CN114301718A - File transmission method for chain encryption by adopting single key - Google Patents

File transmission method for chain encryption by adopting single key Download PDF

Info

Publication number
CN114301718A
CN114301718A CN202210228727.XA CN202210228727A CN114301718A CN 114301718 A CN114301718 A CN 114301718A CN 202210228727 A CN202210228727 A CN 202210228727A CN 114301718 A CN114301718 A CN 114301718A
Authority
CN
China
Prior art keywords
encryption
encrypted
key
files
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210228727.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Microchip Sensing Technology Co ltd
Original Assignee
Beijing Microchip Sensing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Microchip Sensing Technology Co ltd filed Critical Beijing Microchip Sensing Technology Co ltd
Priority to CN202210228727.XA priority Critical patent/CN114301718A/en
Publication of CN114301718A publication Critical patent/CN114301718A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a file transmission method adopting a single key to carry out chain encryption, which adopts the single key to carry out chain encryption by improving the encryption mode based on the corresponding relation of 'one key and one ciphertext' in the traditional symmetric encryption algorithm, can finish batch encryption of the ciphertext with huge data scale only by the single key, greatly reduces the dependence degree on the key in the encryption process, ensures that the encryption calculation can be carried out continuously at high speed, and obviously improves the encryption efficiency; in addition, the step of transmitting a large number of encryption keys is omitted during transmission, so that the safety problem caused by the fact that the keys and the ciphertext are transmitted together in the transmission process is solved, and meanwhile, the ciphertext is more convenient and efficient during transmission.

Description

File transmission method for chain encryption by adopting single key
Technical Field
The invention relates to the technical field of communication, in particular to a file transmission method for chain encryption by adopting a single secret key.
Background
At present, the data volume of file encryption is increased at a high speed, the time overhead of the encryption process of the traditional key encryption and transmission mode is large, the key of authorization authentication is in short supply, and the transmission efficiency of encrypted data is low. Although the traditional symmetric encryption algorithm has the advantages of small calculation amount, high encryption speed, high encryption efficiency and the like in the encryption process, extra huge time overhead generated by waiting for the key due to the large demand of the key when the encryption data size is huge is usually ignored in the actual encryption operation, and the time overhead is far greater than the time overhead of encryption calculation, so that the efficiency of the symmetric encryption process is limited by the efficiency of key input. Moreover, the huge data volume generated by the key also brings great pressure to data transmission, and a special channel is often required to be developed to transmit the key special for encryption, so that the problem that the transmission efficiency of the ciphertext and the key is difficult to improve after the encryption is completed is caused.
Therefore, how to improve the efficiency of file encryption transmission is an urgent problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, the invention provides a file transmission method using a single key for chain encryption, which performs chain encryption by improving the encryption mode based on the corresponding relation of 'one key and one ciphertext' in the traditional symmetric encryption algorithm, and can complete batch encryption of the ciphertext with huge data scale only by using the single key, thereby greatly reducing the dependence degree on the key in the encryption process, enabling the encryption calculation to be performed continuously at high speed, and remarkably improving the encryption efficiency; in addition, the step of transmitting a large number of encryption keys is omitted during transmission, so that the safety problem caused by the fact that the keys and the ciphertext are transmitted together in the transmission process is solved, and meanwhile, the ciphertext is more convenient and efficient during transmission.
In order to achieve the purpose, the invention adopts the following technical scheme:
a file transmission method adopting a single key to perform chain encryption comprises the following steps:
step 1: extracting a plurality of groups of files to be encrypted from the security data center; the file to be encrypted is packaged into a fixed format;
step 2: acquiring a unique security key from a key authentication center, and performing chain encryption calculation on the file to be encrypted based on an encryption calculation server by using the key;
and step 3: transmitting the files and the keys after the chain encryption calculation to a receiving end;
and 4, step 4: and the receiving end adopts the decryption calculation server to perform chain decryption calculation on the received file and the key to obtain the security data.
Preferably, the chain encryption calculation specifically includes:
step 21: extracting a first group of files to be encrypted from a plurality of groups of files to be encrypted, encrypting by using the secret key and a Vernam encryption algorithm to generate encrypted files, and transmitting the encrypted files to the receiving end;
step 22: taking the encrypted file as a current encryption key, extracting a next group of files to be encrypted from the rest files to be encrypted by using a Vernam encryption algorithm to generate an encrypted file, and transmitting the encrypted file to the receiving end; the selection of the encrypted files is carried out according to a certain sequence, but files which are not related and are independent can be selected among the files;
step 23: judging whether the files to be encrypted are all encrypted, if not, returning to the step 22; if so, the chain encryption calculation is complete.
Preferably, the chain decryption calculation is an inverse operation of the chain encryption calculation, and the specific process is as follows:
step 41: decrypting the encrypted file generated by encrypting the first group of files to be encrypted by adopting the key to obtain a ciphertext;
step 42: the ciphertext is used as a current decryption key to decrypt an encrypted file generated by the next group of files to be encrypted, and the ciphertext is obtained;
step 43: judging whether all the encrypted files are decrypted, if not, returning to the step 42; and if so, all the ciphertexts obtained by decryption jointly form the safety data, and the chain decryption calculation is completed.
According to the technical scheme, compared with the prior art, the invention discloses a file transmission method adopting a single key to perform chain encryption, which is an encryption method based on a symmetric encryption algorithm, keeps the advantages of small calculation amount, high encryption speed and high encryption efficiency of the symmetric encryption algorithm, and reduces the dependence of the encryption process on the key to the greatest extent while ensuring the security of a ciphertext by using the simplest Vernam encryption algorithm, so that the encryption efficiency is improved more when encryption is performed; meanwhile, the extra data volume transmission overhead generated by the secret key in the transmission process except the ciphertext is reduced, and the transmission efficiency is obviously improved in the transmission process.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic diagram illustrating a single-key implementation of a chain encryption transmission process for files according to the present invention;
FIG. 2 is a schematic diagram of the structure encryption-transmission-decryption provided by the present invention;
FIG. 3 is a schematic diagram illustrating the comparison of the encryption process time overhead provided by the present invention;
fig. 4 is a schematic diagram illustrating comparison of data volumes in a file transfer process according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a file transmission method for chain encryption by adopting a single key, and a flow chart is shown in figure 1.
A symmetric encryption algorithm refers to an encryption algorithm that requires the same key to be used for encryption and decryption. Due to its fast speed, symmetric encryption is often used when the sender of a message needs to encrypt a large amount of data. Symmetric encryption is also referred to as key encryption. Symmetry means that both parties using this encryption method use the same key for encryption and decryption. A key is an instruction that controls the encryption and decryption process. An algorithm is a set of rules that specify how encryption and decryption are to be performed. The symmetric encryption algorithm has the advantages of being open, small in calculation amount, high in encryption speed and high in encryption efficiency.
The Vernam encryption algorithm is a simpler encryption algorithm and belongs to a symmetric encryption algorithm. Encryption and decryption are performed by using a random number of the same length as information (indicated by 0 or 1) of the same length as the transmission information as a key, and using a special calculation. The encryption and decryption processes continue to write and add the respective digits based on the operation rule of logical exclusive-or. Because the key of the complete random number with the same length as the information is disposable, the famous key security theory of shannon proves that no matter how high-performance supercomputer can not break the encryption.
Examples
The specific flow of chain encryption-transmission-decryption of the present invention is shown in fig. 2, and assuming that there are 4 files that need to be encrypted and transmitted and are finally received and decrypted by a receiver, the process of realizing chain encryption transmission by a single key is as follows:
s1: the initial file 1 is encrypted by using a secret key through a Vernam encryption algorithm to generate an encrypted file 1;
s2: encrypting the initial file 2 by using the encrypted file 1 as an encryption key of the initial file 2, and generating an encrypted file 2 by using a Vernam encryption algorithm;
s3: the encrypted file 2 is used as an encryption key of the initial file 3, and the initial file 3 is encrypted to generate an encrypted file 3;
s4: the encrypted file 3 is used as an encryption key for the original file 4, and encrypts the original file 4 to generate an encrypted file 4.
Binary digit XOR accumulation operation is adopted in chain encryption transmission operation, the whole process can be completely realized through an adder, and the rapidness and the high efficiency of the encryption process are guaranteed to the greatest extent. After the file is transmitted, the subsequent decryption process is the inverse operation of the encryption process, the cipher text of the initial file 1 is obtained by using the key for decryption, then the cipher text of the initial file 2 is obtained by using the cipher text of the initial file 1 for decryption, and finally the initial files 3 and 4 are obtained by sequentially decrypting.
As shown in fig. 3, the upper half is a time overhead of the conventional key encryption process, and the lower half is a time overhead of the chain encryption process of the present invention, as can be seen from the figure, the time overhead of the conventional encryption method is mainly used in the process of waiting for the key, while the chain encryption of the present invention completes the entire encryption process by using a single key, assuming that the time overhead required for generating one key is T and the time overhead required for completing one encryption operation is T, the time overhead of (4T + T) - (4T + T) = 3 (T-T) can be saved under the condition of assuming that 4 files are encrypted, and the time overhead saved is considerable under the condition that T is much greater than T.
As shown in fig. 4, in the process of transmitting the encrypted file, since no additional key needs to be transmitted, under the condition that the ciphertext and the key are equal in length, approximately half of the overhead of data transmission can be saved, and for the sake of security, the length of the key is often greater than that of the ciphertext, so that the method saves huge overhead of data transmission.
The invention has the beneficial effects that:
in a general traditional encryption process, no matter in a symmetric algorithm or an asymmetric algorithm, a key generated except a cipher text is required to ensure the safety of the cipher text, so all encryption operations are in a key to cipher text form, while the invention is in the cipher text to cipher text form, and the dependence on an additional key generation link is overcome; meanwhile, the security is improved by selecting a chain type encryption calculation mode, only a unique safe and reliable 'secret key' is provided for the ciphertext needing to be encrypted and decrypted to the first time in the encryption and decryption processes, the ciphertext is transmitted in the encryption and decryption processes, and the extra time and physical expenses caused by the fact that the 'ciphertext' and the 'secret key' are transmitted separately in the transmission process in the traditional sense are eliminated.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (3)

1. A file transmission method for chain encryption by adopting a single key is characterized by comprising the following steps:
step 1: extracting a plurality of groups of files to be encrypted from the security data center;
step 2: acquiring a unique security key from a key authentication center, and performing chain encryption calculation on the file to be encrypted based on an encryption calculation server by using the key;
and step 3: transmitting the files and the keys after the chain encryption calculation to a receiving end;
and 4, step 4: and the receiving end adopts the decryption calculation server to perform chain decryption calculation on the received file and the key to obtain the security data.
2. The method for file transmission by using single key for chain encryption according to claim 1, wherein the chain encryption calculation specifically comprises the following steps:
step 21: extracting a first group of files to be encrypted from a plurality of groups of files to be encrypted, encrypting by using the secret key and a Vernam encryption algorithm to generate encrypted files, and transmitting the encrypted files to the receiving end;
step 22: taking the encrypted file as a current encryption key, extracting a next group of files to be encrypted from the rest files to be encrypted by using a Vernam encryption algorithm to generate an encrypted file, and transmitting the encrypted file to the receiving end;
step 23: judging whether the files to be encrypted are all encrypted, if not, returning to the step 22; if so, the chain encryption calculation is complete.
3. The method for file transmission by using single key for chain encryption according to claim 2, wherein the chain decryption calculation is an inverse operation of the chain encryption calculation, and the specific process is as follows:
step 41: decrypting the encrypted file generated by encrypting the first group of files to be encrypted by adopting the key to obtain a ciphertext;
step 42: the ciphertext is used as a current decryption key to decrypt an encrypted file generated by the next group of files to be encrypted, and the ciphertext is obtained;
step 43: judging whether all the encrypted files are decrypted, if not, returning to the step 42; if so, all the ciphertexts obtained by decryption form the safety data together, and the chain decryption calculation is completed.
CN202210228727.XA 2022-03-10 2022-03-10 File transmission method for chain encryption by adopting single key Pending CN114301718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210228727.XA CN114301718A (en) 2022-03-10 2022-03-10 File transmission method for chain encryption by adopting single key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210228727.XA CN114301718A (en) 2022-03-10 2022-03-10 File transmission method for chain encryption by adopting single key

Publications (1)

Publication Number Publication Date
CN114301718A true CN114301718A (en) 2022-04-08

Family

ID=80978678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210228727.XA Pending CN114301718A (en) 2022-03-10 2022-03-10 File transmission method for chain encryption by adopting single key

Country Status (1)

Country Link
CN (1) CN114301718A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5297207A (en) * 1993-05-24 1994-03-22 Degele Steven T Machine generation of cryptographic keys by non-linear processes similar to processes normally associated with encryption of data
CN101401105A (en) * 2006-04-18 2009-04-01 国际商业机器公司 Encryption apparatus and method for providing an encrypted file system
US20090323927A1 (en) * 2008-05-23 2009-12-31 Red Hat, Inc. Mechanism for chained output feedback encryption
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
US20150124961A1 (en) * 2013-11-06 2015-05-07 Certicom Corp. Public Key Encryption Algorithms for Hard Lock File Encryption
WO2021044465A1 (en) * 2019-09-02 2021-03-11 株式会社Dnpハイパーテック Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5297207A (en) * 1993-05-24 1994-03-22 Degele Steven T Machine generation of cryptographic keys by non-linear processes similar to processes normally associated with encryption of data
CN101401105A (en) * 2006-04-18 2009-04-01 国际商业机器公司 Encryption apparatus and method for providing an encrypted file system
US20090323927A1 (en) * 2008-05-23 2009-12-31 Red Hat, Inc. Mechanism for chained output feedback encryption
CN101753292A (en) * 2008-12-15 2010-06-23 汤姆森许可贸易公司 Methods and devices for a chained encryption mode
US20150124961A1 (en) * 2013-11-06 2015-05-07 Certicom Corp. Public Key Encryption Algorithms for Hard Lock File Encryption
WO2021044465A1 (en) * 2019-09-02 2021-03-11 株式会社Dnpハイパーテック Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure

Similar Documents

Publication Publication Date Title
CN102904711B (en) Information ciphering method
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN107534558A (en) For the method and data highway system of the information security for protecting the data via data bus transmission
EP3022864B1 (en) Apparatus and method for key update for use in a block cipher algorithm
Kuang et al. Quantum encryption and decryption in IBMQ systems using quantum permutation pad
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
CN114065247A (en) Quantum digital mixed signcryption method
CN101515853B (en) Information terminal and information safety device thereof
CN104038337A (en) Data encryption method based on AES128
CN108599922B (en) Novel method for generating integrity authentication code of message containing secret key
CN101882991B (en) Communication data stream encryption method based on block cipher
CN114301718A (en) File transmission method for chain encryption by adopting single key
CN107040921B (en) Short message encryption system based on point-to-point
CN112367159B (en) Mixed encryption and decryption method and system for medical data secure storage
CN104579645A (en) Secret key updating method based on AES encryption system
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN104796254A (en) ECC-based official document transferring method
CN114826558A (en) Mass data rapid encryption method and system
CN111130755B (en) Matrix double encryption method based on signature
JP2000224158A (en) Ciphering communication system
CN106850192A (en) A kind of method for optimizing mobile device data storehouse encryption efficiency
CN108566270B (en) Novel encryption method using double block cipher
CN106341230B (en) Method for realizing unconditional safety of modern cryptosystem by shortening cipher text length

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220408