Encryption and decryption method, encryption and decryption apparatus and data transmitting system

An encryption method and encryption device technology, applied in the field of communication, can solve problems affecting OTN system performance, decrypted data errors, etc.

Inactive Publication Date: 2017-06-06
SANECHIPS TECH CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that the encryption and decryption method in the prior art has the situation of decryption data error, which affects the performance of the OTN syst...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, encryption and decryption apparatus and data transmitting system
  • Encryption and decryption method, encryption and decryption apparatus and data transmitting system
  • Encryption and decryption method, encryption and decryption apparatus and data transmitting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Embodiment 1 of the present invention provides an encryption method, which is applied to the encryption side, such as figure 1 As shown, the encryption method includes:

[0083] S101: Obtain the first key negotiated with the decryption side;

[0084] When the key for encrypting and decrypting transmitted OTN data in the OTN network needs to be updated, for example, when the key update period is reached, the encryption side and the decryption side perform key negotiation, so that the encryption side and the decryption side configure the same A key. After the key negotiation process between the encryption side and the decryption side is completed, the negotiated first key is obtained. Here, the negotiated key is an encryption and decryption algorithm such as AES, and the present invention does not limit the specific encryption and decryption algorithm. Moreover, the key negotiation process is an existing technology, and will not be repeated here.

[0085] In order to f...

Embodiment 2

[0105] Embodiment 2 of the present invention provides a decryption algorithm corresponding to the encryption algorithm in Embodiment 1, such as figure 2 As shown, the decryption method includes:

[0106] S201: Obtain the first key negotiated with the decryption side;

[0107] Here, when the key for encrypting and decrypting transmitted OTN data in the OTN network needs to be updated, for example, when the update period of the key is reached, the decryption side and the encryption side conduct key negotiation to obtain a new key, namely the first secret key. key, and obtain a new first key, in case the original second key key2 is switched to the first key key1, and the new key is used for decryption. Wherein, when key1 is configured on the decryption side, the same key1 is configured on the encryption side at the same time, so as to ensure that the encryption and decryption keys on the encryption side and the decryption side are consistent, and the decryption side can correct...

Embodiment 3

[0119] In order to implement the encryption method provided by the first embodiment above, the embodiment of the present invention provides an encryption device, such as image 3 As shown, the encryption device includes: a first master control module 301, a first slave control module 302, and an encryption module 303; wherein,

[0120] The first main control module 301 is configured to obtain the first key negotiated with the decryption side;

[0121] The first slave control module 302 is configured to perform a key switch mark on the currently sent optical transport network OTN data to obtain a key switch identification key after the handshake determines that the configuration of the first key on the local side and the decryption side is completed. Mark OTN data;

[0122] like image 3 As shown, the first slave control module 302 includes a first handshake sub-module 3021,

[0123] The first handshake submodule 3021 is configured to: receive the key update message sent by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method, an encryption and decryption apparatus and a data transmitting system. The method includes the following steps: an encryption side acquiring a first key which negotiates with a decryption side; if the configuration of the first key between local and the decryption side is determined to have completed through handshake, marking key changing on optical transmission network OTN data which is currently transmitted to obtain marked OTN data which is intended for marking key changing; using the first key to encrypt the marked OTN data and transmitting the encrypted OTN data to the decryption side which acquires the first key which negotiates with the encryption side; if the configuration of the first key between local and the encryption side is determined to have completed through handshake, monitoring whether the marked OTN data which is transmitted by the encryption side for marking key changing; if the marked OTN data is received, using the first key to decrypt the encrypted OTN data from the encryption side following the marked OTN data.

Description

technical field [0001] The present invention relates to the communication field, in particular to an encryption method, a decryption method and an encryption device. Decryption device and a data transmission system. Background technique [0002] In the process of implementing the technical solutions of the embodiments of the present application, the inventors of the present application at least found the following technical problems in the related art: [0003] The methods for encrypting and decrypting OTN data adopted by both sides of the existing optical transmission network (Optical Transmission Network, OTN) network are mainly divided into asymmetric algorithms and symmetric algorithms. For commonly used symmetric algorithms, such as Advanced Encryption Standard ( Advanced Encryption Standard, AES), also known as Rijndael encryption method, in the transmission of encrypted data on the OTN network side, the encryption side uses the initial key to encrypt the data to be e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14H04L9/32
CPCH04L9/08H04L9/14H04L9/32
Inventor 吕华磊
Owner SANECHIPS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products