CN117560233B - Method and system based on data interaction encryption - Google Patents
Method and system based on data interaction encryption Download PDFInfo
- Publication number
- CN117560233B CN117560233B CN202410048870.XA CN202410048870A CN117560233B CN 117560233 B CN117560233 B CN 117560233B CN 202410048870 A CN202410048870 A CN 202410048870A CN 117560233 B CN117560233 B CN 117560233B
- Authority
- CN
- China
- Prior art keywords
- data
- information data
- real
- plaintext
- time information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 90
- 230000003993 interaction Effects 0.000 title claims abstract description 72
- 230000005540 biological transmission Effects 0.000 claims abstract description 82
- 230000008569 process Effects 0.000 claims abstract description 65
- 238000007781 pre-processing Methods 0.000 claims abstract description 14
- 238000012545 processing Methods 0.000 claims description 20
- 238000010606 normalization Methods 0.000 claims description 18
- 238000006073 displacement reaction Methods 0.000 claims description 15
- 230000008878 coupling Effects 0.000 claims description 9
- 238000010168 coupling process Methods 0.000 claims description 9
- 238000005859 coupling reaction Methods 0.000 claims description 9
- 238000010187 selection method Methods 0.000 claims description 8
- 238000006467 substitution reaction Methods 0.000 claims description 7
- 239000011159 matrix material Substances 0.000 claims description 6
- 230000001502 supplementing effect Effects 0.000 claims description 6
- 238000005457 optimization Methods 0.000 claims description 4
- 238000013139 quantization Methods 0.000 claims description 4
- 238000013528 artificial neural network Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 238000011835 investigation Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims 4
- 230000011218 segmentation Effects 0.000 claims 1
- 238000011002 quantification Methods 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Abstract
The invention relates to the technical field of data encryption and discloses a method and a system based on data interaction encryption. The method comprises the following steps: removing error information in the information data by storing and preprocessing the collected information data; and quantizing each transmission node based on the address of the information data to be transmitted; and meanwhile, after the quantification of the transmission node is finished, encrypting the data interaction process based on a CBC mode, and improving the efficiency of the data interaction process by setting a security level. The method based on the data interaction encryption can process and encrypt the information data received in real time, ensures the safety of the data interaction process, and improves the high efficiency of the data interaction process.
Description
Technical Field
The invention relates to the technical field of data encryption, in particular to a method and a system based on data interaction encryption.
Background
With the development of network technology, computer networks have extended to all corners of society; meanwhile, as the coverage of computer networks is wider and wider, a large amount of data is inevitably transmitted, however, the risk factors in the data transmission process are endlessly layered, and how to safely complete the interaction between the data plays an increasingly important role in the encryption technology.
In the prior art chinese patent CN114422230a, by establishing N data transmission channels, a label of data to be encrypted is identified, and a model is randomly selected to encrypt, so that although the privacy of data encryption is improved, the efficiency of data transmission is reduced, and the method has a great limitation.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a method and a system based on data interaction encryption, which have the advantages of high safety, high efficiency and the like, and solve the problem of low safety in the data interaction process.
In order to solve the technical problem of low safety in the data interaction process, the invention provides the following technical scheme:
the embodiment discloses a method based on data interaction encryption, which specifically comprises the following steps:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node;
s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
preferably, the collecting information data generated in the data interaction process in real time, and establishing an information space based on the collected information data, and storing the collected information data in the information space includes:
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data.
Preferably, the quantifying each transmission node during the sample information data interaction based on the connection condition of each transmission node includes the following steps:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the jth transmission node in the sample information data interaction process, and m represents the number of transmission nodes;
s22, correcting the state of the statically expressed transmission node;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
wherein,representing quantized values of the transmission nodes, α and β representing the impact factors, and d representing the distance between two neighboring transmission nodes.
Preferably, the preprocessing of the real-time information data is performed after the quantization of each transmission node is completed and before the collected real-time information data is transmitted, and the obtaining of the preprocessed information data includes the following steps:
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method.
Preferably, the preprocessing of the real-time information data by the variance feature selection method includes the following steps:
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
preprocessing the normalized real-time information data based on a variance feature selection method;
the calculation process of the real-time information data variance features comprises the following steps:
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,representing the number of the ith real-time information after normalizationAccording to the information characteristic value, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless normalized real-time information data among the real-time information data.
Preferably, the encrypting the data interaction process based on the CBC mode includes the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
dividing the plaintext in the preprocessed information data based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
setting the data in the padding bytes to be 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
s44, obtaining the encrypted information data after the optimization is completed.
