CN117560233B - Method and system based on data interaction encryption - Google Patents

Method and system based on data interaction encryption Download PDF

Info

Publication number
CN117560233B
CN117560233B CN202410048870.XA CN202410048870A CN117560233B CN 117560233 B CN117560233 B CN 117560233B CN 202410048870 A CN202410048870 A CN 202410048870A CN 117560233 B CN117560233 B CN 117560233B
Authority
CN
China
Prior art keywords
data
information data
real
plaintext
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410048870.XA
Other languages
Chinese (zh)
Other versions
CN117560233A (en
Inventor
邓婷
陈锦福
崔飞易
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinfeijie Information Technology Service Co ltd
Original Assignee
Shenzhen Jinfeijie Information Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinfeijie Information Technology Service Co ltd filed Critical Shenzhen Jinfeijie Information Technology Service Co ltd
Priority to CN202410048870.XA priority Critical patent/CN117560233B/en
Publication of CN117560233A publication Critical patent/CN117560233A/en
Application granted granted Critical
Publication of CN117560233B publication Critical patent/CN117560233B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Abstract

The invention relates to the technical field of data encryption and discloses a method and a system based on data interaction encryption. The method comprises the following steps: removing error information in the information data by storing and preprocessing the collected information data; and quantizing each transmission node based on the address of the information data to be transmitted; and meanwhile, after the quantification of the transmission node is finished, encrypting the data interaction process based on a CBC mode, and improving the efficiency of the data interaction process by setting a security level. The method based on the data interaction encryption can process and encrypt the information data received in real time, ensures the safety of the data interaction process, and improves the high efficiency of the data interaction process.

Description

Method and system based on data interaction encryption
Technical Field
The invention relates to the technical field of data encryption, in particular to a method and a system based on data interaction encryption.
Background
With the development of network technology, computer networks have extended to all corners of society; meanwhile, as the coverage of computer networks is wider and wider, a large amount of data is inevitably transmitted, however, the risk factors in the data transmission process are endlessly layered, and how to safely complete the interaction between the data plays an increasingly important role in the encryption technology.
In the prior art chinese patent CN114422230a, by establishing N data transmission channels, a label of data to be encrypted is identified, and a model is randomly selected to encrypt, so that although the privacy of data encryption is improved, the efficiency of data transmission is reduced, and the method has a great limitation.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a method and a system based on data interaction encryption, which have the advantages of high safety, high efficiency and the like, and solve the problem of low safety in the data interaction process.
In order to solve the technical problem of low safety in the data interaction process, the invention provides the following technical scheme:
the embodiment discloses a method based on data interaction encryption, which specifically comprises the following steps:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node;
s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
preferably, the collecting information data generated in the data interaction process in real time, and establishing an information space based on the collected information data, and storing the collected information data in the information space includes:
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data.
Preferably, the quantifying each transmission node during the sample information data interaction based on the connection condition of each transmission node includes the following steps:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the jth transmission node in the sample information data interaction process, and m represents the number of transmission nodes;
s22, correcting the state of the statically expressed transmission node;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
wherein,representing quantized values of the transmission nodes, α and β representing the impact factors, and d representing the distance between two neighboring transmission nodes.
Preferably, the preprocessing of the real-time information data is performed after the quantization of each transmission node is completed and before the collected real-time information data is transmitted, and the obtaining of the preprocessed information data includes the following steps:
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method.
Preferably, the preprocessing of the real-time information data by the variance feature selection method includes the following steps:
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
preprocessing the normalized real-time information data based on a variance feature selection method;
the calculation process of the real-time information data variance features comprises the following steps:
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,representing the number of the ith real-time information after normalizationAccording to the information characteristic value, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless normalized real-time information data among the real-time information data.
Preferably, the encrypting the data interaction process based on the CBC mode includes the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
dividing the plaintext in the preprocessed information data based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
setting the data in the padding bytes to be 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
s44, obtaining the encrypted information data after the optimization is completed.
Preferably, encrypting each block of plaintext data after being divided and padded by the AES algorithm comprises the steps of:
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, the number of cycles of the AES algorithm is set, and steps S4221 to S4224 are executed based on the set number of cycles.
Preferably, the optimizing the number of loops of the AES algorithm in the encryption process by setting the security level includes the steps of:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to store the circulation times of an AES algorithm, setting h as the layer number of the multi-way tree, and setting beta as the number of branches required; wherein each transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>Security finger representing layer alphaValue of number>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm.
The real-time example also discloses a system based on data interaction encryption, which specifically comprises: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
Compared with the prior art, the invention provides a method and a system based on data interaction encryption, which have the following beneficial effects:
1. according to the invention, the data interaction process is encrypted in a CBC mode, each data block in the data interaction process is encrypted in an AES algorithm, and the circulation times of the AES algorithm are set by setting the security level, so that the encryption of information data with different weights is realized, and the efficiency of the information data encryption process is improved.
2. According to the method, the information data generated in the data interaction process are collected in real time, the collected information data are stored in a mode of establishing an information space based on the collected information data, and the information data are preprocessed through the information space, so that the effectiveness of the data in the data interaction process is guaranteed.
3. The invention ensures that the lengths of the information data blocks and the secret keys are equal in a manner of dividing and filling the plaintext in the information data to be encrypted in the data interaction process, thereby improving the data encryption efficiency.
Drawings
Fig. 1 is a schematic flow chart of a method based on data interaction encryption.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The real-time example discloses a method based on data interaction encryption, which specifically comprises the following steps:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node;
preprocessing the collected information data in the information space comprises the steps of:
based on the connection condition of each transmission node, in the sample information data interaction process, the step of quantifying each transmission node comprises the following steps:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the j-th transmission node in the information data interaction process, wherein m represents the number of the transmission nodes;
s22, correcting the state of the statically expressed transmission node;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
wherein,representing quantized values of the transmission nodes, alpha and beta representing influence factors, and d representing a distance between two adjacent transmission nodes;
s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method;
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
further, preprocessing the real-time information data after normalization processing based on a variance characteristic selection method;
the calculation process of the real-time information data variance features comprises the following steps:
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,the information characteristic value of the ith piece of real-time information data after normalization is represented, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless real-time information data after normalization processing in the real-time information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
further, encrypting the data interaction process based on the CBC mode comprises the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
further, since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
further, the plaintext in the preprocessed information data is divided based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
further, setting the data in the stuff bytes to all 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, setting a number of cycles of the AES algorithm, and executing steps S4221 to S4224 based on the set number of cycles;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
optimizing the number of cycles of the AES algorithm in the encryption process by setting the security level includes the steps of:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to preserve AES calculationsSetting the circulation times of the method, setting h as the number of layers of the multi-branch tree, and setting beta as the number of branches; wherein each transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>A value representing the security index of the alpha layer, < >>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm;
s44, obtaining encrypted information data after optimization is completed;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
the real-time example also discloses a system based on data interaction encryption, which specifically comprises: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. A method based on data interaction encryption, comprising the steps of:
s1, collecting information data generated in a data interaction process, taking the information data as sample information data, establishing an information space based on the collected sample information data, and storing the collected sample information data in the information space;
s2, quantizing each transmission node in the sample information data interaction process based on the connection condition of each transmission node; s3, preprocessing the real-time information data after the quantization of each transmission node is completed and before the transmission of the acquired real-time information data, so as to obtain preprocessed information data;
s4, encrypting the preprocessed information data based on a CBC mode in the process of data interaction through quantized transmission nodes to obtain encrypted information data;
s5, forwarding the encrypted information data and the secret key;
s6, decrypting the received encrypted information data through the secret key;
the step S4 comprises the following steps:
s41, segmenting and supplementing plaintext in the preprocessed information data to be encrypted in the data interaction process, and dividing the plaintext in the preprocessed information data to be encrypted into plaintext data blocks with the same key length;
the method for dividing and supplementing the plaintext in the preprocessed information data which needs to be encrypted in the data interaction process comprises the following steps of:
s411, setting the length of the key based on the data interaction process;
setting data in byte units in the data interaction process;
since 1 byte=8 bits; 1bit represents one digit in the data interaction process;
the length of the key is set to be an integer multiple of bytes;
s412, dividing the plaintext in the preprocessed information data based on the set key length;
dividing the plaintext in the preprocessed information data based on the number of bytes and the key length contained in the plaintext in the preprocessed information data;
wherein E represents the number of blocks of the segmented plaintext data, Y represents the number of bytes contained in the plaintext in the preprocessed information data, and X represents the key length;
s413, filling the plaintext in the information data after the pretreatment with the insufficient length, and filling the end of the plaintext in the information data after the pretreatment with the insufficient length based on the byte difference value between the plaintext in the information data after the pretreatment and the key length;
setting the data in the padding bytes to be 0;
s42, encrypting each segmented and complemented plaintext data block through an AES algorithm;
s43, optimizing the circulation times of an AES algorithm in the encryption process by setting a security level;
s44, obtaining encrypted information data after optimization is completed;
the optimization of the circulation times of the AES algorithm in the encryption process by setting the security level comprises the following steps:
s431, setting parameters;
setting the security level as A, B and C, wherein A is the lowest level; w (W) A ,W B ,W C The data total security value is the data total security value with the security level of A, B and C;
establishing a multi-way tree to store the circulation times of an AES algorithm, setting h as the layer number of the multi-way tree, and setting beta as the number of branches required; wherein the method comprises the steps ofEach transmission node in the multi-way tree represents an encryption or decryption operation of a plaintext block of data; let the security index of each encryption or decryption operation be M, the transmission node of the h layer needs to go through the previous h-1 times of encryption or decryption operation, i.e. the security index of the h layer is M h
S432, establishing an objective function;
the total security value of the data with the security level of A in the CBC mode is set as follows:
wherein,indicating the number of data blocks of the filled layer, < >>Representing the number of data blocks with security level A remaining in the deepest layer, < >>A value representing the security index of the alpha layer, < >>Represents the L < th A A value of a security index of the layer; q (Q) A A security level weight representing data; l (L) A The layer number value of the last data block with the security level A is shown;
the total security value of the data with the security level of B in the CBC mode is set as follows:
wherein,represents L A Layer to L B Setting L for the number of data blocks with security degree B between layers A The number of data blocks with the data security level A of the layer is +.>,/>Represents the L < th B A value of a security index of the layer; q (Q) B A security level weight representing data; l (L) B Indicating the number of layers at which the last data block of security level B is located,the number of data blocks left in the deepest layer of the data blocks with the security degree A is represented,represents the L < th B The number of data blocks with the layer security degree of B and N B The number of data blocks representing the security degree B;
the total security value of the data with the security level of C in the CBC mode is set as follows:
wherein,represents the L < th C A value of a security index of the layer; q (Q) C A security level weight representing data; l (L) C Setting L to represent the layer number value of the last data block with the security level of C B The number of data blocks with the data security level B of the layer is,/>Represents L B The number of the remaining databases with security level C except security level B is +.>Represents L B Layer to L C The number of data blocks with a security level C between the layers, is->Represents L C The number of data blocks with the security level of C in the layer;
s433, executing different objective functions based on different security levels to optimize the circulation times of the AES algorithm.
2. The method of data-based interactive encryption according to claim 1, wherein said storing the collected sample information data in the information space comprises:
setting a quadruple e to store the collected information data;
e=(G,H,J,P)
wherein G represents the source address of the collected sample information data; h represents plaintext in the collected sample information data; j represents the address of the next transmission node in the interaction process of the collected sample information data; p represents the destination address of the collected sample information data.
3. A method based on data interaction encryption according to claim 1, wherein S2 comprises the steps of:
s21, carrying out static expression on each transmission node in the sample information data interaction process based on a linear coupling ordinary differential equation;
wherein,representing the state of the jth transmission node, f representing the transmission node equation, c representing the coupling strength, l representing the Laplacian matrix, y j Representing the jth transmission node in the sample information data interaction process, and m represents the number of transmission nodes;
s22, correcting the state of the statically expressed transmission node;
wherein F represents the corrected state value, z represents the number of transmission nodes connected to the transmission node j, S j The weight of the transmission node j is represented, and tau represents the corrected coupling strength;
s23, quantifying the corrected transmission node;
wherein,representing quantized values of the transmission nodes, α and β representing the impact factors, and d representing the distance between two neighboring transmission nodes.
4. A method based on data interaction encryption according to claim 1, wherein S3 comprises the steps of:
s31, classifying the acquired real-time information data according to the difference of the addresses of the next transmission nodes in the acquired real-time information data interaction process;
s32, performing information investigation on the classified real-time information data, and deleting repeated information data and missing information data in the acquired real-time information data;
s33, preprocessing the real-time information data through a variance characteristic selection method.
5. The method based on data interaction encryption according to claim 4, wherein the preprocessing of the real-time information data by the variance feature selection method comprises the steps of:
normalizing the real-time information data to obtain normalized real-time information data;
the normalization processing step comprises the following steps:
the characteristic value interval of the real-time information data is set as follows: [0,255] extracting the characteristics of the filtered real-time information data through a neural network;
processing the extracted real-time information data through a normalization processing formula:
wherein,information characteristic value x representing normalized ith real-time information data i Information characteristic values representing the ith real-time information data;
preprocessing the normalized real-time information data based on a variance feature selection method;
the calculation process of the real-time information data variance features comprises the following steps:
wherein i represents the ith normalized real-time information data, V i Information characteristic variance representing the real-time information data after the ith normalization processing,representing normalized ith real-time information dataThe information characteristic value, M represents the information characteristic mean value of the real-time information data after normalization processing, and n represents the information quantity;
setting a threshold value based on the calculated information characteristic variance of the normalized real-time information data, filtering the normalized real-time information data based on the set threshold value, deleting the normalized real-time information data lower than the threshold value, and outputting the filtered normalized real-time information data, namely the preprocessed information data;
the threshold is set as:
wherein,expressed as threshold, V S Representing the variance of noise, and V represents the information characteristic variance of the real-time information data after normalization processing; noise is meaningless normalized real-time information data among the real-time information data.
6. The method of data-based interactive encryption according to claim 1, wherein said encrypting each block of plaintext data after segmentation and padding by AES algorithm comprises the steps of:
s421, a vector matrix is generated to be exclusive-or with the plaintext data block;
s422, encrypting the plaintext data block by using an AES algorithm;
s4221, setting, namely adding plaintext data blocks and a secret key for multiple rounds by a secret key addition round and outputting;
s4222, setting a byte substitution layer;
byte conversion is carried out on the plaintext data blocks after the addition of multiple rounds in a byte substitution layer, and the plaintext data blocks are output;
s4223, setting byte step length of row displacement, and sequentially displacing each byte in the byte-substituted plaintext data to set byte step length of row displacement;
s4224, setting byte step length of column displacement, and sequentially displacing each byte in the clear text data subjected to row displacement to set byte step length of column displacement;
s4225, the number of cycles of the AES algorithm is set, and steps S4221 to S4224 are executed based on the set number of cycles.
7. A data-based interactive encryption system implementing the data-based interactive encryption method according to any one of claims 1-6, characterized in that it comprises in particular: the system comprises an information data receiving module, an information space module, a data encryption module and a transmission module;
the information data receiving module is used for collecting information data generated in the data interaction process in real time and transmitting the generated information data to the information space module for storage;
the information space module is used for managing the stored information data and transmitting the information data to be transmitted to the data encryption module;
the data encryption module is used for encrypting information data to be transmitted and transmitting the encrypted information data to the transmission module;
the transmission module is used for forwarding the information data transmitted in real time according to the address information of the information data.
CN202410048870.XA 2024-01-12 2024-01-12 Method and system based on data interaction encryption Active CN117560233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410048870.XA CN117560233B (en) 2024-01-12 2024-01-12 Method and system based on data interaction encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410048870.XA CN117560233B (en) 2024-01-12 2024-01-12 Method and system based on data interaction encryption

Publications (2)

Publication Number Publication Date
CN117560233A CN117560233A (en) 2024-02-13
CN117560233B true CN117560233B (en) 2024-04-05

Family

ID=89820922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410048870.XA Active CN117560233B (en) 2024-01-12 2024-01-12 Method and system based on data interaction encryption

Country Status (1)

Country Link
CN (1) CN117560233B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113098843A (en) * 2021-03-08 2021-07-09 中国地质大学(武汉) High-speed random sampling encryption method for geological and geographical big data
CN114726609A (en) * 2022-04-01 2022-07-08 中国工商银行股份有限公司 Encrypted data verification method and device based on block chain and electronic equipment
CN116722968A (en) * 2023-06-27 2023-09-08 西安微电子技术研究所 Lightweight AES-128 dynamic encryption method based on UWB
CN116980194A (en) * 2023-07-24 2023-10-31 南京邮电大学 Safe and efficient data transmission method and system based on cloud edge end cooperation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113098843A (en) * 2021-03-08 2021-07-09 中国地质大学(武汉) High-speed random sampling encryption method for geological and geographical big data
CN114726609A (en) * 2022-04-01 2022-07-08 中国工商银行股份有限公司 Encrypted data verification method and device based on block chain and electronic equipment
CN116722968A (en) * 2023-06-27 2023-09-08 西安微电子技术研究所 Lightweight AES-128 dynamic encryption method based on UWB
CN116980194A (en) * 2023-07-24 2023-10-31 南京邮电大学 Safe and efficient data transmission method and system based on cloud edge end cooperation

Also Published As

Publication number Publication date
CN117560233A (en) 2024-02-13

Similar Documents

Publication Publication Date Title
US7346160B2 (en) Randomization-based encryption apparatus and method
CN113194213B (en) PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN109635576B (en) Method and system for hiding data in image
CN112597519B (en) Non-key decryption method based on convolutional neural network in OFDM encryption system
CN113255007B (en) Safe hidden three-factor query method
CN111698222B (en) Covert communication method of special bitcoin address generated based on vanitygen
US10505715B2 (en) Method and system of synchronous encryption to render computer files and messages impervious to pattern recognition and brute force attacks
CN115296862A (en) Network data secure transmission method based on data coding
CN108804933B (en) Method for carrying out scale conversion on big data in information hiding technology
CN112116672A (en) Color image saving thumbnail encryption algorithm based on genetic algorithm
CN117354061B (en) Network data security management method based on artificial intelligence
Zhou et al. Privacy‐preserving image retrieval in a distributed environment
KR20170122048A (en) System and method for searching encrypted data using bloom filter and binary tree
CN117560233B (en) Method and system based on data interaction encryption
Mohammed et al. DNA-based steganography using neural networks
CN115190216B (en) Encrypted image reversible data hiding and decrypting method based on prediction error map
CN116865950A (en) Detection kit quality inspection data safety storage system
CN115379066B (en) Encryption image reversible data encryption and decryption method based on self-adaptive compression coding
CN114511330B (en) Ether house Pompe fraudster detection method and system based on improved CNN-RF
CN111639351B (en) Battery tracing management coding encryption and decryption method based on self-encoder and Henon mapping
CN111371751B (en) File stream byte group data encryption and network transmission method
CN108156136B (en) Secret-pattern carrier-free test question disguising method for indirect transmission and random codebook
CN111382285A (en) Digital library data management system and management method thereof
CN117880762B (en) Short message data security encryption method based on wireless communication
CN117540441B (en) Transaction data secure storage method for hall type cloud terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant