CN114301664B - Communication encryption method, communication decryption method, device and non-volatile storage medium - Google Patents

Communication encryption method, communication decryption method, device and non-volatile storage medium Download PDF

Info

Publication number
CN114301664B
CN114301664B CN202111617026.7A CN202111617026A CN114301664B CN 114301664 B CN114301664 B CN 114301664B CN 202111617026 A CN202111617026 A CN 202111617026A CN 114301664 B CN114301664 B CN 114301664B
Authority
CN
China
Prior art keywords
bandwidth frequency
communication
transmission data
encrypted transmission
target bandwidth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111617026.7A
Other languages
Chinese (zh)
Other versions
CN114301664A (en
Inventor
孙科
王乾
蒋艳军
赵轶新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111617026.7A priority Critical patent/CN114301664B/en
Publication of CN114301664A publication Critical patent/CN114301664A/en
Application granted granted Critical
Publication of CN114301664B publication Critical patent/CN114301664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a communication encryption method, a communication decryption method, a device and a nonvolatile storage medium. Wherein the method comprises the following steps: acquiring a target bandwidth frequency of a communication transmitting end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end. The invention solves the technical problem that the secret key is easy to leak in the communication process, so that the communication is unsafe.

Description

Communication encryption method, communication decryption method, device and non-volatile storage medium
Technical Field
The present invention relates to the field of communication security, and in particular, to a communication encryption method, a communication decryption method, a device, and a nonvolatile storage medium.
Background
With the rapid development of the internet, the internet uses the explosive expansion of the crowd, the network brings people with hidden danger, when users utilize the network to communicate, once the transmitted data are stolen, the consequences are not considered, how to ensure the safe transmission of confidential information and effectively identify the identities of both transaction parties is one of the problems faced by the network security, while the data encryption technology is the most important means for ensuring the information security, so as to prevent sensitive data from being revealed and realize the data security protection value, so that the research and development of a data encryption algorithm has important significance for the protection of the sensitive data. In the related art, a communication key for encrypting communication contents is usually a fixed key, and cannot be dynamically changed at any time, so that the communication key may be broken, which causes a communication security problem.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a communication encryption method, a communication decryption method, a device and a nonvolatile storage medium, which are used for at least solving the technical problem that a secret key is easy to leak in a communication process to cause unsafe communication.
According to an aspect of an embodiment of the present invention, there is provided a communication encryption method including: acquiring a target bandwidth frequency of a communication transmitting end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
Optionally, the obtaining the target bandwidth frequency of the communication sending end includes: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
Optionally, according to the comparison result, obtaining the first bandwidth frequency of the communication sending end includes: acquiring the uplink bandwidth frequency of the communication transmitting end under the condition that the preset bandwidth frequency is larger than the average bandwidth frequency; and acquiring the downlink bandwidth frequency of the communication transmitting end under the condition that the preset bandwidth frequency is smaller than the average bandwidth frequency.
Optionally, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data, including: acquiring a predetermined encryption constant; and encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain the encrypted transmission data.
Optionally, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data, including: respectively taking the modes of the target bandwidth frequency and the communication content to obtain a plurality of groups of mode values; and converting the multiple groups of analog values into the encrypted transmission data in a character string format.
According to another aspect of the embodiment of the present invention, there is also provided a communication decryption method, including: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain communication content.
Optionally, in the case that the encrypted transmission data is further generated according to a predetermined encryption constant, the decrypting, based on the target bandwidth frequency, a portion of the encrypted transmission data corresponding to the target bandwidth frequency to obtain a communication key includes: and decrypting a part corresponding to the target bandwidth frequency and the encryption constant in the encrypted transmission data based on the target bandwidth frequency and the encryption constant to obtain the communication key.
According to still another aspect of the embodiment of the present invention, there is also provided a communication encryption apparatus including: the acquisition module is used for acquiring the target bandwidth frequency of the communication transmitting end; the encryption module is used for encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and the sending module is used for sending the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
According to still another aspect of the embodiment of the present invention, there is also provided a communication decryption apparatus including: the receiving module is used for receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end; the first decryption module is used for decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key; and the second decryption module is used for decrypting the encrypted transmission data by using the communication key to obtain communication content.
According to still another aspect of the embodiments of the present invention, there is further provided a nonvolatile storage medium, where the nonvolatile storage medium includes a stored program, and when the program runs, the device in which the nonvolatile storage medium is controlled to execute any one of the above-mentioned communication encryption method or any one of the above-mentioned communication decryption method.
According to still another aspect of the embodiments of the present invention, there is further provided a processor, configured to execute a program, where the program executes any one of the above-described communication encryption method or any one of the above-described communication decryption method.
In the embodiment of the invention, the communication content is encrypted according to the bandwidth frequency of the communication sending end, the target bandwidth frequency of the communication sending end is obtained, the target bandwidth frequency and the communication content are encrypted to obtain the encrypted transmission data, and the target bandwidth frequency and the encrypted transmission data are sent to the communication receiving end, so that the aim of encrypting by adopting different keys in each communication is fulfilled, the technical effects of improving the safety and the reliability of communication encryption are realized, and the technical problem of unsafe communication caused by easy leakage of the keys in the communication process is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
Fig. 1 shows a hardware block diagram of a computer terminal for implementing a communication encryption method and a communication decryption method;
fig. 2 is a schematic flow chart of a communication encryption method according to an embodiment of the present invention;
fig. 3 is a flow chart of a communication decryption method according to an embodiment of the present invention;
FIG. 4 is a block flow diagram of bandwidth frequency based encryption communications provided in accordance with an alternative embodiment of the present invention;
FIG. 5 is a schematic diagram of bandwidth frequency based encrypted communications provided in accordance with an alternative embodiment of the present invention;
fig. 6 is a block diagram of a communication encryption device provided according to an embodiment of the present invention;
fig. 7 is a block diagram of a communication decryption apparatus according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided a communication encryption method embodiment, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
The method according to the first embodiment of the present application may be implemented in a mobile terminal, a computer terminal or a similar computing device. Fig. 1 shows a hardware block diagram of a computer terminal for implementing a communication encryption method and a communication decryption method. As shown in fig. 1, the computer terminal 10 may include one or more (shown as 102a, 102b, … …,102 n) processors (which may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial BUS (USB) port (which may be included as one of the ports of the BUS), a network interface, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors and/or other data processing circuits described above may be referred to herein generally as "data processing circuits. The data processing circuit may be embodied in whole or in part in software, hardware, firmware, or any other combination. Furthermore, the data processing circuitry may be a single stand-alone processing module or incorporated, in whole or in part, into any of the other elements in the computer terminal 10. As referred to in embodiments of the application, the data processing circuit acts as a processor control (e.g., selection of the path of the variable resistor termination connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the communication encryption method and the communication decryption method in the embodiments of the present invention, and the processor executes the software programs and modules stored in the memory 104, thereby executing various functional applications and data processing, that is, implementing the communication encryption method and the communication decryption method of the application program. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computer terminal 10.
Fig. 2 is a flow chart of a communication encryption method according to an embodiment of the present invention, as shown in fig. 2, the method includes the following steps:
step S202, a target bandwidth frequency of a communication transmitting end is obtained.
In this step, the target bandwidth frequency may be a value that fluctuates over time, rather than a fixed bandwidth frequency value. A three-way interface can be arranged at the communication transmitting end and used for receiving the communication content of the communication transmitting end and monitoring the target bandwidth frequency of the communication transmitting end.
Step S204, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data.
In the step, the target bandwidth frequency and the communication content are encrypted by adopting the same encryption method, so that the ciphertext of the target bandwidth frequency and the ciphertext of the communication content can be obtained respectively, and then the two ciphertexts are combined to obtain the encrypted transmission data.
Step S206, the target bandwidth frequency and the encrypted transmission data are sent to the communication receiving end.
In this step, the target bandwidth frequency is sent to the communication receiving end, which can help the communication receiving end to solve the communication key, and the communication receiving end can decrypt the encrypted transmission data after receiving the key, so as to obtain the communication content which the communication sending end wants to transmit. Optionally, the communication receiving end may determine the encrypted target bandwidth frequency from the encrypted transmission data according to a predetermined encrypted transmission data format, then perform an encrypted inverse operation based on the encrypted target bandwidth frequency, solve the key, and decrypt the encrypted transmission data after the communication receiving end takes the key, so as to obtain the communication content.
Through the steps, the aim of encrypting by adopting different keys in each communication is fulfilled, so that the technical effects of improving the safety and reliability of communication encryption are realized, and the technical problem that the communication is unsafe due to the fact that the keys are easy to leak in the communication process is solved. Because the target bandwidth frequency is fluctuated, the secret keys used by the two communication parties for encrypting the communication content are different each time, the communication content is difficult to be obtained by the outside through a violent cracking method, and the communication safety is ensured.
As an alternative embodiment, encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data, a predetermined encryption constant may be obtained first; and then encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain encrypted transmission data.
Alternatively, the encryption constant may be agreed in advance by the communication transmitting side and the communication receiving side, and for example, a gravitational constant may be employed as the encryption constant. The communication transmitting end can firstly operate the encryption constant and the target bandwidth frequency, and then encrypt by adopting an encryption algorithm. In communication, only the target bandwidth frequency is transmitted to the communication receiving end, and the encryption constant is not transmitted. Since the communication receiving end knows the agreed encryption constant in advance, the communication receiving end can acquire the key through inverse operation, but the communication content intercepted by the interceptor does not comprise the encryption constant, so that the key cannot be cracked. In this embodiment, the difficulty of cracking can be improved and the communication security can be improved by selecting a complex encryption constant.
As an alternative embodiment, the target bandwidth frequency and the communication content are encrypted, so as to obtain encrypted transmission data, which may be obtained by the following manner: respectively taking the modes of the target bandwidth frequency and the communication content to obtain a plurality of groups of mode values; the multiple sets of modulus values are converted into encrypted transmission data in a string format. Optionally, in the process of converting the multiple groups of modulus values into the encrypted transmission data in the character String format, multiple groups of modulus values can be multiplied by the target bandwidth frequency to be converted into a byte array, then the byte array is converted into a String character String, and the formed character String is used as an encryption result, namely the encrypted transmission data to be transmitted, so that the communication safety is further improved.
As an alternative embodiment, the method for obtaining the target bandwidth frequency of the communication sending end may include the following steps: acquiring a preset bandwidth frequency and an average bandwidth frequency of a communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency. As an optional embodiment, according to the comparison result, the first bandwidth frequency of the communication transmitting end is obtained, and the uplink bandwidth frequency of the communication transmitting end can be obtained when the predetermined bandwidth frequency is greater than the average bandwidth frequency; and acquiring the downlink bandwidth frequency of the communication transmitting end under the condition that the preset bandwidth frequency is smaller than the average bandwidth frequency.
In this optional embodiment, the average bandwidth frequency may be an average value of the current uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end, or may be an average value of bandwidths of the communication transmitting end in a predetermined period of time. The target bandwidth frequency may be an uplink bandwidth frequency of the communication transmitting end, or a downlink bandwidth frequency of the communication transmitting end, and one of the target bandwidth frequencies is specifically selected for encryption during each communication. The predetermined bandwidth frequency can be a preset self-defined bandwidth frequency, and when the predetermined bandwidth frequency is larger than the average bandwidth frequency, the uplink bandwidth frequency and the communication content are adopted to encrypt to obtain encrypted transmission data; and when the preset bandwidth frequency is smaller than the average bandwidth frequency, encrypting the downlink bandwidth frequency and the communication content together to obtain encrypted transmission data. The judgment rule may be agreed in advance, and only the communication transmitting end and the communication receiving end grasp the judgment rule, alternatively, the communication transmitting end may transmit the uplink bandwidth frequency, the downlink bandwidth frequency and the average bandwidth frequency to the communication receiving end, and the communication receiving end determines whether the communication transmitting end adopts the uplink bandwidth frequency to encrypt or adopts the downlink bandwidth frequency to encrypt based on the grasped preset bandwidth frequency, and accordingly, the secret key is reversely solved. The method can further improve the cracking difficulty of an attacker and ensure the safety of communication.
Fig. 3 is a flow chart of a communication decryption method according to an embodiment of the present invention, as shown in fig. 3, the method includes the following steps:
Step S302, receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end.
In this step, the target bandwidth frequency may be a bandwidth frequency of the communication transmitting end, and the value that fluctuates at any time may set a three-way interface at the communication transmitting end, for receiving communication content of the communication transmitting end, and monitoring the target bandwidth frequency of the communication transmitting end.
Step S304, based on the target bandwidth frequency, decrypting the part corresponding to the target bandwidth frequency in the encrypted transmission data to obtain the communication key.
In this step, the communication receiving end may determine, from the encrypted transmission data, a portion corresponding to the target bandwidth frequency, that is, a ciphertext obtained by encrypting the target bandwidth frequency by the communication transmitting end, based on a composition format of the encrypted transmission data agreed with the communication transmitting end, and then perform an inverse operation of the encryption based on the ciphertext and the received target bandwidth frequency, to obtain the communication key.
And step S306, decrypting the encrypted transmission data by using the communication key to obtain the communication content. And decrypting the part corresponding to the communication content in the encrypted transmission data by using the communication key to obtain the communication content.
Through the steps, the aim of encrypting by adopting different keys in each communication is fulfilled, so that the technical effects of improving the safety and reliability of communication encryption are realized, and the technical problem that the communication is unsafe due to the fact that the keys are easy to leak in the communication process is solved.
As an alternative embodiment, in a case where the encrypted transmission data is also generated according to a predetermined encryption constant, decrypting a portion of the encrypted transmission data corresponding to the target bandwidth frequency based on the target bandwidth frequency to obtain the communication key, includes: and decrypting the part corresponding to the target bandwidth frequency and the encryption constant in the encrypted transmission data based on the target bandwidth frequency and the encryption constant to obtain the communication key.
In an alternative embodiment, the encryption constant may be a complex constant agreed in advance by the transmitting end and the receiving end of the communication, such as a gravitational constant, which does not need to be transmitted through a channel. After receiving the encrypted transmission data and the target bandwidth frequency, the communication receiving end processes the encryption constant and the target bandwidth frequency based on the same operation as the communication transmitting end, for example, adds or multiplies the encryption constant and the target bandwidth frequency, then obtains a part corresponding to the operation result from the encrypted transmission data, and carries out encrypted inverse operation according to the operation result to obtain the communication key.
Fig. 4 is a flow chart of an encryption communication based on a bandwidth frequency provided according to an alternative embodiment of the present invention, and fig. 5 is a schematic diagram of an encryption communication based on a bandwidth frequency provided according to an alternative embodiment of the present invention, as shown in fig. 4 and 5, the encryption communication based on a bandwidth frequency may include the following flow:
Step 1, obtaining a plaintext to be encrypted, namely communication content, and encrypting the plaintext to be encrypted and bandwidth frequency obtained by monitoring in real time by taking a UUID of a first character of the plaintext plus a communication transmitting end as a unique identifier to obtain encrypted transmission data.
And 2, obtaining the uplink, downlink and average bandwidth frequencies of the bandwidth of the communication transmitting end, and carrying out different encryption algorithms by matching through different bandwidth transmission frequencies.
And 2.1, when the preset bandwidth frequency is smaller than the current average bandwidth frequency, the communication transmitting end performs modular operation on the universal gravitation constant, the downlink bandwidth frequency, the average bandwidth frequency, the current bandwidth frequency and the plaintext respectively.
And 2.2, when the preset bandwidth frequency is larger than the current average bandwidth frequency, the communication transmitting end performs modular operation on the universal gravitation constant, the uplink bandwidth frequency, the average bandwidth frequency, the current bandwidth frequency and the plaintext respectively.
And step 3, multiplying the obtained modulus value with the corresponding bandwidth frequency to convert the modulus value into a byte array, and converting the byte array into String to form a new character String which is the encrypted transmission data.
And step 4, transmitting the encrypted transmission data, the uplink, the downlink and the average bandwidth frequency to a communication receiving end.
And 5, the communication receiving end obtains the encrypted transmission data, the uplink, the downlink and the average bandwidth frequency through the unique identifier, then carries out modulo reverse operation processing through the obtained bandwidth frequency and the universal gravitation constant to generate a communication key, and then identifies the character string to be decrypted through the communication key to obtain a plaintext, thereby completing decryption.
According to an embodiment of the present invention, there is also provided a communication encryption apparatus for implementing the above communication encryption method, and fig. 6 is a block diagram of a communication encryption apparatus provided according to an embodiment of the present invention, as shown in fig. 6, the communication encryption apparatus including: the acquisition module 62, encryption module 64 and transmission module 66, the communication encryption device will be described below.
An obtaining module 62, configured to obtain a target bandwidth frequency of the communication transmitting end;
an encryption module 64, configured to encrypt the target bandwidth frequency and the communication content to obtain encrypted transmission data;
And a transmitting module 66, configured to transmit the target bandwidth frequency and the encrypted transmission data to the communication receiving end.
Here, the above-mentioned obtaining module 62, the encrypting module 64 and the transmitting module 66 correspond to steps S202 to S206 in the embodiment, and the three modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above-mentioned embodiment. It should be noted that the above-described module may be operated as a part of the apparatus in the computer terminal 10 provided in the embodiment.
According to an embodiment of the present invention, there is also provided a communication decryption apparatus for implementing the above communication decryption method, and fig. 7 is a block diagram of a communication decryption apparatus according to an embodiment of the present invention, as shown in fig. 7, the communication decryption apparatus includes: the communication decryption apparatus will be described below with reference to the receiving module 72, the first decryption module 74, and the second decryption module 76.
A receiving module 72, configured to receive the target bandwidth frequency and the encrypted transmission data sent by the communication transmitting end;
A first decryption module 74, configured to decrypt a portion of the encrypted transmission data corresponding to the target bandwidth frequency based on the target bandwidth frequency, to obtain a communication key;
a second decryption module 76 for decrypting the encrypted transmission data using the communication key to obtain the communication content.
It should be noted that, the receiving module 72, the first decryption module 74 and the second decryption module 76 correspond to steps S302 to S306 in the embodiment, and the three modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to those disclosed in the embodiment. It should be noted that the above-described module may be operated as a part of the apparatus in the computer terminal 10 provided in the embodiment.
Embodiments of the present invention may provide a computer device, optionally in this embodiment, the computer device may be located in at least one network device of a plurality of network devices of a computer network. The computer device includes a memory and a processor.
The memory may be used to store software programs and modules, such as program instructions/modules corresponding to the communication encryption method, the communication decryption method and the device in the embodiments of the present invention, and the processor executes the software programs and modules stored in the memory, thereby executing various functional applications and data processing, that is, implementing the communication encryption method and the communication decryption method described above. The memory may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory remotely located relative to the processor, which may be connected to the computer terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor may call the information and the application program stored in the memory through the transmission device to perform the following steps: acquiring a target bandwidth frequency of a communication transmitting end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end.
The processor may also call the information stored in the memory and the application program through the transmission device to perform the following steps: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain communication content.
Those skilled in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program for instructing a terminal device to execute on associated hardware, the program may be stored in a non-volatile storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
Embodiments of the present invention also provide a nonvolatile storage medium. Alternatively, in the present embodiment, the above-described nonvolatile storage medium may be used to store the program codes executed by the communication encryption method and the communication decryption method provided in the above-described embodiment 1.
Alternatively, in this embodiment, the above-mentioned nonvolatile storage medium may be located in any one of the computer terminals in the computer terminal group in the computer network, or in any one of the mobile terminals in the mobile terminal group.
Optionally, in the present embodiment, the non-volatile storage medium is arranged to store program code for performing the steps of: acquiring a target bandwidth frequency of a communication transmitting end; encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data; and sending the target bandwidth frequency and the encrypted transmission data to a communication receiving end.
Optionally, in the present embodiment, the non-volatile storage medium is arranged to store program code for performing the steps of: receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end; decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency to obtain a communication key; and decrypting the encrypted transmission data by using the communication key to obtain communication content.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of units may be a logic function division, and there may be another division manner in actual implementation, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a non-volatile storage medium. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method of the various embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (9)

1. A communication encryption method, comprising:
acquiring a target bandwidth frequency of a communication transmitting end;
encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data;
The target bandwidth frequency and the encrypted transmission data are sent to a communication receiving end, wherein the communication receiving end determines the encrypted target bandwidth frequency from the encrypted transmission data according to a pre-agreed encrypted transmission data format, and carries out encrypted inverse operation based on the encrypted target bandwidth frequency to solve a communication key;
The obtaining the target bandwidth frequency of the communication sending end comprises the following steps: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
2. The method according to claim 1, wherein obtaining the first bandwidth frequency of the communication transmitting end according to the comparison result includes:
Acquiring the uplink bandwidth frequency of the communication transmitting end under the condition that the preset bandwidth frequency is larger than the average bandwidth frequency;
and acquiring the downlink bandwidth frequency of the communication transmitting end under the condition that the preset bandwidth frequency is smaller than the average bandwidth frequency.
3. The method of claim 1, wherein encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data comprises:
Acquiring a predetermined encryption constant;
and encrypting the encryption constant, the target bandwidth frequency and the communication content to obtain the encrypted transmission data.
4. The method of claim 1, wherein encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data comprises:
Respectively taking the modes of the target bandwidth frequency and the communication content to obtain a plurality of groups of mode values;
and converting the multiple groups of analog values into the encrypted transmission data in a character string format.
5. A communication decryption method, comprising:
receiving target bandwidth frequency and encrypted transmission data sent by a communication sending end;
Decrypting a part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency and a pre-agreed encrypted transmission data format, and performing encrypted inverse operation to obtain a communication key;
decrypting the encrypted transmission data by using the communication key to obtain communication content;
The target bandwidth frequency is obtained by the communication transmitting end through the following modes: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
6. The method according to claim 5, wherein, in the case where the encrypted transmission data is further generated according to a predetermined encryption constant, the decrypting the portion of the encrypted transmission data corresponding to the target bandwidth frequency based on the target bandwidth frequency to obtain the communication key includes:
and decrypting a part corresponding to the target bandwidth frequency and the encryption constant in the encrypted transmission data based on the target bandwidth frequency and the encryption constant to obtain the communication key.
7. A communication encryption apparatus, comprising:
the acquisition module is used for acquiring the target bandwidth frequency of the communication transmitting end;
the encryption module is used for encrypting the target bandwidth frequency and the communication content to obtain encrypted transmission data;
the communication receiving end determines the encrypted target bandwidth frequency from the encrypted transmission data according to a preset encrypted transmission data format, and carries out encrypted inverse operation based on the encrypted target bandwidth frequency to solve a communication key;
The acquisition module is further configured to: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
8. A communication decryption apparatus, comprising:
The receiving module is used for receiving the target bandwidth frequency and the encrypted transmission data sent by the communication sending end;
the first decryption module is used for decrypting the part corresponding to the target bandwidth frequency in the encrypted transmission data based on the target bandwidth frequency and a pre-agreed encrypted transmission data format, and performing encrypted inverse operation to obtain a communication key;
The second decryption module is used for decrypting the encrypted transmission data by using the communication key to obtain communication content;
The target bandwidth frequency is obtained by the communication transmitting end through the following modes: acquiring a preset bandwidth frequency and an average bandwidth frequency of the communication transmitting end, wherein the target bandwidth frequency comprises the average bandwidth frequency; comparing the preset bandwidth frequency with the average bandwidth frequency to obtain a comparison result, and acquiring one of the uplink bandwidth frequency and the downlink bandwidth frequency of the communication transmitting end according to the comparison result, wherein the target bandwidth frequency comprises the uplink bandwidth frequency and the downlink bandwidth frequency.
9. A non-volatile storage medium, characterized in that the non-volatile storage medium comprises a stored program, wherein the program, when run, controls a device in which the non-volatile storage medium is located to perform the communication encryption method of any one of claims 1 to 4 or the communication decryption method of any one of claims 5 to 6.
CN202111617026.7A 2021-12-27 2021-12-27 Communication encryption method, communication decryption method, device and non-volatile storage medium Active CN114301664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111617026.7A CN114301664B (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption method, device and non-volatile storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111617026.7A CN114301664B (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption method, device and non-volatile storage medium

Publications (2)

Publication Number Publication Date
CN114301664A CN114301664A (en) 2022-04-08
CN114301664B true CN114301664B (en) 2024-09-03

Family

ID=80969902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111617026.7A Active CN114301664B (en) 2021-12-27 2021-12-27 Communication encryption method, communication decryption method, device and non-volatile storage medium

Country Status (1)

Country Link
CN (1) CN114301664B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104040367A (en) * 2011-08-03 2014-09-10 英维斯塔克有限公司 Methods And System For Multi-path Mitigation In Tracking Objects Using Reduced Attenuation RF Technology
CN110519039A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic processing of data
CN112583590A (en) * 2020-12-14 2021-03-30 联芸科技(杭州)有限公司 Information issuing method and system based on group shared key

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101070473B1 (en) * 2009-10-13 2011-10-06 아주대학교산학협력단 Method for generating dynamic group key
EP2458777A1 (en) * 2010-11-30 2012-05-30 Irdeto B.V. Deriving one or more cryptographic keys of a sequence of keys
CN106452743B (en) * 2016-09-26 2020-01-31 深圳市紫光同创电子有限公司 Communication key obtaining method and device and communication message decryption method and device
CN108039950A (en) * 2017-12-21 2018-05-15 鸿秦(北京)科技有限公司 A kind of solid state hard disk secure authentication method based on NFC
CN113676485A (en) * 2021-08-27 2021-11-19 中国电信股份有限公司 Virtual reality interaction method and device, storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104040367A (en) * 2011-08-03 2014-09-10 英维斯塔克有限公司 Methods And System For Multi-path Mitigation In Tracking Objects Using Reduced Attenuation RF Technology
CN110519039A (en) * 2019-07-29 2019-11-29 北京多思安全芯片科技有限公司 A kind of Homomorphic processing of data
CN112583590A (en) * 2020-12-14 2021-03-30 联芸科技(杭州)有限公司 Information issuing method and system based on group shared key

Also Published As

Publication number Publication date
CN114301664A (en) 2022-04-08

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
EP3633913B1 (en) Provisioning a secure connection using a pre-shared key
Yau et al. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
CN109756500B (en) Anti-quantum computation HTTPS communication method and system based on multiple asymmetric key pools
Steiner et al. Refinement and extension of encrypted key exchange
Moghaddam et al. A scalable and efficient user authentication scheme for cloud computing environments
US11115206B2 (en) Assymetric structured key recovering using oblivious pseudorandom function
US20090103726A1 (en) Dual-mode variable key length cryptography system
EP3324572A1 (en) Information transmission method and mobile device
CN108347419A (en) Data transmission method and device
WO2019180521A1 (en) Oblivious pseudorandom function in a key management system
CN110417544B (en) Root key generation method, device and medium
CN113411187A (en) Identity authentication method and system, storage medium and processor
KR20240135040A (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
Ajmal et al. Cloud computing platform: Performance analysis of prominent cryptographic algorithms
CN110912683B (en) Password storage method and device and password verification method and device
Zhu A provable privacy-protection system for multi-server environment
CN114301664B (en) Communication encryption method, communication decryption method, device and non-volatile storage medium
CN116015647A (en) Sensitive information security acquisition method, system, device and electronic equipment
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
Vincenzetti et al. STEL: Secure TELnet.
Tsai et al. High-efficient multi-key exchange protocol based on three-party authentication
CA2988628C (en) Methods and computer program products for encryption key generation and management
Iyappan et al. Pluggable encryption algorithm in secure shell (SSH) protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant