CN114944919A - Block chain-based message encryption method and related equipment - Google Patents

Block chain-based message encryption method and related equipment Download PDF

Info

Publication number
CN114944919A
CN114944919A CN202210546103.2A CN202210546103A CN114944919A CN 114944919 A CN114944919 A CN 114944919A CN 202210546103 A CN202210546103 A CN 202210546103A CN 114944919 A CN114944919 A CN 114944919A
Authority
CN
China
Prior art keywords
encrypted message
message
encrypted
obtaining unit
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210546103.2A
Other languages
Chinese (zh)
Inventor
叶雪峰
王公桃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210546103.2A priority Critical patent/CN114944919A/en
Publication of CN114944919A publication Critical patent/CN114944919A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The block chain-based message encryption method and the related equipment can be applied to the field of block chains or the field of finance, and can encrypt a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message; performing mixed distribution processing on the first encrypted message to obtain a second encrypted message; encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message; and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message. According to the method, the encrypted message generated by the elliptic curve encryption algorithm is subjected to mixed distribution processing and Taylor series expansion, so that the encrypted message has higher complexity and is more difficult to crack on the basis of not reducing the operation efficiency of the algorithm, and the encryption safety of the message to be processed is enhanced.

Description

Block chain-based message encryption method and related equipment
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a packet encryption method and related device based on a block chain.
Background
An Elliptic Curve Cryptography (ECC) is an asymmetric cryptography implemented based on the Elliptic curve mathematical theory. ECC has the advantage over RSA encryption algorithms that shorter keys can be used to achieve comparable or higher security than RSA encryption algorithms.
At present, an attacker uses a special GPU, AI equipment, professional mining equipment, a supercomputer computer and the like, so that the hash collision operation speed can be greatly increased, and the threat to the collision base (creating collision attach) of an encrypted message generated by an elliptic curve encryption algorithm is higher and higher.
Therefore, how to increase the encryption security of the message to be processed under the data security requirement of the block chain becomes a technical problem which needs to be solved urgently by the technical personnel in the field.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a packet encryption method based on a block chain and a related device, which overcome or at least partially solve the foregoing problems, and the technical solutions are as follows:
a message encryption method based on a block chain comprises the following steps:
encrypting a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message;
performing mixed distribution processing on the first encrypted message to obtain a second encrypted message;
encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message;
and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
Optionally, the performing taylor series expansion on the third encrypted message to obtain a fourth encrypted message includes:
determining a shift amount based on a numerical value of a ciphertext digit in the third encrypted message;
and shifting the ciphertext letters in the third encrypted message according to the shift amount to obtain a fourth encrypted message.
Optionally, the determining a shift amount based on the ciphertext digital value in the third encrypted message includes:
and determining the remainder of the sum of the numerical values of all the ciphertext numbers in the third encrypted message modulo 10 as the shift amount.
Optionally, the sequence length of the fourth encrypted packet is the same as that of the first encrypted packet.
A message encryption device based on a block chain comprises: a first obtaining unit, a second obtaining unit, a third obtaining unit, and a fourth obtaining unit,
the first obtaining unit is used for encrypting the message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message;
the second obtaining unit is configured to perform hybrid distribution processing on the first encrypted packet to obtain a second encrypted packet;
the third obtaining unit is configured to encrypt the second encrypted packet by using the elliptic curve encryption algorithm to obtain a third encrypted packet;
and the fourth obtaining unit is configured to perform taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
Optionally, the fourth obtaining unit includes: a first determining subunit and a first obtaining subunit,
the first determining subunit is configured to determine a shift amount based on a numerical value of a ciphertext digit in the third encrypted message;
and the first obtaining subunit is configured to shift ciphertext letters in the third encrypted message according to the shift amount, so as to obtain a fourth encrypted message.
Optionally, the first determining subunit is specifically configured to determine a remainder of a modulo-10 sum of numerical values of each ciphertext number in the third encrypted message as the shift amount.
Optionally, the sequence length of the fourth encrypted packet is the same as that of the first encrypted packet.
A computer-readable storage medium, on which a program is stored, which, when executed by a processor, implements the blockchain-based message encryption method according to any one of the above.
An electronic device comprising at least one processor, and at least one memory connected to the processor, a bus; the processor and the memory complete mutual communication through the bus; the processor is configured to call program instructions in the memory to execute any one of the above methods for encrypting a packet based on a blockchain.
By means of the technical scheme, the block chain-based message encryption method and the related equipment can be applied to the field of block chains or the field of finance, and can encrypt a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message; performing mixed distribution processing on the first encrypted message to obtain a second encrypted message; encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message; and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message. According to the method, the encrypted message generated by the elliptic curve encryption algorithm is subjected to mixed distribution processing and Taylor series expansion, so that the encrypted message has higher complexity and is more difficult to crack on the basis of not reducing the operation efficiency of the algorithm, and the encryption safety of the message to be processed is enhanced.
The foregoing description is only an overview of the technical solutions of the present disclosure, and the embodiments of the present disclosure are described below in order to make the technical means of the present disclosure more clearly understood and to make the above and other objects, features, and advantages of the present disclosure more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the disclosure. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating an implementation manner of a packet encryption method based on a block chain according to an embodiment of the present disclosure;
fig. 2 is a flowchart illustrating another implementation manner of a packet encryption method based on a block chain according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating another implementation manner of a packet encryption method based on a block chain according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram illustrating a packet encryption apparatus based on a block chain according to an embodiment of the present disclosure;
fig. 5 shows a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The existing hash algorithm of the blockchain is SHA-2, 256 bits of hash are generated, and an attacker is difficult to directly crack the hash when cracking the hash. An Elliptic Curve Cryptography (ECC) with similar strength to that of SHA-2 is widely applied, and the Elliptic curve cryptography is improved and optimized to meet the requirement of the strength of the block chain hash algorithm, so that the method has remarkable social and economic values.
At present, since attackers use special GPU, AI equipment, professional ore machine equipment, supercomputer computers and the like, the hash collision operation speed can be greatly improved, and the hash collision threat generated by the elliptic curve encryption algorithm is increased. The elliptic curve encryption algorithm is used as an encryption algorithm which is just popularized in recent years, has a plurality of application scenes in the emerging technical field, can obviously enhance the safety by optimizing the algorithm, and has obvious economic significance on adapting to a service fusion block chain.
As shown in fig. 1, a schematic flow chart of an implementation manner of a packet encryption method based on a block chain according to an embodiment of the present disclosure may include:
s100, encrypting the message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message.
The elliptic curve encryption algorithm is a public key encryption technology and is based on an elliptic curve theory. And the encryption, decryption and digital signature are realized by using the discrete logarithm difficulty of the Abel group formed by the points of the elliptic curve in the finite field. The addition operation in the elliptic curve is corresponding to the modular multiplication operation in the discrete logarithm, so that the corresponding cryptosystem based on the elliptic curve can be established.
The embodiment of the disclosure can encrypt the message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message composed of a hash sequence.
S200, performing mixed distribution processing on the first encrypted message to obtain a second encrypted message.
In probability and statistics, if we have a random variable set containing multiple random variables and then generate a new random variable based on the set, the distribution of the random variables is called mixture distribution (mixture distribution). Specifically, first, a random variable is randomly selected from the set according to a given probability, and then the value of the random variable is realized (realze). The random variables in the set can be random real numbers or random vectors (each vector has the same dimension), in which case the mixed distribution is a multivariate distribution.
According to the embodiment of the disclosure, the hash sequence in the first encrypted message is slightly changed by performing the mixed distribution processing on the first encrypted message, so that the operation efficiency of the whole algorithm is not influenced, and the hash complexity of the encrypted message is improved.
S300, encrypting the second encrypted message by using an elliptic curve encryption algorithm to obtain a third encrypted message.
It can be understood that when the position of any bit of the hash value in the hash sequence of the original encrypted message is changed, the elliptic curve encryption algorithm is used for encryption, at least two thirds of the hash values of the hash sequence of the re-encrypted message are changed relative to the hash sequence of the original encrypted message, namely the avalanche effect of the algorithm, so that the complexity of the encrypted message is enhanced, the workload of brute force cracking is increased, and the third encrypted message is almost difficult to crack in the existing brute force cracking mode.
S400, performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
The third encrypted message is subjected to Taylor series expansion, so that the complexity of the hash sequence is further enhanced, and the exhaustion resistance of the encrypted message is enhanced.
Optionally, based on the method shown in fig. 1 and as shown in fig. 2, the step S400 may include:
and S410, determining a shift amount based on the numerical value of the ciphertext number in the third encryption message.
Optionally, based on the method shown in fig. 2, as shown in fig. 3, a flowchart of another implementation manner of the packet encryption method based on the block chain provided in the embodiment of the present disclosure may include that step S410 includes:
and S411, determining the remainder of the sum of the numerical values of all the ciphertext numbers in the third encrypted message modulo 10 as the shift amount.
And S420, shifting the ciphertext letters in the third encrypted message according to the shift amount to obtain a fourth encrypted message.
The embodiment of the disclosure uses a Taylor series expansion processing mode, only processes the ciphertext letter part in the hash sequence of the encrypted message, and can obviously enhance the complexity and the exhaustiveness resistance of the password.
Optionally, the sequence length of the fourth encrypted message is the same as that of the first encrypted message.
The hash sequences of the encrypted messages in the embodiment of the disclosure have the same length, so that the hash sequences can be better compatible with the existing service system, and the workload of the existing service system for modifying the access block chain is reduced. Under the condition of keeping the length of the hash sequence unchanged, the traditional ECC algorithm brute force attack of an attacker is cracked and the password dictionary is invalid, the improvement and use difficulty is obviously reduced, and the influence on the performance, the interface, the message format and the like of the existing system is small. Therefore, the message encryption method provided by the embodiment of the disclosure can meet the requirements of multi-language and cross-platform programming, is also suitable for being used in the IOT terminal with low power consumption and low performance, expands the application scene of the block chain, and is convenient for realizing decentralization and everything interconnection.
The message encryption method provided by the embodiment of the disclosure has the advantages of low algorithm performance consumption, small influence on the existing system, easy realization on different programming languages and operating systems, and capability of meeting the requirements of various use scenes of a block chain in a financial service system.
The block chain-based message encryption method can be applied to the field of block chains or the field of finance, and can encrypt a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message; performing mixed distribution processing on the first encrypted message to obtain a second encrypted message; encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message; and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message. According to the method, the encrypted message generated by the elliptic curve encryption algorithm is subjected to mixed distribution processing and Taylor series expansion, so that the encrypted message has higher complexity and is more difficult to crack on the basis of not reducing the operation efficiency of the algorithm, and the encryption safety of the message to be processed is enhanced.
Although the operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
Corresponding to the foregoing method embodiment, an embodiment of the present disclosure further provides a packet encryption apparatus based on a block chain, where the structure of the apparatus is shown in fig. 4, and the apparatus may include: a first obtaining unit 100, a second obtaining unit 200, a third obtaining unit 300, and a fourth obtaining unit 400.
The first obtaining unit 100 is configured to encrypt the to-be-processed packet by using an elliptic curve encryption algorithm, so as to obtain a first encrypted packet corresponding to the to-be-processed packet.
The elliptic curve encryption algorithm is a public key encryption technology and is based on an elliptic curve theory. And the encryption, decryption and digital signature are realized by using the discrete logarithm difficulty of the Abel group formed by the points of the elliptic curve in the finite field. The addition operation in the elliptic curve is corresponding to the modular multiplication operation in the discrete logarithm, so that the corresponding cryptosystem based on the elliptic curve can be established.
The method and the device for encrypting the message to be processed can encrypt the message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message composed of a hash sequence.
A second obtaining unit 200, configured to perform hybrid distribution processing on the first encrypted message to obtain a second encrypted message.
In probability and statistics, if we have a random variable set containing multiple random variables and then generate a new random variable based on the set, the distribution of the random variables is called hybrid distribution (mixture distribution). Specifically, first, a random variable is randomly selected from the set according to a given probability, and then the value of the random variable is realized (realze). The random variables in the set can be random real numbers or random vectors (each vector has the same dimension), in which case the mixture distribution is a multivariate distribution.
According to the embodiment of the disclosure, the hash sequence in the first encrypted message is slightly changed by performing the mixed distribution processing on the first encrypted message, so that the operation efficiency of the whole algorithm is not influenced, and the hash complexity of the encrypted message is improved.
A third obtaining unit 300, configured to encrypt the second encrypted message by using an elliptic curve encryption algorithm, so as to obtain a third encrypted message.
It can be understood that when the position of any bit of the hash value in the hash sequence of the original encrypted message is changed, the elliptic curve encryption algorithm is used for encryption, at least two thirds of the hash values of the hash sequence of the re-encrypted message are changed relative to the hash sequence of the original encrypted message, namely the avalanche effect of the algorithm, so that the complexity of the encrypted message is enhanced, the workload of brute force cracking is increased, and the third encrypted message is almost difficult to crack in the existing brute force cracking mode.
A fourth obtaining unit 400, configured to perform taylor series expansion on the third encrypted message, so as to obtain a fourth encrypted message.
The third encrypted message is subjected to Taylor series expansion, so that the complexity of the hash sequence is further enhanced, and the exhaustion resistance of the encrypted message is enhanced.
Optionally, the fourth obtaining unit 400 includes: a first determining subunit and a first obtaining subunit,
and a first determining subunit, configured to determine the shift amount based on the value of the ciphertext digit in the third encrypted message.
Optionally, the first determining subunit is specifically configured to determine a remainder modulo 10 of a sum of numerical values of cipher text numbers in the third encrypted message as the shift amount.
And the first obtaining subunit is used for shifting the ciphertext letter in the third encrypted message according to the shift amount to obtain a fourth encrypted message.
The embodiment of the disclosure uses a Taylor series expansion processing mode, only processes the ciphertext letter part in the hash sequence of the encrypted message, and can obviously enhance the complexity and the anti-exhaustion performance of the password.
Optionally, the sequence length of the fourth encrypted message is the same as that of the first encrypted message.
The hash sequences of the encrypted messages in the embodiment of the disclosure have the same length, so that the method can be better compatible with the existing service system, and the workload of the existing service system for transforming the access block chain is reduced. Under the condition of keeping the length of the hash sequence unchanged, the traditional ECC algorithm brute force attack of an attacker is cracked and the password dictionary is invalid, the improvement and use difficulty is obviously reduced, and the influence on the performance, the interface, the message format and the like of the existing system is small. Therefore, the message encryption device provided by the embodiment of the disclosure can meet the requirements of multi-language and cross-platform programming, is also suitable for being used in the IOT terminal with low power consumption and low performance, expands the application scene of the block chain, and is convenient for realizing decentralization and everything interconnection.
The message encryption device provided by the embodiment of the disclosure has the advantages of low algorithm performance consumption, low influence on the existing system, easy realization on different programming languages and operating systems, and capability of meeting the requirements of various use scenes of a block chain in a financial service system.
The block chain-based message encryption device can be applied to the field of block chains or the field of finance, and can encrypt a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message; performing mixed distribution processing on the first encrypted message to obtain a second encrypted message; encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message; and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message. According to the method, the encrypted message generated by the elliptic curve encryption algorithm is subjected to mixed distribution processing and Taylor series expansion, so that the encrypted message has higher complexity and is more difficult to crack on the basis of not reducing the operation efficiency of the algorithm, and the encryption safety of the message to be processed is enhanced.
The device for encrypting the message based on the block chain comprises a processor and a memory, wherein the first obtaining unit 100, the second obtaining unit 200, the third obtaining unit 300, the fourth obtaining unit 400 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the encrypted message generated by the elliptic curve encryption algorithm is subjected to mixed distribution processing and Taylor series expansion by adjusting kernel parameters, so that the encrypted message has higher complexity and is more difficult to crack on the basis of not increasing the operation efficiency of the algorithm, and the encryption security of the message to be processed is enhanced.
The disclosed embodiments provide a computer-readable storage medium on which a program is stored, which when executed by a processor implements the block chain based message encryption method.
The embodiment of the disclosure provides a processor, where the processor is configured to execute a program, where the program executes the block chain-based message encryption method when running.
As shown in fig. 5, an embodiment of the present disclosure provides an electronic device 1000, where the electronic device 1000 includes at least one processor 1001, and at least one memory 1002 and a bus 1003 connected to the processor 1001; the processor 1001 and the memory 1002 communicate with each other through the bus 1003; the processor 1001 is configured to call program instructions in the memory 1002 to execute the above-described packet encryption method based on the blockchain. The electronic device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present disclosure also provides a computer program product adapted to perform a program for initializing the following method steps when executed on an electronic device:
encrypting a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message;
performing mixed distribution processing on the first encrypted message to obtain a second encrypted message;
encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message;
and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
Performing taylor series expansion on the third encrypted message to obtain a fourth encrypted message, including:
determining a shift amount based on a numerical value of a ciphertext digit in the third encrypted message;
and shifting the ciphertext letters in the third encrypted message according to the shift amount to obtain a fourth encrypted message.
The determining a shift amount based on the ciphertext digital value in the third encrypted message comprises:
and determining the remainder of the sum of the numerical values of all the ciphertext numbers in the third encrypted message modulo 10 as the shift amount.
The sequence length of the fourth encrypted message is the same as that of the first encrypted message.
It should be noted that the packet encryption method and the related device based on the block chain provided by the present disclosure may be used in the block chain field or the financial field. The above is merely an example, and the application fields of the packet encryption method based on the block chain and the related device provided by the present disclosure are not limited.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus, electronic devices (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, an electronic device includes one or more processors (CPUs), memory, and a bus. The electronic device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
In the description of the present disclosure, it should be understood that the directions or positional relationships indicated as referring to the terms "upper", "lower", "front", "rear", "left", and "right", etc., are based on the directions or positional relationships shown in the drawings, and are only for convenience of description and simplification of the description, but do not indicate or imply that the positions or elements referred to must have specific directions, be constructed and operated in specific directions, and thus, should not be construed as limitations of the present disclosure.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The above are merely examples of the present disclosure, and are not intended to limit the present disclosure. Various modifications and variations of this disclosure will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the scope of the claims of the present disclosure.

Claims (10)

1. A message encryption method based on a block chain is characterized by comprising the following steps:
encrypting a message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message;
performing mixed distribution processing on the first encrypted message to obtain a second encrypted message;
encrypting the second encrypted message by using the elliptic curve encryption algorithm to obtain a third encrypted message;
and performing Taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
2. The method of claim 1, wherein said performing taylor series expansion on the third encrypted message to obtain a fourth encrypted message comprises:
determining a shift amount based on a numerical value of a ciphertext digit in the third encrypted message;
and shifting the ciphertext letters in the third encrypted message according to the shift amount to obtain a fourth encrypted message.
3. The method of claim 2, wherein determining an amount of shift based on ciphertext digital values in the third encrypted message comprises:
and determining the remainder of the sum of the numerical values of all the ciphertext numbers in the third encrypted message modulo 10 as the shift amount.
4. The method of claim 1, wherein the fourth encrypted message has a same sequence length as the first encrypted message.
5. A message encryption device based on a block chain is characterized by comprising: a first obtaining unit, a second obtaining unit, a third obtaining unit, and a fourth obtaining unit,
the first obtaining unit is used for encrypting the message to be processed by using an elliptic curve encryption algorithm to obtain a first encrypted message;
the second obtaining unit is configured to perform hybrid distribution processing on the first encrypted packet to obtain a second encrypted packet;
the third obtaining unit is configured to encrypt the second encrypted packet by using the elliptic curve encryption algorithm to obtain a third encrypted packet;
and the fourth obtaining unit is configured to perform taylor series expansion on the third encrypted message to obtain a fourth encrypted message.
6. The apparatus of claim 5, wherein the fourth obtaining unit comprises: a first determining subunit and a first obtaining subunit,
the first determining subunit is configured to determine a shift amount based on a numerical value of a ciphertext digit in the third encrypted message;
and the first obtaining subunit is configured to shift ciphertext letters in the third encrypted message according to the shift amount, so as to obtain a fourth encrypted message.
7. The apparatus according to claim 6, wherein the first determining subunit is configured to determine a remainder modulo 10 of a sum of numerical values of ciphertext digits in the third ciphertext as the shift amount.
8. The apparatus of claim 5, wherein the sequence length of the fourth encrypted message is the same as the sequence length of the first encrypted message.
9. A computer-readable storage medium on which a program is stored, the program, when executed by a processor, implementing the blockchain-based message encryption method according to any one of claims 1 to 4.
10. An electronic device comprising at least one processor, and at least one memory, bus connected to the processor; the processor and the memory complete mutual communication through the bus; the processor is configured to invoke program instructions in the memory to perform the blockchain based message encryption method of any of claims 1 to 4.
CN202210546103.2A 2022-05-19 2022-05-19 Block chain-based message encryption method and related equipment Pending CN114944919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210546103.2A CN114944919A (en) 2022-05-19 2022-05-19 Block chain-based message encryption method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210546103.2A CN114944919A (en) 2022-05-19 2022-05-19 Block chain-based message encryption method and related equipment

Publications (1)

Publication Number Publication Date
CN114944919A true CN114944919A (en) 2022-08-26

Family

ID=82906381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210546103.2A Pending CN114944919A (en) 2022-05-19 2022-05-19 Block chain-based message encryption method and related equipment

Country Status (1)

Country Link
CN (1) CN114944919A (en)

Similar Documents

Publication Publication Date Title
CN109039640B (en) Encryption and decryption hardware system and method based on RSA cryptographic algorithm
US11323255B2 (en) Methods and systems for encryption and homomorphic encryption systems using Geometric Algebra and Hensel codes
Abdeldaym et al. Modified RSA algorithm using two public key and Chinese remainder theorem
US11101980B2 (en) System and method for adding and comparing integers encrypted with quasigroup operations in AES counter mode encryption
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
US20220085999A1 (en) System and method to optimize decryption operations in cryptographic applications
Ali et al. Performance of cryptographic algorithms based on time complexity
CN114124359A (en) Method and device for preserving format encrypted data, electronic equipment and storage medium
US20220085998A1 (en) System and method to generate prime numbers in cryptographic applications
Tiwari Cryptography in blockchain
CN111368317B (en) Computer data encryption system and method
Sadkhan A proposed genetic algorithm attack for public key cryptosystem
CN113612799B (en) Block chain hash encryption method and device based on SM2 algorithm
US7113593B2 (en) Recursive cryptoaccelerator and recursive VHDL design of logic circuits
Naji Elliptic curve video encryption in mobile phone based on multi-keys and chaotic map
Jagdale et al. Securing MMS with high performance elliptic curve cryptography
CN114944919A (en) Block chain-based message encryption method and related equipment
Gorbenko et al. Methods of building general parameters and keys for NTRU Prime Ukraine of 5 th–7 th levels of stability. Product form
CN104837131B (en) A kind of batch Cramer-Shoup cryptographic methods based on batch processing multi-exponentiation
US11343070B2 (en) System and method for performing a fully homomorphic encryption on a plain text
WO2020169996A1 (en) Matrix-based cryptographic methods and apparatus
Das et al. An approach towards encrypting paired digits using dynamic programming and Diffie-Hellman key exchange
WO2018187604A1 (en) Methods and systems for enhanced data-centric scalar multiplicative homomorphic encryption systems using geometric algebra
Prasad et al. Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem
CN115276961B (en) Data processing method and device based on OT protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination