CN113596054A - Information intersystem transmission soft frequency hopping encryption method - Google Patents

Information intersystem transmission soft frequency hopping encryption method Download PDF

Info

Publication number
CN113596054A
CN113596054A CN202110912469.2A CN202110912469A CN113596054A CN 113596054 A CN113596054 A CN 113596054A CN 202110912469 A CN202110912469 A CN 202110912469A CN 113596054 A CN113596054 A CN 113596054A
Authority
CN
China
Prior art keywords
message
encryption
algorithm
identification field
transformation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110912469.2A
Other languages
Chinese (zh)
Other versions
CN113596054B (en
Inventor
陈琛
王坤
占怡
朱永成
王慕阳
陈贺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 28 Research Institute
Original Assignee
CETC 28 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 28 Research Institute filed Critical CETC 28 Research Institute
Publication of CN113596054A publication Critical patent/CN113596054A/en
Application granted granted Critical
Publication of CN113596054B publication Critical patent/CN113596054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a soft frequency hopping encryption method for transmission between information systems, which comprises the steps of establishing a message encryption and decryption transformation algorithm set and numbering each algorithm; before sending a message, a sender information system adds an encryption identification field in the header of the message, and the encryption identification field is used for marking the type of the message as a ciphertext or a plaintext; determining the value in the encrypted identification field according to the current time and sending the message, wherein if the type of the message is a ciphertext, the value of the encrypted identification field at the head of the message represents a corresponding encryption transformation algorithm; and after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message, if the message is determined to be a ciphertext, the information system of the receiving party determines a decryption transformation algorithm corresponding to the encryption transformation algorithm of the message according to the value of the encrypted identification field, decrypts the message and then distributes the decrypted message to the inside of the information system of the receiving party. Compared with the prior art, the invention can not only save the encryption machine arranged between the information systems for ensuring the information transmission safety, but also has simple and reliable realization and difficult decoding.

Description

Information intersystem transmission soft frequency hopping encryption method
Technical Field
The invention relates to the technical field of information transmission encryption, in particular to a soft frequency hopping encryption method for transmission between information systems.
Background
At present, the transmission encryption between information systems is mostly realized by arranging a pair of encryptors between the information systems (namely, hardware encryption), and a few methods adopt software encryption. However, the basic principle of both hardware encryption and software encryption is to design a complicated encryption algorithm and to set a key to encrypt and decrypt information, and these require a large investment to design a complicated encryption algorithm. Although these algorithms are very strong in encryption, once broken, new algorithms need to be redesigned.
Disclosure of Invention
In the prior art, most of transmission encryption is encrypted by using a single or a few complex encryption algorithms, but once the encryption algorithms are cracked, new algorithms need to be redesigned. The invention aims to solve the technical problem (or aim) of designing a soft frequency hopping encryption method for transmission among information systems, integrating a large number of known encryption and decryption algorithms or simple encryption and decryption conversion together, and constantly converting the encryption and decryption conversion algorithm used for transmission by using the idea of communication frequency hopping so that the information transmission among the information systems is safer and more reliable and is simple to realize.
The technical scheme is as follows: the invention provides a soft frequency hopping encryption method for transmission between information systems, which comprises the following steps:
step 1, creating a message encryption and decryption transformation algorithm set, and numbering each algorithm in the algorithm set, wherein the message encryption and decryption algorithm set is arranged in a sender information system and a receiver information system; in the invention, the algorithms in the algorithm set can be numbered by using numbers, wherein the numbers are natural numbers, and the numbers corresponding to the algorithms are different and used for distinguishing the algorithms in the algorithm set.
Step 2, before the sender information system sends the message, an encryption identification field is added to the header of the message, and the encryption identification field is used for marking the type of the message as ciphertext or plaintext;
step 3, the sender information system determines the value in the encrypted identification field according to the current time and sends a message, if the type of the message is a ciphertext, the value of the encrypted identification field at the header of the message represents an encrypted transformation algorithm corresponding to the message;
and 4, after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message, if the message is determined to be a ciphertext according to the encrypted identification field, determines a decryption transformation algorithm corresponding to the encryption transformation algorithm of the message according to the value of the encrypted identification field, decrypts the message and distributes the decrypted message to the inside of the information system of the receiving party.
Further, in an implementation manner, the set of message encryption/decryption transformation algorithms created in step 1 includes a first type of algorithm and a second type of algorithm; the algorithm complexity of the first type of algorithm is lower than that of the second type of algorithm, and the number of the first type of algorithm is far larger than that of the second type of algorithm.
In the invention, the message encryption and decryption transformation algorithm set comprises both complex algorithms and a large number of simple transformation algorithms; the simple transformation algorithm comprises parity transformation, sum 255 transformation (namely the sum of the transformed number and the number before transformation is 255) and the like, and hundreds of algorithm sets are realized by the basic transformation algorithm and the byte sequence to be transformed in each message.
Specifically, regarding the algorithm complexity of the first-class algorithm and the second-class algorithm, in terms of a single algorithm, if the algorithm is easy to crack, the algorithm complexity of the algorithm is low, the algorithm belongs to the first-class algorithm of the present invention, for example, a transformation algorithm such as parity transformation is the first-class algorithm, and if the algorithm is difficult to crack, the algorithm complexity of the algorithm is high, the algorithm belongs to the second-class algorithm of the present invention, for example, DES, AES, RSA, and the like. In the invention, if the message encryption and decryption transformation algorithm set only adopts the first type of algorithm, technicians for researching cryptography can easily crack the message as long as a certain amount of sample data exists, but the invention is characterized in that dozens or even hundreds of simple encryption and decryption algorithms are adopted, so that a person trying to crack the message cannot find enough comparison samples. Meanwhile, the message encryption and decryption transformation algorithm set of the invention also has a complex second type algorithm mixed in a large number of first type algorithms, thereby further improving the complexity of the message encryption and decryption algorithm set and further improving the safety of the method.
In addition, in the invention, each message is only provided with an encryption identification field and generally does not exceed 8 bits, although the maximum number of algorithms in an encryption and decryption algorithm set is limited to be not more than 255, because communication resources are precious for information system transmission, especially when radio station wireless transmission is utilized, excessive data volume cannot be increased due to encryption, therefore, the invention can avoid causing excessive communication transmission burden to the information system while encrypting the message.
Further, in one implementation, the step 2 includes:
if the message is a plaintext, namely the message is not encrypted, setting the encryption identification field to be 0;
if the message is a ciphertext, namely the message needs to be encrypted, setting the encryption identification field to be an integer larger than 0, wherein the value of the encryption identification field represents an encryption transformation algorithm corresponding to the message, and the encryption transformation algorithm is one algorithm in an encryption algorithm set.
Further, in an implementation manner, the generating a random integer according to time in step 3 includes:
selecting current astronomical time as current time, and keeping the precision to microsecond; rounding the astronomical time as the random integer; in the invention, the current time can also be GPS time.
If the sending time is different, the adopted encryption and decryption transformation algorithms are also different. In the invention, different encryption and decryption transformation algorithms are adopted for the messages with different sending opportunities, as communication frequency hopping is.
Further, in one implementation, the step 3 includes:
if the type of the message is a ciphertext, the sender information system generates a random integer according to the current time;
the total number of the algorithms in the algorithm set is complemented with the generated random integer to obtain a remainder;
and taking the remainder as the value of an encryption identification field of the message header and sending the message.
Further, in an implementation manner, in the step 3, if the remainder is 0, it indicates that the message sent this time is a plaintext;
if the remainder is not 0, the message sent this time is indicated to be a ciphertext, an encryption and decryption transformation algorithm corresponding to the remainder is selected to encrypt the message, and then the encrypted message is sent.
Further, in an implementation manner, the step 4 includes:
after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message;
if the encryption identification field of the message is 0, the message is represented as a plaintext and is directly distributed to the inside of a system for use;
if the encryption identification field of the message is not 0, the message is represented as a ciphertext, the message is decrypted by using a corresponding encryption and decryption transformation algorithm according to the value of the encryption identification field, and then the decrypted plaintext is distributed to the inside of a system for use.
Has the advantages that: the invention integrates a large number of encryption and decryption transformation algorithms, and can effectively ensure the security of message transmission between information systems by generating random numbers related to time and selecting the corresponding encryption and decryption transformation algorithms to carry out encryption transmission on the messages. The invention has simple and reliable realization principle, and is a simple, reliable and effective transmission soft frequency hopping encryption method proved by system engineering practice.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of parity transformation algorithm in a soft frequency hopping encryption method for information intersystem transmission according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a sum 255 transformation algorithm in a soft frequency hopping encryption method for information intersystem transmission according to an embodiment of the present invention;
fig. 3 is a schematic diagram of soft frequency hopping encryption supporting 16 encryption transformation algorithms in a method for soft frequency hopping encryption for inter-information system transmission according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
The embodiment of the invention discloses a soft frequency hopping encryption method for transmission between information systems, wherein the soft frequency hopping is provided relative to a frequency hopping concept in the communication field, the method is applied to data transmission encryption between the information systems, and the data transmission not only refers to IP data transmission, but also comprises non-IP data transmission, such as radio station point-to-point data transmission, Modem-to-Modem data transmission, serial data transmission and the like. By integrating a large number of known encryption and decryption algorithms or simple encryption and decryption transformation, the encryption and decryption transformation algorithm used for transmitting the message is continuously transformed when the message is sent by the information system, so that the encryption and decryption transformation algorithm is simpler, more stable and more effective than a single encryption and decryption algorithm.
The embodiment of the invention provides a soft frequency hopping encryption method for transmission between information systems, which comprises the following steps:
step 1, creating a message encryption and decryption transformation algorithm set, and numbering each algorithm in the algorithm set, wherein the message encryption and decryption algorithm set is arranged in a sender information system and a receiver information system; in the invention, the algorithms in the algorithm set can be numbered by using numbers, wherein the numbers are natural numbers, and the numbers corresponding to the algorithms are different and used for distinguishing the algorithms in the algorithm set.
Step 2, before the sender information system sends the message, an encryption identification field is added to the header of the message, and the encryption identification field is used for marking the type of the message as ciphertext or plaintext;
step 3, the sender information system determines the value in the encrypted identification field according to the current time and sends a message, if the type of the message is a ciphertext, the value of the encrypted identification field at the header of the message represents an encrypted transformation algorithm corresponding to the message;
and 4, after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message, if the message is determined to be a ciphertext according to the encrypted identification field, determines a decryption transformation algorithm corresponding to the encryption transformation algorithm of the message according to the value of the encrypted identification field, decrypts the message and distributes the decrypted message to the inside of the information system of the receiving party.
The invention provides a soft frequency hopping encryption method for information intersystem transmission, which enables the transmitted information to be difficult to decipher through a continuous random frequency hopping-information transformation encryption and decryption algorithm in the information transmission process. Before sending a message, an information system generates a random number according to time and sets the random number as an encryption identifier; then selecting a corresponding preset encryption transformation algorithm according to the random number, and carrying out encryption transformation on the text of the message; and finally, the transmission process is normally sent. And the receiving end information system selects a corresponding decryption transformation algorithm according to the encryption identification after receiving the encrypted message, and decrypts and transforms the message text to obtain the message text. The soft frequency hopping encryption method for transmission adopts a software method to realize information encryption transmission, not only can save an encryption machine arranged between information systems for ensuring the information transmission safety, but also has simple and reliable realization and difficult deciphering.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, the set of encryption/decryption transformation algorithms for the packet created in step 1 includes a first type of algorithm and a second type of algorithm; the algorithm complexity of the first type of algorithm is lower than that of the second type of algorithm, and the number of the first type of algorithm is far larger than that of the second type of algorithm.
In the invention, the message encryption and decryption transformation algorithm set comprises both complex algorithms and a large number of simple transformation algorithms; the simple transformation algorithm comprises parity transformation, sum 255 transformation (namely the sum of the transformed number and the number before transformation is 255) and the like, and hundreds of algorithm sets are realized by the basic transformation algorithm and the byte sequence to be transformed in each message.
Specifically, regarding the algorithm complexity of the first-class algorithm and the second-class algorithm, in terms of a single algorithm, if the algorithm is easy to crack, the algorithm complexity of the algorithm is low, the algorithm belongs to the first-class algorithm of the present invention, for example, a transformation algorithm such as parity transformation is the first-class algorithm, and if the algorithm is difficult to crack, the algorithm complexity of the algorithm is high, the algorithm belongs to the second-class algorithm of the present invention, for example, DES, AES, RSA, and the like. In the invention, if the message encryption and decryption transformation algorithm set only adopts the first type of algorithm, technicians for researching cryptography can easily crack the message as long as a certain amount of sample data exists, but the invention is characterized in that dozens or even hundreds of simple encryption and decryption algorithms are adopted, so that a person trying to crack the message cannot find enough comparison samples. Meanwhile, the message encryption and decryption transformation algorithm set of the invention also has a complex second type algorithm mixed in a large number of first type algorithms, thereby further improving the complexity of the message encryption and decryption algorithm set and further improving the safety of the method.
Referring to fig. 1, a first type of algorithm, such as parity transformation, is shown as an encryption and decryption algorithm for a message, where a sequence number indicates a sequence number of each byte in the message, and many transformation algorithms can be implemented by parity transformation: as with the first parity transformation, all bytes of the message may be parity transformed; or, the second parity transformation, which can perform parity transformation on odd bytes of the message; or, the third parity transformation, which can perform parity transformation on even bytes of the message; alternatively, the fourth parity transformation may be a parity transformation of 1, 2, 3, 5, 7, 11, 17.
Referring to fig. 2, a first type of algorithm, such as sum 255 transformation, is shown as an encryption and decryption algorithm for a message, where the 255 transformation, i.e., the "sum 255" transformation (the transformed number is 255 minus the value of the byte itself), and a wide variety of transformation algorithms can be extended: as the first and 255 transformations, all bytes of the message may be summed to 255; or, the second sum 255 transformation may perform sum 255 transformation on odd bytes of the message; or, the third sum 255 transformation, which can perform sum 255 transformation on even bytes of the message; alternatively, the fourth and 255 transformations may be performed on 1, 2, 3, 5, 7, 11, 17.. bytes of the message and transformed to 255, etc.
There are many similar transformation algorithms that can be used as the basis of the first type of algorithm, such as transformation with a sum of 200 for a number within 200, and a number above 200 is unchanged; 0 and 255 are unchanged, and the sum of other numbers is 255; the sum of numbers within 127 is 127 transformation, the sum of numbers from 128 to 255 is 383 transformation, and the like.
By using the basic transformation algorithms, hundreds of algorithm sets can be realized by transforming different byte sequences of the message.
In addition, in the invention, each message is only provided with an encryption identification field and generally does not exceed 8 bits, although the maximum number of algorithms in an encryption and decryption algorithm set is limited to be not more than 255, because communication resources are precious for information system transmission, especially when radio station wireless transmission is utilized, excessive data volume cannot be increased due to encryption, therefore, the invention can avoid causing excessive communication transmission burden to the information system while encrypting the message.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, step 2 includes:
if the message is a plaintext, namely the message is not encrypted, setting the encryption identification field to be 0;
if the message is a ciphertext, namely the message needs to be encrypted, setting the encryption identification field to be an integer larger than 0, wherein the value of the encryption identification field represents an encryption transformation algorithm corresponding to the message, and the encryption transformation algorithm is one algorithm in an encryption algorithm set.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, the generating a random integer according to time in step 3 includes:
selecting current astronomical time as current time, and keeping the precision to microsecond; rounding the astronomical time as the random integer; in the invention, the current time can also be GPS time. Specifically, the algorithm for generating the time-dependent random number can be realized by a plurality of different methods, the simplest method is to directly select the current astronomical time, the precision is reserved to be in a subtle way, after the completion, the remainder M is obtained by taking the current astronomical time as the random number according to the total number N of the algorithm, and in addition, the simpler method is to obtain the relevant random number through srand rand according to the time value. Referring to fig. 3, the horizontal axis represents time, the vertical axis represents 16 encryption transformation algorithms, and the encryption transformation algorithm f (t) corresponding to the encryption and decryption algorithm set is selected according to the value M to encrypt and transmit the message. Because the sending time of each message is different and not completely continuous, and the M value obtained according to the time is also different and not completely continuous, each transmission encryption is similar to frequency hopping.
If the sending time is different, the adopted encryption and decryption transformation algorithms are also different. In the invention, different encryption and decryption transformation algorithms are adopted for the messages with different sending opportunities, as communication frequency hopping is.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, step 3 includes:
if the type of the message is a ciphertext, the sender information system generates a random integer according to the current time;
the total number of the algorithms in the algorithm set is complemented with the generated random integer to obtain a remainder;
and taking the remainder as the value of an encryption identification field of the message header and sending the message.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, in step 3, if the remainder is 0, it indicates that the message sent this time is a plaintext;
if the remainder is not 0, the message sent this time is indicated to be a ciphertext, an encryption and decryption transformation algorithm corresponding to the remainder is selected to encrypt the message, and then the encrypted message is sent.
In this embodiment, if N represents the total number of algorithms in the algorithm set, the remainder M is obtained by subtracting the total number of algorithms N from the generated random integer, and the value of the message header encryption identifier field is set to be M. If M is 0, the sending is not encrypted; and if M is not 0, selecting an encryption and decryption transformation algorithm corresponding to M to encrypt the message, and then sending the message.
In the method for encrypting transmission soft frequency hopping between information systems according to the embodiment of the present invention, the step 4 includes:
after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message;
if the encryption identification field of the message is 0, the message is represented as a plaintext and is directly distributed to the inside of a system for use;
if the encryption identification field of the message is not 0, the message is represented as a ciphertext, the message is decrypted by using a corresponding encryption and decryption transformation algorithm according to the value of the encryption identification field, and then the decrypted plaintext is distributed to the inside of a system for use.
In the actual information system engineering, by the method, the soft encryption transmission of the messages between the information systems can be realized under the condition of not using special encryption equipment, the realization principle is simple, the encryption and decryption transformation algorithm can use a complex algorithm or a large number of simple transformation algorithms, the investment is less, and the effectiveness is high.
The invention provides a soft frequency hopping encryption method for transmission between information systems, which integrates a large number of known encryption and decryption algorithms or simple encryption and decryption transformation algorithms to form an encryption and decryption transformation algorithm set, generates random numbers related to time by using the idea of communication frequency hopping, further selects the corresponding encryption and decryption transformation algorithms to carry out encryption transmission on messages, and effectively ensures the safety of the messages transmitted between the information systems. The system engineering practice proves that the invention is a simple, reliable and effective transmission soft frequency hopping encryption method, and for persons skilled in the art, on the premise of not departing from the idea of the invention, the soft frequency hopping encryption method can be subjected to a plurality of improvements and decorations, and the improvements and decorations are also regarded as the protection scope of the invention. All the components not specified in the present embodiment can be realized by the prior art.

Claims (7)

1. A soft frequency hopping encryption method for information intersystem transmission is characterized by comprising the following steps:
step 1, creating a message encryption and decryption transformation algorithm set, and numbering each algorithm in the algorithm set, wherein the message encryption and decryption algorithm set is arranged in a sender information system and a receiver information system;
step 2, before the sender information system sends the message, an encryption identification field is added to the header of the message, and the encryption identification field is used for marking the type of the message as ciphertext or plaintext;
step 3, the sender information system determines the value in the encrypted identification field according to the current time and sends a message, if the type of the message is a ciphertext, the value of the encrypted identification field at the header of the message represents an encrypted transformation algorithm corresponding to the message;
and 4, after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message, if the message is determined to be a ciphertext according to the encrypted identification field, determines a decryption transformation algorithm corresponding to the encryption transformation algorithm of the message according to the value of the encrypted identification field, decrypts the message and distributes the decrypted message to the inside of the information system of the receiving party.
2. The encryption method according to claim 1, wherein the set of message encryption/decryption transformation algorithms created in step 1 includes a first type of algorithm and a second type of algorithm; the algorithm complexity of the first type of algorithm is lower than that of the second type of algorithm, and the number of the first type of algorithm is far larger than that of the second type of algorithm.
3. The method according to claim 1, wherein said step 2 comprises:
if the message is a plaintext, namely the message is not encrypted, setting the encryption identification field to be 0;
if the message is a ciphertext, namely the message needs to be encrypted, setting the encryption identification field to be an integer larger than 0, wherein the value of the encryption identification field represents an encryption transformation algorithm corresponding to the message, and the encryption transformation algorithm is one algorithm in an encryption algorithm set.
4. The method as claimed in claim 1, wherein the step 3 of generating random integers according to time comprises:
selecting current astronomical time as current time, and keeping the precision to microsecond; rounding the astronomical time as the random integer;
if the sending time is different, the adopted encryption and decryption transformation algorithms are also different.
5. The method according to claim 1, wherein said step 3 comprises:
if the type of the message is a ciphertext, the sender information system generates a random integer according to the current time;
the total number of the algorithms in the algorithm set is complemented with the generated random integer to obtain a remainder;
and taking the remainder as the value of an encryption identification field of the message header and sending the message.
6. The method according to claim 5, wherein in said step 3, if said remainder is 0, it indicates that said message sent this time is a plaintext;
if the remainder is not 0, the message sent this time is indicated to be a ciphertext, an encryption and decryption transformation algorithm corresponding to the remainder is selected to encrypt the message, and then the encrypted message is sent.
7. The method according to claim 1, wherein said step 4 comprises:
after receiving the message, the information system of the receiving party extracts the encrypted identification field of the header of the message;
if the encryption identification field of the message is 0, the message is represented as a plaintext and is directly distributed to the inside of a system for use;
if the encryption identification field of the message is not 0, the message is represented as a ciphertext, the message is decrypted by using a corresponding encryption and decryption transformation algorithm according to the value of the encryption identification field, and then the decrypted plaintext is distributed to the inside of a system for use.
CN202110912469.2A 2021-07-14 2021-08-10 Method for encrypting transmission soft frequency hopping between information systems Active CN113596054B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110794689 2021-07-14
CN202110794689X 2021-07-14

Publications (2)

Publication Number Publication Date
CN113596054A true CN113596054A (en) 2021-11-02
CN113596054B CN113596054B (en) 2023-05-19

Family

ID=78256734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110912469.2A Active CN113596054B (en) 2021-07-14 2021-08-10 Method for encrypting transmission soft frequency hopping between information systems

Country Status (1)

Country Link
CN (1) CN113596054B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766202A (en) * 2022-11-11 2023-03-07 之江实验室 System, method, storage medium and electronic equipment for data secure transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
CN107424619A (en) * 2017-04-18 2017-12-01 上海擎云物联网股份有限公司 A kind of audio encryption algorithm and user ID authentication method and enciphering identifying method
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client
CN110166242A (en) * 2019-05-22 2019-08-23 吉林亿联银行股份有限公司 Message transmitting method and device
CN111614667A (en) * 2020-05-20 2020-09-01 北京科东电力控制系统有限责任公司 Safety encryption method, device and system for real-time data transmission of power grid regulation and control information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
CN107424619A (en) * 2017-04-18 2017-12-01 上海擎云物联网股份有限公司 A kind of audio encryption algorithm and user ID authentication method and enciphering identifying method
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client
CN110166242A (en) * 2019-05-22 2019-08-23 吉林亿联银行股份有限公司 Message transmitting method and device
CN111614667A (en) * 2020-05-20 2020-09-01 北京科东电力控制系统有限责任公司 Safety encryption method, device and system for real-time data transmission of power grid regulation and control information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766202A (en) * 2022-11-11 2023-03-07 之江实验室 System, method, storage medium and electronic equipment for data secure transmission

Also Published As

Publication number Publication date
CN113596054B (en) 2023-05-19

Similar Documents

Publication Publication Date Title
CN101188496B (en) A SMS encryption transport method
CA2303048C (en) Security method for transmissions in telecommunication networks
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN105376261B (en) Encryption method and system for instant messaging message
US6640303B1 (en) System and method for encryption using transparent keys
CN112073115B (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
CN102469173A (en) IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm
CN1323523C (en) Method of forming dynamic key in radio local network
CN101707767A (en) Data transmission method and devices
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN109787764B (en) Encryption method of secret key
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN103167494A (en) Information sending method and information sending system
CN113596054B (en) Method for encrypting transmission soft frequency hopping between information systems
CN107659405B (en) The encrypting and decrypting method of data communication between a kind of substation boss station
CN109462480B (en) Satellite communication system encryption method based on RSA and AES
CN111800784A (en) Block chain cloud service system based on cloud computing
CN104579645B (en) Key updating method based on AES encryption system
CN113132980B (en) Key management system method and device applied to Beidou navigation system
CN112291196B (en) End-to-end encryption method and system suitable for instant messaging
EP2047631B1 (en) Method for establishing a secret key between two nodes in a communication network
JPH08204701A (en) Electronic mail cipher communication system and cipher communication method
JP2005051368A (en) Communication apparatus, base station apparatus and communication system
CN116743505B (en) Safety transmission encryption method based on national secret
CN108632215B (en) Digital communication encryption and decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant