CN114285563B - Key generation method and device - Google Patents

Key generation method and device Download PDF

Info

Publication number
CN114285563B
CN114285563B CN202111621002.9A CN202111621002A CN114285563B CN 114285563 B CN114285563 B CN 114285563B CN 202111621002 A CN202111621002 A CN 202111621002A CN 114285563 B CN114285563 B CN 114285563B
Authority
CN
China
Prior art keywords
target
gene
key
offset
gene library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111621002.9A
Other languages
Chinese (zh)
Other versions
CN114285563A (en
Inventor
王乾
孙科
蒋艳军
赵轶新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111621002.9A priority Critical patent/CN114285563B/en
Publication of CN114285563A publication Critical patent/CN114285563A/en
Application granted granted Critical
Publication of CN114285563B publication Critical patent/CN114285563B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a method and a device for generating a secret key. Wherein the method comprises the following steps: at least two gene libraries are obtained from a first system and recombined to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data; intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; the target key and the target offset are encrypted. The application solves the technical problem that the security of the traditional data desensitization mode is not high enough in data protection.

Description

Key generation method and device
Technical Field
The present application relates to the field of data encryption, and in particular, to a method and apparatus for generating a key.
Background
The data desensitization refers to the deformation of data of certain sensitive information through a desensitization rule, so that the reliable protection of the sensitive data is realized. In the case of customer security data or some commercially sensitive data, the actual data is modified and tested for use, such as data desensitization of personal information, without violating system rules. This allows for the safe use of the desensitized real data set in development, testing and other non-production environments and outsourcing environments. The same key is used for encryption and decryption by the symmetric encryption algorithm. While asymmetric encryption is different from symmetric encryption algorithms, asymmetric algorithms require two keys: the public key and the private key, namely the public key and the private key, the private key decrypts the public key encrypted data, the public key decrypts the private key encrypted data, and the private key public keys can be mutually encrypted and decrypted. The private key can only be kept by one party. The public key may be given to any requesting party. The encryption and decryption speeds of the symmetric encryption algorithm are relatively high, and the encryption and decryption speeds of the asymmetric encryption algorithm are relatively low; and the security of the symmetric encryption algorithm is relatively low, and the security of the asymmetric encryption algorithm is higher.
However, the security of the traditional data desensitization is still to be improved, and the traditional data desensitization is fixed whether the traditional data desensitization is symmetric encryption or asymmetric encryption. Therefore, a key generation method is needed to improve the security of data and protect the property and life security of users.
Aiming at the problem that the security of the traditional data desensitization mode on data protection is not high enough, no effective solution is proposed at present.
Disclosure of Invention
The embodiment of the application provides a method and a device for generating a secret key, which at least solve the technical problem that the security is not high enough in data protection due to the traditional data desensitization mode.
According to an aspect of an embodiment of the present application, there is provided a method for generating a key, including: at least two gene libraries are obtained from a first system and recombined to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data; intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; the target key and the target offset are encrypted.
Optionally, obtaining at least two gene libraries from the first system for recombination, comprising: intercepting each obtained gene library respectively to obtain a plurality of gene fragments, wherein each gene library corresponds to one gene fragment; and randomly combining the plurality of gene fragments to obtain a target gene library.
Alternatively, the sum of the lengths of the plurality of gene segments is the same as the length of the target gene library.
Optionally, encrypting the target key and the target offset includes: obtaining public keys of a second system and a third system; and encrypting the target key and the target offset by using the public key to obtain encrypted data.
Optionally, the method further comprises: and respectively sending the encrypted data to a second system and a third system, wherein the encrypted data are decrypted according to private keys of the second system and the third system respectively.
Optionally, obtaining at least two gene libraries from the first system for recombination, comprising: at least two gene libraries are obtained from the first system at preset time intervals.
Alternatively, different gene libraries may include different types of keys and offsets.
According to another aspect of the embodiment of the present application, there is also provided a key generating apparatus, including: the recombination module is used for acquiring at least two gene libraries from the first system to recombine to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data; the intercepting module is used for intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; and the encryption module is used for encrypting the target key and the target offset.
According to still another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium including a stored program, wherein the device in which the nonvolatile storage medium is controlled to execute the above key generation method when the program runs.
According to still another aspect of the embodiments of the present application, there is also provided a processor for executing a program stored in a memory, wherein the program executes the above key generation method.
In the embodiment of the application, at least two gene libraries are acquired from a first system for recombination to obtain target gene libraries, wherein each gene library comprises a key and an offset, and the key and the offset are used for encrypting data; intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; the method for encrypting the target key and the target offset obtains new key and offset by recombining different gene libraries and asymmetrically encrypts the new key and the offset, thereby achieving the aim of encrypting data, realizing the technical effects of dynamically configuring encryption dimension, improving data security and protecting property and life security of users, and further solving the technical problem that the security is not high enough in data protection due to the traditional data desensitization method.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the accompanying drawings
Fig. 1 is a block diagram of a hardware configuration of a computer terminal (or mobile device) for implementing a key generation method according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of generating a key according to an embodiment of the application;
fig. 3 is a block diagram of a key generation apparatus according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The method according to the first embodiment of the present application may be implemented in a mobile terminal, a computer terminal or a similar computing device. Fig. 1 shows a block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a key generation method. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …,102 n) processors 102 (the processors 102 may include, but are not limited to, a microprocessor MCU, a programmable logic device FPGA, etc. processing means), a memory 104 for storing data, and a transmission means 106 for communication functions. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial BUS (USB) port (which may be included as one of the ports of the BUS), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuits described above may be referred to generally herein as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Furthermore, the data processing circuitry may be a single stand-alone processing module, or incorporated, in whole or in part, into any of the other elements in the computer terminal 10 (or mobile device). As referred to in embodiments of the application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the method for generating a key in the embodiment of the present application, and the processor 102 executes the software programs and modules stored in the memory 104, thereby executing various functional applications and data processing, that is, implementing the above-mentioned vulnerability detection method of application programs. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 106 is arranged to receive or transmit data via a network. The specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module for communicating with the internet wirelessly.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10 (or mobile device).
According to an embodiment of the present application, there is provided an embodiment of a key generation method, it being noted that the steps shown in the flowcharts of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.
Fig. 2 is a method for generating a key according to an embodiment of the present application, as shown in fig. 2, the method including the steps of:
step S202, at least two gene libraries are obtained from a first system and recombined to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data;
according to an alternative embodiment of the application, the first system is a C-system. And C, storing a plurality of different gene libraries in the system, and copying out two or more gene libraries at intervals (the time is a parameter and can be set according to actual conditions) for recombination to obtain the target gene library. Each gene bank in the C system includes a key and an offset with which data can be encrypted. According to the application, by recombining different gene libraries, the encryption dimension can be dynamically configured according to the resource condition, namely, multi-dimensional encryption and decryption are supported. For example: two to N kinds of genes can be selected for encryption and decryption by cross encryption and decryption of the two to N kinds of gene libraries so as to realize different encryption dimensions, and the method can be applied to various encryption occasions.
S204, intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset;
Alternatively, the preset length may be a gene bank length of 256 bits. And intercepting the gene library with 256-bit length from the target gene library to obtain the target key and the target offset. The encryption and decryption efficiency can be ensured by dynamically intercepting the length of the gene library.
Step S206, encrypting the target key and the target offset;
in this step, the data encryption interaction is completed by encrypting the target key and the target offset. By adopting an asymmetric encryption algorithm, the public key and the private key are used for encryption and decryption, so that the security of data is effectively improved.
Through the steps, new keys and offsets are obtained by recombining different gene libraries, and the new keys and the offsets are asymmetrically encrypted, so that the aim of encrypting data is fulfilled, and the technical effects of dynamically configuring encryption dimension, improving data security and protecting property and life security of users are realized.
According to an alternative embodiment of the present application, performing step S202 to obtain at least two gene libraries from the first system for recombination includes: intercepting each obtained gene library respectively to obtain a plurality of gene fragments, wherein each gene library corresponds to one gene fragment; and randomly combining the plurality of gene fragments to obtain a target gene library.
And C, storing a plurality of different gene libraries in the system, and copying two or more gene libraries at intervals (the time is a parameter and can be set according to actual conditions) for mixed recombination to obtain the target gene library. And intercepting each obtained gene library to a certain length to obtain a plurality of different gene fragments, wherein each gene library corresponds to one gene fragment. These gene fragments are randomly combined to obtain a target gene library.
By dynamically recombining different gene libraries, the encryption dimension can be dynamically configured, and the method is applied to various encryption occasions and improves the security of data.
According to another alternative embodiment of the application, the sum of the lengths of the plurality of gene segments is the same as the length of the target gene library. The sum of the lengths of the plurality of intercepted gene fragments is the same as the length of the target gene library.
In some alternative embodiments of the present application, performing step S206 to encrypt the target key and the target offset includes: obtaining public keys of a second system and a third system; and encrypting the target key and the target offset by using the public key to obtain encrypted data.
Alternatively, the second system may be an a-system, and the third system may be a B-system, and public keys of the a-system and the B-system are agreed in advance. Firstly, public keys of the A system and the B system are obtained, the C system encrypts the target key and the target offset through the public key to obtain encrypted data, and then the encrypted data is distributed to the A, B system.
By adopting an asymmetric encryption algorithm, the public key and the private key are used for encryption and decryption, so that the security of data is effectively improved.
In other optional embodiments of the present application, the method further comprises: and respectively sending the encrypted data to a second system and a third system, wherein the encrypted data are decrypted according to private keys of the second system and the third system respectively.
After the encrypted data is obtained, the encrypted data is respectively sent to the A system and the B system, and then the encrypted data is decrypted according to private keys of the A system and the B system respectively so as to complete data encryption interaction.
By adopting an asymmetric encryption algorithm, namely using a public key and a private key for encryption and decryption, the data security is effectively improved.
According to an alternative embodiment of the present application, performing step S202 to obtain at least two gene libraries from the first system for recombination includes: at least two gene libraries are obtained from the first system at preset time intervals.
Optionally, the preset time interval is a parameter, and can be set by itself according to actual conditions, and two or more than two gene libraries can be obtained by obtaining at least two gene libraries. Two to N gene libraries are obtained from the C system according to the preset time interval by setting the preset time interval so as to realize cross encryption and decryption.
According to the application, different gene libraries are combined in a crossing way according to time, so that the crossing operation of the gene libraries of different types is realized.
According to another alternative embodiment of the application, different gene libraries comprise different types of keys and offsets.
The types of keys and offsets contained from different gene libraries in the C-system are different. Therefore, the data encryption of different gene libraries can be realized, and the safety of the data is improved.
The application is mainly used for data encryption, and is a multidimensional dynamic data encryption processing method based on different gene bank cross operation. By dynamically combining different gene libraries, the cross operation of different kinds of gene libraries can be realized. Meanwhile, the application can dynamically configure the encryption dimension according to the resource condition so as to realize different encryption dimensions, and can be applied to various encryption occasions. After the recombination is finished, the length of the gene library is dynamically intercepted, so that the encryption and decryption efficiency can be ensured. By adopting an asymmetric encryption algorithm, the public key and the private key are used for encryption and decryption, so that the security of data is effectively improved.
Fig. 3 is a block diagram of a key generation apparatus according to an embodiment of the present application, as shown in fig. 3, the apparatus including:
The reorganization module 30 is configured to obtain at least two gene libraries from the first system for reorganization to obtain target gene libraries, where each gene library includes a key and an offset, and the key and the offset are used to encrypt data;
according to an alternative embodiment of the application, the first system is a C-system. And C, storing a plurality of different gene libraries in the system, and copying out two or more gene libraries at intervals (the time is a parameter and can be set according to actual conditions) for recombination to obtain the target gene library. Each gene bank in the C system includes a key and an offset with which data can be encrypted. According to the application, by recombining different gene libraries, the encryption dimension can be dynamically configured according to the resource condition, namely, multi-dimensional encryption and decryption are supported. For example: two to N kinds of genes can be selected for encryption and decryption by cross encryption and decryption of the two to N kinds of gene libraries so as to realize different encryption dimensions, and the method can be applied to various encryption occasions.
The intercepting module 32 is used for intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset;
Alternatively, the preset length may be a gene bank length of 256 bits. And intercepting the gene library with 256-bit length from the target gene library to obtain the target key and the target offset. The encryption and decryption efficiency can be ensured by dynamically intercepting the length of the gene library.
An encryption module 34, configured to encrypt the target key and the target offset;
According to another alternative embodiment of the present application, the data encryption interaction is accomplished by encrypting the target key and the target offset. By adopting an asymmetric encryption algorithm, the public key and the private key are used for encryption and decryption, so that the security of data is effectively improved.
The application can dynamically combine the cross combination of different gene libraries according to time to realize the cross operation of different kinds of gene libraries. The method is reliable and efficient, can effectively improve the safety of data and protect the property and life safety of users through practical inspection.
According to an alternative embodiment of the application, the reorganization module 30 comprises:
The intercepting unit is used for intercepting each acquired gene library respectively to obtain a plurality of gene fragments, wherein each gene library corresponds to one gene fragment;
and the combination unit is used for randomly combining the plurality of gene fragments to obtain a target gene library.
And C, storing a plurality of different gene libraries in the system, and copying two or more gene libraries at intervals (the time is a parameter and can be set according to actual conditions) for mixed recombination to obtain the target gene library. And intercepting each obtained gene library to a certain length to obtain a plurality of different gene fragments, wherein each gene library corresponds to one gene fragment. These gene fragments are randomly combined to obtain a target gene library.
By dynamically recombining different gene libraries, the encryption dimension can be dynamically configured, and the method is applied to various encryption occasions and improves the security of data.
According to another alternative embodiment of the application, the sum of the lengths of the plurality of gene segments is the same as the length of the target gene library. The sum of the lengths of the plurality of intercepted gene fragments is the same as the length of the target gene library.
According to yet another alternative embodiment of the present application, the encryption module 34 includes:
An acquisition unit configured to acquire public keys of the second system and the third system;
and the encryption unit is used for encrypting the target key and the target offset by utilizing the public key to obtain encrypted data.
Alternatively, the second system may be an a-system, and the third system may be a B-system, and public keys of the a-system and the B-system are agreed in advance. Firstly, public keys of the A system and the B system are obtained, the C system encrypts the target key and the target offset through the public key to obtain encrypted data, and then the encrypted data is distributed to the A, B system.
By adopting an asymmetric encryption algorithm, namely using a public key and a private key for encryption and decryption, the data security is effectively improved.
In some optional embodiments of the application, the apparatus further comprises:
And the sending module is used for respectively sending the encrypted data to the second system and the third system, wherein the encrypted data is decrypted according to the private keys of the second system and the third system respectively.
After the encrypted data is obtained, the encrypted data is respectively sent to the A system and the B system, and then the encrypted data is decrypted according to private keys of the A system and the B system respectively so as to complete data encryption interaction.
By adopting an asymmetric encryption algorithm, namely using a public key and a private key for encryption and decryption, the data security is effectively improved.
In other alternative embodiments of the present application, the reorganization module 30 is further configured to obtain at least two gene libraries from the first system at preset time intervals.
Optionally, the preset time interval is a parameter, and can be set by itself according to actual conditions, and two or more than two gene libraries can be obtained by obtaining at least two gene libraries. Two to N gene libraries are obtained from the C system according to the preset time interval by setting the preset time interval so as to realize cross encryption and decryption.
According to the application, different gene libraries are combined in a crossing way according to time, so that the crossing operation of the gene libraries of different types is realized.
In still other alternative embodiments of the present application, different gene libraries include different types of keys and offsets.
The types of keys and offsets contained from different gene libraries in the C-system are different. Therefore, the data encryption of different gene libraries can be realized, and the safety of the data is improved.
According to still another aspect of the embodiments of the present application, there is also provided a nonvolatile storage medium including a stored program, wherein the device in which the nonvolatile storage medium is controlled to execute the above key generation method when the program runs.
The above-described nonvolatile storage medium is used to store a program that performs the following functions: at least two gene libraries are obtained from a first system and recombined to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data; intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; the target key and the target offset are encrypted.
The embodiment of the application also provides a processor, which is used for running the program stored in the memory, wherein the method for generating the key is executed when the program runs.
The processor is configured to execute a program that performs the following functions: at least two gene libraries are obtained from a first system and recombined to obtain target gene libraries, wherein each gene library comprises a secret key and an offset, and the secret key and the offset are used for encrypting data; intercepting a gene library with preset length from a target gene library to obtain a target key and a target offset; the target key and the target offset are encrypted.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the related art or all or part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (8)

1. A method of generating a key, comprising:
Obtaining at least two gene libraries from a first system for recombination to obtain a target gene library, wherein the method comprises the following steps: intercepting each obtained gene library respectively to obtain a plurality of gene fragments, wherein each gene library corresponds to one gene fragment; randomly combining the plurality of gene segments to obtain target gene libraries, wherein each gene library comprises a key and an offset, and the key and the offset are used for encrypting data;
intercepting a gene library with preset length from the target gene library to obtain a target key and a target offset;
Encrypting the target key and the target offset.
2. The method of claim 1, wherein the sum of the lengths of the plurality of gene segments is the same as the length of the target gene library.
3. The method of claim 1, wherein encrypting the target key and target offset comprises:
Obtaining public keys of a second system and a third system;
And encrypting the target key and the target offset by using the public key to obtain encrypted data.
4. A method according to claim 3, characterized in that the method further comprises:
And respectively sending the encrypted data to the second system and the third system, wherein the encrypted data are decrypted according to private keys of the second system and the third system respectively.
5. The method of claim 1, wherein obtaining at least two gene banks from the first system for recombination comprises:
At least two gene libraries are obtained from the first system at preset time intervals.
6. The method of any one of claims 1 to 5, wherein different ones of the gene libraries comprise different types of the keys and the offsets.
7. A key generation apparatus, comprising:
The recombination module is used for acquiring at least two gene libraries from the first system to recombine to obtain a target gene library, and comprises the following steps: intercepting each obtained gene library respectively to obtain a plurality of gene fragments, wherein each gene library corresponds to one gene fragment; randomly combining the plurality of gene segments to obtain target gene libraries, wherein each gene library comprises a key and an offset, and the key and the offset are used for encrypting data;
the intercepting module is used for intercepting a gene library with preset length from the target gene library to obtain a target key and a target offset;
And the encryption module is used for encrypting the target key and the target offset.
8. A non-volatile storage medium, characterized in that the non-volatile storage medium comprises a stored program, wherein the device in which the non-volatile storage medium is controlled to execute the key generation method according to any one of claims 1 to 6 when the program is run.
CN202111621002.9A 2021-12-27 2021-12-27 Key generation method and device Active CN114285563B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111621002.9A CN114285563B (en) 2021-12-27 2021-12-27 Key generation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111621002.9A CN114285563B (en) 2021-12-27 2021-12-27 Key generation method and device

Publications (2)

Publication Number Publication Date
CN114285563A CN114285563A (en) 2022-04-05
CN114285563B true CN114285563B (en) 2024-05-10

Family

ID=80876784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111621002.9A Active CN114285563B (en) 2021-12-27 2021-12-27 Key generation method and device

Country Status (1)

Country Link
CN (1) CN114285563B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
CN104734848A (en) * 2015-03-02 2015-06-24 郑州轻工业学院 Recombinant DNA technology based information encrypting and hiding method and application
US10289865B1 (en) * 2016-03-08 2019-05-14 Symantec Corporation Systems and methods for providing kinship-based accessibility to securely stored data
CN110677247A (en) * 2019-10-09 2020-01-10 广州市农业科学研究院 Gene chip encryption method and gene chip decryption method and device
CN112152775A (en) * 2019-08-12 2020-12-29 湖南大学 Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118885A1 (en) * 2005-11-23 2007-05-24 Elrod Craig T Unique SNiP for use in secure data networking and identity management
EP3682449A1 (en) * 2017-10-27 2020-07-22 ETH Zurich Encoding and decoding information in synthetic dna with cryptographic keys generated based on polymorphic features of nucleic acids
GB2576310A (en) * 2018-08-10 2020-02-19 Andrew Croall Paul Chromosomal identification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
CN104734848A (en) * 2015-03-02 2015-06-24 郑州轻工业学院 Recombinant DNA technology based information encrypting and hiding method and application
US10289865B1 (en) * 2016-03-08 2019-05-14 Symantec Corporation Systems and methods for providing kinship-based accessibility to securely stored data
CN112152775A (en) * 2019-08-12 2020-12-29 湖南大学 Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
CN110677247A (en) * 2019-10-09 2020-01-10 广州市农业科学研究院 Gene chip encryption method and gene chip decryption method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于DNA技术的加密方法;卢明欣;陈原;秦磊;肖国镇;;西安电子科技大学学报;20061225(第06期);全文 *
一种基于重组DNA技术的密码方案;饶妮妮;电子学报;20040725(第07期);全文 *

Also Published As

Publication number Publication date
CN114285563A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
US10154013B1 (en) Updating encrypted cryptographic key
WO2017097041A1 (en) Data transmission method and device
US9893885B1 (en) Updating cryptographic key pair
CN110892672A (en) Key authentication assertion generation to provide device anonymity
JP2021522595A (en) Cryptographic cards, electronic devices, and cryptographic service methods
CN112165490B (en) Encryption method, decryption method, storage medium and terminal equipment
WO2021231087A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN110417544B (en) Root key generation method, device and medium
CN110874478A (en) Key processing method and device, storage medium and processor
CN110874494A (en) Password operation processing method, device and system and measurement trust chain construction method
US20140140504A1 (en) System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction
US20170250804A1 (en) Apparatus and method for encrypting and decrypting
US20200044838A1 (en) Data encryption method and system using device authentication key
CN110795742A (en) Measurement processing method and device for high-speed cryptographic operation, storage medium and processor
CN114465803A (en) Object authorization method, device, system and storage medium
US10262161B1 (en) Secure execution and transformation techniques for computing executables
US20230259926A1 (en) Address generation method, blockchain information processing method, and related device
CN114285563B (en) Key generation method and device
CN110912683B (en) Password storage method and device and password verification method and device
KR101834522B1 (en) Apparatus for confirming data and method for confirming data using the same
CN111464496B (en) Data transmission method, device, system, storage medium and electronic device
KR20200011666A (en) Apparatus and method for authentication
CN113381854B (en) Data transmission method, device, equipment and storage medium
US20240020383A1 (en) Method and circuit for protecting an electronic device from a side-channel attack
CN117910029A (en) Data acquisition method, device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant