CN1330353A - Information encryption method and system - Google Patents
Information encryption method and system Download PDFInfo
- Publication number
- CN1330353A CN1330353A CN 00109666 CN00109666A CN1330353A CN 1330353 A CN1330353 A CN 1330353A CN 00109666 CN00109666 CN 00109666 CN 00109666 A CN00109666 A CN 00109666A CN 1330353 A CN1330353 A CN 1330353A
- Authority
- CN
- China
- Prior art keywords
- encryption
- decryption
- key
- information
- decipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
An encription method for real-time synchronous transmission of image and sound over broadband multimedia network is disclosed, which features that different encryption and decryption algorithms are used for different information and different encryption and decryption algorithms are combined. Its advantages are high reliability, flexible delay and high system efficiency.
Description
The present invention relates to a kind of encryption method and system of information, particularly a kind of information transmission system that is applied to image, sound etc. is carried out real-time synchronous transmission is the encryption method and the system of multimedia wideband network for example.
In recent years, broadband network based on cable television network obtains develop rapidly and has vast potential for future development, it not only can improve message transmission rate greatly and transmission capacity is big, can support multiple services such as Digital Television, data broadcasting, video request program, videophone and online value-added service, satisfied the demand of users aspect the broadband high-speed communication, meanwhile to the higher requirement of the also corresponding proposition of encryption system.The present invention is mainly used in the multimedia wideband network that can carry out real-time synchronous transmission to image, sound etc., as shown in Figure 1.The information source here can be satellite television, adopt the program of different compression methods compressions, also can be multiple services such as video request program/quasi-video request program (VOD/NVOD), the Internet access.Information source becomes the transport stream that takies different frequency range through multiplexer, encrypt through encryption equipment then, become radiofrequency signal through the modulator up-conversion again, following transmission mode can be divided into 2 kinds, a kind of is to enter home gateway by two-way HFC net, and functions such as deciphering, demodulation, decompression all realize in home gateway.Home gateway is sent to televisor, home PC etc. as required.Another kind of transmission mode is delivered a letter breath by unidirectional HFC net under being, the information of uploading is passed through common telephone network.The information of uploading is given the loop receiver, carries out analysis and Control to controller then and passes to different subsystems.
Employed encryption system is based on maintaining secrecy of encryption method in above-mentioned network, fixing cryptographic services can only be provided, embodiment as shown in Figure 2, the data X of transmission is through encryption equipment, configuring cipher key K, (X K) makes X by expressly becoming ciphertext Y, passes through decipher again after finishing transmission by encryption function H, configuration decryption key k, be reduced to expressly X by decryption function h, wherein: ciphertext Y=H (X, K); Expressly X=h (Y, k), encryption function H equates with decryption function h, i.e. H=k, K can equate with k also can not wait, i.e. K=k, perhaps K ≠ k.
In the encryption system of existing broadband, H is a kind of fixing encryption mapping method, be immutable, usually adopt following method, as: the digital encryption standard DES (DataEncryption Standard) that the U.S. adopts, Marurer randomization password, the PIKE cryptographic algorithm, the Gifford cryptographic algorithm, stream cipher arithmetic and RC-5 algorithm by the quick software and hardware realization of the RC-4 of RSA company proposition, IDEA IDEA (International DataEncryption Algorithm), non-packet dedicated cryptographic algorithm SAFER-K64 (Secure AndFast Encryption Routine), the GOST cryptographic algorithm that the former Soviet states Bureau of Standards adopts, the SEAL (Software Encryption Algorithm) that IBM proposes, the CRAB algorithm of RSA lab design, the MP-T cipher system, the ELGamal cipher system, the ECC elliptic curve cryptosystem that Canada Certicom company proposes comprises IEEE P1363 and ANSI X9 standard, the McEliece cipher system, the Rabin cipher system, Williams cipher system or the like.The H function can only carry out a small amount of remainder adjustment under individual cases.The encryption system of more than telling about has deficiency in the following aspects:
(1) encryption method that a certain system is adopted is fixed, and when system changes, can't change corresponding encryption method, lacks dirigibility;
(2) length of the key K in the real-time encrypted system in broadband is fixed, and is cracked easily, uses inconvenient;
(3) because the encryption method that adopts is fixed,, be difficult for improving with the upgrading of system so reliability is fixed;
(4) have fixing time-delay, i.e. the certain time delay of this process need of Chuan Shu data encrypting and deciphering because the encryption method that adopts fixes, so can't satisfy that different system or system finish different task to the different requirements of time delay.Particularly for the system that need carry out real-time synchronous transmission to image, sound etc., existing encryption method will can't meet the demands because of ductility at that time;
(5) have fixing complexity, promptly,, cracked easily and lack dirigibility so the complicacy of this process of encryption and decryption is also fixed because the encryption method that adopts is fixed;
(6) different system adopts different encryption methods, encryption equipment and decipher between therefore different systems do not match, as shown in Figure 3, the decipher of system 2 can't be decrypted the encryption equipment of system 1, between system 1 and system 2, must change demoder during communication as need, thereby cause the waste of time, personnel and material.
Purpose of the present invention is just in order to overcome above deficiency, a kind of information transmission system that is applied to image, sound etc. is carried out real-time the synchronous transmission for example encryption method and the system of multimedia wideband network are provided, can improve the degree of reliability of encrypting, be applicable to the system that information is carried out synchronous transmission, and can solve the problem that to communicate by letter because encryption equipment does not match with decipher between different system.
In encryption method of the present invention; the Systems Operator can change elementary cell in real time; mode with series and parallel or two dimension, three-dimensional and multi-dimensional matrix on the basis of elementary cell constructs more complicated encryption system; realize the compound use of elementary cell encryption method; and adopt in real time and control; the method provides 2 repair and maintenance to protect factor in original system: the interweaving property that encrypt (1), the synchronism of (2) encryption and decryption makes it have higher reliability.
The present invention has the following advantages:
(1) the present invention can make the user use different systems or use the user of different system can direct dialogue;
(2) different encryption systems is interweaved use makes system have higher security;
(3) can adopt corresponding encryption method according to the demand of different task, thereby improve the arithmetic speed of system;
(4) can adopt corresponding encryption method according to the requirement to complexity of system, thereby improve the operational efficiency of system;
(5) the compound use of employing encryption method, thereby the security that improves system;
Owing to have above advantage, thereby reduce the cost of system;
In encryption method of the present invention, according to the different mining of cryptographic tasks with different cryptographic algorithm, according to same information or program are adopted different cryptographic algorithm in the different periods, use different several situations such as cryptographic algorithm according to ciphering process, on the basis of basic ciphering unit, construct complexity and the encryption system of tool dirigibility with series, parallel or alternate manner, can increase reliability, the security of encryption system, improve operational efficiency, reduce cost.
Below also the present invention is further illustrated in conjunction with the embodiments by accompanying drawing.
Fig. 1 is the synoptic diagram of the encryption system that adopts in the existing multimedia wideband network;
Fig. 2 is the theory diagram of existing encryption system;
Fig. 3 is in existing 2 communication systems because encryption equipment, decipher is not complementary and the synoptic diagram that can not communicate by letter;
Fig. 4 is the theory diagram of encryption method of the present invention;
Fig. 5 is the synoptic diagram that encryption method of the present invention is applied to broadband transmission network;
Fig. 6 is an example in the encryption method of the present invention that various cryptographic algorithm are multiplexing;
Fig. 7 is another example in the encryption method of the present invention that various cryptographic algorithm are multiplexing.
Emphasis of the present invention is at structure variable in time function H and configuring cipher key K, H is for encrypting the mapping method set in the present invention, be H=f (X, K, t), so native system can be according to the difference of required encrypted content, or in the different periods, adopt different algorithms to realize encryption and decryption and dispose corresponding key.For example, the information of price comparison costliness or program are used the algorithm construction function H of more complicated, can adopt simple algorithm to realize encrypting for general information or program; Another kind of situation can be used different algorithms at times to the information or the program of price comparison costliness, disposes different key K; The third situation, the different algorithm of different phase employing to ciphering process uses a kind of algorithm as producing key K, and transmission security key K uses another kind of algorithm.
The theory diagram of encryption system of the present invention is made up of four parts such as information source, key generator, encryption equipment, transmission channel, deciphers as shown in Figure 4.Fig. 5 represents that encryption system of the present invention is used for an example of broadband transmission network, and wherein, hardware components comprises information source, key generator, encryption equipment, transmission channel, decipher, control center.The H function of encryption equipment, decipher is combined by different cryptographic algorithm, forms to encrypt the mapping method set.In this embodiment, mainly enumerate 3 kinds of cryptographic algorithm commonly used: IDEA algorithm, RSA Algorithm, the DES algorithm, adopt mode in parallel to make up, these algorithms all are disclosed, and any disclosed algorithm all can carry out independent assortment and the not strict present embodiment that is limited to.The ciphering process that this encryption system is implemented is as follows:
(1) produces information transmitted by information source, also claim expressly;
(2) control the selection cryptographic algorithm by control center according to information feature, the DES algorithm is mainly used in the encryption of general information in the present embodiment, the IDEA algorithm can fast encrypt, and RSA Algorithm is a kind of security public key encryption algorithm preferably, can be used for the information encryption of comparison secret, as encryption to key;
(3) the algorithm configuration key K of being selected according to control center by key generator is sent into encryption equipment, decipher simultaneously;
(4) expressly finishing ciphering process by encryption equipment becomes ciphertext;
(5) ciphertext is transmitted by transmission channel;
(6) ciphertext is finished decrypting process by decipher and is become expressly.
In the present embodiment, key generator sends to key K, decryption key k in encryption equipment, the decipher simultaneously, makes encryption and decryption finish synchronously in real time.The transmission course of key can be undertaken by following 3 kinds of modes:
(1) key can be transferred in encryption equipment, the decipher by IC-card;
(2) can be placed on key in the secret envelope, transmit by the normal transmission channel;
(3) can adopt a kind of transmit leg and the take over party generation method of the key of agreement in advance, in encryption equipment and decipher, produce automatically simultaneously, realize in real time encryption and decryption synchronously.
(4) the encryption mapping function set H in the encryption equipment gathered h with the deciphering mapping function in the decipher and can equate also can not wait this moment, i.e. H=h, perhaps H ≠ h, key K can equal k simultaneously, also can be not equal to k, i.e. K=k, perhaps K ≠ k, the enforcement of not overslaugh present embodiment.
In the present embodiment, because control the selection cryptographic algorithm according to information feature by control center, send into encryption equipment, decipher simultaneously by the algorithm configuration key K that key generator is selected according to control center, so compare with the system of the fixing encryption method of in the past employing, advantage with flexible replacing encryption method, even between the different systems, by adopting method of the present invention, also can direct communication.And when system upgrade, also very strong adaptability can be arranged.
The algorithm of encryption equipment, decipher can also have 2 kinds of array modes in addition in the present embodiment, and respectively as Fig. 6, shown in Figure 7, these 2 kinds of array modes just form more complicated cryptographic algorithm, and total system is implemented encryption and decryption process did not influence.
More than be that example is illustrated with the multimedia wideband network, be noted that application of the present invention is not limited only to multimedia wideband network, every system that relates to information encryption all can use method and system of the present invention.
Claims (10)
1. method of information being carried out encryption and decryption, it is characterized in that,, adopt different encryption and decryption algorithms by for the different information contents, and dissimilar cryptographic algorithm or decipherment algorithm made up, come information transmitted is encrypted or deciphered.
2. the method for encryption and decryption according to claim 1 is characterized in that, described method can realize by following steps:
(1) produces information transmitted promptly expressly by information source;
(2) control selection cryptographic algorithm and decipherment algorithm according to information feature;
(3) by algorithm configuration key K, the decryption key k of key generator, send into encryption equipment, decipher simultaneously respectively according to selection in above-mentioned steps (2);
(4) will be expressly after ciphering process by encryption equipment becomes ciphertext and ciphertext transmitted by transmission channel, according to key the decrypting process of ciphertext by decipher become expressly.
3. the method for encryption and decryption according to claim 1 and 2 is characterized in that, described encryption, decrypting process are finished in real time synchronously.
4. the method for encryption and decryption according to claim 1 is characterized in that, uses different algorithms in the different period of information transmission.
5. the method for encryption and decryption according to claim 2 is characterized in that, the encryption function H in the encryption equipment equates with the decryption function h in the decipher, i.e. H=h.
6. the method for encryption and decryption according to claim 2 is characterized in that, encryption function H and the decryption function h in the decipher in the encryption equipment are unequal, i.e. H ≠ h.
7. the method for encryption and decryption according to claim 2 is characterized in that, key K equals decryption key k, i.e. K=k.
8. the method for encryption and decryption according to claim 2 is characterized in that, key K is not equal to decryption key k, i.e. K ≠ k.
9. the encryption and decryption system of an information, be applied to information be carried out system for transmitting by transmission channel, comprise: information source, produce the key generator of key, encryption equipment that information is encrypted, with the decipher that information encrypted is decrypted, it is characterized in that
Encryption function in the described encryption equipment is combined by different cryptographic algorithm;
Decryption function in the described decipher is combined by different decipherment algorithms;
Described encryption and decryption system also comprises control center, is used for selecting to determine the cryptographic algorithm of encryption equipment and the decipherment algorithm in the decipher.
10. encryption according to claim 9 and encryption system, it is characterized in that, algorithm configuration key K, decryption key k that described key generator is selected according to control center send into encryption equipment, decipher simultaneously respectively, and described encryption, decrypting process are finished in real time synchronously.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00109666 CN1330353A (en) | 2000-06-20 | 2000-06-20 | Information encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 00109666 CN1330353A (en) | 2000-06-20 | 2000-06-20 | Information encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1330353A true CN1330353A (en) | 2002-01-09 |
Family
ID=4579777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 00109666 Pending CN1330353A (en) | 2000-06-20 | 2000-06-20 | Information encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1330353A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100438388C (en) * | 2002-12-16 | 2008-11-26 | 中国电子科技集团公司第三十研究所 | Time-sharing gap encrypting-diencrypting technology suitable for group path channels |
CN101059957B (en) * | 2007-05-24 | 2011-06-22 | 华中科技大学 | An audio coding selective cryptographic method |
CN102158863A (en) * | 2011-02-18 | 2011-08-17 | 惠州Tcl移动通信有限公司 | System and method for authenticating JAVA-based mobile terminal, server and terminal |
CN1926800B (en) * | 2003-10-20 | 2011-11-16 | 伊索普株式会社 | Information encryption transmission/reception method |
CN102523087A (en) * | 2011-12-14 | 2012-06-27 | 百度在线网络技术(北京)有限公司 | Method and equipment for carrying out encrypting treatment on self-execution network information |
CN1985463B (en) * | 2004-07-09 | 2012-08-08 | 诺基亚公司 | Managing traffic keys during a multi-media session |
CN106850220A (en) * | 2017-02-22 | 2017-06-13 | 腾讯科技(深圳)有限公司 | Data ciphering method, data decryption method and device |
-
2000
- 2000-06-20 CN CN 00109666 patent/CN1330353A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100438388C (en) * | 2002-12-16 | 2008-11-26 | 中国电子科技集团公司第三十研究所 | Time-sharing gap encrypting-diencrypting technology suitable for group path channels |
CN1926800B (en) * | 2003-10-20 | 2011-11-16 | 伊索普株式会社 | Information encryption transmission/reception method |
CN1985463B (en) * | 2004-07-09 | 2012-08-08 | 诺基亚公司 | Managing traffic keys during a multi-media session |
CN101059957B (en) * | 2007-05-24 | 2011-06-22 | 华中科技大学 | An audio coding selective cryptographic method |
CN102158863A (en) * | 2011-02-18 | 2011-08-17 | 惠州Tcl移动通信有限公司 | System and method for authenticating JAVA-based mobile terminal, server and terminal |
CN102523087A (en) * | 2011-12-14 | 2012-06-27 | 百度在线网络技术(北京)有限公司 | Method and equipment for carrying out encrypting treatment on self-execution network information |
CN102523087B (en) * | 2011-12-14 | 2015-02-11 | 百度在线网络技术(北京)有限公司 | Method and equipment for carrying out encrypting treatment on self-execution network information |
CN106850220A (en) * | 2017-02-22 | 2017-06-13 | 腾讯科技(深圳)有限公司 | Data ciphering method, data decryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4907518B2 (en) | Method and system for generating transcodable encrypted content | |
US5907619A (en) | Secure compressed imaging | |
US8781967B2 (en) | Watermarking in an encrypted domain | |
EP0709760B1 (en) | Data copyright management system | |
CN1186731C (en) | Method and apparatus for protecting copyright data in computer system | |
EP3195519B1 (en) | Encoder, decoder and methods employing partial data encryption | |
JP2004504765A (en) | Secure packet-based data broadcasting architecture | |
JPH09200199A (en) | Method and device for generating ciphered signature using hash key | |
JP2003324418A (en) | Image processor, data process apparatus and method therefor | |
JP5437073B2 (en) | Method and apparatus for managing keys and method and apparatus for acquiring keys | |
KR20070022089A (en) | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content | |
JP2002510164A (en) | Method and apparatus for communicating a secret message to selected members | |
Raju et al. | Fast and secure real-time video encryption | |
CN1330353A (en) | Information encryption method and system | |
Mabruri | Data security system of text messaging based on android mobile devices using advanced encrytion standard dynamic s-box | |
US20020064278A1 (en) | High speed RSA public key cryptographic apparatus and method | |
JP4838809B2 (en) | Method for transmitting a message between a transmitter and at least one receiver, and a system for implementing this method | |
US7483535B2 (en) | Transmission of generalized scalable bit-streams | |
Aly et al. | A light-weight encrypting for real time video transmission | |
CN1355654A (en) | Encryption system for cable TV network | |
JP4667235B2 (en) | Data distribution / reception system and data distribution / reception method | |
Lindskog et al. | A content-independent scalable encryption model | |
JP3202544B2 (en) | Encryption communication device and encryption device | |
Mukherjee et al. | Format independent encryption of generalized scalable bit-streams enabling arbitrary secure adaptations [multimedia communication applications] | |
Baharon et al. | Secure video transcoding in mobile cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |