CN114338217B - Data encryption transmission method - Google Patents
Data encryption transmission method Download PDFInfo
- Publication number
- CN114338217B CN114338217B CN202210001877.7A CN202210001877A CN114338217B CN 114338217 B CN114338217 B CN 114338217B CN 202210001877 A CN202210001877 A CN 202210001877A CN 114338217 B CN114338217 B CN 114338217B
- Authority
- CN
- China
- Prior art keywords
- data
- sequence
- sub
- numbers
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 32
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000005336 cracking Methods 0.000 abstract description 3
- 238000013500 data storage Methods 0.000 description 5
- 238000003491 array Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The application discloses a data encryption transmission method, relates to the technical field of data encryption, and solves the technical problems that in the prior art, a fixed key is adopted to encrypt and decrypt data, so that the data encryption and transmission safety is low; the application divides the plaintext data into a plurality of sub-data through the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively through different keys, thereby achieving the purpose of data encryption, and improving the safety of the data through double encryption; before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.
Description
Technical Field
The application belongs to the technical field of data encryption, and particularly relates to a data encryption transmission method.
Background
With the increasing variety and quantity of data, data storage encryption technology is increasingly applied, and becomes an effective method for protecting data security. Data storage encryption techniques generally refer to encrypting data using a particular technique prior to writing the data to a device, thereby ensuring the security of the data on the storage device.
In the prior art, an encryption and decryption unit is generally adopted to encrypt data, the encryption and decryption unit adopts a fixed key to encrypt the data, the stored data adopts a fixed key to decrypt, the key generally adopted by the encryption and decryption unit is fixed and single, the possibility of being violently cracked exists, the whole data is directly encrypted according to non-encryption processing, and the possibility of data leakage is increased; therefore, a data encryption transmission method is needed.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art; therefore, the application provides a data encryption transmission method, which is used for solving the technical problem that the data encryption and transmission safety are not high because the data is encrypted and decrypted by adopting a fixed key in the prior art.
To achieve the above object, an embodiment according to a first aspect of the present application provides a data encryption transmission method, including:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; wherein the position feature tag represents a positional relationship between the number and the reference node;
rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence;
encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key label to a target terminal through a secure transmission channel; wherein, the safe transmission channel is established by the block chain link point.
Preferably, the dividing the plaintext data includes:
dividing plaintext data according to the set unit quantity; wherein the unit quantity includes a unit data quantity or a unit character number;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
Preferably, the number Chi Jiyu is set up by the number of the sub data, including:
acquiring the number of sub-data, and marking as N; wherein N is an integer not less than 2;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
Preferably, the step of obtaining the numbered position feature tag includes:
before the number reordering, arbitrarily selecting a number as a reference node;
acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label; wherein the location feature tag is an integer.
Preferably, the number sequence includes a plurality of number arrays, each number array includes a number and a corresponding position feature tag, and the number arrays in the number sequence are arranged according to a natural sequence.
Preferably, the natural sequence includes from large to small or from small to large.
Preferably, encrypting the data sequence and the number sequence includes:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
Preferably, the data types include text, picture and video, and the keys corresponding to each data type in the key pool are not less than two.
Preferably, the secure transmission channel is established through a blockchain node, and the data sender and the data requester are checked through the blockchain node before the secure transmission channel is established.
Compared with the prior art, the application has the beneficial effects that:
1. the application divides the plaintext data into a plurality of sub-data by the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively by different keys, thereby achieving the aim of data encryption and improving the safety of the data by double encryption.
2. Before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.
Drawings
FIG. 1 is a schematic diagram of the working steps of the present application.
Detailed Description
The technical solutions of the present application will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Along with the increasing of the types and the quantity of data, in order to avoid the loss of sensitive data such as company data, customer data and the like caused by leakage, a data storage encryption technology is widely applied and becomes an effective method for protecting the data security; data storage encryption techniques generally refer to encrypting data using a particular technique prior to writing the data to a storage device, thereby ensuring the security of the data stored on the storage device, and correspondingly decrypting the data using a corresponding technique when reading the stored data
The data storage encryption technology can be divided into methods such as host software encryption, encryption storage security switch, embedded special encryption equipment, encryption mechanism based on storage equipment and the like according to the implementation means, and the logic architecture of each method generally comprises an encryption and decryption unit and a key management center; the encryption and decryption unit is a functional unit for encrypting data to be stored by using a fixed key and decrypting the read stored data by using the fixed key; the key management center generally refers to a functional unit that is responsible for storing keys, and performing management operations such as replacing keys.
In the prior art, an encryption and decryption unit is generally adopted to encrypt data, the encryption and decryption unit adopts a fixed key to encrypt the data, the stored data adopts a fixed key to decrypt, the key generally adopted by the encryption and decryption unit is fixed and single, the possibility of being violently cracked exists, the whole data is directly encrypted according to non-encryption processing, and the possibility of data leakage is increased; before data encryption, the data are divided and numbered according to a division rule, the data and the processed numbers are respectively encrypted, and the encrypted data are transmitted to a target terminal through a secure transmission channel.
Referring to fig. 1, the present application provides a data encryption transmission method, which includes:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously marking the sub-data after the arrangement into a data sequence in series;
and encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key tag to the target terminal through a secure transmission channel.
The application provides a new data encryption method, which is used for encrypting data and then sending the encrypted data to a target terminal through a secure transmission channel; the target terminal in the application can represent a data receiver and specifically comprises a smart phone, a computer and a server.
The application divides plaintext data, comprising:
dividing the plaintext data according to the set unit data quantity or unit character quantity;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
In one embodiment, the plaintext data is divided by a set amount of unit data; for example: the plaintext data is 1.15Mb, and when the set unit data amount is 0.5Mb, the plaintext data is divided into three sub-data, and when the set unit data amount is 0.1Mb, the plaintext data is divided into twelve sub-data; it will be appreciated that the partitioning of plaintext data is typically from one end to the other.
In another embodiment, the plaintext data is divided by a set number of unit characters; for example: the plain text data is a character string containing 110 characters, and is divided into six sub-data when the set number of unit characters is 20, and is divided into four sub-data when the set number of unit characters is 30.
In other preferred embodiments, the set unit amount further includes a unit frame number for dividing data such as video.
In the present application, the number Chi Jiyu of the sub-data is established, which includes:
acquiring the number of sub-data, and marking as N;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
In the application, N is an integer not less than 2, and simultaneously the number of the sub data is not less than two, and a numbering pool is constructed according to the selected natural numbers, so that the data can be selected one by one from the numbering pool, and all the natural numbers in the numbering pool can be selected at one time.
It is noted that the present application arbitrarily selects N natural numbers, which are not required to be consecutive, but are required to be N different natural numbers; illustrating: assuming 5 sub-data, then a natural number such as 1,2, 3, 4, 5, such as 2,3, 4, 5, 6, such as 5, 6, 7, 8, 3, may be selected; but not 1,2, 3, 4.
In the application, the position feature label for obtaining the number comprises the following steps:
before the number reordering, arbitrarily selecting a number as a reference node;
and acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label.
The position feature labels in the present application are integers, including positive integers, 0 and negative integers.
Illustrating: assume that the numbers of the 5 sub-data divided into before reordering are 3,2, 5, 6, 1, respectively;
description example one: taking a number 3 corresponding to the first sub data as a reference node, and taking the position difference between the first number 3 and the reference node as 0, wherein the corresponding position feature label is 0; the position difference between the second number 2 and the reference node is 1, the corresponding position feature label is 1, and the like, and the position feature labels of the third number 5, the fourth number 6 and the fifth number 1 are 2,3 and 4 respectively.
Illustrative example II: taking the number 1 corresponding to the last sub-data as a reference node, and taking the position difference between the first number 3 and the reference node as 4, wherein the corresponding position characteristic label is-4; and the position difference between the second number 2 and the reference node is 3, the corresponding position characteristic label is-3, and the like, and the position characteristic labels of the third number 5, the fourth number 6 and the fifth number 1 are-2, -1 and 0 respectively.
Illustrative example III: taking a number 5 corresponding to the intermediate sub-data as a reference node, wherein the position difference between the first number 3 and the reference node is 2, and the corresponding position feature label is-2; and the position difference between the second number 2 and the reference node is 1, the corresponding position characteristic label is-1, and the like, and the position characteristic labels of the third number 5, the fourth number 6 and the fifth number 1 are 0, 1 and 2 respectively.
The number sequence comprises a plurality of number arrays, each number array comprises a number and a corresponding position characteristic label, and the number arrays in the number sequence are arranged according to a natural sequence; and respectively acquiring corresponding number sequences according to the first, second and third embodiments.
For the first illustrative example, the corresponding numbering sequence is [ (1, 0), (2, 1), (3, 2), (5, 3), (6, 4) ]; for the second illustrative example, the corresponding numbering sequence is [ (1, -4), (2, -3), (3, -2), (5, -1), (6, 0) ]; for the third illustrative example, the corresponding numbering sequence is [ (1, -2), (2, -1), (3, 0), (5, 1), (6, 2) ].
It is noted that the natural sequence in the present application includes from small to large or from large to small; taking the first, second, and third illustrative examples as examples, the number sequences obtained by rearranging from small to large have been mentioned above, the number sequences obtained from the new arrangement in the order from small to large are as follows: for the first illustrative example, the corresponding numbering sequence is [ (6, 0), (5, 1), (3, 2), (2, 3), (1, 4) ]; for the second illustrative example, the corresponding numbering sequence is [ (6, -4), (5, -3), (3, -2), (2, -1), (1, 0) ]; for the third illustrative example, the corresponding numbering sequence is [ (6, -2), (5, -1), (3, 0), (2, 1), (1, 2) ].
It can be understood that the user knowing the number sequence obtaining step can obtain the original sequence of the corresponding sub-data according to any unencrypted number sequence, and can obtain the plaintext data in the correct sequence by decrypting the sub-data.
In the present application, encrypting a data sequence and a number sequence includes:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
In the application, two different keys are adopted to encrypt the number sequence and the data sequence, if the number sequence and the data sequence are text data, the text type data at least need two different keys, so the keys corresponding to each data type in the key pool are not less than two, and the data types comprise text, pictures, videos and the like.
It is noted that, the data sequence of the present application is generated by rearranging the numbers according to the natural order, that is, decrypting the data sequence and serially connecting the sub-data therein to obtain data not equal to the plaintext data, and actually, the sub-data in the data sequence is disturbed due to the rearranging of the numbers, so as to achieve the dual encryption purpose.
The safe transmission channel is established through the block chain node, and before the safe transmission channel is established, the data sender and the data requester are checked through the block chain link point; the verification in the application refers to the rationality and the compliance of the two parties of data receiving, and the data transmission channel between the two parties can be established based on the block chain link points after verification.
One of the key points of the application is as follows: the application divides the plaintext data into a plurality of sub-data by the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively by different keys, thereby achieving the aim of data encryption and improving the safety of the data by double encryption.
The second key point of the application is that: before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.
The partial data in the formula are all obtained by removing dimension and taking the numerical value for calculation, and the formula is a formula closest to the real situation obtained by simulating a large amount of collected data through software; the preset parameters and the preset threshold values in the formula are set by those skilled in the art according to actual conditions or are obtained through mass data simulation.
The working principle of the application is as follows:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers; and acquiring the position characteristic label of the number, and correlating the number with the position characteristic label.
Rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence.
And encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key tag to the target terminal through a secure transmission channel.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.
Claims (8)
1. A data encryption transmission method, comprising:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; wherein the position feature tag represents a positional relationship between the number and the reference node;
rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence;
encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key label to a target terminal through a secure transmission channel; wherein, the safe transmission channel is established by the block chain link point.
2. The data encryption transmission method according to claim 1, wherein dividing the plaintext data comprises:
dividing plaintext data according to the set unit quantity;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
3. The method for encrypted transmission of data according to claim 1, wherein the number of the sub-data numbered Chi Jiyu is established, comprising:
acquiring the number of sub-data, and marking as N; wherein N is an integer not less than 2;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
4. The method for encrypted data transmission according to claim 1, wherein obtaining the numbered location feature tag comprises:
before the number reordering, arbitrarily selecting a number as a reference node;
acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label; wherein the location feature tag is an integer.
5. A data encryption transmission method according to claim 1 or 4, wherein the natural sequence comprises from large to small or from small to large.
6. A data encryption transmission method according to claim 1, wherein encrypting the data sequence and the number sequence comprises:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
7. The method according to claim 6, wherein the data types include text, picture and video, and the key corresponding to each data type in the key pool is not less than two.
8. The data encryption transmission method according to claim 1, wherein the secure transmission channel is established by a blockchain node, and the data sender and the data requester are checked by a blockchain node before the secure transmission channel is established.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210001877.7A CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210001877.7A CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114338217A CN114338217A (en) | 2022-04-12 |
CN114338217B true CN114338217B (en) | 2023-10-10 |
Family
ID=81022334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210001877.7A Active CN114338217B (en) | 2022-01-04 | 2022-01-04 | Data encryption transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114338217B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115017530B (en) * | 2022-08-08 | 2022-12-16 | 创云融达信息技术(天津)股份有限公司 | Data security storage device and method |
CN117424752B (en) * | 2023-12-07 | 2024-03-15 | 佛山市顺德弘金电器科技有限公司 | Communication encryption and decryption method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611550A (en) * | 2012-02-26 | 2012-07-25 | 光束(北京)国际工程技术研究院有限公司 | Method for encrypting data and method for transmitting encrypted data |
CN102624527A (en) * | 2012-02-26 | 2012-08-01 | 光束(北京)国际工程技术研究院有限公司 | Method and device for encrypting data and transmission method and transmission device of encrypted data |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN112333698A (en) * | 2020-11-18 | 2021-02-05 | 深圳大师科技有限公司 | Encryption authentication method and device for mobile game terminal |
CN113746629A (en) * | 2021-11-04 | 2021-12-03 | 山东凤和凰城市科技有限公司 | Secret communication method based on polymer simulation |
-
2022
- 2022-01-04 CN CN202210001877.7A patent/CN114338217B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102611550A (en) * | 2012-02-26 | 2012-07-25 | 光束(北京)国际工程技术研究院有限公司 | Method for encrypting data and method for transmitting encrypted data |
CN102624527A (en) * | 2012-02-26 | 2012-08-01 | 光束(北京)国际工程技术研究院有限公司 | Method and device for encrypting data and transmission method and transmission device of encrypted data |
CN103345609A (en) * | 2013-06-06 | 2013-10-09 | 深圳市大成天下信息技术有限公司 | Method and device for text encryption and decryption |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN112333698A (en) * | 2020-11-18 | 2021-02-05 | 深圳大师科技有限公司 | Encryption authentication method and device for mobile game terminal |
CN113746629A (en) * | 2021-11-04 | 2021-12-03 | 山东凤和凰城市科技有限公司 | Secret communication method based on polymer simulation |
Also Published As
Publication number | Publication date |
---|---|
CN114338217A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN114338217B (en) | Data encryption transmission method | |
US8345876B1 (en) | Encryption/decryption system and method | |
US20120134491A1 (en) | Cloud Storage Data Encryption Method, Apparatus and System | |
US20120134490A1 (en) | Selective Data Encryption and Decryption Method and Apparatus | |
US20090141889A1 (en) | Data processing apparatus | |
Mandal et al. | Symmetric key image encryption using chaotic Rossler system | |
HU227781B1 (en) | Symmetric key cryptographic apparatus and method for encryption and decryption of information | |
CN117176474B (en) | Encryption protection method and system for RFID data | |
CN115514469B (en) | Information encryption protection method | |
RU2410842C2 (en) | Communication system and communication method | |
CN112235101B (en) | Coding method and device based on hybrid coding mechanism, decoding method and device | |
EP3998597A1 (en) | Data processing device, data processing method, and computer program | |
Dhane et al. | A novel high capacity reversible data hiding through encryption scheme by permuting encryption key and entropy analysis | |
CN114422230B (en) | Information transmission system based on data encryption | |
CN114629701B (en) | Information display system based on information encryption | |
CN111368316B (en) | File encryption and decryption method and device | |
CA2592675A1 (en) | Communication system and communication method | |
WO2020153480A1 (en) | Transmission/reception system, transmission device, reception device, method, and computer program | |
CN113742759B (en) | Data encryption method and device for financial accounting system | |
CN118013558B (en) | Industrial equipment data storage method and system | |
US11664976B2 (en) | Method and devices for creating redundancy and encryption using Mojette Transform | |
JP5837625B2 (en) | Communication system and communication method | |
EP3285429A1 (en) | Method for securely transmitting digital data | |
CN114254366A (en) | Encryption method, decryption method, device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240912 Address after: 1144, 11th Floor, Building 29, Taihu Beili, Tongzhou District, Beijing 101149 Patentee after: Beijing Carly Education Consulting Co.,Ltd. Country or region after: China Address before: 473004 No. 80 Changjiang Road, Wancheng District, Nanyang City, Henan Province Patentee before: NANYANG INSTITUTE OF TECHNOLOGY Country or region before: China |