Implementation method and device for real-time transmission data encryption algorithm

A technology of real-time transmission and encryption algorithm, applied in transmission systems, interconnection devices, digital transmission systems, etc., can solve the problems of inability to achieve security protection, weak encryption strength, and easy to be analyzed and broken, so as to solve the problem of security threats, Overcome the effect of low security factor and secure encryption effect

Inactive Publication Date: 2012-06-27
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The encryption strength is too weak, it is easy to be analyzed and broken, and it cannot achieve the purpose of long-term security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device for real-time transmission data encryption algorithm
  • Implementation method and device for real-time transmission data encryption algorithm
  • Implementation method and device for real-time transmission data encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The implementation method and device of the encryption algorithm for real-time transmission data provided by the present invention use the constantly changing characteristics of the algorithm to replace the complexity of the algorithm, and perform multiple rounds of encryption iterations on the real-time transmission data to be encrypted to overcome the security brought by simple encryption The problem of low coefficient can achieve a safe encryption effect, thereby solving various security threats faced by real-time transmitted VoIP data.

[0028] see figure 1 It is a schematic structural diagram of the first embodiment of the device for implementing an encryption algorithm for real-time data transmission in an embodiment of the present invention;

[0029] The realization device of the encryption algorithm of described real-time transmission data comprises:

[0030] The algorithm storage module 1 is used to store an algorithm library with multiple algorithms; the stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a realization method for an encryption algorithm of real-time transmission data, which comprises determining the iterative rounds used to conduct the encryption algorithm for the real-time transmission data, selecting one of a plurality of algorithms in an algorithms library according to a key when in each round of encryption iteration, and conducting the encryption algorithm for real-time transmission data using the data pack as a unit by combining the key. The invention further discloses a realization device for the encryption algorithm of real-time transmission data. The method is adopted to overcome the problems of low security coefficient brought by the encryption and complexity of strong encryption, and realize the security encryption effect for the real-timetransmission data, thereby solving various security threat problems faced by real-timely transmitted VoIP data.

Description

technical field [0001] The invention relates to real-time transmission technology, in particular to a method and device for realizing an encryption algorithm for real-time transmission data. Background technique [0002] With the rapid development of broadband networks and the gradual popularization of triple play, a new business model based on IP network voice transmission (VoIP, Voice over Internet Protocol) technology has emerged in the current network technology, which is essentially A form of communication in which a user calls another user (which may be connected to the Internet or to a fixed-line network) through a terminal connected to the Internet. [0003] However, VoIP technology also has its many shortcomings. As we all know, voice data, as a special traffic in IP network, not only faces security threats such as viruses and attacks that are common in IP data networks, but also has unique security issues that it faces mainly: Threats such as denial of service (Do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28H04M7/00
Inventor 刘利锋王飞丁一鸣
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products