CN114390518A - Encryption method, device, equipment and storage medium - Google Patents

Encryption method, device, equipment and storage medium Download PDF

Info

Publication number
CN114390518A
CN114390518A CN202210032027.3A CN202210032027A CN114390518A CN 114390518 A CN114390518 A CN 114390518A CN 202210032027 A CN202210032027 A CN 202210032027A CN 114390518 A CN114390518 A CN 114390518A
Authority
CN
China
Prior art keywords
encrypted
data
key
target
static
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210032027.3A
Other languages
Chinese (zh)
Inventor
王啸阳
周宇晖
师进
吴昊
冯迎辰
杨姝
刘洪强
马瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CRSC Research and Design Institute Group Co Ltd
Original Assignee
CRSC Research and Design Institute Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CRSC Research and Design Institute Group Co Ltd filed Critical CRSC Research and Design Institute Group Co Ltd
Priority to CN202210032027.3A priority Critical patent/CN114390518A/en
Publication of CN114390518A publication Critical patent/CN114390518A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/42Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for mass transport vehicles, e.g. buses, trains or aircraft

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an encryption method, an encryption device, encryption equipment and a storage medium, and belongs to the technical field of communication security. The method comprises the following steps: acquiring data to be encrypted; acquiring a target static secret key of the data to be encrypted from a physical layer static secret key library; determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted; and encrypting the data to be encrypted according to the target static secret key and the target dynamic secret key to obtain target encrypted data. By the technical scheme, the information security of the point-to-point wireless communication of the railway locomotive is improved, the eavesdropping and the attack of illegal users are avoided, and a new idea is provided for the safety of the railway communication.

Description

Encryption method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication security, in particular to an encryption method, an encryption device, encryption equipment and a storage medium.
Background
Due to the inherent openness of the radio channel, wireless communication systems are always at risk of being eavesdropped. In order to solve the transmission security problem of a wireless communication system, a traditional mode adopts a data encryption mode, so that the content of wireless communication data is prevented from being intercepted, and effective information leakage is prevented. At present, a common encryption algorithm is mainly based on a cryptography principle, depends on the computational complexity, and encrypts information through a network layer and an upper layer protocol.
However, as the computing power of computers continues to increase, especially with the advent of quantum computers, it has become difficult for conventional encryption schemes and systems to ensure the absolute security of wireless communication information. If the public key used in the communication between the legal users is not updated or is not updated timely after multiple authentications, the eavesdropper can deduce the key of the legal user through the acquired partial information, so that the purpose of eavesdropping the information transmitted in the wireless public channel is achieved, and the information security of the whole wireless communication network is threatened. When eavesdropping the information of the legal user, the eavesdropper can impersonate the legal user to carry out attack, denial of service (DoS), session hijacking, man-in-the-middle attack, data tampering, clone node attack and the like based on identity authentication on the wireless network, so that the performance of the whole communication network is seriously reduced.
If the strength of the traditional encryption algorithm is to be improved, the length and the complexity of the encryption key are required to be continuously increased, the updating frequency of the encryption key is improved, and the probability that the key is cracked by an eavesdropper can be reduced. The increase of the encryption key length and complexity undoubtedly brings more system power consumption, calculation resource consumption and bandwidth overhead. A large number of sensor nodes in the Internet of things are resource-limited, have the characteristics of low power consumption, low computational power and the like, and are difficult to support an encryption mechanism and communication authentication with high complexity. Network threats such as injection attack and information leakage are easy to face in the key distribution, management and updating process in the wireless communication network. Therefore, an efficient encryption algorithm is crucial to the information security of wireless communication.
Disclosure of Invention
The invention provides an encryption method, an encryption device, encryption equipment and a storage medium, which are used for realizing the point-to-point wireless communication safety of a railway locomotive and avoiding the eavesdropping and the attack of illegal users.
In a first aspect, an embodiment of the present invention provides an encryption method, where the method includes:
acquiring data to be encrypted;
acquiring a target static secret key of the data to be encrypted from a physical layer static secret key library;
determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted;
and encrypting the data to be encrypted according to the target static secret key and the target dynamic secret key to obtain target encrypted data.
In a second aspect, an embodiment of the present invention further provides an encryption apparatus, where the apparatus includes:
the data to be encrypted acquisition module is used for acquiring data to be encrypted;
the static key acquisition module is used for acquiring a target static key of the data to be encrypted from a physical layer static key library;
the dynamic key acquisition module is used for determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted;
and the target encrypted data determining module is used for encrypting the data to be encrypted according to the target static secret key and the target dynamic secret key to obtain target encrypted data.
In a third aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement an encryption method as provided by any of the embodiments of the invention.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the encryption method provided in any embodiment of the present invention.
According to the technical scheme of the embodiment of the invention, the data to be encrypted is obtained, then the target static secret key of the data to be encrypted is obtained from the physical layer static secret key library, the target dynamic secret key is further determined according to the characteristics of a wireless channel when the data to be encrypted is transmitted, and finally the data to be encrypted is encrypted according to the target static secret key and the target dynamic secret key to obtain the target encrypted data. According to the technical scheme, the data to be encrypted is doubly encrypted through the static key and the dynamic key, the information security of the point-to-point wireless communication of the railway locomotive is improved, the eavesdropping and the attack of illegal users are avoided, and a new thought is provided for the safety of the railway communication.
Drawings
Fig. 1 is a flowchart of an encryption method according to an embodiment of the present invention;
fig. 2 is a flowchart of an encryption method according to a second embodiment of the present invention;
fig. 3 is a flowchart of an encryption method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an encryption apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of an encryption method according to an embodiment of the present invention, which is applicable to a case of railway communication encryption, and is particularly applicable to a case of railway locomotive point-to-point communication encryption, where the method may be executed by an encryption device, which may be implemented in software and/or hardware, and may be integrated in an electronic device carrying an encryption function, for example, a server, such as a railway locomotive networking system in the server, and optionally, the system includes an on-board Automatic Train Protection (ATP) module, an encryption management module, a data processing module, and a data transmission module.
As shown in fig. 1, the method may specifically include:
s110, acquiring data to be encrypted.
In this embodiment, the data to be encrypted refers to data to be encrypted, and may be, for example, data to be transmitted sent by a vehicle-mounted station of a locomotive.
In this embodiment, the data to be encrypted sent by the station radio station is acquired from the vehicle-mounted radio station of the locomotive.
And S120, acquiring a target static secret key of the data to be encrypted from the physical layer static secret key library.
In this embodiment, the physical layer static key library is used to store the physical layer static key, and for example, the static key in the physical layer static key library may be set by a person skilled in the art according to an actual situation, and further, may be randomly generated. The physical layer is the lowest layer in the OSI model of computer networks, and is located at the lowest layer of the OSI reference model, and it is directly oriented to the physical media (i.e. communication channel) actually responsible for data transmission. The physical layer does not refer to a specific physical device nor a physical medium for signal transmission, but rather a physical connection for an upper layer (data link layer) to transmit an original bitstream is provided on top of the physical medium.
In this embodiment, the target static key refers to a static key for encrypting data to be encrypted.
Specifically, a static key may be randomly selected from the physical layer static key library as a target static key of the data to be encrypted.
S130, determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted.
In this embodiment, the wireless channel characteristics may be information such as channel state information CIR, signal strength RSSI, signal phase, time delay, and bit error rate fluctuation.
In this embodiment, the target dynamic key refers to a key generated randomly in the signal transmission process, and the target dynamic key changes with the change speed of the channel, and when the channel changes slowly, the change of the target dynamic key also changes slowly, for example, multiple bits of continuous 0 or 1 may occur.
Specifically, data to be encrypted is transmitted between a sender and a receiver, communication connection is established, and according to the wireless channel characteristics when the data to be encrypted is transmitted, the sender and the receiver (the sender and the receiver) perform steps of information reconciliation and confidentiality enhancement and the like according to the wireless channel characteristics to generate a target dynamic key. The purpose of information reconciliation is to negotiate initial keys generated by both communication parties and ensure the consistency of the keys of both parties; the privacy enhancement refers to the process of compressing the generated key to carry out interaction between two communication parties.
And S140, encrypting the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data.
In this embodiment, the target encrypted data refers to data obtained by encrypting data to be encrypted.
Optionally, the target static key may be used to encrypt the data to be encrypted, so as to obtain the target encrypted data. Specifically, the hash operation may be performed on the data to be encrypted by using the target static key, and the obtained hash result is used as the target encrypted data.
Optionally, the target dynamic key may also be used to encrypt the data to be encrypted, so as to obtain the target encrypted data. Specifically, the hash operation may be performed on the data to be encrypted by using the target dynamic key, and the obtained hash result is used as the target encrypted data.
Optionally, the target static key may be used to encrypt the data to be encrypted to obtain static encrypted data, and the target dynamic key is used to encrypt the static encrypted data to obtain target encrypted data. Specifically, firstly, a target static key can be adopted to perform hash operation on data to be encrypted to obtain a first hash result; and further performing hash operation on the first hash value again by using the target dynamic key to obtain a second hash result, and taking the second hash result as target encrypted data.
According to the technical scheme of the embodiment of the invention, the data to be encrypted is obtained, then the target static secret key of the data to be encrypted is obtained from the physical layer static secret key library, the target dynamic secret key is further determined according to the characteristics of a wireless channel when the data to be encrypted is transmitted, and finally the data to be encrypted is encrypted according to the target static secret key and the target dynamic secret key to obtain the target encrypted data. According to the technical scheme, the data to be encrypted is doubly encrypted through the static key and the dynamic key, the information security of the point-to-point wireless communication of the railway locomotive is improved, the eavesdropping and the attack of illegal users are avoided, and a new thought is provided for the safety of the railway communication.
Example two
Fig. 2 is a flowchart of an encryption method provided in the second embodiment of the present invention, and on the basis of the above embodiment, further optimization is performed on "obtaining a target static key of data to be encrypted from a physical layer static key library", so as to provide an alternative implementation.
As shown in fig. 2, the method may specifically include:
s210, acquiring data to be encrypted.
S220, acquiring a candidate static key from the physical layer static key library.
In this embodiment, the candidate static key refers to a static key randomly selected from a physical layer static key library.
Specifically, a static key is randomly selected from the physical layer static key library as a candidate static key.
It should be noted that the static key in the physical layer static key store is updated periodically. Illustratively, if the number of the static keys in the physical layer static key library is less than a set value, a new static key is randomly generated to ensure that the static keys in the physical layer static key library are sufficient; wherein the setting value can be set by a person skilled in the art according to the actual situation.
For each static key in the physical layer static key library, if the monitored usage period of the static key exceeds the set usage period, the static key is cleared, and a new static key is generated again.
And S230, judging whether the candidate static key meets the available condition.
In this embodiment, the usable condition refers to a condition that the static key can be used, and may be, for example, that the number of times of use is not sent to a set number of times within a usable period; wherein the set times can be set by the technicians in the field according to the actual conditions; the usable period can also be set by those skilled in the art according to actual conditions.
Illustratively, whether the number of usage times of the candidate static key satisfies a set number of times is judged.
For example, it may also be determined whether the usage period of the candidate static key satisfies the usage period.
For example, it may also be determined whether the number of times of use and the usage period of the candidate static key satisfy the set number of times and the usage period, respectively, at the same time.
And S240, if so, taking the candidate static key as a target static key of the data to be encrypted.
In this embodiment, if the result is satisfied, the candidate static key is used as a target static key of the data to be encrypted. If not, the process returns to step S220.
And S250, determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted.
And S260, encrypting the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data.
According to the technical scheme of the embodiment of the invention, the data to be encrypted is obtained, then the candidate static secret key is obtained from the physical layer static secret key library, whether the candidate static secret key meets the usable condition or not is judged, if yes, the candidate static secret key is used as the target static secret key of the data to be encrypted, further, the target dynamic secret key is determined according to the wireless channel characteristics when the data to be encrypted is transmitted, and finally, the data to be encrypted is encrypted according to the target static secret key and the target dynamic secret key to obtain the target encrypted data. According to the technical method, the candidate static secret key is introduced, so that the determination of the target static secret key is more reliable, and the transmission safety of the data to be encrypted is ensured.
EXAMPLE III
Fig. 3 is a flowchart of an encryption method provided in a third embodiment of the present invention, and on the basis of the above embodiment, an alternative implementation is provided for further optimizing "determining a target dynamic key according to a wireless channel characteristic when data to be encrypted is transmitted".
As shown in fig. 3, the method may specifically include:
s310, obtaining data to be encrypted.
S320, obtaining a target static secret key of the data to be encrypted from the physical layer static secret key library.
S330, if the communication link of the data to be encrypted is successfully established, determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted.
In this embodiment, if it is recognized that the communication link of the data to be encrypted is successfully established, the radio frequency signal when the data to be encrypted is transmitted is acquired, the wireless channel characteristic is extracted from the radio frequency signal, and the target dynamic key is generated according to the wireless channel characteristic. Specifically, a radio frequency signal when a sender transmits data to be encrypted is obtained from a locomotive radio station, wireless channel characteristics are extracted from the radio frequency signal, then the sender and a receiver carry out information reconciliation and confidentiality enhancement according to the wireless channel characteristics, and a secret key determined by both parties is randomly generated to serve as a target dynamic secret key.
For example, the target dynamic key may be determined according to the wireless channel characteristics when the data to be encrypted is transmitted, or the target dynamic key may be generated according to the quantized wireless channel characteristics by acquiring the radio frequency signal when the data to be encrypted is transmitted, extracting the wireless channel characteristics from the radio frequency signal, quantizing the wireless channel characteristics, and finally generating the target dynamic key according to the quantized wireless channel characteristics.
Specifically, the quantization of the radio channel characteristics may be performed by both communication parties (the transmitting party and the receiving party) quantizing the radio channel characteristics into a bit stream according to a certain quantization criterion.
S340, encrypting the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data.
According to the technical scheme of the embodiment of the invention, the data to be encrypted is obtained, then the target static secret key of the data to be encrypted is obtained from the physical layer static secret key library, and further if the communication link of the data to be encrypted is successfully established, the target dynamic secret key is determined according to the wireless channel characteristics when the data to be encrypted is transmitted, and finally the data to be encrypted is encrypted according to the target static secret key and the target dynamic secret key to obtain the target encrypted data. By the technical scheme, the target dynamic key is determined more reliably, so that the transmission safety of the data to be encrypted is ensured.
Example four
Fig. 4 is a schematic structural diagram of an encryption device according to a fourth embodiment of the present invention, where the present embodiment is applicable to a case of railway communication encryption, and is particularly applicable to a case of railway locomotive point-to-point communication encryption, the encryption device may be implemented in software and/or hardware, and may be integrated in an electronic device carrying an encryption function, for example, a server, such as a railway locomotive networking system in the server, and optionally, the system includes an Automatic Train Protection (ATP) module, an encryption management module, a data processing module, and a data transmission module.
As shown in fig. 4, the apparatus may specifically include:
a to-be-encrypted data obtaining module 410, configured to obtain data to be encrypted;
a static key obtaining module 420, configured to obtain a target static key of data to be encrypted from a physical layer static key store;
a dynamic key obtaining module 430, configured to determine a target dynamic key according to a wireless channel characteristic when data to be encrypted is transmitted;
and the target encrypted data determining module 440 is configured to encrypt the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data.
According to the technical scheme of the embodiment of the invention, the data to be encrypted is obtained, then the target static secret key of the data to be encrypted is obtained from the physical layer static secret key library, the target dynamic secret key is further determined according to the characteristics of a wireless channel when the data to be encrypted is transmitted, and finally the data to be encrypted is encrypted according to the target static secret key and the target dynamic secret key to obtain the target encrypted data. According to the technical scheme, the data to be encrypted is doubly encrypted through the static key and the dynamic key, the information security of the point-to-point wireless communication of the railway locomotive is improved, the eavesdropping and the attack of illegal users are avoided, and a new thought is provided for the safety of the railway communication.
Further, the static key obtaining module 420 includes:
a candidate static key obtaining unit, configured to obtain a candidate static key from a physical layer static key library;
a usable condition judging unit for judging whether the candidate static key satisfies a usable condition;
and the static key acquisition unit is used for taking the candidate static key as a target static key of the data to be encrypted if the candidate static key is satisfied.
Further, the static key obtaining module 420 further includes:
and the static key updating unit is used for updating the static key in the physical layer static key library.
Further, the dynamic key obtaining module 430 includes:
the video signal acquisition unit is used for acquiring a radio frequency signal when data to be encrypted is transmitted;
a wireless channel characteristic extraction unit, which is used for extracting wireless channel characteristics from the radio frequency signal;
and the dynamic key generation unit is used for generating a target dynamic key according to the wireless channel characteristics.
Further, the dynamic key obtaining module 430 further includes:
and the quantization unit is used for quantizing the wireless channel characteristics.
Further, the dynamic key obtaining module 430 is specifically configured to:
and if the communication link of the data to be encrypted is successfully established, determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted.
Further, the target encrypted data determining module 440 is specifically configured to:
encrypting data to be encrypted by adopting a target static secret key to obtain static encrypted data;
and encrypting the static encrypted data by adopting the target dynamic key to obtain target encrypted data.
The encryption device can execute the encryption method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present invention, and fig. 5 shows a block diagram of an exemplary device suitable for implementing the embodiment of the present invention. The device shown in fig. 5 is only an example and should not bring any limitation to the function and the scope of use of the embodiments of the present invention.
As shown in FIG. 5, electronic device 12 is embodied in the form of a general purpose computing device. The components of electronic device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by electronic device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory (cache 32). The electronic device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of embodiments described herein.
Electronic device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with electronic device 12, and/or with any devices (e.g., network card, modem, etc.) that enable electronic device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the electronic device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with other modules of the electronic device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing, such as implementing encryption methods provided by embodiments of the present invention, by executing programs stored in the system memory 28.
EXAMPLE six
The sixth embodiment of the present invention further provides a computer-readable storage medium, on which a computer program (or referred to as computer-executable instructions) is stored, where the computer program is used for executing the encryption method provided by the sixth embodiment of the present invention when executed by a processor, and the method includes:
acquiring data to be encrypted;
acquiring a target static secret key of data to be encrypted from a physical layer static secret key library;
determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted;
and encrypting the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data. .
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. An encryption method, comprising:
acquiring data to be encrypted;
acquiring a target static secret key of the data to be encrypted from a physical layer static secret key library;
determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted;
and encrypting the data to be encrypted according to the target static secret key and the target dynamic secret key to obtain target encrypted data.
2. The method according to claim 1, wherein the obtaining the target static key of the data to be encrypted from the physical layer static key library comprises:
acquiring a candidate static key from a physical layer static key library;
judging whether the candidate static key meets a usable condition;
and if so, taking the candidate static key as a target static key of the data to be encrypted.
3. The method of claim 2, further comprising:
and updating the static key in the physical layer static key library.
4. The method of claim 1, wherein the determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted comprises:
acquiring a radio frequency signal when the data to be encrypted is transmitted;
extracting wireless channel characteristics from the radio frequency signal;
and generating a target dynamic key according to the wireless channel characteristics.
5. The method of claim 4, wherein after extracting the radio channel characteristics from the radio frequency signal, further comprising:
and quantizing the wireless channel characteristics.
6. The method of claim 1, wherein the determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted comprises:
and if the communication link of the data to be encrypted is successfully established, determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted.
7. The method according to claim 1, wherein the encrypting the data to be encrypted according to the target static key and the target dynamic key to obtain target encrypted data comprises:
encrypting the data to be encrypted by adopting the target static secret key to obtain static encrypted data;
and encrypting the static encrypted data by adopting the target dynamic key to obtain target encrypted data.
8. An encryption apparatus, comprising:
the data to be encrypted acquisition module is used for acquiring data to be encrypted;
the static key acquisition module is used for acquiring a target static key of the data to be encrypted from a physical layer static key library;
the dynamic key acquisition module is used for determining a target dynamic key according to the wireless channel characteristics when the data to be encrypted is transmitted;
and the target encrypted data determining module is used for encrypting the data to be encrypted according to the target static secret key and the target dynamic secret key to obtain target encrypted data.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the encryption method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the encryption method according to any one of claims 1 to 7.
CN202210032027.3A 2022-01-12 2022-01-12 Encryption method, device, equipment and storage medium Pending CN114390518A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210032027.3A CN114390518A (en) 2022-01-12 2022-01-12 Encryption method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210032027.3A CN114390518A (en) 2022-01-12 2022-01-12 Encryption method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114390518A true CN114390518A (en) 2022-04-22

Family

ID=81201788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210032027.3A Pending CN114390518A (en) 2022-01-12 2022-01-12 Encryption method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114390518A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116321133A (en) * 2023-05-11 2023-06-23 西安星恒通智能装备有限公司 Multi-antenna cooperation processing method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116321133A (en) * 2023-05-11 2023-06-23 西安星恒通智能装备有限公司 Multi-antenna cooperation processing method and system

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN111371549B (en) Message data transmission method, device and system
CN110891066B (en) Proxy anonymous communication method based on homomorphic encryption scheme
CN1455341A (en) Method for long-distance changing of communication cipher code
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN108964893A (en) A kind of cipher key processing method, device, equipment and medium
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN112769568B (en) Security authentication communication system and method in fog computing environment and Internet of things equipment
US10419212B2 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN114390518A (en) Encryption method, device, equipment and storage medium
CN113225180A (en) Method and system for protecting communication key
CN115643105B (en) Federal learning method and device based on homomorphic encryption and depth gradient compression
CN113795023B (en) Bluetooth data transmission encryption method based on chaotic sequence and packet encryption
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN115473655A (en) Terminal authentication method, device and storage medium for access network
CN113242216A (en) Credible network camera based on domestic commercial cryptographic algorithm
CN116886276B (en) Data transmission method and system based on dynamic key
CN112565156A (en) Information registration method, device and system
CN113596135B (en) Block chain system, data processing method and equipment thereof and storage medium
CN114553412B (en) Data transmission method, device, equipment and storage medium
CN117749527B (en) Safety protection method and system based on big data analysis and cloud computing
CN116436697B (en) Data transmission encryption and decryption method and device, electronic equipment and storage medium
Kaur et al. Optical stegnography to enhance speed of analog transmission with security enhancement through image encryption
CN116418602B (en) Metadata protection anonymous communication method and system based on trusted hardware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination