CN118432863A - Data encryption/decryption method and device based on polarization code and encryption/decryption system - Google Patents

Data encryption/decryption method and device based on polarization code and encryption/decryption system Download PDF

Info

Publication number
CN118432863A
CN118432863A CN202410429530.1A CN202410429530A CN118432863A CN 118432863 A CN118432863 A CN 118432863A CN 202410429530 A CN202410429530 A CN 202410429530A CN 118432863 A CN118432863 A CN 118432863A
Authority
CN
China
Prior art keywords
data
information
encryption
working key
polarization code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410429530.1A
Other languages
Chinese (zh)
Inventor
林飞
严新荣
余晶
杨珍
胡志金
吴涵
杨成林
汪宇傲
曾玥
王松伟
张龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Original Assignee
Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp filed Critical Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Priority to CN202410429530.1A priority Critical patent/CN118432863A/en
Publication of CN118432863A publication Critical patent/CN118432863A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a data encryption/decryption method and device based on a polarization code and an encryption/decryption system, and relates to the technical field of encryption, wherein the data encryption method comprises the following steps: acquiring a working key corresponding to the working key number from a preset working key library; generating a random digital stream based on the working key and the message key; attaching cipher synchronization information and load ciphertext information to a frame, and sub-packaging the attached frame according to the polarization coding length to obtain a plurality of data packets; respectively carrying out polarization code encoding on each data packet, wherein when carrying out polarization code encoding on a first data packet, the freezing sequence is a preset fixed value; when the polarization code encoding is carried out on other data packets, the freezing sequence sequentially selects random number sequences in the generated random number stream, so that a plurality of encoded data packets are obtained, and framing is attached to realize data encryption. The invention takes the random digital stream generated by the cryptographic algorithm as the frozen sequence of the polarized code, thereby greatly increasing the security of the data encryption security code.

Description

Data encryption/decryption method and device based on polarization code and encryption/decryption system
Technical Field
The present invention relates to the field of encryption technologies, and in particular, to a method and apparatus for encrypting/decrypting data based on a polarization code, and an encryption/decryption system.
Background
In a secure communication system, information sent by a sender at an application layer generally comprises cryptosync information and load ciphertext information; the cryptosync information is in a plaintext, and generally comprises a work key number and a message key. Because the two communication parties are locally preset with the same working key library, the two communication parties can select the same working key through the same working key number. The load ciphertext information is generated by encrypting the load plaintext information by a work key and a message key by adopting a cryptographic algorithm. In order to reduce data transmission errors, the transceiver side typically uses channel coding techniques to improve system performance when transmitting on noisy channels.
At present, the existing data encryption transmission method generally encrypts payload plaintext data at an application layer, however, security enhancement is not considered in the aspect of channel encoding and decoding, so that potential risks still exist in data encryption security coding.
Disclosure of Invention
The invention provides a data encryption/decryption method, a device and an encryption/decryption system based on a polarization code, which aim to enable a receiving party and a transmitting party to take a random digital stream generated by a cryptographic algorithm as a freezing sequence of the polarization code, so that only a legal receiving party and transmitting party can correctly encode and decode the polarization code, and simultaneously correspondingly complete encryption and decryption of load information, thereby greatly increasing the security of data encryption security coding.
In a first aspect, the present invention provides a data encryption method based on a polarization code, the method comprising:
Acquiring the cryptosync information and the load ciphertext information of the information to be encrypted; wherein the cryptosync information includes a work key number and a message key;
acquiring a working key corresponding to the working key number from a preset working key library; generating a random digital stream based on the working key and the message key;
attaching the cryptosync information and the load ciphertext information to a frame, and packetizing the attached frame according to the polarization coding length to obtain a plurality of data packets;
Respectively carrying out polarization code encoding on each data packet to obtain a plurality of encoded data packets, and attaching the plurality of encoded data packets to a framing to realize data encryption; when the first data packet is subjected to polarization code encoding, the freezing sequence is a preset fixed value; when the polarization code encoding is carried out on other data packets, the freezing sequence sequentially selects the random number sequences in the generated random number stream.
Further, the method comprises the steps of,
The obtaining of the load ciphertext information comprises the following steps: performing encryption operation on the payload plaintext information by adopting a first encryption algorithm based on the working key and the message key;
The generation of the random digital stream comprises the following steps: and generating by using a second encryption algorithm based on the working key and the message key.
Further, the generation matrix of the polarization code coding is:
Wherein N represents the code length of the polarization code; b N denotes a bit flip permutation matrix; n=log 2 N, matrix Represents the n-th order Kronecker product of the matrix F.
Further, the input sequence given the polarization code is: the coded data packet after the polarization code coding is:
wherein, Comprising a freezing sequenceAnd information sequence u A=(ui, i ε A); set A c is the complement of set A; set a represents a set of information bit indices,
Further, the polarization coding length is the length of the number of polarization code information bits.
In a second aspect, the present invention provides a method for decrypting data based on a polarization code, the method comprising:
Obtaining framing data to be decrypted, and packetizing according to the polarization decoding length to obtain a plurality of decoding data packets;
Decoding the first decoded data packet, and selecting a preset fixed value by the freezing sequence to obtain the first data packet;
Analyzing the first data packet to obtain cryptosync information; obtaining a working key number and a message key based on the cryptosync information; acquiring a working key corresponding to the working key number from a preset working key library; generating a random digital stream based on the working key and the message key;
sequentially decoding each rest decoded data packet, sequentially selecting random number sequences in the generated random number stream by the frozen sequences, and correspondingly obtaining a plurality of data packets;
Attaching the first data packet and a plurality of data packets obtained subsequently to a framing, and analyzing to obtain complete load ciphertext information;
And decrypting the load ciphertext information by using the working key and the message key to obtain load plaintext information.
Further, the method comprises the steps of,
The obtaining of the payload plaintext information comprises the following steps: decrypting the load ciphertext information by using the working key and the message key by using a first encryption algorithm;
The generation of the random digital stream comprises the following steps: and generating by using a second encryption algorithm based on the working key and the message key.
In a third aspect, the present invention provides a data encryption device comprising a memory, a processor and a computer program stored on the memory, the processor executing the computer program to perform the steps of the data encryption method of any one of the above.
In a fourth aspect, the present invention provides a data decryption device comprising a memory, a processor and a computer program stored on the memory, the processor executing the computer program to perform the steps of the data decryption method according to any one of the preceding claims.
In a fifth aspect, the present invention provides a data encryption and decryption system, including an encryption module and a decryption module;
an encryption module for implementing the steps of the data encryption method described in any one of the above;
a decryption module, configured to implement the steps of the data decryption method described in any one of the above.
In general, by means of the technical solution conceived by the present invention, the following beneficial effects can be obtained compared with the prior art:
The invention provides a data encryption/decryption method, a device and an encryption/decryption system based on a polarization code, which generate a random digital stream by using a working key and a message key in data encryption/decryption protection, and take the random digital stream as a freezing sequence of polarization code encoding and decoding of a subsequent data packet; therefore, only under the condition that the frozen sequences of the two transmitting parties are consistent, the polarization code coding transmitting data and the polarization code decoding receiving data can be correctly carried out; under the condition of not increasing additional cost, the safety of both communication parties in channel coding and decoding is enhanced to a great extent, and the reliability of data encryption and decryption is improved.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a prior art method of data encryption;
FIG. 2 is a schematic diagram of steps of a data encryption method based on polarization codes according to the present invention;
FIG. 3 is a schematic diagram of a data encryption method based on polarization codes according to the present invention;
fig. 4 is a schematic diagram of steps of a data decryption method based on polarization codes according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings and examples of the present invention, and it is apparent that the described examples are some, but not all, examples of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that in the description of embodiments of the present invention, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a method, step, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such method, step, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements or steps in a method, or apparatus that includes such elements.
As shown in fig. 1, in the prior art, a sender transmits information at an application layer, encrypts payload plaintext information only with cryptosync information, and does not encrypt in terms of channel coding and decoding, resulting in insufficient security. As Polar codes (Polar codes) are the only theoretical evidence at present, the structured error correction coding method reaching the Shannon limit has the advantages of lower coding and decoding complexity and the like. Therefore, the invention provides a data encryption and decryption method based on the polarization code, which uses the random digital stream generated by the cryptographic algorithm as the freezing sequence of the polarization code, so that only legal transmitting and receiving parties can correctly encode and decode the polarization code, and simultaneously, the encryption and decryption of the load information are correspondingly completed, thereby greatly increasing the security of data encryption and security coding.
In a first aspect, the present invention provides a data encryption method based on polarization codes, as shown in fig. 2 to 3, the method includes:
Step 101: and acquiring the cryptosync information and the load ciphertext information of the information to be encrypted.
Wherein the cryptosync information includes a work key number and a message key.
As one embodiment of the present invention, the obtaining of the load ciphertext information includes: and carrying out encryption operation on the payload plaintext information by adopting a first encryption algorithm based on the working key and the message key.
Step 102: acquiring a working key corresponding to the working key number from a preset working key library; a random digital stream is generated based on the working key and the message key.
It should be noted that, the working key numbers and the working keys in the working key library are in one-to-one correspondence.
As an embodiment of the present invention, the generation of the random digital stream includes: and generating by using a second encryption algorithm based on the working key and the message key.
The first encryption algorithm and the second encryption algorithm may be the same or different, and preferably different encryption algorithms are used.
Step 103: and attaching the cipher synchronization information and the load ciphertext information to the frame, and packetizing the attached frame according to the polarization coding length to obtain a plurality of data packets. Preferably, the polarization encoding length is the length of the number of polarization code information bits.
It should be noted that, the first data packet includes cryptosync information and load ciphertext data; the remaining other packets include only the payload ciphertext data.
Step 104: and respectively carrying out polarization code encoding on each data packet to obtain a plurality of encoded data packets, and attaching the plurality of encoded data packets to a framing to realize data encryption.
When the first data packet is subjected to polarization code encoding, the freezing sequence is a preset fixed value; when the polarization code encoding is carried out on other data packets, the freezing sequence sequentially selects the random number sequences in the generated random number stream. Preferably, the frozen sequence typically takes a value of all 0s, i.e. fills in fixed bits.
The other data packets are other data packets than the first data packet among the plurality of data packets.
It should be noted that, the generation matrix of the polarization code encoding is preferably:
Wherein N represents the code length of the polarization code; b N denotes a bit flip permutation matrix; n=log 2 N, matrix Represents the n-th order Kronecker product of the matrix F.
Further, the input sequence of a given polarization code is: the coded data packet after the polarization code coding is: wherein, Comprising a freezing sequenceAnd information sequence u A=(ui, i ε A); set A c is the complement of set A; set a represents a set of information bit indices,
It should be noted that, given the number M of information bits, according to the idea of polarization code encoding, after the set a corresponds to M polarizations, the channel should have a higher channel capacity or a lower probability of misjudgment, and this set is suitable for transmitting non-fixed bits such as information bits.
Taking 10-bit working key numbers as an example, the working key library preset by two communication parties comprises 1024 working keys; wherein the working key number includes (WKN 0、WKN1、…、WKN1023), and the working key corresponding to the working key number includes (WK 0、WK1、…、WK1023); the work key number WKN i corresponds one-to-one to the work key WK i.
And acquiring the cryptosync information and the load ciphertext information of the information to be encrypted. Wherein the cryptosync information includes a work key number and a message key.
The acquisition of the cryptosync information includes: acquiring a working key number and a message key, and generating cryptosync information based on the working key number and the message key; and acquiring a working key corresponding to the working key number from a preset working key library, and encrypting the payload plaintext information based on the working key and the message key to obtain the payload ciphertext information.
Firstly, a working key WK 3 with the serial number of 3 corresponding to a working key number WKN 3 (0 x 003) is obtained from a working key library; obtaining a message key MK from a noise source, generating cryptosync information SK based on the working key number WKN 3 and the message key MK, sk= WKN 3 |mk; the payload plaintext information PT to be transmitted is subjected to encryption operation based on the working key WK 3 and the message key MK to obtain the payload ciphertext information CT,A random digital stream PN is generated based on the working key WK 3 and the message key MK,
Then, attaching the cryptosync information SK and the load ciphertext information CT to a framing to obtain SK||CT; wherein SK ct=d 1(M)||D2(M)||…||Dk (M). And packetizing the data SK||CT after framing according to the information bit number length M of the polarization codes to obtain a plurality of data packets D 1(M)、D2(M)、…、Dk (M) and the like, wherein k is the packet number.
Then, each data packet D 1(M)、D2(M)、…、Dk (M) is subjected to polarization code encoding to obtain a plurality of encoded data packets
More specifically, when the first data packet D 1 (M) is subjected to polarization code encoding, the freezing sequence is a preset fixed value.
In other words, when the first data packet D 1 (M) is encoded with the polarization code, the information sequence u A is D 1 (M), and the sequence is frozenGenerating a first coded data packet for an all 0 sequence
Freezing sequence when encoding other data packet D 2(M)、D3(M)、…、Dk (M) by polarization codeAnd sequentially selecting random number sequences in the generated random number stream.
In other words, when the second data packet D 2 (M) is encoded with the polarization code, the information sequence u A is D 2 (M), and the sequence is frozenIs a random number sequence { PN 1、PN2、…、PNt }, where t=N-M; generating a first encoded data packet
When the third data packet D 3 (M) is coded by polarization code, the information sequence u A is D 3 (M), and the sequence is frozenIs a random number sequence { PN t+1、PNt+2、…、PN2t }, where t=N-M; generating a first encoded data packet
By the above way, when the k data packet D k (M) is coded by polarization code, the information sequence u A is D k (M), and the sequence is frozenIs a random number sequence { PN (k-2)t+1、PN(k-2)t+2、…、PN(k-1)t }, where t=N-M; generating a first encoded data packet
Finally, a plurality of coded data packetsAttaching a framing to obtainRealize data encryption and willThe data transmitted as a channel is sent to the receiving side.
In a second aspect, the present invention provides a data decryption method based on polarization codes, as shown in fig. 4, where the method includes:
Step 201: and obtaining the framing data to be decrypted, and packetizing according to the polarization decoding length to obtain a plurality of decoding data packets.
Step 202: and decoding the first decoded data packet, and selecting a preset fixed value by the freezing sequence to obtain the first data packet.
Step 203: analyzing the first data packet to obtain the cryptosync information; obtaining a work key number and a message key based on the cryptosync information; acquiring a working key corresponding to the working key number from a preset working key library; a random digital stream is generated based on the working key and the message key.
As an embodiment of the present invention, the generation of the random digital stream includes: and generating by using a second encryption algorithm based on the working key and the message key.
Step 204: and decoding each rest decoded data packet in sequence, and sequentially selecting random number sequences in the generated random number stream by the frozen sequences to correspondingly obtain a plurality of data packets.
Step 205: and attaching the first data packet and a plurality of data packets obtained subsequently to a framing, and analyzing to obtain complete load ciphertext information.
Step 206: and decrypting the load ciphertext information by using the working key and the message key to obtain load plaintext information.
As one embodiment of the present invention, the obtaining of the payload plaintext information includes: and decrypting the load ciphertext information by using the working key and the message key by adopting a first encryption algorithm.
The first encryption algorithm and the second encryption algorithm may be the same or different, and preferably different encryption algorithms are used.
Other technical features are consistent with those of the encryption method, and are not described in detail herein.
The receiving side receives the frame data of the group to be decryptedPreferably, the group frame data to be decryptedIs encrypted dataThe correctness of the data obtained by demodulation judgment after the noisy channel transmission depends on the signal-to-noise ratio of the channel transmission.
As one embodiment of the present invention, first, group frame data to be decrypted is acquiredPacketizing according to the polarization decoding length, k being the number of packets to obtain a plurality of decoded data packets
Next, for the first decoded data packetDecoding, freezing sequence thereofSelecting all 0 sequences, and decoding to obtainFor the first data packet
Then, for the first data packetAnalyzing to obtain the cryptosync information SK i; obtaining a working key number based on cryptosync information SK i And a message key MK i, wherein,Obtaining and working key number from preset working key libraryCorresponding working keyBased on working keyAnd message key MK i generates random digital stream PN i, wherein,
Then, for each remaining decoded data packet in turnDecoding respectively, sequentially selecting random number sequences in the generated random digital streams PN i by the frozen sequences, and correspondingly obtaining a plurality of data packets
Specifically, for the second decoded data packetDecoding polarization code, freezing sequence thereofIs a random number sequenceWherein t=n-M; decoding to obtainFor the second data packet
For the third decoded data packetDecoding polarization code, freezing sequence thereofIs a random number sequenceWherein t=n-M; decoding to obtainIs the third data packet
And so on, for the kth decoded data packetDecoding polarization code, freezing sequence thereofIs a random number sequenceWherein t=n-M; decoding to obtainIs the third data packet
Then, the first data packetAnd a plurality of data packets obtained subsequently And attaching a framing, and analyzing to obtain complete load ciphertext information CT i. It should be noted that the number of the substrates,Cryptosync SK i is the above-described first packetAnd analyzing.
Step 206: by working keysAnd message key MK i decrypts payload ciphertext information CT i, resulting in payload plaintext information PT i, wherein,
It should be noted that when the signal-to-noise ratio of the channel transmission is above the threshold for correctly decoding the polarization code, that is, when only the legal transmitting and receiving parties can correctly perform the encoding and decoding of the polarization code,SKi=SK,MKi=MK,PNi=PN,CTi=CT,PTi=PT。
In a third aspect, the present invention provides a data encryption device comprising a memory, a processor and a computer program stored on the memory, the processor executing the computer program to perform the steps of the data encryption method of any one of the above.
In a fourth aspect, the present invention provides a data decryption device comprising a memory, a processor and a computer program stored on the memory, the processor executing the computer program to perform the steps of the data decryption method according to any one of the preceding claims.
In a fifth aspect, the present invention provides a data encryption and decryption system, including an encryption module and a decryption module;
an encryption module for implementing the steps of the data encryption method described in any one of the above;
a decryption module, configured to implement the steps of the data decryption method described in any one of the above.
The technical features of the data encryption device, the data decryption device, and the data encryption/decryption system are consistent with the technical features of the data encryption method and the data decryption method, and are not described in detail herein.
It should be noted that, for simplicity of description, the foregoing embodiments have been shown as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts, as some steps may be performed in other order or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed method or system may be implemented in other manners. For example, the embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory. Based on this understanding, the technical solution of the present application may be embodied essentially or partly in the form of a software product, or all or part of the technical solution, which is stored in a memory, and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application.
Those skilled in the art will appreciate that all or part of the various circuits of the above described embodiments may be implemented by program code to instruct related hardware, and that the program may be stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the scope of the present disclosure. That is, equivalent changes and modifications are contemplated by the teachings of this disclosure, which fall within the scope of the present disclosure. Embodiments of the present disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a scope and spirit of the disclosure being indicated by the claims.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1. A method for encrypting data based on a polarization code, the method comprising:
Acquiring the cryptosync information and the load ciphertext information of the information to be encrypted; wherein the cryptosync information includes a work key number and a message key;
acquiring a working key corresponding to the working key number from a preset working key library; generating a random digital stream based on the working key and the message key;
attaching the cryptosync information and the load ciphertext information to a frame, and packetizing the attached frame according to the polarization coding length to obtain a plurality of data packets;
Respectively carrying out polarization code encoding on each data packet to obtain a plurality of encoded data packets, and attaching the plurality of encoded data packets to a framing to realize data encryption; when the first data packet is subjected to polarization code encoding, the freezing sequence is a preset fixed value; when the polarization code encoding is carried out on other data packets, the freezing sequence sequentially selects the random number sequences in the generated random number stream.
2. A data encryption method based on polarization codes as set forth in claim 1, wherein,
The obtaining of the load ciphertext information comprises the following steps: performing encryption operation on the payload plaintext information by adopting a first encryption algorithm based on the working key and the message key;
The generation of the random digital stream comprises the following steps: and generating by using a second encryption algorithm based on the working key and the message key.
3. The method for encrypting data based on polarization codes as recited in claim 1, wherein said generation matrix of polarization code codes is:
Wherein N represents the code length of the polarization code; b N denotes a bit flip permutation matrix; n=log 2 N, matrix Represents the n-th order Kronecker product of the matrix F.
4. A method of encrypting data based on a polar code as claimed in claim 3, wherein the input sequence given to the polar code is: the coded data packet after the polarization code coding is:
wherein, Comprising a freezing sequenceAnd information sequence u A=(ui, i ε A); set A c is the complement of set A; set a represents a set of information bit indices,
5. The method for encrypting data based on polarization code according to claim 1, wherein said polarization code length is a length of a number of information bits of the polarization code.
6. A method for decrypting data based on a polarization code, the method comprising:
Obtaining framing data to be decrypted, and packetizing according to the polarization decoding length to obtain a plurality of decoding data packets;
Decoding the first decoded data packet, and selecting a preset fixed value by the freezing sequence to obtain the first data packet;
Analyzing the first data packet to obtain cryptosync information and first load ciphertext data; obtaining a working key number and a message key based on the cryptosync information; acquiring a working key corresponding to the working key number from a preset working key library; generating a random digital stream based on the working key and the message key;
sequentially decoding each rest decoded data packet, sequentially selecting random number sequences in the generated random number stream by the frozen sequences, and correspondingly obtaining a plurality of data packets;
Attaching the first data packet and the plurality of data packets obtained subsequently to a framing, and analyzing to obtain complete load ciphertext information;
And decrypting the load ciphertext information by using the working key and the message key to obtain load plaintext information.
7. A method for decrypting data based on a polarization code as recited in claim 6, wherein,
The obtaining of the payload plaintext information comprises the following steps: decrypting the load ciphertext information by using the working key and the message key by using a first encryption algorithm;
The generation of the random digital stream comprises the following steps: and generating by using a second encryption algorithm based on the working key and the message key.
8. A data encryption device comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to carry out the steps of the method according to any one of claims 1 to 5.
9. A data decryption device comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to carry out the steps of the method according to any one of claims 6 to 7.
10. The data encryption and decryption system is characterized by comprising an encryption module and a decryption module;
An encryption module for implementing the steps of the method of any one of claims 1 to 5;
decryption module for implementing the steps of the method according to any of claims 6 to 7.
CN202410429530.1A 2024-04-10 2024-04-10 Data encryption/decryption method and device based on polarization code and encryption/decryption system Pending CN118432863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410429530.1A CN118432863A (en) 2024-04-10 2024-04-10 Data encryption/decryption method and device based on polarization code and encryption/decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410429530.1A CN118432863A (en) 2024-04-10 2024-04-10 Data encryption/decryption method and device based on polarization code and encryption/decryption system

Publications (1)

Publication Number Publication Date
CN118432863A true CN118432863A (en) 2024-08-02

Family

ID=92336236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410429530.1A Pending CN118432863A (en) 2024-04-10 2024-04-10 Data encryption/decryption method and device based on polarization code and encryption/decryption system

Country Status (1)

Country Link
CN (1) CN118432863A (en)

Similar Documents

Publication Publication Date Title
US9673976B2 (en) Method and system for encryption of blocks of data
EP0511420B1 (en) A cryptographic system based on information difference
EP0966126B1 (en) Encrypting speech coder
JP2016513825A (en) Safety communication method and apparatus
KR20170137872A (en) Generate a cryptographic checksum
Oggier et al. An information-theoretic security evaluation of a class of randomized encryption schemes
CN114844728B (en) Serialized data secure communication method and big data platform
JP2009116348A (en) Method for data decorrelation
JP2017524291A (en) Cryptographic checksum generation
Kim et al. A secure information transmission scheme with a secret key based on polar coding
Mihaljević et al. An approach for stream ciphers design based on joint computing over random and secret data
US20020018561A1 (en) Data encryption and decryption using error correction methodologies
CN114710558B (en) Asynchronous secure transmission channel construction method based on cloud storage
Adamo et al. Joint scheme for physical layer error correction and security
Adamo et al. Physical layer error correction based cipher
CN110266321B (en) Novel communication method and system based on polarization code
JP4758110B2 (en) Communication system, encryption apparatus, key generation apparatus, key generation method, restoration apparatus, communication method, encryption method, encryption restoration method
CN111194531B (en) Method for transmitting digital data on multiple channels
JP2002077135A (en) Encrypting method, decrypting method and their equipment
CN118432863A (en) Data encryption/decryption method and device based on polarization code and encryption/decryption system
US9705675B2 (en) Method and system making it possible to test a cryptographic integrity of an error tolerant data item
Shoushtari et al. Secrecy coding in the integrated network enhanced telemetry (iNET)
US11196447B2 (en) Computer-implemented method for error-correction-encoding and encrypting of a file
Mihaljević A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding
Jin et al. Low transmission overhead for polar coding physical-layer encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination