CN117062061B - Encryption transmission method for wireless communication - Google Patents

Encryption transmission method for wireless communication Download PDF

Info

Publication number
CN117062061B
CN117062061B CN202311310419.2A CN202311310419A CN117062061B CN 117062061 B CN117062061 B CN 117062061B CN 202311310419 A CN202311310419 A CN 202311310419A CN 117062061 B CN117062061 B CN 117062061B
Authority
CN
China
Prior art keywords
communication
key
public
response
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311310419.2A
Other languages
Chinese (zh)
Other versions
CN117062061A (en
Inventor
谭强生
林文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Cbr Electric Co ltd
Original Assignee
Zhejiang Cbr Electric Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Cbr Electric Co ltd filed Critical Zhejiang Cbr Electric Co ltd
Priority to CN202311310419.2A priority Critical patent/CN117062061B/en
Publication of CN117062061A publication Critical patent/CN117062061A/en
Application granted granted Critical
Publication of CN117062061B publication Critical patent/CN117062061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an encryption transmission method for wireless communication, which relates to the technical field of communication encryption and comprises the following steps: s1, acquiring a marking code of communication content, wherein the marking code comprises character communicationEvent communicationWork communicationProfile communicationThe method comprises the steps of carrying out a first treatment on the surface of the S2, screening the security level of the communication content according to the marking codeThe method comprises the steps of carrying out a first treatment on the surface of the S3, according to the security levelCarrying out mixed encryption processing on the communication content to obtain an encrypted file; s4, after the encrypted file is received, decrypting the encrypted file, completing content analysis of the encrypted file, and verifying the analyzed content; the invention combines the advantages of two different encryption modes, optimizes the communication process, improves the communication efficiency and ensures the confidentiality of communication.

Description

Encryption transmission method for wireless communication
Technical Field
The invention relates to the technical field of communication encryption, in particular to an encryption transmission method of wireless communication.
Background
Along with the high-speed development of internet technology, more and more intelligent devices can access the internet to bring help to life, work and study of people, on the other hand, network security is more and more important, when the existing intelligent devices are accessed to a server, the server can authenticate the connection request of the intelligent devices, and confidentiality of communication contents is also a vital requirement in the process of communication.
The traditional method is to use a single key, so that the encryption and decryption speed of data is high, the security is relatively poor, RSA is based on a large number of hard factors and is in a public-private key encryption mode, and therefore the security of an RSA algorithm is higher.
Based on this, there is a need to propose an encryption transmission method for wireless communication to solve or at least alleviate the above-mentioned drawbacks.
Disclosure of Invention
The invention mainly aims to provide an encryption transmission method for wireless communication, which aims to solve the technical problem that information hijacking occurs because information needs to be uploaded to a public gateway or a cloud server in the existing wireless communication process.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
an encryption transmission method for wireless communication comprises the following steps:
s1, acquiring a marking code of communication content, wherein the marking code comprises character communicationEvent communicationWork communicationProfile communication
S2, screening the security level of the communication content according to the marking codeThe objective function is as follows:
wherein,the number of key characters is represented and,representing the total number of characters corresponding to the marking code;
s3, according to the security levelCarrying out mixed encryption processing on the communication content to obtain an encrypted file;
and S4, after the encrypted file is received, decrypting the encrypted file, completing content analysis of the encrypted file, and verifying the analyzed content.
Further, the process of the hybrid encryption process includes:
s30, acquiring a tag code of the communication object, wherein the tag code comprises a public object according to equipment classification used by a connection networkPrivate objectIntermediate objectDirect terminal
S31, before the communication content is sent to a communication object, respectively generating a corresponding private key and a public key according to the acquired tag code, mutually disclosing the generated public keys, storing the public keys in a public gateway, and then reserving the private keys;
s32, the communication object is networked to the public gateway to download the public key, and the communication content is encrypted by the private key before being sent to the communication object, so that an encrypted file is obtained.
Further, the generating process of the public key and the private key comprises the following steps:
s300, selecting communication key characters according to the character sequence and the length of the communication contentExtraneous characterWill beAndthe number of the numerical values is multiplied to obtain the numerical valueIn combination with security levelObtaining interference factors from objective functions
Wherein,interference factorIs the number of interfering characters;
s301, according to a random distribution function, the interference factors are generatedInserted in the communication key characterObtaining the calibration value of the distribution position of the random distribution functionAnd according to the key character of communicationGenerating a hint value for a number of charactersThen obtain the public key as []The private key is []。
Further, the calibration valueIs data set and calibrated to the interference factorsEach character is inserted in a specific position in the communication content.
Further, after the public key is sent to the public gateway, when the communication object downloads, the network connection is completed, the response information is generated, and the response information is encrypted in the communication object, and the encryption process comprises:
SS1, producing an encryption key through POP3 protocol;
SS2, encrypting the response information through an encryption key to obtain a first response ciphertext;
SS3, encrypting the encryption key by using the public key, and converting the encrypted encryption key into a second response ciphertext;
the SS4, the communication object sends the obtained first response ciphertext and the second response ciphertext to the public gateway;
and SS5, the terminal device for sending the communication content receives the first response ciphertext and the second response ciphertext from the public gateway.
Further, the terminal device in step SS5 decrypts the first response ciphertext and the second response ciphertext, and the steps are as follows:
the SS50 decrypts the received first response ciphertext and the second response ciphertext by using the public key reserved in the public gateway to obtain an encryption key;
and the SS51 analyzes the response information through the encryption key to obtain identification information.
Further, the identification information is decrypted by the private key at the terminal device, and the decrypted identification information is marked to determine the type of the communication object.
Further, the verification process of the response information after analysis comprises the following steps:
marking the decrypted identification information as verification information, and marking the communication content encrypted by the private key as reference information; the number of interference characters rejected by the private key in the verification information isThe number of interference characters rejected by the private key in the verification information is as followsInterference factor in reference informationComparing;
the method comprises the steps of carrying out a first treatment on the surface of the The transmission of the communication object and the terminal device is incomplete, and the defect exists;
the method comprises the steps of carrying out a first treatment on the surface of the It indicates that the transmission between the communication object and the terminal device is complete.
The invention has the following beneficial effects:
the communication content to be transmitted is divided, and the security level is divided according to the division, so that the difficulty of a security mode is realized, and secondly, the encryption and verification of the response signal of the receiving end are finished through generating a public key and a private key and then through an encryption key, so that the verification process between the sending terminal device and a communication object is shortened, and meanwhile, the security of the communication content is improved.
In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. The present invention will be described in further detail with reference to the drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention. In the drawings:
FIG. 1 is a schematic diagram of the principles of the present invention;
fig. 2 is a schematic diagram of the hybrid encryption process in the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
An encrypted transmission method for wireless communication as shown in fig. 1 comprises the following steps:
s1, acquiring a marking code of communication content, wherein the marking code comprises character communicationEvent communicationWork communicationProfile communication
S2, screening the security level of the communication content according to the marking codeThe objective function is as follows:
wherein,the number of key characters is represented and,representing the total number of characters corresponding to the marking code;
s3, according to the security levelCarrying out mixed encryption processing on the communication content to obtain an encrypted file;
and S4, after the encrypted file is received, decrypting the encrypted file, completing content analysis of the encrypted file, and verifying the analyzed content.
In this embodiment, the terminal device, the public gateway and the communication object participate in the communication process, and when the terminal device and the communication object are initially paired, information is communicated through the public gateway, and after the terminal device and the communication object are successfully configured, the terminal device and the communication object are directly connected, so that the problem that the communication content is hijacked in the public gateway can be reduced to the greatest extent, but it is to be understood that the method is generally used for short-distance transmission, such as smart factories, smart blocks and the like.
Referring to fig. 2, in this embodiment, the procedure of the hybrid encryption process includes:
s30, acquiring a tag code of the communication object, wherein the tag code comprises a public object according to equipment classification used by a connection networkPrivate objectIntermediate objectDirect terminalThe method comprises the steps of carrying out a first treatment on the surface of the By classifying communication objects and combining the security level marked by the communication contentDouble verification is performed to ensure that secret information cannot leak out;
it should be noted that the generation process of the public key and the private key includes:
s300, selecting communication key characters according to the character sequence and the length of the communication contentExtraneous characterWill beAndthe number of the numerical values is multiplied to obtain the numerical valueIn combination with security levelObtaining interference factors from objective functions
Wherein,interference factorIs the number of interfering characters;
s301, according to a random distribution function, the interference factors are generatedInserted in the communication key characterObtaining the calibration value of the distribution position of the random distribution function And according to the key character of communicationGenerating a hint value for a number of charactersThen obtain the public key as []The private key is []。
Specifically, by randomly adding interference factors into the communication content, when the public key and the private key matched in the invention are not available, an external hijack hives the encrypted communication information in time, but the key information is difficult to analyze due to the fact that the external hijack does not match the public key and the private key, and confidentiality of communication is guaranteed;
s31, before the communication content is sent to a communication object, respectively generating a corresponding private key and a public key according to the acquired tag code, mutually disclosing the generated public keys, storing the public keys in a public gateway, and then reserving the private keys;
s32, the communication object is networked to the public gateway to download the public key, and the communication content is encrypted by the private key before being sent to the communication object to obtain an encrypted file; by generating the public key and the private key, the confidentiality of communication content is improved.
Further, the calibration valueIs data set and calibrated to the interference factorsEach character is inserted in a specific position in the communication content.
Further, after the public key is sent to the public gateway, when the communication object downloads, the network connection is completed, the response information is generated, and the response information is encrypted in the communication object, and the encryption process comprises:
SS1, generating an encryption key through POP3 protocol;
SS2, encrypting the response information through an encryption key to obtain a first response ciphertext;
SS3, encrypting the encryption key by using the public key, and converting the encrypted encryption key into a second response ciphertext;
the SS4, the communication object sends the obtained first response ciphertext and the second response ciphertext to the public gateway;
and SS5, the terminal device for sending the communication content receives the first response ciphertext and the second response ciphertext from the public gateway.
Further, the terminal device in step SS5 decrypts the first response ciphertext and the second response ciphertext, and the steps are as follows:
the SS50 decrypts the received first response ciphertext and the second response ciphertext by using the public key reserved in the public gateway to obtain an encryption key;
and the SS51 analyzes the response information through the encryption key to obtain identification information.
Further, the identification information is decrypted by the private key at the terminal device, and the decrypted identification information is marked to determine the type of the communication object.
Further, the verification process of the parsed response information includes:
marking the decrypted identification information as verification information, and marking the communication content encrypted by the private key as reference information; the number of interference characters rejected by the private key in the verification information isThe number of interference characters rejected by the private key in the verification information is as followsInterference factor in reference informationComparing;
the method comprises the steps of carrying out a first treatment on the surface of the The transmission of the communication object and the terminal device is incomplete, and the defect exists;
the method comprises the steps of carrying out a first treatment on the surface of the The transmission of the communication object and the terminal device is complete; and then the public key and the private key are used for encrypting and verifying the response signal of the receiving end through the encryption key, so that the verification process between the sending terminal device and the communication object is shortened, and the confidentiality of the communication content is improved.
The foregoing description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical solution of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. An encrypted transmission method for wireless communication is characterized by comprising the following steps:
s1, acquiring a marking code of communication content, wherein the marking code comprises character communication E 1 Event communication E 2 Work communication E 3 Profile communication E 4
S2, screening the security level I of the communication content according to the marking code, wherein the objective function is as follows:
wherein λ represents the number of key characters, and η represents the total number of characters corresponding to the marker code;
s3, carrying out mixed encryption processing on the communication content according to the security level I to obtain an encrypted file;
s4, after the encrypted file is received, decrypting the encrypted file, completing content analysis of the encrypted file, and verifying the analyzed content;
the process of the hybrid encryption process comprises the following steps:
s30, acquiring a tag code of a communication object, wherein the tag code comprises a public object A, a private object B, an intermediate object C and a direct terminal D according to equipment classification used by a connection network;
s31, before the communication content is sent to a communication object, respectively generating a corresponding private key and a public key according to the acquired tag code, mutually disclosing the generated public keys, storing the public keys in a public gateway, and then reserving the private keys;
s32, the communication object is networked to the public gateway to download the public key, and the communication content is encrypted by the private key before being sent to the communication object to obtain an encrypted file;
the generation process of the public key and the private key comprises the following steps:
s300, selecting communication key characters according to the character sequence and the length of the communication contentExtraneous character +.>Will beAnd->The number of the numerical values is multiplied to obtain a numerical value m, and the interference factor P is obtained according to the objective function by combining the security level I;
P=I*m;
wherein i=1, 2,3,4, the interference factor P is the number of interference characters;
s301, inserting an interference factor P into the communication key character according to a random distribution functionIn the method, a random distribution function distribution position calibration value n is obtained, and the communication key character +.>The number of characters of (a) generates a prompt value O, and a public key is obtained as [ O, P ]]The private key is [ P, n ]]。
2. The method according to claim 1, wherein the calibration value n is a data set and is calibrated to a specific position in the communication content where each character of the interference factor P is inserted.
3. The method according to claim 1, wherein after the public key is sent to the public gateway, when the communication object downloads, the network connection is completed, the response information is generated, and the response information is encrypted in the communication object, and the encryption process includes:
SS1, producing an encryption key through POP3 protocol;
SS2, encrypting the response information through an encryption key to obtain a first response ciphertext;
SS3, encrypting the encryption key by using the public key, and converting the encrypted encryption key into a second response ciphertext;
the SS3, the communication object sends the obtained first response ciphertext and the second response ciphertext to the public gateway;
and SS4, the terminal device for sending the communication content receives the first response ciphertext and the second response ciphertext from the public gateway.
4. The method for encrypted transmission in wireless communication according to claim 3, wherein the terminal device in step SS4 decrypts the first response ciphertext and the second response ciphertext, and comprises the steps of:
the SS40 decrypts the received first response ciphertext and the second response ciphertext by using the public key reserved in the public gateway to obtain an encryption key;
the SS41 analyzes the response information by the encryption key to obtain the identification information.
5. The method according to claim 4, wherein the identification information is decrypted by a private key in the terminal device, and the decrypted identification information is marked to determine the type of the communication object.
6. The method for encrypted transmission in wireless communication according to claim 4, wherein the verification process of the response message after parsing comprises:
marking the decrypted identification information as verification information, and marking the communication content encrypted by the private key as reference information; the number of the interference characters removed by the private key in the verification information is L, and the number of the interference characters removed by the private key in the verification information is L and is compared with an interference factor P in the reference information;
l+.p; the transmission of the communication object and the terminal device is incomplete, and the defect exists;
l=p; it indicates that the transmission between the communication object and the terminal device is complete.
CN202311310419.2A 2023-10-11 2023-10-11 Encryption transmission method for wireless communication Active CN117062061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311310419.2A CN117062061B (en) 2023-10-11 2023-10-11 Encryption transmission method for wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311310419.2A CN117062061B (en) 2023-10-11 2023-10-11 Encryption transmission method for wireless communication

Publications (2)

Publication Number Publication Date
CN117062061A CN117062061A (en) 2023-11-14
CN117062061B true CN117062061B (en) 2024-01-12

Family

ID=88655794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311310419.2A Active CN117062061B (en) 2023-10-11 2023-10-11 Encryption transmission method for wireless communication

Country Status (1)

Country Link
CN (1) CN117062061B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8464353B2 (en) * 2003-10-03 2013-06-11 Hewlett-Packard Development Company, L. P. Method and system for content downloads via an insecure communications channel to devices
EP2924953A1 (en) * 2014-03-25 2015-09-30 Thorsten Sprenger Method and system for encrypted data synchronization for secure data management
CN106972927A (en) * 2017-03-31 2017-07-21 杭州翼兔网络科技有限公司 A kind of encryption method and system for different safety class
CN107750441A (en) * 2015-01-26 2018-03-02 卢森堡商创研腾智权信托有限公司 Safety actuality communication network and agreement
CN111082929A (en) * 2019-11-25 2020-04-28 西安戴森电子技术有限公司 Method for realizing encrypted instant communication
CN112702318A (en) * 2020-12-09 2021-04-23 江苏通付盾信息安全技术有限公司 Communication encryption method, decryption method, client and server
CN113259133A (en) * 2021-07-02 2021-08-13 深圳市深圳通有限公司 Encryption communication method, equipment and storage medium based on HTTP protocol
CN114553553A (en) * 2022-02-24 2022-05-27 蓝想大数据科技(上海)有限公司 Mixed encryption communication method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8464353B2 (en) * 2003-10-03 2013-06-11 Hewlett-Packard Development Company, L. P. Method and system for content downloads via an insecure communications channel to devices
EP2924953A1 (en) * 2014-03-25 2015-09-30 Thorsten Sprenger Method and system for encrypted data synchronization for secure data management
CN107750441A (en) * 2015-01-26 2018-03-02 卢森堡商创研腾智权信托有限公司 Safety actuality communication network and agreement
CN106972927A (en) * 2017-03-31 2017-07-21 杭州翼兔网络科技有限公司 A kind of encryption method and system for different safety class
CN111082929A (en) * 2019-11-25 2020-04-28 西安戴森电子技术有限公司 Method for realizing encrypted instant communication
CN112702318A (en) * 2020-12-09 2021-04-23 江苏通付盾信息安全技术有限公司 Communication encryption method, decryption method, client and server
CN113259133A (en) * 2021-07-02 2021-08-13 深圳市深圳通有限公司 Encryption communication method, equipment and storage medium based on HTTP protocol
CN114553553A (en) * 2022-02-24 2022-05-27 蓝想大数据科技(上海)有限公司 Mixed encryption communication method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
侯佩 ; 寇雅楠 ; 黄利斌 ; .混合加密体制在数字签名中的应用.计算机工程与设计.2011,(第06期),全文. *
江冰 ; 辛元雪 ; 孙前庆 ; .空间信息传输的改进式混合加密策略.计算机工程与设计.2012,(第09期),全文. *
混合加密体制在数字签名中的应用;侯佩;寇雅楠;黄利斌;;计算机工程与设计(第06期);全文 *
空间信息传输的改进式混合加密策略;江冰;辛元雪;孙前庆;;计算机工程与设计(第09期);全文 *

Also Published As

Publication number Publication date
CN117062061A (en) 2023-11-14

Similar Documents

Publication Publication Date Title
JP4545197B2 (en) Wireless network system and communication method using the same
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
CN107454079A (en) Lightweight device authentication and shared key machinery of consultation based on platform of internet of things
JP4788213B2 (en) Time stamp verification program and time stamp verification system
CN101247356B (en) DHCP message passing method and system
US20150149784A1 (en) Communication method utilizing fingerprint information authentication
CN108847942A (en) A kind of authentication method and system based on mark public key
CN106060073B (en) Channel key machinery of consultation
CN108600152B (en) Improved Kerberos identity authentication system and method based on quantum communication network
CN106529963A (en) System and method for security authentication of mobile devices
CN113595744B (en) Network access method, device, electronic equipment and storage medium
CN101124767A (en) Method and device for key generation and proving authenticity
CN101944216A (en) Two-factor online transaction safety authentication method and system
JPH10224345A (en) Cipher key authentication method for chip card and certificate
TWI246345B (en) System and method for controlling a mobile terminal using a digital signature
US20200366673A1 (en) Securing digital data transmission in a communication network
CN107645500B (en) Broadcast data interaction method and device
CN117062061B (en) Encryption transmission method for wireless communication
CN110635894A (en) Quantum key output method and system based on frame protocol format
JP2019057867A (en) Encryption communication system
KR20010079161A (en) The equipment authentication and communication encryption key distribution method in a wireless local area network environments
CN113992336B (en) Encryption network offline data trusted exchange method and device based on block chain
CN114492489B (en) NFC label verification system based on dynamic data
TWI621029B (en) Personal identity authentication method and system using graphic lock
CN111489462A (en) Personal Bluetooth key system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant