CN114268425A - Information encryption transmission method and device, electronic equipment and storage medium - Google Patents

Information encryption transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114268425A
CN114268425A CN202111570495.8A CN202111570495A CN114268425A CN 114268425 A CN114268425 A CN 114268425A CN 202111570495 A CN202111570495 A CN 202111570495A CN 114268425 A CN114268425 A CN 114268425A
Authority
CN
China
Prior art keywords
encryption
chaotic
keys
transaction information
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111570495.8A
Other languages
Chinese (zh)
Other versions
CN114268425B (en
Inventor
肖倩兮
张志辉
胡平
黄文琳
唐正
陈晓林
黎海辉
周隽杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202111570495.8A priority Critical patent/CN114268425B/en
Publication of CN114268425A publication Critical patent/CN114268425A/en
Application granted granted Critical
Publication of CN114268425B publication Critical patent/CN114268425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The disclosure provides an information encryption transmission method, an information encryption transmission device, electronic equipment and a storage medium, and relates to the technical field of big data privacy protection, wherein the method comprises the following steps: the method comprises the steps of obtaining transaction information generated by a user in a transaction terminal, generating three encryption keys by adopting a pre-constructed chaotic system, carrying out triple DES encryption on the transaction information by adopting the three encryption keys, and transmitting the encrypted transaction information, wherein the chaotic system can improve the randomness of the encryption keys to ensure that the keys are not easy to crack, and 3DES is adopted to increase the key length to effectively resist attack, so that the security of transaction information transmission is improved.

Description

Information encryption transmission method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the technical field of big data privacy protection, and in particular, to an information encryption transmission method and apparatus, an electronic device, and a storage medium.
Background
Under the background of rapid development of electronic commerce, the online payment service of China is widely popularized through the vigorous promotion of banks and payment mechanisms. Currently, several mainstream online payment organization forms are formed in the market, including a strongly coupled merchant-payment mechanism mode, a loosely coupled merchant-payment mechanism mode, a gateway type merchant-bank mode, and a comprehensive merchant-card organization mode. In either mode, the card organization acts as a bank card transfer clearing structure, linking the acquirer and the issuer to enable normal flow and execution of banking transactions, where the importance of the transfer transaction and the cardholder's information security is self evident.
In the related technology, a traditional ECB (electronic codebook) mode is generally adopted to encrypt transaction information, and a seed key of an encryption algorithm is fixed and unchangeable, that is, each group of plaintext packets adopts the same initial key, although a key expansion scheme in the encryption process can avoid a simple mathematical relationship between a round key and a seed key, because of the reversibility of the key expansion scheme, the work load and complexity of deriving the seed key can be reduced due to the leakage of the round key, and once the fixed seed key is cracked, the information security of the whole encryption system faces serious threat.
Disclosure of Invention
The present disclosure provides an information encryption transmission method, apparatus, electronic device and storage medium, which are intended to solve at least one of the technical problems in the related art to some extent.
An embodiment of a first aspect of the present disclosure provides an information encryption transmission method, including: acquiring transaction information generated by a user in a transaction terminal; generating three encryption keys by adopting a pre-constructed chaotic system; three encryption keys are adopted to carry out triple DES encryption on transaction information; and transmitting the encrypted transaction information.
An embodiment of a second aspect of the present disclosure provides an information decryption method, including: receiving encrypted transaction information encrypted by triple DES, wherein three encryption keys encrypted by triple DES are generated by an encryption end chaotic system; and decrypting the encrypted transaction information by adopting the three decryption keys to obtain the transaction information, wherein the three decryption keys are the same as the three encryption keys.
An embodiment of a third aspect of the present disclosure provides an information encryption transmission apparatus, including: the acquisition module is used for acquiring transaction information generated by a user in a transaction terminal; the generating module is used for generating three encryption keys by adopting a pre-constructed chaotic system; the encryption module is used for carrying out triple DES encryption on the transaction information by adopting three encryption keys; and the transmission module is used for transmitting the encrypted transaction information.
An embodiment of a fourth aspect of the present disclosure provides an information decryption apparatus, including: the receiving module is used for receiving encrypted transaction information encrypted by triple DES, wherein three encryption keys encrypted by triple DES are generated by an encryption end chaotic system; and the decryption module is used for decrypting the encrypted transaction information by adopting three decryption keys to obtain the transaction information, wherein the three decryption keys are the same as the three encryption keys.
An embodiment of a fifth aspect of the present disclosure provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to execute the instructions to implement the information encryption transmission method or to execute the information decryption method.
A sixth aspect of the present disclosure provides a computer-readable storage medium, where instructions, when executed by a processor of an electronic device, enable the electronic device to perform an information encryption transmission method or an information decryption method.
A seventh embodiment of the disclosure proposes a computer program product, comprising a computer program, characterized in that the computer program is executed by a processor for an information encryption transmission method, or for an information decryption method.
In the embodiment, transaction information generated by a user in a transaction terminal is acquired, a pre-constructed chaotic system is adopted to generate three encryption keys, the three encryption keys are adopted to carry out triple DES encryption on the transaction information, the encrypted transaction information is transmitted, the randomness of the encryption keys can be improved according to the characteristics of the chaotic system, such as the non-periodicity, the randomness, the initial state and the extreme sensitivity to control parameters, so that the keys are not easy to crack, the length of the keys can be increased by adopting a 3DES encryption technology, brute force attack and plaintext attack can be effectively resisted, and therefore, in a payment scene of electronic commerce, the scheme can effectively encrypt the transaction information of the user, the transaction information plaintext is prevented from being attacked and leaked in the transmission process, and the transaction safety is improved.
Additional aspects and advantages of the disclosure will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The foregoing and/or additional aspects and advantages of the present disclosure will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart illustrating an information encryption transmission method according to a first embodiment of the present disclosure;
FIG. 2 is a schematic diagram of an information encryption transmission system shown in accordance with the present disclosure;
fig. 3 is a schematic diagram of a 3DES encryption and decryption process shown in accordance with the present disclosure;
FIG. 4 is a schematic diagram of a transaction information block encryption process shown in accordance with the present disclosure;
FIG. 5 is a flow diagram illustrating a plaintext block encryption process according to the present disclosure;
fig. 6 is a flow diagram illustrating an encryption key permutation sub-key process according to the present disclosure;
fig. 7 is a flowchart illustrating an information encryption transmission method according to a second embodiment of the present disclosure;
fig. 8 is a flowchart illustrating an information encryption transmission method according to a third embodiment of the present disclosure;
fig. 9 is a schematic flow chart diagram illustrating an information decryption method according to a fourth embodiment of the present disclosure;
FIG. 10 is a flow chart illustrating an encryption method based on the chaotic system and the 3DES algorithm according to the present disclosure;
fig. 11 is a block diagram of an information encryption transmission apparatus shown according to the present disclosure;
FIG. 12 is a block diagram of an information decryption device shown in accordance with the present disclosure;
FIG. 13 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present disclosure.
Detailed Description
Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of illustrating the present disclosure and should not be construed as limiting the same. On the contrary, the embodiments of the disclosure include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
Aiming at the technical problem that the information security of the whole encryption system faces serious threat due to the reversibility of a key expansion scheme mentioned in the background art, the technical scheme of the embodiment provides an information encryption transmission method, and the method is explained by combining a specific embodiment.
It should be noted that the execution main body of the information encryption transmission method of this embodiment may be an information encryption transmission apparatus, the apparatus may be implemented by software and/or hardware, the apparatus may be configured in an electronic device, and the electronic device may include, but is not limited to, a terminal, a server, and the like.
Fig. 1 is a schematic flow chart of an information encryption transmission method according to a first embodiment of the present disclosure, as shown in fig. 1, the method includes:
s101: acquiring transaction information generated by a user performing transaction at a transaction terminal.
In the embodiment of the disclosure, transaction information (which may also be referred to as plaintext to be encrypted) generated when a user performs a transaction at a transaction terminal is first obtained.
The transaction terminal may be, for example, a POS machine, an ATM cash dispenser, and any other possible transaction device, but is not limited thereto.
And information generated by a user conducting a transaction at a POS or ATM cash machine may be referred to as transaction information, such as: without limitation, the card holder's card number, password, track, cvv2, chip card data, and any other possible information.
FIG. 2 is a schematic diagram of an information encryption transmission system according to the present disclosure, as shown in FIG. 2, in which a cardholder (user) may make a payment through a merchant's POS during a transaction with the merchant; further, the merchant can be used as a requester to send the transaction information of the cardholder to the acquiring system; the card organization is used as a bank card transfer clearing structure to connect the acquiring system and the issuing bank, so that the bank business of the other generation and the other generation can be normally transferred and executed. The acquiring system is directly connected with the card organization through the front-end processor, and transmits the transaction information to the front-end processor for encryption in the process of transmitting the transaction information to the card organization, namely, the information encryption transmission method provided by the embodiment of the disclosure can be operated on the front-end processor.
It should be noted that, in the technical solution of the present disclosure, the processing such as collection, acquisition, storage, and application of the related operation data is performed after authorization by the user, and all of the processing are in accordance with the regulations of the relevant laws and regulations, and do not violate the good customs of the public order.
S102: three encryption keys are generated by adopting a pre-constructed chaotic system.
The chaotic system is a deterministic pseudo-random process, wherein the chaotic system refers to a chaotic phenomenon that random irregular motion exists in a deterministic system, the behavior of the chaotic system is represented by uncertainty, unrepeatability and unpredictability, an iterative model can be expressed by a nonlinear equation, an iterative output sequence seems to have disordered noise, and useful information can be well covered when the chaotic system is used for encryption. In some embodiments, the chaotic system may be, for example, a one-dimensional chaotic system or other forms of chaotic systems, which are not limited in this respect. The chaotic system is completely determined by an analytic equation, control parameters and initial conditions, and only the same initial control parameters and the same initial values can restore chaotic signals.
In the embodiment of the present disclosure, an encryption key (which may also be referred to as a seed key) may be generated using a chaotic system. The number and length of the encryption keys may be related to the encryption method, for example: in the embodiment of the disclosure, a 3DES encryption algorithm can be used for encryption, and three encryption keys need to be generated by using a chaotic system, and each encryption key has a length of 64 bits. Therefore, the generated encryption key has randomness, the encryption key is not easy to be reversely cracked, and the security of subsequent information encryption is improved.
S103: and three encryption keys are adopted to carry out triple DES encryption on the transaction information.
After the transaction information and the three encryption keys are obtained, further, the embodiment of the disclosure may adopt the three encryption keys to perform triple DES encryption on the transaction information.
Fig. 3 is a schematic diagram of a 3DES encryption and decryption process shown according to the present disclosure, and as shown in fig. 3, k1, k2, and k3 respectively represent three encryption keys, and in the triple DES encryption process of transaction information, the transaction information is DES encrypted by sequentially using k1, k2, and k 3.
In some embodiments, the three encryption keys k1, k2, k3 are different from each other, so the effective key length can reach 168 bits (each encryption key removes 8 check bits); in other embodiments, two of the three encryption keys k1, k2, k3 are the same, for example: k1, k3 are the same, the effective key length can be up to 112 bits (8 parity bits are removed per encryption key).
In the encryption process, three encryption keys k1, k2 and k3 can be adopted to sequentially carry out DES encryption-DES decryption-DES encryption operation on transaction information, so that the capability of resisting exhaustive attack is greatly improved.
For example, if the transaction information is denoted by P and the encrypted transaction information is denoted by C, the triple DES encryption process can be expressed as:
C=Ek3(Dk2(Ek1(P)))
wherein E isk1(P) denotes a first heavy DES encryption of the transaction information P with an encryption key k1, Dk2(Ek1(P)) denotes second heavy DES decryption with k2 on the basis of the first heavy DES encryption, Ek3(Dk2(Ek1(P))) indicates that the encryption key k3 is used to perform a third DES encryption using k3 in addition to the second DES encryption, resulting in triple DES encrypted transaction information C (which may also be referred to as encrypted plaintext).
Fig. 4 is a schematic diagram of a transaction information block encryption process shown according to the present disclosure, and as shown in fig. 4, in an actual 3DES encryption process, the transaction information may be divided into a plurality of plaintext blocks, for example: plaintext block 1, plaintext block 2, plaintext block n, each plaintext block may be 64-bit data, and each plaintext block is encrypted by 3DES using three encryption keys to obtain a plurality of ciphertext blocks, for example: the ciphertext block 1, the ciphertext block 2, the ciphertext block n and the ciphertext blocks jointly form encrypted transaction information.
In some embodiments, fig. 5 is a flowchart of a plaintext block encryption process according to the disclosure, and as shown in fig. 5, in the process of performing DES encryption for each plaintext block, first, a 64-bit plaintext block is Initially Permuted (IP) to obtain a new 64-bit data whose position is scrambled according to a certain rule, and the data is divided into a left part and a right part, where the left 32 bits are L0, and the right is R0; further, 16 rounds of iteration are carried out, and in each iteration, the right data (Rn-1) of the previous round is directly used as the left data (Ln-Rn-1) of the current round; and inputting the right data (Rn-1) of the upper round and the upper round sub key (Kn-1) into F (Kn-1, Rn-1) to perform functional operation to obtain 32-bit output, and taking the result of XOR of the 32 bits and the left data (Ln-1) of the upper round as the right data of the round (namely Rn ═ Ln-1 ^ F (Kn-1, Rn-1)). The first 15 rounds of calculation (n is 1-15) are equivalent to left and right exchange after each calculation, and then the calculation is assigned to a new left part and a new right part; the first 15 rounds of operations (n ═ 1 to 15) are equivalent to left-right exchange after each operation, and the left-right exchange is not performed after the last round of operations (n ═ 16) and the assignment is directly performed (or the left-right exchange operation can be performed after each round of iterative operations, and the left-right exchange operation can be performed after 16 rounds of iterative operations are completed). The results L16 and R16 after 16 rounds of iteration are spliced into 64 bits, and then Inverse Initial Permution (IP-1) is performed once again, so that the final 64-bit ciphertext output is obtained. Both IP permutation and IP-1 permutation are linear transformations, with 64-bit inputs corresponding to 64-bit outputs, i.e.: the corresponding 64-bit cipher text block is output.
It should be noted that, in the above embodiments, each round of encrypted sub-key k is1~k16The encryption keys are obtained by replacing encryption keys, and three encryption keys can obtain three groups of sub-keys. Specifically, fig. 6 is a flow chart illustrating a process of permuting a sub-KEY by an encryption KEY according to the present disclosure, where as shown in fig. 6, an initial 64-bit encryption KEY first discards 8 th, 16 th, 24 th, 32 th, 40 th, 48 th, 56 th, 64 th check bits, and the remaining 56 th bits (i.e., the initial KEY) are changed by one set, and the two steps are implemented by PC-1 permutation. The obtained 56-bit data is also divided into left and right parts like in the encryption process, wherein the left 28-bit data is C0, and the right 28-bit data is D0, and then 16 iterations are carried out. And respectively circularly and leftwards shifting Cn and Dn (n is 1-16) in each iteration, wherein the number of bits of left shift in each iteration is different and is determined by the number of turns. And each round of left shift generates the next round of Cn and Dn, the Cn and Dn of each round are spliced into 56 bits, and the 56 bits are compressed and replaced by PC-2, so that the sub-key output Kn of each round can be obtained. PC-1 permutation and PC-2 permutation are transformed according to DES encryption algorithm standard until k is obtained1~k16. The way in which each encryption key replaces a sub-key is the same and will not be described herein.
S104: and transmitting the encrypted transaction information.
After the transaction information is encrypted by the 3DES, further, the embodiment of the present disclosure may transmit the encrypted transaction information, for example: transmitted to the card organization.
In the embodiment, transaction information generated by a user in a transaction terminal is acquired, the three encryption keys are generated by adopting the pre-constructed chaotic system, the three encryption keys are adopted to carry out triple DES encryption on the transaction information, and the encrypted transaction information is transmitted, the chaotic system can be used for improving the randomness of the encryption keys to ensure that the keys are not easy to crack, and 3DES is used for increasing the length of the keys to effectively resist attack, so that the security of transaction information transmission is improved.
Fig. 7 is a flowchart illustrating an information encryption transmission method according to a second embodiment of the present disclosure, where as shown in fig. 7, the method includes:
s701: acquiring transaction information generated by a user performing transaction at a transaction terminal.
For specific description of S701, reference may be made to the above embodiments, which are not described herein again.
S702: and generating three first sub-keys by adopting a first chaotic mapping algorithm in the chaotic system.
As described in the foregoing embodiments, the iterative process of the chaotic system can be expressed by a non-linear equation (also referred to as a chaotic mapping algorithm), and the chaotic system of the embodiments of the present disclosure can be a hybrid system, and the system can include two or more chaotic mapping algorithms.
For example, the chaotic system provided by the embodiment of the present disclosure may include two chaotic algorithms, a first chaotic mapping algorithm and a second chaotic mapping algorithm, where the first chaotic mapping algorithm and the second chaotic mapping algorithm may be one of a Logistic chaotic mapping algorithm, a Chebyshev chaotic mapping algorithm, a Gussian chaotic mapping algorithm, and any other possible chaotic mapping algorithm, and the first chaotic mapping algorithm and the second chaotic mapping algorithm are different, for example: the first chaos mapping algorithm is a Logistic chaos mapping algorithm, and the second chaos mapping algorithm is a Chebyshev chaos mapping algorithm.
In the process of generating the encryption key, a first chaotic mapping algorithm (Logistic chaotic mapping) in the chaotic system may be adopted to generate a first sub-key for each encryption key, so as to obtain three first sub-keys, where the first sub-keys are partial keys of the encryption key, for example: the first partial key is 32 bits.
In some embodiments, in generating the first partial key, a first initial sequence (which may also be referred to as a chaotic variable) and a first number of iterations N are first determined.
Further, a first chaotic mapping algorithm (Logistic chaotic mapping) is initialized, wherein the Logistic chaotic mapping algorithm can be expressed as: x is the number ofn+1=μxn(1-xn),xnFor the first initial sequence, mu is a control parameter of a Logistic chaotic mapping algorithm, and mu belongs to (0, 4)]To control the parameters of the chaotic equation morphology. When the value of μ is determined, for any first initial sequence e (0,1), the same number of iterations results in a determined and identical sequence of values. Along with the continuous increase of the mu value, the system characteristics are presented differently, when the mu value is increased to a certain degree, the sequence value presents uncertainty, does not converge to a fixed value, has ergodicity, can generate a cycle bifurcation phenomenon after repeatedly going through the process, and generates a chaos phenomenon when the mu value is more than 3.57. After the first chaotic mapping algorithm is initialized, further, the first initial sequence is iterated based on the first chaotic mapping algorithm and the first iteration number N to obtain a first chaotic sequence, that is, the first initial sequence is iterated N times (for example, 16 times) based on the first chaotic mapping algorithm, and the iterated sequence may be referred to as a first chaotic sequence. Further, a target sequence of a specified position is selected from the first chaotic sequence as a first sub-key, wherein the specified position can be flexibly set according to practical application without limitation.
In some embodiments, the effect of the plaintext (i.e., transaction information) to be encrypted may also be introduced in the course of performing the iteration. Specifically, in this embodiment, the number n and m of plaintext blocks can be obtained according to the length len of the plaintext to be encrypted, where n represents the number len/8 of block groups, and m represents the remaining number len% 8 of bytes after blocking. In the operation of obtaining the first chaotic sequence by iterating the first initial sequence based on the first chaotic mapping algorithm and the first iteration number, the iteration number may be determined to be the sum of the first iteration number and the number of blocks of the transaction information, that is: n + N, and then performing N + N iterations on the first initial sequence based on a first chaotic mapping algorithm to obtain a first chaotic sequence. Therefore, the characteristics of the plaintext to be encrypted are utilized in the process of generating the encryption key, and the change of the plaintext to be encrypted can directly influence the encryption key, so that the randomness of the key is further improved.
S703: and generating three second sub-keys by adopting a second chaotic mapping algorithm in the chaotic system, wherein the first chaotic mapping algorithm is different from the second chaotic mapping algorithm.
Moreover, a second chaotic mapping algorithm (Chebyshev chaotic mapping) in the chaotic system may be adopted to generate a second sub-key for each encryption key, so as to obtain three second sub-keys, where the second sub-keys are partial keys of the encryption key, for example: the second partial key is 32 bits.
In some embodiments, in generating the second partial key, a second initial sequence (which may also be referred to as a chaotic variable) and a second iteration number N are first determined.
Further, a second chaos mapping algorithm (Chebyshev chaos mapping) is initialized, and the Chebyshev chaos mapping can be expressed as: x is the number ofn+1=f(Xn)=cos(k cos-1xn),-1<xn<The Chebyshev chaotic mapping takes an order k as a parameter, when the k is more than or equal to 2, the Chebyshev mapping is in a chaotic phenomenon, the mapping enters mixed purity, the mapping is uniformly distributed on a value of an interval, the value range is wide, and the key space is large. Further, the second initial sequence is iterated based on the second chaotic mapping algorithm and the second iteration number N to obtain a second chaotic sequence, that is, the second initial sequence is iterated N times (for example, 16 times) based on the second chaotic mapping algorithm, and the iterated sequence may be referred to as a second chaotic sequence. Further, a target sequence of a specified position is selected from the second chaotic sequence as a second partial key.
It should be noted that, in the process of generating the second partial key, the influence of the plaintext block on the iteration number may also be introduced, which is similar to the above process of generating the first partial key, and is not described herein again.
S704: and respectively carrying out cross combination on the three first sub-keys and the three second sub-keys to obtain three encryption keys.
After the three first sub-keys and the three second sub-keys are obtained, each first sub-key and the corresponding second sub-key are respectively cross-combined to obtain a 64-bit encryption key, that is, different chaotic mapping algorithms can be adopted to respectively generate partial keys in the embodiment of the disclosure, and a plurality of (for example, two) partial keys are further respectively spliced to obtain a plurality of encryption keys.
Therefore, the embodiment of the disclosure can generate part of the keys by adopting a mixed chaotic mapping algorithm, and then cross-combine to obtain the final encryption key, thereby further improving the randomness of the encryption key, enhancing the cracking difficulty of the encryption key, and further improving the security of the key.
S705: and three encryption keys are adopted to carry out triple DES encryption on the transaction information.
S706: and transmitting the encrypted transaction information.
For specific descriptions of S705-S706, reference may be made to the above embodiments, which are not described herein again.
In the embodiment, transaction information generated by a user in a transaction terminal is acquired, the three encryption keys are generated by adopting the pre-constructed chaotic system, the three encryption keys are adopted to carry out triple DES encryption on the transaction information, and the encrypted transaction information is transmitted, the chaotic system can be used for improving the randomness of the encryption keys to ensure that the keys are not easy to crack, and 3DES is used for increasing the length of the keys to effectively resist attack, so that the security of transaction information transmission is improved. In addition, the embodiment of the disclosure can adopt a mixed chaotic mapping algorithm to generate part of keys, and then cross-combine to obtain a final encryption key, thereby further improving the randomness of the encryption key, enhancing the cracking difficulty of the encryption key, and further improving the security of the key. In addition, the characteristics of the plaintext to be encrypted are utilized in the process of generating the encryption key, and the change of the plaintext to be encrypted can directly influence the encryption key, so that the randomness of the key is further improved.
Fig. 8 is a flowchart illustrating an information encryption transmission method according to a third embodiment of the present disclosure, where as shown in fig. 8, the method includes:
s801: acquiring transaction information generated by a user performing transaction at a transaction terminal.
For specific description of S801, refer to the above embodiments, which are not described herein.
S802: the remainder of the quotient operation of the length in bytes of the transaction information and 8 is calculated.
In the process of performing 3DES encryption, the transaction information needs to be blocked, the data size of each plaintext block is 8 bytes, and in practical application, the byte length of the transaction information may not be an integral multiple of 8.
For example, the byte length of the transaction information may be represented by x, the plaintext block size is fixed to 8 bytes, and the remainder may be represented by a, where a is x% 8.
S803: and in the case that the remainder is not zero, padding the byte length of the transaction information.
Further, it is determined whether the remainder a is zero, and if the remainder a is not zero, the byte length of the transaction information is padded (or referred to as padding), where the padded byte number is: 8- (x% 8), the byte length of the corresponding padded transaction data is x + (8- (x% 8)). In some embodiments, the Padding may be performed by using a PKCS5Padding method, or may also be performed by using any other possible algorithm, which is not limited thereto. Therefore, the embodiment of the disclosure can fill the transaction data, and is beneficial to the operation of block encryption.
S804: three encryption keys are generated by adopting a pre-constructed chaotic system.
S805: and three encryption keys are adopted to carry out triple DES encryption on the transaction information.
S806: and transmitting the encrypted transaction information.
For specific descriptions of S804-S806, reference may be made to the above embodiments, which are not described herein again.
In the embodiment, transaction information generated by a user in a transaction terminal is acquired, the three encryption keys are generated by adopting the pre-constructed chaotic system, the three encryption keys are adopted to carry out triple DES encryption on the transaction information, and the encrypted transaction information is transmitted, the chaotic system can be used for improving the randomness of the encryption keys to ensure that the keys are not easy to crack, and 3DES is used for increasing the length of the keys to effectively resist attack, so that the security of transaction information transmission is improved. In addition, the embodiment of the disclosure can fill the transaction data, which is beneficial to the operation of block encryption.
Fig. 9 is a flowchart illustrating an information decryption method according to a third embodiment of the present disclosure, as shown in fig. 9, the method including:
s901: and receiving encrypted transaction information encrypted by the triple DES, wherein three encryption keys encrypted by the triple DES are generated by an encryption-side chaotic system.
As shown in fig. 2, embodiments of the present disclosure may be performed by a card organization, which may receive encrypted transaction information transmitted by a front-end processor of an acquirer system.
The encrypted transaction information is obtained by encrypting the transaction information by using a 3DES encryption algorithm, and the encryption key is generated by a chaotic system preset by an encryption terminal (i.e., a front-end processor).
S902: and decrypting the encrypted transaction information by using the three decryption keys to obtain the transaction information, wherein the three decryption keys are the three decryption keys.
Further, the card organization may decrypt the encrypted transaction information using three decryption keys to obtain the transaction information.
Wherein, three decryption keys are the same, but in different order, for example: the sub-key sequence of the encryption key is k1、k2、...、k16If the corresponding decryption key is a secretThe key sequence is k16、k15、...、k1
For example, as shown in fig. 3, for example, if the encrypted transaction information is represented by C and the transaction information is represented by P, the decryption process can be represented as: p ═ Dk1(Ek2(Dk3(C) )) that is: the transaction information P is obtained by firstly using K3 for decryption, then using K2 for encryption and finally using K1 for decryption.
It should be noted that the chaotic systems with the same parameters can be set at the encryption end (front-end processor) and the decryption end (card organization), and the chaotic systems at the two ends respectively generate an encryption key and a decryption key, thereby realizing the secure transmission of the transaction information.
In some embodiments, the transaction information is subjected to a padding operation prior to encryption, such as: the m bytes are padded such that the byte length of the encryption information is an integer multiple of 8. In this case, m bytes can be deleted from the tail of the data after decryption, and the remaining data is the original text of the transaction information before encryption.
According to the embodiment of the disclosure, the encrypted transaction information encrypted by the triple DES is received, wherein three encryption keys encrypted by the triple DES are generated by the encryption-end chaotic system, and the encrypted transaction information is decrypted by adopting three decryption keys to obtain the transaction information, wherein the three decryption keys are the same as the three encryption keys, so that the transaction information can be safely transmitted.
In a specific example, fig. 10 is a flowchart of an encryption method based on a chaotic system and a 3DES algorithm according to the present disclosure, as shown in fig. 10, the lower half corresponds to one end of a front-end processor in the above embodiment, a preset chaotic system includes a Logistic chaotic mapping algorithm and a Chebyshev chaotic mapping algorithm, and a 128-bit random key (i.e., the above encryption key) can be obtained by cross-combining chaotic sequences of Logistic mapping and Chebyshev mapping; further, the clear text (i.e., the transaction information) may be padded using the PKCS5Padding method, and then encrypted with a 128-bit random key to obtain the ciphertext, and the ciphertext may be transmitted to the card organization through the Internet (the upper half of fig. 10). After the card organization receives the ciphertext, the ciphertext is decrypted by adopting the 128-bit random key to obtain the plaintext.
Fig. 11 is a block diagram of an information encryption transmission apparatus according to the present disclosure, and as shown in fig. 11, the information encryption transmission apparatus 1100 includes: the obtaining module 1110 is configured to obtain transaction information generated when a user performs a transaction at a transaction terminal; a generating module 1120, configured to generate three encryption keys by using a pre-constructed chaotic system; an encryption module 1130, configured to perform triple DES encryption on the transaction information by using three encryption keys; and a transmission module 1140 for transmitting the encrypted transaction information.
In some embodiments, the generating module 1120 includes: the first generation submodule is used for generating three first sub-keys by adopting a first chaotic mapping algorithm in the chaotic system; the second generation submodule is used for generating three second sub-keys by adopting a second chaotic mapping algorithm in the chaotic system, wherein the first chaotic mapping algorithm is different from the second chaotic mapping algorithm; and the combination submodule is used for respectively carrying out cross combination on the three first sub-keys and the three second sub-keys to obtain three encryption keys.
In some embodiments, the first generation submodule is specifically configured to: determining a first initial sequence and a first iteration number; iterating the first initial sequence based on a first chaotic mapping algorithm and the first iteration times to obtain a first chaotic sequence; and selecting a target sequence of a specified position from the first chaotic sequence as a first key.
In some embodiments, the apparatus 1100 further comprises: the first calculation module is used for calculating the block number of the transaction information; the first generation submodule is specifically configured to: and iterating the first initial sequence based on the first chaotic mapping algorithm, the sum of the first iteration times and the block number to obtain a first chaotic sequence.
In some embodiments, the second generation submodule is specifically configured to: determining a second initial sequence and a second iteration number; iterating the second initial sequence based on a second chaotic mapping algorithm and a second iteration number until the sequence is discrete to obtain a second chaotic sequence; and selecting a target sequence of a specified position from the second chaotic sequence as a second partial key.
In some embodiments, the apparatus 1100 further comprises: the second calculation module is used for calculating the remainder of the byte length of the transaction information and the 8-quotient operation; and the bit complementing module is used for complementing the byte length of the transaction information under the condition that the remainder is not zero.
In some embodiments, the three encryption keys are different from each other or two of the encryption keys are the same, and the encryption module 1130 is specifically configured to: and sequentially carrying out DES encryption, DES decryption and DES encryption on the transaction information by adopting the three encryption keys.
Fig. 12 is a block diagram of an information decryption apparatus shown according to the present disclosure, and as shown in fig. 12, the information decryption apparatus 1200 includes:
a receiving module 1210, configured to receive encrypted transaction information encrypted by triple DES, where three encryption keys encrypted by triple DES are generated by an encryption-side chaotic system; and
the decryption module 1220 is configured to decrypt the encrypted transaction information using three decryption keys to obtain the transaction information, where the three decryption keys are the same as the three encryption keys.
In the embodiment, transaction information generated by a user in a transaction terminal is acquired, the three encryption keys are generated by adopting the pre-constructed chaotic system, the three encryption keys are adopted to carry out triple DES encryption on the transaction information, and the encrypted transaction information is transmitted, the chaotic system can be used for improving the randomness of the encryption keys to ensure that the keys are not easy to crack, and 3DES is used for increasing the length of the keys to effectively resist attack, so that the security of transaction information transmission is improved.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
Fig. 13 is a block diagram of an electronic device shown in accordance with the present disclosure. For example, the electronic device 1300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and so forth.
Referring to fig. 13, electronic device 1300 may include one or more of the following components: a processing component 1302, a memory 1304, a power component 1306, a multimedia component 1308, an audio component 1310, an input/output (I/O) interface 1312, a sensor component 1314, and a communication component 1316.
The processing component 1302 generally controls overall operation of the electronic device 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1302 may include one or more processors 920 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1302 can include one or more modules that facilitate interaction between the processing component 1302 and other components. For example, the processing component 1302 may include a multimedia module to facilitate interaction between the multimedia component 1308 and the processing component 1302.
The memory 1304 is configured to store various types of data to support operation at the electronic device 1300. Examples of such data include instructions for any application or method operating on the electronic device 1300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1304 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1306 provides power to the various components of the electronic device 1300. Power components 1306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for electronic device 1300.
The multimedia component 1308 includes a touch-sensitive display screen that provides an output interface between the electronic device 1300 and a user. In some embodiments, the touch display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1308 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the electronic device 1300 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1310 is configured to output and/or input audio signals. For example, the audio component 1310 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 1300 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1304 or transmitted via the communication component 1316.
In some embodiments, the audio component 1310 also includes a speaker for outputting audio signals.
The I/O interface 1312 provides an interface between the processing component 1302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 1314 includes one or more sensors for providing various aspects of state assessment for the electronic device 1300. For example, the sensor assembly 1314 may detect an open/closed state of the electronic device 1300, the relative positioning of components, such as a display and keypad of the electronic device 1300, the sensor assembly 1314 may also detect a change in the position of the electronic device 1300 or a component of the electronic device 1300, the presence or absence of user contact with the electronic device 1300, orientation or acceleration/deceleration of the electronic device 1300, and a change in the temperature of the electronic device 1300. The sensor assembly 1314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1316 is configured to facilitate communications between the electronic device 1300 and other devices in a wired or wireless manner. The electronic device 1300 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1316 also includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 1300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described information encryption transmission method.
In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 1304 comprising instructions, executable by the processor 920 of the electronic device 1300 to perform the above-described method is also provided. Alternatively, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (19)

1. An information encryption transmission method, comprising:
acquiring transaction information generated by a user in a transaction terminal;
generating three encryption keys by adopting a pre-constructed chaotic system;
performing triple DES encryption on the transaction information by adopting the three encryption keys; and
and transmitting the encrypted transaction information.
2. The method of claim 1, wherein generating three encryption keys using the pre-constructed chaotic system comprises:
generating three first sub-keys by adopting a first chaotic mapping algorithm in the chaotic system;
generating three second sub-keys by adopting a second chaotic mapping algorithm in the chaotic system, wherein the first chaotic mapping algorithm is different from the second chaotic mapping algorithm; and
and respectively carrying out cross combination on the three first sub-keys and the three second sub-keys to obtain the three encryption keys.
3. The method of claim 2, wherein generating three first partial keys using a first chaotic mapping algorithm in the chaotic system comprises:
determining a first initial sequence and a first iteration number;
iterating the first initial sequence based on the first chaotic mapping algorithm and the first iteration times to obtain a first chaotic sequence; and
and selecting a target sequence of a specified position from the first chaotic sequence as the first key.
4. The method of claim 3, further comprising:
calculating the number of the blocks of the transaction information;
and, the iterating the first initial sequence based on the first chaotic mapping algorithm and the first iteration number to obtain a first chaotic sequence includes:
and iterating the first initial sequence to obtain a first chaotic sequence based on the first chaotic mapping algorithm and the sum of the first iteration times and the block number.
5. The method of claim 2, wherein generating three second partial keys using a second chaotic mapping algorithm in the chaotic system comprises:
determining a second initial sequence and a second iteration number;
iterating the second initial sequence based on the second chaotic mapping algorithm and the second iteration times to obtain a second chaotic sequence; and
and selecting a target sequence at a specified position from the second chaotic sequence as the second partial key.
6. The method of claim 1, wherein prior to performing triple DES encryption of the transaction information using the three encryption keys, further comprising:
calculating the remainder of the byte length of the transaction information and the 8-quotient operation; and
and under the condition that the remainder is not zero, padding the byte length of the transaction information.
7. The method of claim 1, wherein the three encryption keys are different from each other or two of the encryption keys are the same, and wherein the performing triple DES encryption of the transaction information using the three encryption keys comprises:
and sequentially carrying out DES encryption, DES decryption and DES encryption on the transaction information by adopting the three encryption keys.
8. An information decryption method, comprising:
receiving encrypted transaction information encrypted by triple DES, wherein three encryption keys encrypted by triple DES are generated by an encryption-end chaotic system; and
and decrypting the encrypted transaction information by adopting three decryption keys to obtain the transaction information, wherein the three decryption keys are the same as the three encryption keys.
9. An information encryption transmission apparatus, comprising:
the acquisition module is used for acquiring transaction information generated by a user in a transaction terminal;
the generating module is used for generating three encryption keys by adopting a pre-constructed chaotic system;
the encryption module is used for carrying out triple DES encryption on the transaction information by adopting the three encryption keys; and
and the transmission module is used for transmitting the encrypted transaction information.
10. The apparatus of claim 9, wherein the generating module comprises:
the first generation submodule is used for generating three first sub-keys by adopting a first chaotic mapping algorithm in the chaotic system;
the second generation submodule is used for generating three second sub-keys by adopting a second chaotic mapping algorithm in the chaotic system, wherein the first chaotic mapping algorithm is different from the second chaotic mapping algorithm; and
and the combination submodule is used for respectively carrying out cross combination on the three first sub-keys and the three second sub-keys to obtain the three encryption keys.
11. The apparatus of claim 10, wherein the first generation submodule is specifically configured to:
determining a first initial sequence and a first iteration number;
iterating the first initial sequence based on the first chaotic mapping algorithm and the first iteration times to obtain a first chaotic sequence; and
and selecting a target sequence of a specified position from the first chaotic sequence as the first key.
12. The apparatus of claim 11, wherein the apparatus further comprises: the first calculation module is used for calculating the block number of the transaction information;
the first generation submodule is specifically configured to:
and iterating the first initial sequence to obtain a first chaotic sequence based on the first chaotic mapping algorithm and the sum of the first iteration times and the block number.
13. The apparatus of claim 10, wherein the second generation submodule is specifically configured to:
determining a second initial sequence and a second iteration number;
iterating the second initial sequence until the sequence is discrete based on the second chaotic mapping algorithm and the second iteration times to obtain a second chaotic sequence; and
and selecting a target sequence at a specified position from the second chaotic sequence as the second partial key.
14. The apparatus of claim 9, wherein the apparatus further comprises:
the second calculation module is used for calculating the remainder of the byte length of the transaction information and the 8-quotient operation; and
and the bit complementing module is used for complementing the byte length of the transaction information under the condition that the remainder is not zero.
15. The apparatus according to claim 9, wherein the three encryption keys are different from each other or two of the encryption keys are the same, and the encryption module is specifically configured to:
and sequentially carrying out DES encryption, DES decryption and DES encryption on the transaction information by adopting the three encryption keys.
16. An information decryption apparatus, comprising:
the receiving module is used for receiving encrypted transaction information encrypted by triple DES, wherein three encryption keys encrypted by triple DES are generated by an encryption end chaotic system; and
and the decryption module is used for decrypting the encrypted transaction information by adopting three decryption keys to obtain the transaction information, wherein the three decryption keys are the same as the three encryption keys.
17. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the method of any one of claims 1-7 or to perform the method of claim 8.
18. A computer-readable storage medium, whose instructions, when executed by a processor of an electronic device, enable the electronic device to perform the method of any of claims 1-7 or perform the method of claim 8.
19. A computer program product comprising a computer program, characterized in that the computer program realizes the method of any of claims 1-7 or performs the method of claim 8 when executed by a processor.
CN202111570495.8A 2021-12-21 2021-12-21 Information encryption transmission method, device, electronic equipment and storage medium Active CN114268425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111570495.8A CN114268425B (en) 2021-12-21 2021-12-21 Information encryption transmission method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111570495.8A CN114268425B (en) 2021-12-21 2021-12-21 Information encryption transmission method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114268425A true CN114268425A (en) 2022-04-01
CN114268425B CN114268425B (en) 2023-06-02

Family

ID=80828724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111570495.8A Active CN114268425B (en) 2021-12-21 2021-12-21 Information encryption transmission method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114268425B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117077715A (en) * 2023-10-16 2023-11-17 深圳市国芯物联科技有限公司 Multichannel data transmission method of radio frequency identification reader-writer

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1487694A (en) * 2003-07-25 2004-04-07 华南理工大学 Automatic safe transmission device and method for chaotic enciphered communication cipher key
CN103634100A (en) * 2013-11-26 2014-03-12 中国广核集团有限公司 Encryption method and device
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN109560914A (en) * 2017-09-26 2019-04-02 北京京东尚科信息技术有限公司 Data ciphering method and device, storage medium, electronic equipment
CN111798236A (en) * 2020-06-30 2020-10-20 中国工商银行股份有限公司 Transaction data encryption and decryption method, device and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1487694A (en) * 2003-07-25 2004-04-07 华南理工大学 Automatic safe transmission device and method for chaotic enciphered communication cipher key
CN103634100A (en) * 2013-11-26 2014-03-12 中国广核集团有限公司 Encryption method and device
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN109560914A (en) * 2017-09-26 2019-04-02 北京京东尚科信息技术有限公司 Data ciphering method and device, storage medium, electronic equipment
CN111798236A (en) * 2020-06-30 2020-10-20 中国工商银行股份有限公司 Transaction data encryption and decryption method, device and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117077715A (en) * 2023-10-16 2023-11-17 深圳市国芯物联科技有限公司 Multichannel data transmission method of radio frequency identification reader-writer
CN117077715B (en) * 2023-10-16 2024-01-26 深圳市国芯物联科技有限公司 Multichannel data transmission method of radio frequency identification reader-writer

Also Published As

Publication number Publication date
CN114268425B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
EP3337082B1 (en) Method and system for generation of cipher round keys by bit-mixers
US20240127236A1 (en) Communications Device, Point Of Sale Device, Payment Device and Methods
KR102383829B1 (en) Cryptographic method for securely exchanging messages and device and system for implementing this method
Wadi et al. Rapid encryption method based on AES algorithm for grey scale HD image encryption
MX2007008936A (en) Secure encryption system, device and method.
CN102725737A (en) V erifiable, leak-resistant encryption and decryption
CN110795762B (en) Reserved format encryption method based on stream cipher
JP2003513490A (en) Data processing method resistant to data extraction by analyzing unintended side channel signals
Vyakaranal et al. Performance analysis of symmetric key cryptographic algorithms
CN114268425B (en) Information encryption transmission method, device, electronic equipment and storage medium
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
Maximov Cryptanalysis of the" Grain" family of stream ciphers
CN114826587A (en) Data encryption method, data decryption method, data encryption device, data decryption device and data decryption equipment
CN109804596B (en) Programmable block cipher with masked input
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
US11336425B1 (en) Cryptographic machines characterized by a Finite Lab-Transform (FLT)
CN103853340A (en) Touch keyword using national cipher SM1 encryption chip and encryption method thereof
US20220417000A1 (en) Random position cipher encryption using scrambled ascii strings
Madani et al. Enhancement of A5/1 Stream Cipher Overcoming its Weaknesses
Misra et al. Analysing the parameters of chaos based image encryption schemes
KR100494560B1 (en) Real time block data encryption/decryption processor using Rijndael block cipher and method therefor
Liu et al. iCETD: An improved tag generation design for memory data authentication in embedded processor systems
CN116318646A (en) Method and device for constructing trusted representation based on privacy calculation and electronic equipment
Kaushik et al. Stream Encryption Standard for Digital Images
Van Der Merwe et al. Security in banking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant