CN114338217B - Data encryption transmission method - Google Patents

Data encryption transmission method Download PDF

Info

Publication number
CN114338217B
CN114338217B CN202210001877.7A CN202210001877A CN114338217B CN 114338217 B CN114338217 B CN 114338217B CN 202210001877 A CN202210001877 A CN 202210001877A CN 114338217 B CN114338217 B CN 114338217B
Authority
CN
China
Prior art keywords
data
sequence
sub
numbers
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210001877.7A
Other languages
Chinese (zh)
Other versions
CN114338217A (en
Inventor
胡双年
马峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Carly Education Consulting Co.,Ltd.
Original Assignee
Nanyang Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanyang Institute of Technology filed Critical Nanyang Institute of Technology
Priority to CN202210001877.7A priority Critical patent/CN114338217B/en
Publication of CN114338217A publication Critical patent/CN114338217A/en
Application granted granted Critical
Publication of CN114338217B publication Critical patent/CN114338217B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a data encryption transmission method, relates to the technical field of data encryption, and solves the technical problems that in the prior art, a fixed key is adopted to encrypt and decrypt data, so that the data encryption and transmission safety is low; the application divides the plaintext data into a plurality of sub-data through the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively through different keys, thereby achieving the purpose of data encryption, and improving the safety of the data through double encryption; before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.

Description

Data encryption transmission method
Technical Field
The application belongs to the technical field of data encryption, and particularly relates to a data encryption transmission method.
Background
With the increasing variety and quantity of data, data storage encryption technology is increasingly applied, and becomes an effective method for protecting data security. Data storage encryption techniques generally refer to encrypting data using a particular technique prior to writing the data to a device, thereby ensuring the security of the data on the storage device.
In the prior art, an encryption and decryption unit is generally adopted to encrypt data, the encryption and decryption unit adopts a fixed key to encrypt the data, the stored data adopts a fixed key to decrypt, the key generally adopted by the encryption and decryption unit is fixed and single, the possibility of being violently cracked exists, the whole data is directly encrypted according to non-encryption processing, and the possibility of data leakage is increased; therefore, a data encryption transmission method is needed.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art; therefore, the application provides a data encryption transmission method, which is used for solving the technical problem that the data encryption and transmission safety are not high because the data is encrypted and decrypted by adopting a fixed key in the prior art.
To achieve the above object, an embodiment according to a first aspect of the present application provides a data encryption transmission method, including:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; wherein the position feature tag represents a positional relationship between the number and the reference node;
rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence;
encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key label to a target terminal through a secure transmission channel; wherein, the safe transmission channel is established by the block chain link point.
Preferably, the dividing the plaintext data includes:
dividing plaintext data according to the set unit quantity; wherein the unit quantity includes a unit data quantity or a unit character number;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
Preferably, the number Chi Jiyu is set up by the number of the sub data, including:
acquiring the number of sub-data, and marking as N; wherein N is an integer not less than 2;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
Preferably, the step of obtaining the numbered position feature tag includes:
before the number reordering, arbitrarily selecting a number as a reference node;
acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label; wherein the location feature tag is an integer.
Preferably, the number sequence includes a plurality of number arrays, each number array includes a number and a corresponding position feature tag, and the number arrays in the number sequence are arranged according to a natural sequence.
Preferably, the natural sequence includes from large to small or from small to large.
Preferably, encrypting the data sequence and the number sequence includes:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
Preferably, the data types include text, picture and video, and the keys corresponding to each data type in the key pool are not less than two.
Preferably, the secure transmission channel is established through a blockchain node, and the data sender and the data requester are checked through the blockchain node before the secure transmission channel is established.
Compared with the prior art, the application has the beneficial effects that:
1. the application divides the plaintext data into a plurality of sub-data by the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively by different keys, thereby achieving the aim of data encryption and improving the safety of the data by double encryption.
2. Before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.
Drawings
FIG. 1 is a schematic diagram of the working steps of the present application.
Detailed Description
The technical solutions of the present application will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Along with the increasing of the types and the quantity of data, in order to avoid the loss of sensitive data such as company data, customer data and the like caused by leakage, a data storage encryption technology is widely applied and becomes an effective method for protecting the data security; data storage encryption techniques generally refer to encrypting data using a particular technique prior to writing the data to a storage device, thereby ensuring the security of the data stored on the storage device, and correspondingly decrypting the data using a corresponding technique when reading the stored data
The data storage encryption technology can be divided into methods such as host software encryption, encryption storage security switch, embedded special encryption equipment, encryption mechanism based on storage equipment and the like according to the implementation means, and the logic architecture of each method generally comprises an encryption and decryption unit and a key management center; the encryption and decryption unit is a functional unit for encrypting data to be stored by using a fixed key and decrypting the read stored data by using the fixed key; the key management center generally refers to a functional unit that is responsible for storing keys, and performing management operations such as replacing keys.
In the prior art, an encryption and decryption unit is generally adopted to encrypt data, the encryption and decryption unit adopts a fixed key to encrypt the data, the stored data adopts a fixed key to decrypt, the key generally adopted by the encryption and decryption unit is fixed and single, the possibility of being violently cracked exists, the whole data is directly encrypted according to non-encryption processing, and the possibility of data leakage is increased; before data encryption, the data are divided and numbered according to a division rule, the data and the processed numbers are respectively encrypted, and the encrypted data are transmitted to a target terminal through a secure transmission channel.
Referring to fig. 1, the present application provides a data encryption transmission method, which includes:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously marking the sub-data after the arrangement into a data sequence in series;
and encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key tag to the target terminal through a secure transmission channel.
The application provides a new data encryption method, which is used for encrypting data and then sending the encrypted data to a target terminal through a secure transmission channel; the target terminal in the application can represent a data receiver and specifically comprises a smart phone, a computer and a server.
The application divides plaintext data, comprising:
dividing the plaintext data according to the set unit data quantity or unit character quantity;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
In one embodiment, the plaintext data is divided by a set amount of unit data; for example: the plaintext data is 1.15Mb, and when the set unit data amount is 0.5Mb, the plaintext data is divided into three sub-data, and when the set unit data amount is 0.1Mb, the plaintext data is divided into twelve sub-data; it will be appreciated that the partitioning of plaintext data is typically from one end to the other.
In another embodiment, the plaintext data is divided by a set number of unit characters; for example: the plain text data is a character string containing 110 characters, and is divided into six sub-data when the set number of unit characters is 20, and is divided into four sub-data when the set number of unit characters is 30.
In other preferred embodiments, the set unit amount further includes a unit frame number for dividing data such as video.
In the present application, the number Chi Jiyu of the sub-data is established, which includes:
acquiring the number of sub-data, and marking as N;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
In the application, N is an integer not less than 2, and simultaneously the number of the sub data is not less than two, and a numbering pool is constructed according to the selected natural numbers, so that the data can be selected one by one from the numbering pool, and all the natural numbers in the numbering pool can be selected at one time.
It is noted that the present application arbitrarily selects N natural numbers, which are not required to be consecutive, but are required to be N different natural numbers; illustrating: assuming 5 sub-data, then a natural number such as 1,2, 3, 4, 5, such as 2,3, 4, 5, 6, such as 5, 6, 7, 8, 3, may be selected; but not 1,2, 3, 4.
In the application, the position feature label for obtaining the number comprises the following steps:
before the number reordering, arbitrarily selecting a number as a reference node;
and acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label.
The position feature labels in the present application are integers, including positive integers, 0 and negative integers.
Illustrating: assume that the numbers of the 5 sub-data divided into before reordering are 3,2, 5, 6, 1, respectively;
description example one: taking a number 3 corresponding to the first sub data as a reference node, and taking the position difference between the first number 3 and the reference node as 0, wherein the corresponding position feature label is 0; the position difference between the second number 2 and the reference node is 1, the corresponding position feature label is 1, and the like, and the position feature labels of the third number 5, the fourth number 6 and the fifth number 1 are 2,3 and 4 respectively.
Illustrative example II: taking the number 1 corresponding to the last sub-data as a reference node, and taking the position difference between the first number 3 and the reference node as 4, wherein the corresponding position characteristic label is-4; and the position difference between the second number 2 and the reference node is 3, the corresponding position characteristic label is-3, and the like, and the position characteristic labels of the third number 5, the fourth number 6 and the fifth number 1 are-2, -1 and 0 respectively.
Illustrative example III: taking a number 5 corresponding to the intermediate sub-data as a reference node, wherein the position difference between the first number 3 and the reference node is 2, and the corresponding position feature label is-2; and the position difference between the second number 2 and the reference node is 1, the corresponding position characteristic label is-1, and the like, and the position characteristic labels of the third number 5, the fourth number 6 and the fifth number 1 are 0, 1 and 2 respectively.
The number sequence comprises a plurality of number arrays, each number array comprises a number and a corresponding position characteristic label, and the number arrays in the number sequence are arranged according to a natural sequence; and respectively acquiring corresponding number sequences according to the first, second and third embodiments.
For the first illustrative example, the corresponding numbering sequence is [ (1, 0), (2, 1), (3, 2), (5, 3), (6, 4) ]; for the second illustrative example, the corresponding numbering sequence is [ (1, -4), (2, -3), (3, -2), (5, -1), (6, 0) ]; for the third illustrative example, the corresponding numbering sequence is [ (1, -2), (2, -1), (3, 0), (5, 1), (6, 2) ].
It is noted that the natural sequence in the present application includes from small to large or from large to small; taking the first, second, and third illustrative examples as examples, the number sequences obtained by rearranging from small to large have been mentioned above, the number sequences obtained from the new arrangement in the order from small to large are as follows: for the first illustrative example, the corresponding numbering sequence is [ (6, 0), (5, 1), (3, 2), (2, 3), (1, 4) ]; for the second illustrative example, the corresponding numbering sequence is [ (6, -4), (5, -3), (3, -2), (2, -1), (1, 0) ]; for the third illustrative example, the corresponding numbering sequence is [ (6, -2), (5, -1), (3, 0), (2, 1), (1, 2) ].
It can be understood that the user knowing the number sequence obtaining step can obtain the original sequence of the corresponding sub-data according to any unencrypted number sequence, and can obtain the plaintext data in the correct sequence by decrypting the sub-data.
In the present application, encrypting a data sequence and a number sequence includes:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
In the application, two different keys are adopted to encrypt the number sequence and the data sequence, if the number sequence and the data sequence are text data, the text type data at least need two different keys, so the keys corresponding to each data type in the key pool are not less than two, and the data types comprise text, pictures, videos and the like.
It is noted that, the data sequence of the present application is generated by rearranging the numbers according to the natural order, that is, decrypting the data sequence and serially connecting the sub-data therein to obtain data not equal to the plaintext data, and actually, the sub-data in the data sequence is disturbed due to the rearranging of the numbers, so as to achieve the dual encryption purpose.
The safe transmission channel is established through the block chain node, and before the safe transmission channel is established, the data sender and the data requester are checked through the block chain link point; the verification in the application refers to the rationality and the compliance of the two parties of data receiving, and the data transmission channel between the two parties can be established based on the block chain link points after verification.
One of the key points of the application is as follows: the application divides the plaintext data into a plurality of sub-data by the set unit quantity, numbers the sub-data, reorders the numbers and the corresponding sub-data according to the natural sequence to obtain the number sequence and the data sequence, and encrypts the number sequence and the data sequence respectively by different keys, thereby achieving the aim of data encryption and improving the safety of the data by double encryption.
The second key point of the application is that: before reordering the numbers and the corresponding sub-data, the method acquires the position feature labels of the corresponding numbers, randomly selects the reference nodes, and can quickly determine the reference nodes according to the number sequence; the application improves the difficulty of data cracking and further ensures the safety of the data.
The partial data in the formula are all obtained by removing dimension and taking the numerical value for calculation, and the formula is a formula closest to the real situation obtained by simulating a large amount of collected data through software; the preset parameters and the preset threshold values in the formula are set by those skilled in the art according to actual conditions or are obtained through mass data simulation.
The working principle of the application is as follows:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers; and acquiring the position characteristic label of the number, and correlating the number with the position characteristic label.
Rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence.
And encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key tag to the target terminal through a secure transmission channel.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.

Claims (8)

1. A data encryption transmission method, comprising:
after receiving the plaintext data, dividing the plaintext data into a plurality of sub-data; randomly selecting numbers from the numbering pool to number a plurality of sub-data, wherein the sub-data are associated with the corresponding numbers;
acquiring a numbered position feature tag, and associating the number with the position feature tag; wherein the position feature tag represents a positional relationship between the number and the reference node;
rearranging the numbers and the corresponding sub-data according to the natural sequence of the numbers, generating a number sequence according to a plurality of numbers and the corresponding position feature labels after the arrangement, and simultaneously connecting the sub-data after the arrangement in series and marking the sub-data as a data sequence;
encrypting the data sequence and the number sequence by adopting different keys, and transmitting the encrypted data and the key label to a target terminal through a secure transmission channel; wherein, the safe transmission channel is established by the block chain link point.
2. The data encryption transmission method according to claim 1, wherein dividing the plaintext data comprises:
dividing plaintext data according to the set unit quantity;
a division of one unit data amount or one unit character number is not satisfied as one sub data.
3. The method for encrypted transmission of data according to claim 1, wherein the number of the sub-data numbered Chi Jiyu is established, comprising:
acquiring the number of sub-data, and marking as N; wherein N is an integer not less than 2;
n natural numbers are arbitrarily selected, and a numbering pool is built according to the N natural numbers.
4. The method for encrypted data transmission according to claim 1, wherein obtaining the numbered location feature tag comprises:
before the number reordering, arbitrarily selecting a number as a reference node;
acquiring the position relation between the number and the reference node, and converting the position relation into a position characteristic label; wherein the location feature tag is an integer.
5. A data encryption transmission method according to claim 1 or 4, wherein the natural sequence comprises from large to small or from small to large.
6. A data encryption transmission method according to claim 1, wherein encrypting the data sequence and the number sequence comprises:
two different keys are selected from the key pool according to the data type or randomly, and the data sequence and the number sequence are encrypted respectively through the two different keys.
7. The method according to claim 6, wherein the data types include text, picture and video, and the key corresponding to each data type in the key pool is not less than two.
8. The data encryption transmission method according to claim 1, wherein the secure transmission channel is established by a blockchain node, and the data sender and the data requester are checked by a blockchain node before the secure transmission channel is established.
CN202210001877.7A 2022-01-04 2022-01-04 Data encryption transmission method Active CN114338217B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210001877.7A CN114338217B (en) 2022-01-04 2022-01-04 Data encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210001877.7A CN114338217B (en) 2022-01-04 2022-01-04 Data encryption transmission method

Publications (2)

Publication Number Publication Date
CN114338217A CN114338217A (en) 2022-04-12
CN114338217B true CN114338217B (en) 2023-10-10

Family

ID=81022334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210001877.7A Active CN114338217B (en) 2022-01-04 2022-01-04 Data encryption transmission method

Country Status (1)

Country Link
CN (1) CN114338217B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115017530B (en) * 2022-08-08 2022-12-16 创云融达信息技术(天津)股份有限公司 Data security storage device and method
CN117424752B (en) * 2023-12-07 2024-03-15 佛山市顺德弘金电器科技有限公司 Communication encryption and decryption method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611550A (en) * 2012-02-26 2012-07-25 光束(北京)国际工程技术研究院有限公司 Method for encrypting data and method for transmitting encrypted data
CN102624527A (en) * 2012-02-26 2012-08-01 光束(北京)国际工程技术研究院有限公司 Method and device for encrypting data and transmission method and transmission device of encrypted data
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN112333698A (en) * 2020-11-18 2021-02-05 深圳大师科技有限公司 Encryption authentication method and device for mobile game terminal
CN113746629A (en) * 2021-11-04 2021-12-03 山东凤和凰城市科技有限公司 Secret communication method based on polymer simulation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611550A (en) * 2012-02-26 2012-07-25 光束(北京)国际工程技术研究院有限公司 Method for encrypting data and method for transmitting encrypted data
CN102624527A (en) * 2012-02-26 2012-08-01 光束(北京)国际工程技术研究院有限公司 Method and device for encrypting data and transmission method and transmission device of encrypted data
CN103345609A (en) * 2013-06-06 2013-10-09 深圳市大成天下信息技术有限公司 Method and device for text encryption and decryption
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN112333698A (en) * 2020-11-18 2021-02-05 深圳大师科技有限公司 Encryption authentication method and device for mobile game terminal
CN113746629A (en) * 2021-11-04 2021-12-03 山东凤和凰城市科技有限公司 Secret communication method based on polymer simulation

Also Published As

Publication number Publication date
CN114338217A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
CN114338217B (en) Data encryption transmission method
US8345876B1 (en) Encryption/decryption system and method
US20120134491A1 (en) Cloud Storage Data Encryption Method, Apparatus and System
US20120134490A1 (en) Selective Data Encryption and Decryption Method and Apparatus
US20090141889A1 (en) Data processing apparatus
Mandal et al. Symmetric key image encryption using chaotic Rossler system
HU227781B1 (en) Symmetric key cryptographic apparatus and method for encryption and decryption of information
CN117176474B (en) Encryption protection method and system for RFID data
CN115514469B (en) Information encryption protection method
RU2410842C2 (en) Communication system and communication method
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
EP3998597A1 (en) Data processing device, data processing method, and computer program
Dhane et al. A novel high capacity reversible data hiding through encryption scheme by permuting encryption key and entropy analysis
CN114422230B (en) Information transmission system based on data encryption
CN114629701B (en) Information display system based on information encryption
CN111368316B (en) File encryption and decryption method and device
CA2592675A1 (en) Communication system and communication method
WO2020153480A1 (en) Transmission/reception system, transmission device, reception device, method, and computer program
CN113742759B (en) Data encryption method and device for financial accounting system
CN118013558B (en) Industrial equipment data storage method and system
US11664976B2 (en) Method and devices for creating redundancy and encryption using Mojette Transform
JP5837625B2 (en) Communication system and communication method
EP3285429A1 (en) Method for securely transmitting digital data
CN114254366A (en) Encryption method, decryption method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240912

Address after: 1144, 11th Floor, Building 29, Taihu Beili, Tongzhou District, Beijing 101149

Patentee after: Beijing Carly Education Consulting Co.,Ltd.

Country or region after: China

Address before: 473004 No. 80 Changjiang Road, Wancheng District, Nanyang City, Henan Province

Patentee before: NANYANG INSTITUTE OF TECHNOLOGY

Country or region before: China