Preferably, encrypting each block of plaintext data after being divided and padded by the AES algorithm comprises the steps of:
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, the number of cycles of the AES algorithm is set, and steps S4221 to S4224 are executed based on the set number of cycles.
Preferably, the optimizing the number of loops of the AES algorithm in the encryption process by setting the security level includes the steps of:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to store the circulation times of an AES algorithm, setting h as the layer number of the multi-way tree, and setting beta as the number of branches required; wherein each transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h ;
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>Security finger representing layer alphaValue of number>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm.
The real-time example also discloses a system based on data interaction encryption, which specifically comprises: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
Compared with the prior art, the invention provides a method and a system based on data interaction encryption, which have the following beneficial effects:
1. according to the invention, the data interaction process is encrypted in a CBC mode, each data block in the data interaction process is encrypted in an AES algorithm, and the circulation times of the AES algorithm are set by setting the security level, so that the encryption of information data with different weights is realized, and the efficiency of the information data encryption process is improved.
2. According to the method, the information data generated in the data interaction process are collected in real time, the collected information data are stored in a mode of establishing an information space based on the collected information data, and the information data are preprocessed through the information space, so that the effectiveness of the data in the data interaction process is guaranteed.
3. The invention ensures that the lengths of the information data blocks and the secret keys are equal in a manner of dividing and filling the plaintext in the information data to be encrypted in the data interaction process, thereby improving the data encryption efficiency.
Drawings
Fig. 1 is a schematic flow chart of a method based on data interaction encryption.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The real-time example discloses a method based on data interaction encryption, which specifically comprises the following steps:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node;
preprocessing the collected information data in the information space comprises the steps of:
based on the connection condition of each transmission node, in the sample information data interaction process, the step of quantifying each transmission node comprises the following steps:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the j-th transmission node in the information data interaction process, wherein m represents the number of the transmission nodes;
s22, correcting the state of the statically expressed transmission node;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
wherein,representing quantized values of the transmission nodes, alpha and beta representing influence factors, and d representing a distance between two adjacent transmission nodes;
s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method;
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
further, preprocessing the real-time information data after normalization processing based on a variance characteristic selection method;
the calculation process of the real-time information data variance features comprises the following steps:
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,the information characteristic value of the ith piece of real-time information data after normalization is represented, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless real-time information data after normalization processing in the real-time information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
further, encrypting the data interaction process based on the CBC mode comprises the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
further, since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
further, the plaintext in the preprocessed information data is divided based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
further, setting the data in the stuff bytes to all 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, setting a number of cycles of the AES algorithm, and executing steps S4221 to S4224 based on the set number of cycles;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
optimizing the number of cycles of the AES algorithm in the encryption process by setting the security level includes the steps of:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to preserve AES calculationsSetting the circulation times of the method, setting h as the number of layers of the multi-branch tree, and setting beta as the number of branches; wherein each transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h ;
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>A value representing the security index of the alpha layer, < >>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm;
s44, obtaining encrypted information data after optimization is completed;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
the real-time example also discloses a system based on data interaction encryption, which specifically comprises: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. A method based on data interaction encryption, comprising the steps of:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node; s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
the step S4 comprises the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
dividing the plaintext in the preprocessed information data based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
setting the data in the padding bytes to be 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
s44, obtaining encrypted information data after optimization is completed;
the optimization of the circulation times of the AES algorithm in the encryption process by setting the security level comprises the following steps:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to store the circulation times of an AES algorithm, setting h as the layer number of the multi-way tree, and setting beta as the number of branches required; wherein the method comprises the steps ofEach transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h ;
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
;
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>A value representing the security index of the alpha layer, < >>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
;
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
;
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm.
2. The method of data-based interactive encryption according to claim 1, wherein said storing the collected sample information data in the information space comprises:
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data.
3. A method based on data interaction encryption according to claim 1, wherein S2 comprises the steps of:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the jth transmission node in the sample information data interaction process, and m represents the number of transmission nodes;
s22, correcting the state of the statically expressed transmission node;
;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
;
wherein,representing quantized values of the transmission nodes, α and β representing the impact factors, and d representing the distance between two neighboring transmission nodes.
4. A method based on data interaction encryption according to claim 1, wherein S3 comprises the steps of:
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method.
5. The method based on data interaction encryption according to claim 4, wherein the preprocessing of the real-time information data by the variance feature selection method comprises the steps of:
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
;
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
preprocessing the normalized real-time information data based on a variance feature selection method;
the calculation process of the real-time information data variance features comprises the following steps:
;
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,representing normalized ith real-time information dataThe information characteristic value, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
;
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless normalized real-time information data among the real-time information data.
6. The method of data-based interactive encryption according to claim 1, wherein said encrypting each block of plaintext data after segmentation and padding by AES algorithm comprises the steps of:
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, the number of cycles of the AES algorithm is set, and steps S4221 to S4224 are executed based on the set number of cycles.
7. A data-based interactive encryption system implementing the data-based interactive encryption method according to any one of claims 1-6, characterized in that it comprises in particular: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410048870.XA CN117560233B (en) | 2024-01-12 | 2024-01-12 | Method and system based on data interaction encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410048870.XA CN117560233B (en) | 2024-01-12 | 2024-01-12 | Method and system based on data interaction encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117560233A CN117560233A (en) | 2024-02-13 |
CN117560233B true CN117560233B (en) | 2024-04-05 |
Family
ID=89820922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410048870.XA Active CN117560233B (en) | 2024-01-12 | 2024-01-12 | Method and system based on data interaction encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117560233B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113098843A (en) * | 2021-03-08 | 2021-07-09 | 中国地质大学(武汉) | High-speed random sampling encryption method for geological and geographical big data |
CN114726609A (en) * | 2022-04-01 | 2022-07-08 | 中国工商银行股份有限公司 | Encrypted data verification method and device based on block chain and electronic equipment |
CN116722968A (en) * | 2023-06-27 | 2023-09-08 | 西安微电子技术研究所 | Lightweight AES-128 dynamic encryption method based on UWB |
CN116980194A (en) * | 2023-07-24 | 2023-10-31 | 南京邮电大学 | Safe and efficient data transmission method and system based on cloud edge end cooperation |
-
2024
- 2024-01-12 CN CN202410048870.XA patent/CN117560233B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113098843A (en) * | 2021-03-08 | 2021-07-09 | 中国地质大学(武汉) | High-speed random sampling encryption method for geological and geographical big data |
CN114726609A (en) * | 2022-04-01 | 2022-07-08 | 中国工商银行股份有限公司 | Encrypted data verification method and device based on block chain and electronic equipment |
CN116722968A (en) * | 2023-06-27 | 2023-09-08 | 西安微电子技术研究所 | Lightweight AES-128 dynamic encryption method based on UWB |
CN116980194A (en) * | 2023-07-24 | 2023-10-31 | 南京邮电大学 | Safe and efficient data transmission method and system based on cloud edge end cooperation |
Also Published As
Publication number | Publication date |
---|---|
CN117560233A (en) | 2024-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7346160B2 (en) | Randomization-based encryption apparatus and method | |
CN113194213B (en) | PNG image information hiding and recovering method based on secret sharing and chaotic mapping | |
CN109635576B (en) | Method and system for hiding data in image | |
CN112597519B (en) | Non-key decryption method based on convolutional neural network in OFDM encryption system | |
CN113255007B (en) | Safe hidden three-factor query method | |
CN111698222B (en) | Covert communication method of special bitcoin address generated based on vanitygen | |
US10505715B2 (en) | Method and system of synchronous encryption to render computer files and messages impervious to pattern recognition and brute force attacks | |
CN115296862A (en) | Network data secure transmission method based on data coding | |
CN108804933B (en) | Method for carrying out scale conversion on big data in information hiding technology | |
CN112116672A (en) | Color image saving thumbnail encryption algorithm based on genetic algorithm | |
CN117354061B (en) | Network data security management method based on artificial intelligence | |
Zhou et al. | Privacy‐preserving image retrieval in a distributed environment | |
KR20170122048A (en) | System and method for searching encrypted data using bloom filter and binary tree | |
CN117560233B (en) | Method and system based on data interaction encryption | |
Mohammed et al. | DNA-based steganography using neural networks | |
CN115190216B (en) | Encrypted image reversible data hiding and decrypting method based on prediction error map | |
CN116865950A (en) | Detection kit quality inspection data safety storage system | |
CN115379066B (en) | Encryption image reversible data encryption and decryption method based on self-adaptive compression coding | |
CN114511330B (en) | Ether house Pompe fraudster detection method and system based on improved CNN-RF | |
CN111639351B (en) | Battery tracing management coding encryption and decryption method based on self-encoder and Henon mapping | |
CN111371751B (en) | File stream byte group data encryption and network transmission method | |
CN108156136B (en) | Secret-pattern carrier-free test question disguising method for indirect transmission and random codebook | |
CN111382285A (en) | Digital library data management system and management method thereof | |
CN117880762B (en) | Short message data security encryption method based on wireless communication | |
CN117540441B (en) | Transaction data secure storage method for hall type cloud terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |