CN114338008B - Encryption transmission method, device, system and storage medium - Google Patents

Encryption transmission method, device, system and storage medium Download PDF

Info

Publication number
CN114338008B
CN114338008B CN202111620874.3A CN202111620874A CN114338008B CN 114338008 B CN114338008 B CN 114338008B CN 202111620874 A CN202111620874 A CN 202111620874A CN 114338008 B CN114338008 B CN 114338008B
Authority
CN
China
Prior art keywords
sequence
signature
data
encrypted
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111620874.3A
Other languages
Chinese (zh)
Other versions
CN114338008A (en
Inventor
郭江柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111620874.3A priority Critical patent/CN114338008B/en
Publication of CN114338008A publication Critical patent/CN114338008A/en
Application granted granted Critical
Publication of CN114338008B publication Critical patent/CN114338008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption transmission method, device and system and a storage medium. Wherein the method comprises the following steps: acquiring data to be encrypted and an optical fiber network band in a preset period; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; and encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted. The invention solves the technical problems of low data transmission safety and high leakage risk caused by the fact that the ciphertext of the encryption transmission method in the prior art is easy to crack.

Description

Encryption transmission method, device, system and storage medium
Technical Field
The present invention relates to the field of information technologies and software development technologies, and in particular, to the field of data transmission technologies, and in particular, to an encryption transmission method, device, system, and storage medium.
Background
With the rapid development of information technology, the potential safety hazard problem of network information is increasingly prominent, and how to ensure that personal information can be safely transmitted on a network is also a problem to be solved by a lacing.
In the prior art, the password storage mode of the user mainly uses the ciphertext encrypted by the MD5 algorithm, because the encryption of the MD5 does not need a secret key, only one ciphertext is obtained after the same data is encrypted, the ciphertext has the possibility of inquiring and cracking through a rainbow table after leakage, the data transmission security is low, and the leakage risk is high.
Aiming at the problems of easy cracking of ciphertext, low data transmission safety, large leakage risk and the like in the prior art, no effective solution is proposed at present.
Disclosure of Invention
The embodiment of the invention provides an encryption transmission method, an encryption transmission device, an encryption transmission system and a storage medium, which at least solve the technical problems of low data transmission safety and high leakage risk caused by the fact that ciphertext of an encryption transmission method in the prior art is easy to crack.
According to an aspect of an embodiment of the present invention, there is provided an encrypted transmission method including: acquiring data to be encrypted and an optical fiber network band in a preset period; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; and encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
Optionally, generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix includes: randomly extracting a numerical value from the integer sequence as a first signature variable, randomly extracting two numerical values from the conversion sequence as a second signature variable, and randomly extracting three numerical values from the encryption matrix as a third signature variable; and splicing the first signature variable, the second signature variable and the third signature variable to obtain a signature variable array.
Optionally, encrypting the data to be encrypted by using the signature to obtain encrypted data to be transmitted, including: performing exclusive-or disturbance on the data to be encrypted by adopting the conversion sequence to obtain data after exclusive-or disturbance; the data after the exclusive or disturbance is subjected to Laplacian transformation to obtain transformed data; carrying out subcarrier disturbance processing on the transformed data by adopting the encryption matrix, and obtaining hexadecimal code table transformed data after code table transformation; and encrypting the data after the code table conversion by adopting the signature to obtain encrypted data to be transmitted.
Optionally, generating the integer sequence based on the optical fiber network band includes: generating a band diagram based on the optical fiber network band; and selecting the maximum value in the effective values in each second in the wave band diagram to obtain the integer sequence.
Optionally, generating the encryption matrix according to the converted sequence of integers converted from the integer sequence includes: screening the values in the integer sequence to obtain all odd term values; generating the conversion sequence by all the odd term values; the converted sequence is subjected to size sorting through an bubbling sorting algorithm to obtain a sorted sequence; and multiplying the ordered sequence of numbers by all even number values in the integer sequence, and taking the obtained multiplication result as the encryption matrix.
Optionally, screening the values in the integer sequence to obtain all odd term values, including: and taking the value of the integer sequence every other unit from the first value of the integer sequence to obtain all the odd term values.
According to another aspect of the embodiment of the present invention, there is also provided an encrypted transmission apparatus, including: the first acquisition module is used for acquiring data to be encrypted and an optical fiber network band in a preset period; the first generation module is used for generating an integer sequence based on the optical fiber network wave band; the second generation module is used for generating an encryption matrix according to the converted sequence obtained by converting the integer sequence; the third generation module is used for generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; the second acquisition module is used for randomly inserting the byte array intercepted from the preset signature secret key into the signature variable array to obtain a signature; and the third acquisition module is used for encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform any one of the above-described encrypted transmission methods.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device including a memory, in which a computer program is stored, and a processor configured to run the computer program to perform any one of the encrypted transmission methods described above.
According to another aspect of the embodiment of the present invention, there is further provided a processor, where the processor is configured to execute a program, and when the program runs, execute any one of the encrypted transmission methods described above.
In the embodiment of the invention, an encryption transmission mode is adopted, and the data to be encrypted and the optical fiber network wave band in a preset period are obtained; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; the signature is adopted to encrypt the data to be encrypted to obtain the encrypted data to be transmitted, and the aim of realizing data encryption transmission by adopting an irreversible encryption algorithm is fulfilled, so that the technical effects of improving the complexity and the safety of data encryption transmission are realized, and the technical problems of low data transmission safety and high leakage risk caused by the fact that ciphertext of an encryption transmission method in the prior art is easily cracked are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a flowchart of an encrypted transmission method according to an embodiment of the present invention;
FIG. 2 is a flow chart of an alternative encrypted transmission method according to an embodiment of the invention;
FIG. 3 is an alternative wave Duan Tu according to an embodiment of the present invention;
FIG. 4 is a flow chart of another alternative encrypted transmission method according to an embodiment of the invention;
FIG. 5 is a flow chart of another alternative encrypted transmission method according to an embodiment of the invention;
Fig. 6 is a schematic structural diagram of an encryption transmission apparatus according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
With the rapid development of information technology, the internet is no longer an unfamiliar vocabulary, and now becomes an indispensable important component in various fields of economic society, more and more enterprises join the lines and rows of internet users, become novel platforms and reform forces for production and construction, economic trade, technological innovation, public service, file transmission, life entertainment, and the internet technology is changing living space and life style of people in a rapid and convenient transmission mode.
Each social networking site opens up to varying degrees real-time data generated by its users, which is collected by some data providers, and presents some market analysis facilities for monitoring data. According to various data combinations such as information written in a social network site by a user and position information displayed by a smart phone, the personal information can be accurately locked to a person, personal information is mined, and privacy security of the user is difficult to guarantee. Meanwhile, how to ensure secure transmission of personal information over a network is also a problem to be solved. Most of current ciphers of users in most systems are encrypted by using an MD5 algorithm, because the encryption of the MD5 does not need a secret key, only one cipher text is obtained after the same data is encrypted, the possibility of inquiring and cracking through a rainbow table exists after the cipher text is leaked, the data transmission security is low, and the leakage risk is high.
In view of the foregoing, embodiments of the present invention provide a method embodiment of encrypted transmission, it should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Fig. 1 is a flowchart of an encrypted transmission method according to an embodiment of the present invention, as shown in fig. 1, the method includes the steps of:
Step S102, obtaining data to be encrypted and an optical fiber network wave band in a preset period;
step S104, generating an integer sequence based on the optical fiber network wave band;
Step S106, generating an encryption matrix according to the converted sequence obtained by the conversion of the integer sequence;
step S108, generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix;
step S110, randomly inserting a byte array intercepted from a preset signature key into the signature variable array to obtain a signature;
And step S112, encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
Alternatively, the predetermined period is a period previous to the current time point, where the previous period may be, but is not limited to, a minute previous to the current time point.
Optionally, acquiring a band diagram corresponding to the optical fiber network band, selecting a maximum value in effective values in each second in the band diagram, and obtaining the integer sequence X1y according to the maximum value.
Optionally, the conversion sequence X2y is generated according to the odd term values in the integer sequence X1 y; the encryption matrix X3y is generated based on the even term values in the integer sequence X1y and the converted sequence X2 y.
Optionally, any number of the target numbers is selected from the integer sequence X1y, the converted sequence X2y and the encryption matrix X3y, and a concatenation process is performed on a plurality of the numbers to obtain the signature variable array.
Optionally, after the signature variable array is obtained, a preset signature key is randomly intercepted by one bit, the key length is repeated for 1 to 2 times to obtain a byte array, and the byte array is randomly inserted into the signature variable array to obtain the signature.
In the embodiment of the invention, an encryption transmission mode is adopted, and the data to be encrypted and the optical fiber network wave band in a preset period are obtained; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; the signature is adopted to encrypt the data to be encrypted to obtain the encrypted data to be transmitted, and the aim of realizing data encryption transmission by adopting an irreversible encryption algorithm is fulfilled, so that the technical effects of improving the complexity and the safety of data encryption transmission are realized, and the technical problems of low data transmission safety and high leakage risk caused by the fact that ciphertext of an encryption transmission method in the prior art is easily cracked are solved.
The embodiment of the invention at least can realize the following technical effects: the key is introduced into the irreversible encryption algorithm, and the key cannot be used for decryption, so that serious consequences possibly caused by leakage are greatly reduced; the complexity of the rainbow table is improved, the possibility of reverse matching through random encryption is reduced, and the anti-attack capability of the ciphertext is improved; the security performance during information transmission is greatly enhanced, and one-time-pad encryption can be well achieved.
In an alternative embodiment, generating the signature variable array from the integer sequence, the conversion array, and the encryption matrix includes:
Step S202, randomly extracting a numerical value from the integer sequence as a first signature variable, randomly extracting two numerical values from the converted sequence as a second signature variable, and randomly extracting three numerical values from the encryption matrix as a third signature variable;
step S204, the first signature variable, the second signature variable and the third signature variable are spliced to obtain a signature variable array.
In the embodiment of the invention, one value is randomly extracted from the integer sequence to be used as a first signature variable, two values are randomly extracted from the conversion sequence to be used as a second signature variable, and three digits are randomly extracted from the encryption matrix to be used as a third signature variable; and the first signature variable, the second signature variable and the third signature variable are spliced to obtain a signature variable array, so that the purpose of improving the complexity of the signature variable array is achieved, the possibility of reverse matching through random encryption is reduced, and the anti-attack capability of the ciphertext is improved.
As an alternative embodiment, fig. 2 is a flowchart of an alternative encryption transmission method according to an embodiment of the present invention, where, as shown in fig. 2, the encryption of the data to be encrypted using the signature, to obtain encrypted data to be transmitted, includes:
step S302, performing exclusive-or disturbance on the data to be encrypted by adopting the conversion sequence to obtain data after exclusive-or disturbance;
step S304, the data after the exclusive or disturbance is subjected to Laplacian transformation to obtain transformed data;
Step S306, carrying out subcarrier disturbance processing on the transformed data by adopting the encryption matrix, and obtaining hexadecimal code table transformed data after code table transformation;
and step S308, encrypting the data after the code table conversion by adopting the signature to obtain the encrypted data to be transmitted.
Optionally, the laplace transform is used for converting the data after the exclusive or disturbance into sinusoidal signal data with equal amplitude, and performing superposition processing on the sinusoidal signal data to obtain the transformed data, where the laplace transform formula is as follows:
Wherein a and α are constants;
optionally, the transformed data is subjected to code table conversion processing by contrasting with an ASCII code table to obtain hexadecimal code table converted data.
In an alternative embodiment, generating an integer sequence based on the fiber network band includes:
step S402, generating a wave band diagram based on the wave band of the optical fiber network;
step S404, selecting the maximum value in the effective values in each second in the band diagram to obtain the integer sequence.
Alternatively, the previous period may be, but is not limited to, a previous minute of a previous time point, a maximum value of a corresponding band length in each second in the band diagram is selected, and the integer sequence is obtained based on a plurality of the maximum values.
As an alternative embodiment, fig. 3 is an alternative band diagram according to an embodiment of the present invention, where a maximum band length corresponding to each second is obtained, for example, a maximum band length of 490nm for the 3 rd second, 420nm for the 4 th second, 340nm for the 5 th second, 430nm for the 6 th second, and so on, as shown, and an integer sequence is obtained according to a plurality of the above maximum band lengths.
As an alternative embodiment, fig. 4 is a flowchart of another alternative encryption transmission method according to an embodiment of the present invention, as shown in fig. 4, generating an encryption matrix according to a converted sequence of integers converted as described above, including:
Step S502, screening the numerical values in the integer sequence to obtain all the numerical values of the odd items;
Step S504, generating the conversion sequence by all the odd term values;
step S506, the converted sequence is subjected to size sorting through an bubbling sorting algorithm to obtain a sorted sequence;
And step S508, multiplying the ordered sequence by all even number values in the integer sequence, and taking the obtained multiplication result as the encryption matrix.
Optionally, the first value in the integer sequence is taken as the initial position 0, a numerical coordinate is established, each value corresponds to a unit in the numerical coordinate, values are taken every other unit, all odd term values in the integer sequence are obtained, and the conversion number sequence X2y is generated based on all the odd term values.
In an alternative embodiment, the filtering the values in the integer sequence to obtain all the odd term values includes:
step S602, starting from the first value of the integer sequence, taking the value of the integer sequence every other unit to obtain all the odd term values.
Optionally, the first value in the integer sequence is taken as the initial position 0, a numerical coordinate is established, each value corresponds to one unit in the numerical coordinate, and values are taken every other unit, so that all odd term values in the integer sequence are obtained.
As an alternative embodiment, fig. 5 is a flowchart of another alternative encryption transmission method according to an embodiment of the present invention, as shown in fig. 5, and the method specifically includes the following steps: generating a wave band diagram by acquiring a network wave band within one minute before the current time, taking the maximum value in effective values in each second in the wave band diagram, obtaining an integer sequence X1y, and generating a conversion sequence according to the integer sequence; screening the values in the integer sequence X1y, starting from the first value coordinate 0 of the sequence, taking values every other unit to obtain all odd term values, generating a group of conversion sequence X2y, and generating an encryption matrix according to the conversion sequence; the size sorting is carried out on the converted number sequence X2y through bubbling sorting, the sorted number sequence is multiplied by all even number item values in X1y, and the multiplied result is the encryption matrix X3y; randomly extracting a numerical value from an integer sequence as a first signature variable, randomly extracting two numerical values from a conversion sequence as a second signature variable, randomly extracting three numerical values from an encryption matrix as a third signature variable, splicing the first signature variable with the second signature variable and the third signature variable, randomly intercepting a preset signature key, repeating the key for 1 to 2 times, and randomly inserting the obtained byte array into the spliced signature variable array to obtain a signature; performing exclusive-or disturbance on the original binary data through a scrambling matrix X2y, performing Laplacian transformation on the data after the exclusive-or disturbance (represented as superposition of sine signals with equal amplitude), and performing subcarrier disturbance through a permutation matrix X3y; and (3) converting the result data into 16 system by contrasting with an ASCII code table, and combining the signature to obtain the final encrypted data and outputting the final encrypted data.
In the embodiment of the invention, since the algorithm is irreversible encryption operation using the key, the key can only be used for encrypting the data and can not reversely decrypt the encrypted data according to the key, so that a series of potential safety hazards caused by key leakage can be reduced; the key is used for irreversible encryption operation, so that different results are obtained after the same data are encrypted by different keys, the situation that the original data are reversely searched according to a rainbow table after the encrypted data are leaked is prevented, and the method has stronger anti-attack capability.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the above-mentioned methods of the various embodiments of the present invention.
Example 2
The embodiment also provides an encryption transmission device, which is used for implementing the above embodiment and the preferred implementation manner, and is not described in detail. As used below, the terms "unit," "means" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
According to an embodiment of the present invention, there is further provided an apparatus embodiment for implementing the above-mentioned encrypted transmission method, and fig. 6 is a schematic structural diagram of an encrypted transmission apparatus according to an embodiment of the present invention, as shown in fig. 6, where the above-mentioned encrypted transmission apparatus includes: a first acquisition module 800, a first generation module 802, a second generation module 804, a third generation module 806, a second acquisition module 808, a third acquisition module 810, wherein:
A first obtaining module 800, configured to obtain data to be encrypted and a fiber network band within a predetermined period;
A first generating module 802, configured to generate an integer sequence based on the fiber network band;
A second generating module 804, configured to generate an encryption matrix according to the converted sequence of integers;
a third generating module 806, configured to generate a signature variable array according to the integer sequence, the conversion array, and the encryption matrix;
A second obtaining module 808, configured to randomly insert the byte array randomly intercepted from the preset signature key into the signature variable array to obtain a signature;
and a third obtaining module 810, configured to encrypt the data to be encrypted by using the signature, so as to obtain encrypted data to be transmitted.
It should be noted that each of the above modules may be implemented by software or hardware, for example, in the latter case, it may be implemented by: the above modules may be located in the same processor; or the various modules described above may be located in different processors in any combination.
Here, the first obtaining module 800, the first generating module 802, the second generating module 804, the third generating module 806, the second obtaining module 808, and the third obtaining module 810 correspond to steps S102 to S112 in embodiment 1, and the modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to those disclosed in embodiment 1. It should be noted that the above modules may be run in a computer terminal as part of the apparatus.
It should be noted that, the optional or preferred implementation manner of this embodiment may be referred to the related description in embodiment 1, and will not be repeated here.
The encryption transmission apparatus may further include a processor and a memory, where the first obtaining module 800, the first generating module 802, the second generating module 804, the third generating module 806, the second obtaining module 808, the third obtaining module 810, and the like are stored as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, the kernel fetches corresponding program units from the memory, and one or more of the kernels can be arranged. The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
According to an embodiment of the present application, there is also provided an embodiment of a nonvolatile storage medium. Optionally, in this embodiment, the nonvolatile storage medium includes a stored program, where the device where the nonvolatile storage medium is located is controlled to execute any one of the encrypted transmission methods when the program runs.
Alternatively, in this embodiment, the above-mentioned nonvolatile storage medium may be located in any one of the computer terminals in the computer terminal group in the computer network or in any one of the mobile terminals in the mobile terminal group, and the above-mentioned nonvolatile storage medium includes a stored program.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: acquiring data to be encrypted and an optical fiber network band in a preset period; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; and encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: randomly extracting a numerical value from the integer sequence as a first signature variable, randomly extracting two numerical values from the conversion sequence as a second signature variable, and randomly extracting three numerical values from the encryption matrix as a third signature variable; and splicing the first signature variable, the second signature variable and the third signature variable to obtain a signature variable array.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: performing exclusive-or disturbance on the data to be encrypted by adopting the conversion sequence to obtain data after exclusive-or disturbance; the data after the exclusive or disturbance is subjected to Laplacian transformation to obtain transformed data; carrying out subcarrier disturbance processing on the transformed data by adopting the encryption matrix, and obtaining hexadecimal code table transformed data after code table transformation; and encrypting the data after the code table conversion by adopting the signature to obtain encrypted data to be transmitted.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: generating a band diagram based on the optical fiber network band; and selecting the maximum value in the effective values in each second in the wave band diagram to obtain the integer sequence.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: screening the values in the integer sequence to obtain all odd term values; generating the conversion sequence by all the odd term values; the converted sequence is subjected to size sorting through an bubbling sorting algorithm to obtain a sorted sequence; and multiplying the ordered sequence of numbers by all even number values in the integer sequence, and taking the obtained multiplication result as the encryption matrix.
Optionally, the program controls the device in which the nonvolatile storage medium is located to perform the following functions when running: and taking the value of the integer sequence every other unit from the first value of the integer sequence to obtain all the odd term values.
According to an embodiment of the present application, there is also provided an embodiment of a processor. Optionally, in this embodiment, the processor is configured to run a program, where any one of the encrypted transmission methods is executed when the program runs.
According to an embodiment of the present application, there is also provided an embodiment of a computer program product adapted to perform a program initialized with the steps of any one of the above-mentioned encryption transmission methods when executed on a data processing device.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: acquiring data to be encrypted and an optical fiber network band in a preset period; generating an integer sequence based on the optical fiber network band; generating an encryption matrix according to a conversion sequence obtained by converting the integer sequence; generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix; randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature; and encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
According to an embodiment of the present application, there is also provided an embodiment of an electronic device including a memory in which a computer program is stored, and a processor configured to run the computer program to perform any one of the encrypted transmission methods described above.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable non-volatile storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a non-volatile storage medium, including instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned nonvolatile storage medium includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (9)

1. An encrypted transmission method, comprising:
acquiring data to be encrypted and an optical fiber network band in a preset period;
Generating an integer sequence based on the fiber network band;
generating an encryption matrix according to the converted sequence obtained by converting the integer sequence;
generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix;
randomly inserting a byte array randomly intercepted from a preset signature secret key into the signature variable array to obtain a signature;
and encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
2. The method of claim 1, wherein generating a signature variable array from the sequence of integers, the conversion array, and the encryption matrix comprises:
Randomly extracting a numerical value from the integer sequence as a first signature variable, randomly extracting two numerical values from the converted sequence as a second signature variable, and randomly extracting three numerical values from the encryption matrix as a third signature variable;
and splicing the first signature variable, the second signature variable and the third signature variable to obtain a signature variable array.
3. The method of claim 1, wherein encrypting the data to be encrypted using the signature results in encrypted data to be transmitted, comprising:
Performing exclusive-or disturbance on the data to be encrypted by adopting the conversion sequence to obtain data after exclusive-or disturbance;
After the exclusive or disturbed data is subjected to Laplacian transformation, transformed data are obtained;
carrying out subcarrier disturbance processing on the transformed data by adopting the encryption matrix, and obtaining hexadecimal code table transformed data after code table transformation;
and encrypting the data after the code table conversion by adopting the signature to obtain encrypted data to be transmitted.
4. The method of claim 1, wherein generating an integer sequence based on the fiber network band comprises:
generating a band diagram based on the optical network band;
and selecting the maximum value in the effective values in each second in the wave band diagram to obtain the integer sequence.
5. The method of claim 1, wherein generating an encryption matrix from the converted sequence of integers converted from the sequence of integers comprises:
Screening the values in the integer sequence to obtain all odd term values;
Generating the conversion sequence by all the odd term values;
The converted sequence is subjected to size sorting through an bubbling sorting algorithm to obtain a sorted sequence;
Multiplying the ordered sequence of numbers with all even number of numbers in the integer sequence, and taking the obtained multiplication result as the encryption matrix.
6. The method of claim 5, wherein screening the values in the sequence of integers to obtain all odd term values comprises:
and starting from the first value of the integer sequence, taking the value of the integer sequence every other unit to obtain all the odd term values.
7. An encrypted transmission device, comprising:
The first acquisition module is used for acquiring data to be encrypted and an optical fiber network band in a preset period;
A first generation module for generating an integer sequence based on the fiber network band;
The second generation module is used for generating an encryption matrix according to the converted sequence obtained by conversion of the integer sequence;
The third generation module is used for generating a signature variable array according to the integer sequence, the conversion sequence and the encryption matrix;
the second acquisition module is used for randomly inserting the byte array randomly intercepted from the preset signature secret key into the signature variable array to obtain a signature;
And the third acquisition module is used for encrypting the data to be encrypted by adopting the signature to obtain the encrypted data to be transmitted.
8. A computer readable storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the encrypted transmission method according to any one of claims 1 to 6.
9. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the encrypted transmission method of any one of claims 1 to 6.
CN202111620874.3A 2021-12-27 2021-12-27 Encryption transmission method, device, system and storage medium Active CN114338008B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111620874.3A CN114338008B (en) 2021-12-27 2021-12-27 Encryption transmission method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111620874.3A CN114338008B (en) 2021-12-27 2021-12-27 Encryption transmission method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN114338008A CN114338008A (en) 2022-04-12
CN114338008B true CN114338008B (en) 2024-05-14

Family

ID=81014246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111620874.3A Active CN114338008B (en) 2021-12-27 2021-12-27 Encryption transmission method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN114338008B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003195756A (en) * 2001-12-25 2003-07-09 Shisei O Ciphering method and device therefor
JP2005115830A (en) * 2003-10-10 2005-04-28 Nippon Telegr & Teleph Corp <Ntt> System, method and program for e-mail delivery
JP2005210633A (en) * 2004-01-26 2005-08-04 Lec:Kk Encryption method and encryption apparatus
CN106160995A (en) * 2015-04-21 2016-11-23 郑珂威 Multinomial complete homomorphic cryptography method and system based on coefficient mapping conversion
CN109921894A (en) * 2019-02-13 2019-06-21 平安科技(深圳)有限公司 Data transfer encryption method, device and storage medium, server
CN109948353A (en) * 2019-03-12 2019-06-28 韩山师范学院 Asymmetric more image encryption methods, device and storage medium
CN110224811A (en) * 2019-05-13 2019-09-10 中国联合网络通信集团有限公司 Internet of Things cipher processing method, apparatus and system
CN110336662A (en) * 2019-06-06 2019-10-15 平安科技(深圳)有限公司 Digital information encryption method, device, computer equipment and storage medium
CN110971581A (en) * 2018-09-30 2020-04-07 北京国双科技有限公司 Encrypted data processing method and device
CN112994875A (en) * 2021-04-29 2021-06-18 南京铉盈网络科技有限公司 Encryption method, decryption method, communication method, system and device thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003195756A (en) * 2001-12-25 2003-07-09 Shisei O Ciphering method and device therefor
JP2005115830A (en) * 2003-10-10 2005-04-28 Nippon Telegr & Teleph Corp <Ntt> System, method and program for e-mail delivery
JP2005210633A (en) * 2004-01-26 2005-08-04 Lec:Kk Encryption method and encryption apparatus
CN106160995A (en) * 2015-04-21 2016-11-23 郑珂威 Multinomial complete homomorphic cryptography method and system based on coefficient mapping conversion
CN110971581A (en) * 2018-09-30 2020-04-07 北京国双科技有限公司 Encrypted data processing method and device
CN109921894A (en) * 2019-02-13 2019-06-21 平安科技(深圳)有限公司 Data transfer encryption method, device and storage medium, server
CN109948353A (en) * 2019-03-12 2019-06-28 韩山师范学院 Asymmetric more image encryption methods, device and storage medium
CN110224811A (en) * 2019-05-13 2019-09-10 中国联合网络通信集团有限公司 Internet of Things cipher processing method, apparatus and system
CN110336662A (en) * 2019-06-06 2019-10-15 平安科技(深圳)有限公司 Digital information encryption method, device, computer equipment and storage medium
CN112994875A (en) * 2021-04-29 2021-06-18 南京铉盈网络科技有限公司 Encryption method, decryption method, communication method, system and device thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于矩阵运算的文件数据块加密方法;吕政;;信息安全与通信保密;20090210(第02期);全文 *

Also Published As

Publication number Publication date
CN114338008A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
TWI489847B (en) Data encryption method, data verification method and electronic apparatus
CN102904712B (en) Information ciphering method
CN108737326B (en) Method, system, device and electronic equipment for token verification
CN106599723B (en) File encryption method and device and file decryption method and device
CN103095449B (en) A kind of dynamic encryption decryption method based on stream cipher
CN107528689B (en) Password modification method based on Ukey
CN111010266B (en) Message encryption and decryption, reading and writing method and device, computer equipment and storage medium
CN106778292B (en) A kind of quick restoring method of Word encrypted document
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
CN108667598B (en) Device and method for realizing secure key exchange and secure key exchange method
CN109687966A (en) Encryption method and its system
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN112115461A (en) Equipment authentication method and device, computer equipment and storage medium
Wu et al. Security analysis and improvement on an image encryption algorithm using Chebyshev generator
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN113489710B (en) File sharing method, device, equipment and storage medium
CN111859435B (en) Data security processing method and device
CN116455572B (en) Data encryption method, device and equipment
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN114338008B (en) Encryption transmission method, device, system and storage medium
CN106161000A (en) The method and system that data file is encrypted and decrypted
KR101148560B1 (en) Apparatus and method for encryption using mixture of bit data
CN110401533B (en) Private key encryption method and device
CN110166222B (en) Multi-device simultaneous authentication method and device, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant