CN116805913B - Military high-safety encryption communication device and communication method thereof - Google Patents
Military high-safety encryption communication device and communication method thereof Download PDFInfo
- Publication number
- CN116805913B CN116805913B CN202311064933.2A CN202311064933A CN116805913B CN 116805913 B CN116805913 B CN 116805913B CN 202311064933 A CN202311064933 A CN 202311064933A CN 116805913 B CN116805913 B CN 116805913B
- Authority
- CN
- China
- Prior art keywords
- random number
- equipment
- communication
- transmission path
- sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 130
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000005540 biological transmission Effects 0.000 claims abstract description 78
- 238000010276 construction Methods 0.000 claims abstract description 7
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 241001391944 Commicarpus scandens Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a military high-safety encryption communication device and a communication method thereof, relating to the technical field of communication, wherein the device comprises: the device comprises an acquisition module, a construction module and a sending module. The application can construct a first transmission path only comprising the transmission equipment and the receiving equipment, dynamically constructs a second transmission path comprising other communication equipment according to equipment levels of the transmission equipment and the receiving equipment and cluster security coefficients of clusters where the equipment and the receiving equipment are located, and transmits data through the second transmission path to assist in decrypting the data transmitted by the first transmission path, thereby improving the safety and transmission efficiency of communication data and solving the problem that military communication methods in the prior art are easy to crack and attack because of usually being based on fixed encryption algorithms and keys.
Description
Technical Field
The application relates to the technical field of communication, in particular to a military high-security encryption communication device and a military high-security encryption communication method.
Background
With the rapid development of communication countermeasure technology, security of information in military communication has become a non-negligible problem. The future battlefield is a digital battlefield, the information making right becomes a new high point for the competition of the two parties after the sea making right and the air making right, the communication is an important component of the information making right, and the environment of serious scout theft and electronic interference is faced. Whether the communication system and the communication network have good anti-interception capability is a primary condition for obtaining the winning of the communication electronic warfare.
However, the conventional military communication method is often based on a fixed encryption algorithm and a secret key, and is easy to crack and attack, and an attacker can steal communication content or tamper data by means of analyzing the encryption algorithm, acquiring the secret key and the like, so that a military high-security encryption communication device and a communication method thereof are needed to solve the problems.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a military high-safety encryption communication device and a military high-safety encryption communication method, and solves the problems that the military communication method in the prior art is always based on a fixed encryption algorithm and a secret key and is easy to crack and attack.
In order to achieve the above purpose, the application adopts the following technical scheme:
in one aspect, a military high security encryption communication device comprises:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
the construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
the transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
Preferably, the acquiring module is specifically configured to:
acquiring equipment information of communication equipment in a cluster, wherein the equipment information comprises average communication duration, average sink duration and calibrated equipment grade;
and determining the cluster security coefficient according to the equipment information.
Preferably, the formula for determining the number of devices in the second transmission path according to the device level and the cluster security coefficient is:
;
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmission path, is->Is the device class of the transmitting device,/->Is the device class of the receiving device.
Preferably, the formula for determining the cluster security coefficient according to the device information is:
;
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the ith device, < +.>For the communication coefficient of the ith device, +.>For the device class of the ith device, +.>For the communication duration of the ith communication device, < +.>A preset communication duration for the ith communication device,/-for the ith communication device>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>The communication coefficient for the ith device, A, B, C, D, E is constant, x is the transmitting device, y is the receiving device,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
Preferably, the sending module is specifically configured to:
acquiring data to be transmitted, a first random number and a second random number;
and encrypting the equipment number sequence and the random number sequence by using a first random number, and encrypting the data to be transmitted by using the first random number and the second random number.
Preferably, the first random number is a random number generated by the receiving device, the second random number is a random number generated by the sending device, and the method for obtaining the first random number includes:
the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to the receiving device;
the sending device decrypts the encrypted first random number by using the public key to obtain the first random number.
Preferably, the method further comprises:
the receiving module is used for decrypting the encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
In another aspect, a method of high security encrypted communication for military use, comprises:
acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned;
constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
The beneficial effects of the application are as follows:
1) Path construction taking into account the security coefficients of the device class and the cluster: according to the equipment levels and cluster safety coefficients of the sending equipment and the receiving equipment, the number of the equipment in the second sending path is determined, the second sending path is dynamically constructed, the path can be flexibly adjusted according to the conditions of the communication equipment, and the safety and the transmission efficiency of communication data are improved.
2) Random encryption algorithm selection: each communication device on the second transmission path independently generates a random number, determines an encryption algorithm according to the random number, increases the randomness and security of the encryption algorithm,
3) Communication security and confidentiality are improved: by constructing the first transmission path and the second transmission path and randomly selecting the encryption algorithm, the safety and confidentiality of communication are further enhanced, so that an attacker is difficult to guess and analyze the selection rule of the encryption algorithm.
4) Transmission efficiency and flexibility are improved: according to the dynamic adjustment of the equipment level, the cluster security coefficient and the equipment number, the efficiency of data transmission is optimized, and meanwhile, the system has flexibility and expansibility and can adapt to the communication requirements of different scenes.
In summary, the application improves the safety and transmission efficiency of communication data by selecting the random encryption algorithm, considering the path construction of the equipment level and the cluster security coefficient, dynamically adjusting the number of communication equipment, and the like.
Drawings
Fig. 1 is a schematic structural diagram of a military high-security encryption communication device according to an embodiment of the present application
Fig. 2 is a schematic structural diagram of a military high-security encryption communication method according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application is provided to facilitate understanding of the present application by those skilled in the art, but it should be understood that the present application is not limited to the scope of the embodiments, and all the applications which make use of the inventive concept are protected by the spirit and scope of the present application as defined and defined in the appended claims to those skilled in the art.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a military high security encryption communication device according to an embodiment of the present application, where the device includes:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
in order to increase the complexity of the encryption algorithm and further increase the security of the data, a cluster is configured comprising a plurality of communication devices, which may be military devices or civil devices or other devices, it is noted that these devices are each provided with a corresponding device class and device number when configured as a cluster and that only the military device may act as a transmitting device and a receiving device, while the other devices act as auxiliary communication devices.
In an embodiment of the present application, the obtaining module is specifically configured to: acquiring equipment information of communication equipment in a cluster, wherein the communication equipment is non-transmitting equipment and non-receiving equipment in the cluster, and the equipment information comprises average communication duration, average fall duration and calibrated equipment grade; and determining the cluster security coefficient according to the equipment information.
In the embodiment of the application, the formula for determining the cluster security coefficient according to the equipment information is as follows:
;
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the ith device, < +.>For the communication coefficient of the ith device, +.>For the device class of the ith device, +.>For the communication duration of the ith communication device, < +.>Is the ith passPreset communication duration of the communication device, +.>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>The communication coefficient for the ith device, A, B, C, D, E is constant, x is the transmitting device, y is the receiving device,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
Specifically, the larger the sinking coefficient is, the lower the reliability of the communication equipment is, the larger the communication coefficient is, the higher the communication pressure of the communication equipment is, the cluster safety coefficient is adjusted according to the communication condition and the sinking condition of the communication equipment in the cluster, and the number of the communication equipment on the transmission path is conveniently and subsequently determined according to the cluster safety coefficient.
In the embodiment of the present application, the formula for determining the number of devices in the second transmission path according to the device class and the cluster security coefficient is:
;
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmission path, is->Is the device class of the transmitting device,/->Is the device class of the receiving device.
Specifically, the larger the device level gap between the transmission devices, the more communication devices that need to be selected, and the smaller the device level gap, the fewer communication devices that need to be selected. The larger the cluster safety coefficient is, the higher the cluster safety is, at this time, the safety of data transmission can be ensured only by selecting fewer communication devices, the data transmission time, the power consumption and the like can be reduced, and if the lower the cluster safety coefficient is, the lower the cluster safety is, at this time, more communication devices are required to be selected to ensure the safety of data transmission.
The construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
in order to further improve communication safety, the embodiment of the application respectively constructs the first transmission path and the second transmission path, and the second transmission path comprehensively considers the random construction of the information of the cluster, the transmission equipment and the receiving equipment, so that the equipment communication is safer and more reliable due to the randomness of the information, and a new idea is provided for subsequent data transmission and encryption and decryption.
The transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
The method for determining the encryption algorithm of the communication equipment by the random number sequence comprises the following steps: the communication devices on the second transmission path are selected as devices, each communication device needs to randomly generate a random number through a pseudo-random number generator, a true random number generator or a mixed random number generator, if the random number is one of the encryption algorithm serial numbers, the encryption algorithm corresponding to the encryption algorithm serial number is directly used as the encryption algorithm of the communication device in the data transmission process, wherein the encryption algorithm serial number and the encryption algorithm are stored in an encryption algorithm table in an associated mode, if the random number is not one of the encryption algorithm serial numbers, the total number of the encryption algorithms is calculated and divided, and the encryption algorithm is determined according to the rest numbers.
According to the application, by using the pseudo-random number generator, the true random number generator or the mixed random number generator, each communication device can generate a random number, and the high randomness method can improve the randomness and the safety of the encryption algorithm, so that an attacker is difficult to guess and analyze the selection rule of the encryption algorithm; in addition, each communication device independently generates a random number, and determines an encryption algorithm according to the random number generated by the communication device, so that the encryption algorithms adopted by different communication devices on the same communication link are different, the difficulty of an attacker attack is increased, and even if the random number of some devices is acquired by the attacker, other devices can still keep safety.
In the embodiment of the present application, the sending module is specifically configured to: acquiring data to be transmitted, a first random number and a second random number; encrypting the equipment number sequence and the random number sequence by using a first random number, and encrypting the data to be transmitted by using the first random number and the second random number; the first random number is a random number generated by the receiving device, and the second random number is a random number generated by the transmitting device.
In the embodiment of the application, the method for acquiring the first random number comprises the following steps: the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to the receiving device; the sending device decrypts the encrypted first random number by using the public key to obtain the first random number. Of course, the method by which the receiving device obtains the first random number includes, but is not limited to, encrypting this based on the public key and the private key.
In an embodiment, the method for encrypting the data to be sent by using the first random number and the second random number is as follows: splitting the data to be sent to obtain first data to be sent and second data to be sent; encrypting the first data to be sent by using a first random number, and encrypting the second data to be sent by using the second random number, wherein the method for splitting the data to be sent comprises but is not limited to interval extraction, cutting and the like.
In another embodiment, the method for encrypting the data to be transmitted by using the first random number and the second random number is as follows: and encrypting the first random number by using the second random number to obtain an encrypted random number, and encrypting the data to be transmitted by using the encrypted random number.
In another embodiment, the method for encrypting the data to be transmitted by using the first random number and the second random number is as follows: and encrypting the second random number by using the first random number to obtain an encrypted random number, and encrypting the data to be transmitted by using the encrypted random number.
In an embodiment of the present application, the method further includes: the receiving module is used for decrypting the encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
Because the first transmission path is a direct communication link from the transmitting device to the receiving device, the second transmission path is an indirect communication link from the transmitting device to the receiving device, and a plurality of communication nodes exist on the indirect communication link, if the data to be transmitted is directly split and then transmitted to the receiving device after being sequentially encrypted through the second transmission path, the transmission time is long, the transmission power is low, and the equipment is easy to break down.
In summary, the method and the device can construct the first transmission path only comprising the transmitting equipment and the receiving equipment, dynamically construct the second transmission path comprising other communication equipment according to the equipment levels of the transmitting equipment and the receiving equipment and the cluster security coefficient of the cluster where the transmitting equipment and the receiving equipment are located, and transmit data through the second transmission path to assist in decrypting the data transmitted by the first transmission path, thereby improving the safety and the transmission efficiency of the communication data, and solving the problem that the military communication method in the prior art is easy to crack and attack due to the fixed encryption algorithm and the secret key.
Referring to fig. 2, fig. 2 is a flowchart of a military high security encryption communication method according to an embodiment of the present application, including: acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned; constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment; acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; and acquiring data to be transmitted of the transmitting device, encrypting the data to be transmitted, the device number sequence and the random number sequence by using random numbers, wherein the random numbers comprise a first random number and a second random number, transmitting the encrypted data to the receiving device through a first transmitting path, and sequentially encrypting the second random number through a second transmitting path and transmitting the encrypted data to the receiving device.
It should be understood that, for the same inventive concept, the working principles of each step in the embodiments of the present application may refer to the embodiments described above, and details are not repeated in the embodiments of the present application.
It will be apparent to those skilled in the art that while preferred embodiments of the present application have been described, additional variations and modifications may be made to these embodiments once the basic inventive concepts are known to those skilled in the art. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (7)
1. A military high security encryption communication apparatus comprising:
the acquisition module is used for acquiring equipment levels of the sending equipment and the receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are located;
the construction module is used for constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
the transmission module is used for acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; the method comprises the steps of obtaining data to be transmitted, a first random number and a second random number, encrypting the equipment number sequence and the random number sequence by using the first random number to obtain first encrypted data, encrypting the data to be transmitted by using the first random number and the second random number to obtain second encrypted data, transmitting the first encrypted data and the second encrypted data to receiving equipment through a first transmission path, sequentially encrypting the second random number through the second transmission path, and transmitting the second encrypted data to the receiving equipment.
2. The high security encryption communication device of claim 1, wherein the acquisition module is specifically configured to:
acquiring equipment information of communication equipment in a cluster, wherein the equipment information comprises communication duration, sink duration and equipment grade, and the communication equipment is non-transmitting equipment and non-receiving equipment in the cluster;
and determining the cluster security coefficient according to the equipment information.
3. The military high security encryption communication set of claim 2, wherein the formula for determining the number of devices in the second transmission path based on the device class and the cluster security factor is:
,
in the method, in the process of the application,for the transmitting device->For receiving the device->For the security factor of the cluster, +.>、/>Is a constant value, and is used for the treatment of the skin,Ffor the number of devices in the second transmit path,f x is the device class of the transmitting device,f y is the device class of the receiving device.
4. The high security encryption communication device of claim 2, wherein the formula for determining the cluster security factor from the device information is:
,
in the method, in the process of the application,cluster safety factor,/->For the sink coefficient of the i-th device,L 2i for the communication coefficient of the i-th device,f i for the device class of the ith device, +.>For the communication duration of the ith communication device, < +.>A preset communication duration for the ith communication device,/-for the ith communication device>For the sink duration of the ith communication device, < >>For the repair duration of the ith communication device, < >>Communication system for ith deviceNumber A, B, C, D, E is a constant, < >>For the transmitting device->In order for the receiving device to receive a signal,mis a removal transmitting devicexReceiving apparatusyTotal number of remaining devices in the rear cluster.
5. The high security cryptographic communication device for military use according to claim 4, wherein said first random number is a random number generated by said receiving device, said second random number is a random number generated by said transmitting device, and wherein said method for obtaining said first random number comprises:
the method comprises the steps that a receiving device generates a group of random numbers, encrypts the random numbers by using a private key to obtain an encrypted first random number, and sends the encrypted first random number to a sending device;
the sending device decrypts the encrypted first random number by using the public key to obtain the first random number.
6. The military high security encryption communication set of claim 5, further comprising:
the receiving module is used for decrypting the first encrypted data sent by the first sending path by using the first random number to obtain a device number sequence and a random number sequence, determining an encryption sequence according to the device number sequence, determining an encryption algorithm according to the random number sequence, decrypting the encrypted second random number sent by the second sending path according to the encryption sequence and the encryption algorithm to obtain a second random number, and decrypting the second encrypted data sent by the first path by using the first random number and the second random number to obtain target data.
7. A military high security encryption communication method, comprising:
acquiring equipment levels of transmitting equipment and receiving equipment and cluster security coefficients of communication clusters in which the equipment levels are positioned;
constructing a first transmission path according to the transmission equipment and the receiving equipment, determining the number of equipment in a second transmission path according to the equipment grade and the cluster security coefficient, and randomly constructing the second transmission path according to the number of the equipment;
acquiring a device number sequence of the second transmission path and a random number sequence of corresponding communication devices, wherein the random number sequence is used for determining an encryption algorithm of the communication devices, and the device number sequence is used for determining an encryption sequence; the method comprises the steps of obtaining data to be transmitted, a first random number and a second random number, encrypting the equipment number sequence and the random number sequence by using the first random number to obtain first encrypted data, encrypting the data to be transmitted by using the first random number and the second random number to obtain second encrypted data, transmitting the first encrypted data and the second encrypted data to receiving equipment through a first transmission path, sequentially encrypting the second random number through the second transmission path, and transmitting the second encrypted data to the receiving equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311064933.2A CN116805913B (en) | 2023-08-23 | 2023-08-23 | Military high-safety encryption communication device and communication method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311064933.2A CN116805913B (en) | 2023-08-23 | 2023-08-23 | Military high-safety encryption communication device and communication method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116805913A CN116805913A (en) | 2023-09-26 |
CN116805913B true CN116805913B (en) | 2023-11-07 |
Family
ID=88079715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311064933.2A Active CN116805913B (en) | 2023-08-23 | 2023-08-23 | Military high-safety encryption communication device and communication method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116805913B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109241760A (en) * | 2018-09-28 | 2019-01-18 | 北京北信源信息安全技术有限公司 | Data ciphering method, decryption method, encryption device and decryption device |
CN110620792A (en) * | 2019-10-24 | 2019-12-27 | 福建星网视易信息系统有限公司 | Communication encryption method, communication device, system, and computer-readable storage medium |
CN110830587A (en) * | 2019-11-14 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Data transmission method, device, equipment and storage medium |
CN111278008A (en) * | 2020-01-13 | 2020-06-12 | 山东大学 | Safety communication method and system for military unmanned aerial vehicle group keyless management center |
CN113922961A (en) * | 2021-11-11 | 2022-01-11 | 成都合盛智联科技有限公司 | Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering |
CN114244508A (en) * | 2021-12-15 | 2022-03-25 | 平安科技(深圳)有限公司 | Data encryption method, device, equipment and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10574451B2 (en) * | 2017-10-19 | 2020-02-25 | Bank Of America Corporation | Method and apparatus for perfect forward secrecy using deterministic hierarchy |
US20220094690A1 (en) * | 2021-12-02 | 2022-03-24 | Intel Corporation | Trusted and connected multi-domain node clusters |
-
2023
- 2023-08-23 CN CN202311064933.2A patent/CN116805913B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109241760A (en) * | 2018-09-28 | 2019-01-18 | 北京北信源信息安全技术有限公司 | Data ciphering method, decryption method, encryption device and decryption device |
CN110620792A (en) * | 2019-10-24 | 2019-12-27 | 福建星网视易信息系统有限公司 | Communication encryption method, communication device, system, and computer-readable storage medium |
CN110830587A (en) * | 2019-11-14 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Data transmission method, device, equipment and storage medium |
CN111278008A (en) * | 2020-01-13 | 2020-06-12 | 山东大学 | Safety communication method and system for military unmanned aerial vehicle group keyless management center |
CN113922961A (en) * | 2021-11-11 | 2022-01-11 | 成都合盛智联科技有限公司 | Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering |
CN114244508A (en) * | 2021-12-15 | 2022-03-25 | 平安科技(深圳)有限公司 | Data encryption method, device, equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
无线超短波语音数字化集群加密系统研究;汪艳丽;电信技术;全文 * |
集群网络密钥管理方案研究综述;刘军;网络与信息安全学报;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116805913A (en) | 2023-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110225016B (en) | Data hidden transmission method based on block chain network | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
US11831769B2 (en) | Registration device, server device, searchable encryption system, and searchable encryption method | |
CN1659821A (en) | Method for secure data exchange between two devices | |
CN112367342B (en) | Encryption transmission method and system for distributed photovoltaic operation and maintenance data | |
CN114493593B (en) | Multi-block chain hidden communication method | |
CN111600661B (en) | Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution | |
CN106453318A (en) | Data transmission system and method based on security module | |
CN213426286U (en) | Encryption camera based on quantum random number chip and video processing system | |
CN110677236A (en) | OFDM encryption method based on composite chaotic system and XOR operation | |
CN104378196A (en) | Method and device for safely executing encryption and decryption algorithm | |
CN110855667B (en) | Block chain encryption method, device and system | |
KR101765207B1 (en) | System for securing traffic signal and method for using the same | |
WO2007044042A2 (en) | Encryption methods and apparatus | |
CN118094606B (en) | Method and device for improving security of encryption chip and computer equipment | |
Bangera et al. | Multilayer security using RSA cryptography and dual audio steganography | |
CN113407966B (en) | Searchable public key encryption method and system with key updating and ciphertext sharing functions | |
CN116805913B (en) | Military high-safety encryption communication device and communication method thereof | |
CN114845302B (en) | Near field encryption communication method and system based on Internet of things | |
CN115719300A (en) | Personnel information management method for big data | |
CN114785479A (en) | System and method for preventing AES algorithm module from being attacked | |
Man et al. | Image encryption algorithm based on dual fingerprint control | |
CN112069487A (en) | Intelligent equipment network communication safety implementation method based on Internet of things | |
CN117221878B (en) | Information security control method and device based on wireless network equipment | |
CN115330265B (en) | End-to-end event processing engine system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |