CN115665735B - Data transmission method, device, system and storage medium - Google Patents

Data transmission method, device, system and storage medium Download PDF

Info

Publication number
CN115665735B
CN115665735B CN202211602265.XA CN202211602265A CN115665735B CN 115665735 B CN115665735 B CN 115665735B CN 202211602265 A CN202211602265 A CN 202211602265A CN 115665735 B CN115665735 B CN 115665735B
Authority
CN
China
Prior art keywords
random number
encrypted
parameter information
information
seeds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211602265.XA
Other languages
Chinese (zh)
Other versions
CN115665735A (en
Inventor
邸鹤
柳奇
张晓明
刘磊
张亚夫
郭帅雷
马凯
李庆锋
周海豹
韩玉倩
焦国辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shangyu Hebei Electronic Technology Co ltd
Original Assignee
Shangyu Hebei Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shangyu Hebei Electronic Technology Co ltd filed Critical Shangyu Hebei Electronic Technology Co ltd
Priority to CN202211602265.XA priority Critical patent/CN115665735B/en
Publication of CN115665735A publication Critical patent/CN115665735A/en
Application granted granted Critical
Publication of CN115665735B publication Critical patent/CN115665735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Storage Device Security (AREA)

Abstract

The application relates to a data transmission method, a device, a system and a storage medium, wherein the method comprises the steps of forming and combining parameter information of a Beidou terminal to generate random number seeds, wherein the parameter information at least comprises parameter information with physical change; inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information; encrypting a plaintext by using a random number sequence to obtain encrypted data; and transmitting the encrypted data and the unique serial number to a receiver through a public network and transmitting the random number seed and the unique serial number to the receiver through a Beidou link. According to the data transmission method, the device, the system and the storage medium, the Beidou link is used for sending the random number sub-information required by the generation of the secret key, and each group of encrypted data corresponds to independent and unique secret key information, so that the data can be transmitted safely and efficiently.

Description

Data transmission method, device, system and storage medium
Technical Field
The present application relates to the field of data transmission technologies, and in particular, to a data transmission method, apparatus, system, and storage medium.
Background
Information encryption provides effective guarantee for storage, sharing and communication of information, and information security is related to personal, enterprise and national security. At present, the information transmission of public networks (such as the internet) has high transmission efficiency but the security of communication channels is low, and a data layer needs to be encrypted.
The encryption mode comprises symmetric encryption and asymmetric encryption, a secret key needs to be obtained in advance when information is decrypted in any mode, the secret key is not changed for a long time, hidden danger of violence cracking exists in a ciphertext, if the secret key is changed frequently, the secret key is transmitted in a public network and has great potential safety hazard, and once the secret key is intercepted, the possibility of secret losing exists.
Disclosure of Invention
The application provides a data transmission method, a device, a system and a storage medium, random number sub-information required by key generation is sent through a Beidou link, and each group of encrypted data corresponds to independent and unique key information, so that data can be transmitted safely and efficiently.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides a data transmission method, including:
combining and generating random number seeds by using parameter information of the Beidou terminal, wherein the parameter information at least comprises parameter information with physical change;
inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information;
encrypting a plaintext by using a random number sequence to obtain encrypted data;
transmitting the encrypted data and the unique serial number to a receiver through a public network; and
transmitting the random number seed and the unique serial number to a receiver through a Beidou link;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
In a possible implementation manner of the first aspect, the parameter information of the Beidou terminal includes an identity authentication module, signal strength and internal noise information;
the selected parameter information of the Beidou terminal at least comprises one parameter information with physical change.
In a possible implementation manner of the first aspect, the length value of the random number seed is a fixed value.
In one possible implementation manner of the first aspect, encrypting the plaintext using the random number sequence includes:
dividing plaintext information into encrypted segments and unencrypted segments, wherein the encrypted segments and the unencrypted segments are alternately arranged; and
and encrypting the encrypted segment by using the random number sequence corresponding to the encrypted segment to obtain encrypted data.
In a possible implementation manner of the first aspect, the length and the number of the encrypted segments and the length and the number of the unencrypted segments are both generated according to random number seeds.
In a possible implementation manner of the first aspect, the generating process of the length and the number of the encrypted segments and the length and the number of the unencrypted segments includes:
combining the parameter information of the Beidou terminal to generate random number seeds, wherein the parameter information at least comprises one parameter information with physical change;
inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information; and
and selecting random numbers from the random number sequence as the length and the number of the encrypted segments and the length and the number of the unencrypted segments.
In a possible implementation manner of the first aspect, each character of the plaintext information is encrypted using a random number at a corresponding position in the random number sequence.
In a second aspect, the present application provides a data transmission apparatus, including:
the first generation unit is used for generating random number seeds by combining the parameter information of the Beidou terminal, wherein the parameter information at least comprises one piece of parameter information with physical change;
the second generation unit is used for inputting the random number seeds into the strong random number generator to obtain a random number sequence with the same length as the plaintext information;
the encryption unit is used for encrypting the plaintext by using the random number sequence to obtain encrypted data;
the first communication unit is used for transmitting the encrypted data and the unique serial number to a receiver through a public network; and
the second communication unit is used for transmitting the random number seeds and the unique serial number to a receiver through a Beidou link;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
In a third aspect, the present application provides a data transmission system, including:
one or more memories for storing instructions; and
one or more processors configured to invoke and execute the instructions from the memory to perform the method according to the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program for performing a method as described in the first aspect and any possible implementation manner of the first aspect when the program is run by a processor.
In a fifth aspect, the present application provides a computer program product comprising program instructions for executing the method according to the first aspect and any possible implementation manner of the first aspect when the program instructions are executed by a computing device.
In a sixth aspect, the present application provides a system on a chip comprising a processor configured to perform the functions recited in the above aspects, such as generating, receiving, sending, or processing data and/or information recited in the above methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices, connected in a wired or wireless manner, or coupled on the same device.
Overall, the data transmission method disclosed in the present application uses a method of generating true random numbers to obtain a random number sequence, which has higher security. Compared with a pseudo random number, the generation of the true random number has no regularity, and the pseudo random number is regular in nature, but the regular period is long, but can be predicted. The main reason is that the pseudo random number is simulated by a computer using an algorithm, and the process does not involve a physical process, so that the pseudo random number cannot have the characteristics of a true random number naturally.
This application uses public network transmission encryption data, uses big dipper link transmission random number seed, and the data bulk of encryption data is big, uses public network transmission can effectively reduce the transmission cost of encryption data, and the short message of big dipper link has high security to the receiver, need use purpose-made receiving equipment to receive, and receiving equipment still embeds the physics encryption circuit, makes the transmission of random number seed have high security.
Drawings
Fig. 1 is a schematic block diagram illustrating a flow of steps of a data transmission method provided in the present application.
Fig. 2 is a schematic diagram of a transmission process based on the data transmission method shown in fig. 1.
Fig. 3 is a schematic diagram of a short message sending process of the beidou short message system provided by the present application.
Fig. 4 is a schematic diagram of plaintext division provided in the present application.
Fig. 5 is a schematic block diagram of a processing flow when the lengths of an encrypted part and an unencrypted part are not fixed according to the present application.
Detailed Description
The technical solution of the present application will be described in further detail below with reference to the accompanying drawings.
In order to more clearly understand the technical solution in the present application, the related art will be first described.
The wiener cipher (Vernamcipher), also called a one-time pad, has the characteristic of being unable to be decoded, is unconditional and safe, and is theoretically unable to be decoded. Wiener ciphers have the disadvantage that the key length must be equal to the plaintext length and can only be used once. It is not feasible to transmit the key over a secure channel because if one method were to efficiently and securely transmit the key, the same method could be used to securely transmit the plaintext.
The key of wiener cipher uses true random number bit sequence, which has randomness, unpredictability and unreproducibility. And replacing the true random number sequence with a strong pseudo random number sequence, and taking the strong pseudo random number bit sequence as a key to obtain the stream cipher (streamcipher). The encryption mode can construct a high-strength cryptosystem by only using a high-performance pseudo random number generator; meanwhile, key information with huge data volume does not need to be transmitted, and only seed information of a random number generator with small data volume needs to be transmitted.
Beidou short messages originate from Beidou I, and since 2003, beidou provides short message communication services for users by adopting a RDSS-based system from the beginning, and Beidou II still inherits the system and the services. And the Beidou III upgrades the short message communication service by utilizing 3 GEO satellites and adopting a generalized RDSS system and an RNSS + short message communication system on the basis of being compatible with the RDSS system.
Referring to fig. 1 and fig. 2, a data transmission method disclosed in the present application includes the following steps:
s101, combining parameter information of the Beidou terminal to generate random number seeds, wherein the parameter information at least comprises parameter information with physical change;
s102, inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information;
s103, encrypting a plaintext by using a random number sequence to obtain encrypted data;
s104, transmitting the encrypted data and the unique serial number to a receiver through a public network; and
s105, transmitting the random number seed and the unique serial number to a receiver through a Beidou link;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
The source in fig. 2, which refers to the source of the information, can be understood as the sender, and the sink is intended as the receiver of the information. Specifically, in step S101, the sender uses the parameter information of the beidou terminal to form a combination to generate a random number seed, and when the parameter information of the beidou terminal is selected, the parameter information at least includes one parameter information with physical changes.
For example, the parameter information of the Beidou terminal includes various modes such as an identity authentication module, signal strength, internal noise information and the like, the identity authentication module is considered to provide fixed parameter information, the signal strength and the internal noise provide dynamic parameter information, and when the parameter information of the Beidou terminal is selected, the modes include various modes such as the identity authentication module + signal strength, the identity authentication module + internal noise information, the identity authentication module + signal strength + internal noise information, the signal strength and the internal noise.
The Beidou identity authentication module is in the form of an intelligent IC card, and is embedded with a Beidou descrambling function and an identity authentication function and bound with a unique UUID. Each identity authentication module can provide a plurality of different bit identity authentication information according to the Beidou downlink information.
The signal strength is obtained by performing radio frequency analog link conversion on a wireless communication signal received by a current receiver, wherein the signal strength contains thermal noise information inside the receiver and is obtained by accumulative calculation for a plurality of milliseconds. If only the fractional part of the signal strength is taken and cannot be reproduced because it cannot be predicted, the sequence can be considered as a true random number sequence.
It should be understood that random numbers are both true random numbers and pseudo random numbers:
true random numbers: there are many uncertain phenomena in nature, such as the weight of each sand grain in a piece of desert, or the thermal motion trajectory of molecules in the atmosphere, and by measuring these phenomena, true random numbers can be obtained.
Pseudo random number: the pseudo-random number is calculated and if the primordial seed is short, periodic repetitions of the pseudo-random number occur soon, which means that the way in which the pseudo-random number is generated can be deduced back by means of analog calculations.
In summary, when the length of a given digit is given, the security of a true random number is relatively high, and the pseudo-random number is characterized in that a plurality of true random numbers can be conveniently obtained, and the security of the pseudo-random number with the same digit is lower than that of the true random number.
Therefore, in the present application, the true random number is used to obtain the random number seed, and after obtaining the random number seed, step S102 is executed, in which the random number seed is input into the strong random number generator to obtain a random number sequence with the same length as the plaintext information, and the random number sequence is used to encrypt the plaintext information.
In step S103, the plaintext is encrypted by using the random number sequence to obtain encrypted data, so that encrypted data and a random number seed are obtained, then the unique serial number is respectively bound with the encrypted data and the random number seed, the encrypted data and the unique serial number are transmitted to the receiving party through the public network (in step S104), and the random number seed and the unique serial number are transmitted to the receiving party through the beidou link (in step S105).
The function of the unique sequence number is to enable pairing of the encrypted data with a random number seed at the receiving party. The receiving side processes as follows: after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
It should be understood that, on the premise that the random number seeds are consistent, the random number seeds are input into the strong random number generator at the sender and the strong random number generator at the receiver, and the same random number sequence is obtained.
After the receiver obtains the random number sequence, the encrypted data can be decrypted, and the decryption process is the reverse of the encryption process, which is not described herein again.
Overall, the data transmission method disclosed in the present application has the following advantages:
the random number sequence is obtained by using a mode of generating a true random number, and the security is higher. Compared with a pseudo random number, the generation of the true random number has no regularity, and the pseudo random number is regular in nature, but the regular period is long, but can be predicted. The main reason is that the pseudo random number is simulated by a computer using an algorithm, and the process does not involve a physical process, so that the pseudo random number cannot have the characteristics of a true random number naturally.
This application uses public network transmission encryption data, uses big dipper link transmission random number seed, and the data bulk of encryption data is big, uses public network transmission can effectively reduce the transmission cost of encryption data, and the short message of big dipper link has high security to the receiver, need use purpose-made receiving equipment to receive, and receiving equipment still embeds the physics encryption circuit, makes the transmission of random number seed have high security.
Referring to fig. 3, it can be understood that the random number seed is sent using a high-security private channel, and the private channel is different from the public network, and the private channel refers to a beidou short message communication system, which is composed of three parts, namely a space system, a ground system and a user system, and the short message sending and receiving end forms an M-type communication mechanism through an outbound link and an inbound link. The route nodes for sending the short messages are clear, and an encryption mode is arranged among the nodes, so that the Beidou short message communication system has high safety.
Based on the above contents, it can be found that the intrusion needs to obtain the encrypted data transmitted through the public network at the same time, and the occurrence probability of the event is extremely low and even can be ignored through the contents of the random number seed and the strong random number generator transmitted through the Beidou short message communication system.
One possible implementation manner is to reversely derive the generation manner of the random number seed through a data analysis manner, but the true random number is used in the present application, and the generation of the true random number has no regularity, which means that the random number seed used in the present application cannot be obtained through a data accumulation and induction summary manner, and the manner also has no use value.
As a specific embodiment of the data transmission method provided in the application, the length value of the random number seed is a fixed value, and the fixed value means that for plaintext with different lengths, a random number seed with a fixed length is used in the application.
Therefore, the possibility of snooping the random number seed generation mode by analyzing the lengths of different plaintexts can be fundamentally avoided, and the safety of the technical scheme provided by the application can be further improved.
As for the encryption method of plaintext information, there are the following two methods:
first, each character of the plaintext information is encrypted using data at a corresponding position in a sequence of random numbers.
Referring to fig. 4, in the second type, part of characters in plaintext information are encrypted using a random number segment in a random number sequence, and the specific process is as follows:
s201, dividing plaintext information into encrypted segments and unencrypted segments, wherein the encrypted segments and the unencrypted segments are alternately arranged; and
s202, encrypting the encrypted segment by using the random number sequence corresponding to the encrypted segment to obtain encrypted data.
In step S201 and step S202, it can be considered that only a part of the plaintext information is encrypted, instead of encrypting the whole of the plaintext information, which has an advantage of less data processing amount in the encryption process, but also has high confidentiality.
Because the encrypted part and the non-encrypted part are mixed together from the viewpoint of cracking, cracking can be carried out only after the positions and the lengths of all the encrypted parts are obtained, and compared with a full encryption mode, the mixed encryption mode is more difficult to crack.
It is to be understood that even if the plaintext information is sent through the public network, the plaintext information needs to be encrypted and then sent, and on the premise that a mixed mechanism of an encrypted part and a non-encrypted part is not known, a large amount of messy codes are mixed in the plaintext information obtained through forced cracking, so that the plaintext information does not have any value.
The way of mixing the encrypted part and the unencrypted part has the following various ways:
first, the length of the encrypted part and the unencrypted part is fixed;
secondly, the length of the encrypted part and the unencrypted part is not fixed and has certain regularity;
thirdly, the length of the encrypted part and the unencrypted part is not fixed and has no regularity;
referring to fig. 5, for the third mode, the length and number of the encrypted segments and the length and number of the unencrypted segments are both generated according to the random number seeds, and the specific process is as follows:
s301, combining parameter information of the Beidou terminal to generate random number seeds, wherein the parameter information at least comprises parameter information with physical change;
s302, inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information; and
s303, selecting random numbers from the random number sequence as the length and the number of the encrypted segments and the length and the number of the unencrypted segments.
The generation method of the random number sequence is the same as that described above, and is not described herein again. In step S303, a random number is selected from the random number sequence as the length and number of encrypted segments and the length and number of unencrypted segments.
For example, the random number is selected according to a certain rule, for example, the third bit is selected for the first time as the length of the first section of encrypted segment, the fifth bit is selected for the second time as the length of the first section of unencrypted segment, the ninth bit is selected for the first time as the length of the second section of unencrypted segment, and so on.
Because the random number seed uses the true random number, the random number sequence can be regarded as the true random number sequence, and the generation of the true random number sequence has no rule and high safety.
By performing the processing in steps S301 to S303, an encrypted piece of data containing the encrypted piece and the unencrypted piece arranged in sequence but having random lengths of the encrypted piece and the unencrypted piece can be obtained, and it can be understood that each encryption mode of the encrypted piece of data is different because the encryption mode is doped with unpredictable length encryption, and thus has higher security.
The present application further provides a data transmission apparatus, including:
the first generation unit is used for generating random number seeds by combining the parameter information of the Beidou terminal, wherein the parameter information at least comprises one piece of parameter information with physical change;
the second generation unit is used for inputting the random number seeds into the strong random number generator to obtain a random number sequence with the same length as the plaintext information;
the encryption unit is used for encrypting the plaintext by using the random number sequence to obtain encrypted data;
the first communication unit is used for transmitting the encrypted data and the unique serial number to a receiver through a public network; and
the second communication unit is used for transmitting the random number seeds and the unique serial number to a receiver through a Beidou link;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
Further, the length value of the random number seed is a fixed value.
Further, the method also comprises the following steps:
the cutting unit is used for dividing the plaintext information into encrypted segments and unencrypted segments, and the encrypted segments and the unencrypted segments are alternately arranged; and
and the first encryption unit is used for encrypting the encrypted segment by using the random number sequence corresponding to the encrypted segment to obtain encrypted data.
Further, the length and number of the encrypted segments and the length and number of the unencrypted segments are generated according to the random number seed.
Further, still include:
the first processing unit is used for forming and combining the parameter information of the Beidou terminal to generate random number seeds, and the parameter information at least comprises parameter information with physical change;
the second processing unit is used for inputting the random number seeds into the strong random number generator to obtain a random number sequence with the same length as the plaintext information; and
and the second encryption unit is used for selecting random numbers from the random number sequence as the length and the number of the encrypted segments and the length and the number of the unencrypted segments.
Further, each character of the plaintext information is encrypted by using the random number at the corresponding position in the random number sequence.
In one example, the units in any of the above apparatuses may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
As another example, when a unit in a device may be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of invoking programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/procedures/concepts may be named in the present application, it is to be understood that these specific names do not constitute limitations on related objects, and the named names may vary according to circumstances, contexts, or usage habits, and the understanding of the technical meaning of the technical terms in the present application should be mainly determined by the functions and technical effects embodied/performed in the technical solutions.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that, in various embodiments of the present application, first, second, etc. are used merely to indicate that a plurality of objects are different. For example, the first time window and the second time window are merely to show different time windows. And should not have any influence on the time window itself, and the above-mentioned first, second, etc. should not impose any limitation on the embodiments of the present application.
It is also to be understood that, in various embodiments of the present application, unless otherwise specified or conflicting in logic, terms and/or descriptions between different embodiments are consistent and may be mutually referenced, and technical features in different embodiments may be combined to form a new embodiment according to their inherent logical relationship.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a computer-readable storage medium, which includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present application further provides a data transmission system, the system including:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory to perform the methods described above.
The present application also provides a computer program product comprising instructions that, when executed, cause the data transmission system to perform operations of the data transmission system corresponding to the method described above.
The present application further provides a system on a chip comprising a processor configured to perform the functions recited above, such as generating, receiving, transmitting, or processing data and/or information recited in the above-described methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
The processor mentioned in any of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the method for transmitting feedback information.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, respectively disposed on different devices, and connected in a wired or wireless manner to support the chip system to implement various functions in the above embodiments. Alternatively, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the memory may also be a storage unit outside the chip in the terminal, such as a ROM or other types of static storage devices that can store static information and instructions, a RAM, and the like.
It will be appreciated that the memory herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
The non-volatile memory may be ROM, programmable Read Only Memory (PROM), erasable Programmable Read Only Memory (EPROM), electrically Erasable Programmable Read Only Memory (EEPROM), or flash memory.
Volatile memory can be RAM, which acts as external cache memory. There are many different types of RAM, such as Static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (ddr SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchlink DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are preferred embodiments of the present application, and the scope of protection of the present application is not limited by the embodiments, so: equivalent changes in structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (8)

1. A method of data transmission, comprising:
combining and generating random number seeds by using parameter information of the Beidou terminal, wherein the parameter information at least comprises parameter information with physical change;
inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information;
encrypting a plaintext by using a random number sequence to obtain encrypted data;
transmitting the encrypted data and the unique serial number to a receiver through a public network; and
transmitting the random number seed and the unique serial number to a receiver through a Beidou link;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence;
dividing plaintext information into encrypted segments and unencrypted segments, wherein the encrypted segments and the unencrypted segments are alternately arranged;
encrypting the encrypted segment by using the random number sequence corresponding to the encrypted segment to obtain encrypted data;
the generation process of the length and the number of the encrypted segments and the length and the number of the unencrypted segments comprises the following steps:
combining and generating random number seeds by using parameter information of the Beidou terminal, wherein the parameter information at least comprises parameter information with physical change;
inputting the random number seeds into a strong random number generator to obtain a random number sequence with the same length as the plaintext information;
and selecting random numbers from the random number sequence as the length and the number of the encrypted segments and the length and the number of the unencrypted segments.
2. The data transmission method according to claim 1, wherein the parameter information of the Beidou terminal comprises an identity authentication module, signal strength and internal noise information;
the selected parameter information of the Beidou terminal at least comprises one parameter information with physical change.
3. The data transmission method according to claim 1 or 2, wherein the length value of the random number seed is a fixed value.
4. The data transmission method of claim 1, wherein the length and number of encrypted segments and the length and number of unencrypted segments are both generated according to a random number seed.
5. The data transmission method according to claim 1, wherein each character of the plaintext information is encrypted using a random number at a corresponding position in the sequence of random numbers.
6. A data transmission apparatus, comprising:
the first generation unit is used for generating random number seeds by combining the parameter information of the Beidou terminal, wherein the parameter information at least comprises one piece of parameter information with physical change;
the second generation unit is used for inputting the random number seeds into the strong random number generator to obtain a random number sequence with the same length as the plaintext information;
the encryption unit is used for encrypting the plaintext by using the random number sequence to obtain encrypted data;
the first communication unit is used for transmitting the encrypted data and the unique serial number to a receiver through a public network;
the second communication unit is used for transmitting the random number seeds and the unique serial number to a receiver through a Beidou link;
the cutting unit is used for dividing the plaintext information into an encrypted segment and an unencrypted segment, and the encrypted segment and the unencrypted segment are alternately arranged;
the first encryption unit is used for encrypting the encrypted segment by using the random number sequence corresponding to the encrypted segment to obtain encrypted data;
the first processing unit is used for forming and combining the parameter information of the Beidou terminal to generate random number seeds, and the parameter information at least comprises parameter information with physical change;
the second processing unit is used for inputting the random seed number into the strong random number generator to obtain a random number sequence with the same length as the plaintext information;
the second encryption unit is used for selecting random numbers from the random number sequence as the length and the number of the encryption sections and the length and the number of the non-encryption sections;
after receiving the random number seeds with the same unique serial number and the encrypted data through the public network and the Beidou link, the receiver inputs the random number seeds into the strong random number generator to obtain a random number sequence, and then decrypts the encrypted data by using the random number sequence.
7. A data transmission system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory, and to perform the method of any of claims 1 to 5.
8. A computer-readable storage medium, the computer-readable storage medium comprising:
program for performing the method according to any one of claims 1 to 5 when the program is run by a processor.
CN202211602265.XA 2022-12-14 2022-12-14 Data transmission method, device, system and storage medium Active CN115665735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211602265.XA CN115665735B (en) 2022-12-14 2022-12-14 Data transmission method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211602265.XA CN115665735B (en) 2022-12-14 2022-12-14 Data transmission method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN115665735A CN115665735A (en) 2023-01-31
CN115665735B true CN115665735B (en) 2023-03-14

Family

ID=85022378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211602265.XA Active CN115665735B (en) 2022-12-14 2022-12-14 Data transmission method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN115665735B (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255886B (en) * 2011-04-02 2013-12-04 南京邮电大学 Encryption and decryption methods of streaming media on-demand system
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN106452741B (en) * 2016-09-23 2019-11-26 浙江神州量子网络科技有限公司 The communication system and communication means of the transmission of information encryption and decryption are realized based on quantum network
CN106452749B (en) * 2016-10-18 2019-06-07 北京骏逸通达信息服务有限公司 A kind of method and system carrying out key and data separated transmission by satellite communication
CN111865584B (en) * 2020-07-21 2023-02-28 南方电网科学研究院有限责任公司 Data crushing safe transmission method and device based on pseudo-random number
CN112995138B (en) * 2021-02-03 2022-12-27 上海钧正网络科技有限公司 Data communication method and device, electronic equipment and readable storage medium
CN113726527A (en) * 2021-09-28 2021-11-30 河南国科量子通信技术应用研究院 Quantum safety data protection method in field operation scene

Also Published As

Publication number Publication date
CN115665735A (en) 2023-01-31

Similar Documents

Publication Publication Date Title
US20110216902A1 (en) Computation of garbled tables in garbled circuit
Kaushik et al. Cloud data security with hybrid symmetric encryption
Thein et al. Comparative performance study on ordinary and chaos image encryption schemes
Abbasi et al. Cryptography: Security and integrity of data management
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
EP2892206B1 (en) System and method for push framework security
CN115665735B (en) Data transmission method, device, system and storage medium
Shirole et al. Review paper on data security in cloud computing environment
CN114257402B (en) Encryption algorithm determining method, device, computer equipment and storage medium
Achkoun et al. SPF-CA-1.2: an enhanced version of cellular automata-based block cipher system
Pandey et al. Data security using various cryptography Techniques: A Recent Survey
Pitale et al. Cryptographic algorithm development and application for encryption and decryption
Kumar et al. Performance and security analysis using B-128 modified blowfish algorithm
Alrammahi et al. Development of Advanced Encryption Standard (AES) Cryptography Algorithm for Wi-Fi Security Protocol
Abdelgader et al. Design of a secure file transfer system using hybrid encryption techniques
Rishu et al. Advancements in encryption techniques for enhanced data security over cloud
Krishna et al. Comparison of Encryption Techniques In Internet Of Things
Pokharel et al. A Keyless JS Algorithm
WO2018011825A1 (en) Encryption and decryption of messages
Harram et al. Simulation of AES based data encryption in Vb. NET
Nori Improving Security Using Cryptography Based on Smartphone User Locations
Şahin et al. Secure and Fast Encryption Routine+: Evaluation by Software Application
Saif et al. Providing a security layer for Man-in-the-Middle attack in fog computing
Asoro et al. Development of A Honeyed Advanced Encryption Standard Algorithm (HAESA)
KR101616717B1 (en) Method and system for providing service encryption and decryption using vernam cipher

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant