Data block association encryption algorithm based on timestamps

An encryption algorithm and data block technology, applied in the field of data communication, to achieve the effect of simple calculation, guaranteed reliability and integrity, and small insertion delay

Active Publication Date: 2019-08-06
西安前观测控技术有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a time stamp-based data block association encryption algorithm to s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data block association encryption algorithm based on timestamps
  • Data block association encryption algorithm based on timestamps
  • Data block association encryption algorithm based on timestamps

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0069] In the public security video surveillance system, public or private network transmission is used between the video capture front end and the control center. For ease of description, the encryption decryptor near the video sending end is called an encryptor, and the encryption decryptor near the video receiving end is called a decryptor. The network port that the encryptor connects to the video source is called port A, the port that connects to the public network is called port B, the port that the decryptor connects to the public network is called port B, and the port that connects to the local area network is called port A.

[0070] The data collected by the video capture front end is transmitted to the server in the form of UDP packets. The UDP packet format is shown in Table 1. In this application example, the encryption / decryption device uses the algorithm of the present invention to encrypt and decrypt. In order not to affect the normal transmission of data packets on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data communication, and particularly relates to a data block association encryption algorithm based on timestamps. Hardware encoding and decoding devices are additionally arranged at a transmitting end and a receiving end of data, an address mapping technology is adopted to transform a transmitting data block, data and timestamp characteristics are hidden by adopting a mode of calculating CRC and timestamps, an encryption field is added to the data by adopting a secret key method, and then the data is transmitted. The data stream is decoded at areceiving end, and the safety of data communication is judged by utilizing the continuous characteristics of the timestamps. The method adopts replacement, CRC calculation, secret key calculation andtimestamp calculation adopted, calculation is simple, system resource consumption is low, the calculation method is very suitable for being achieved through a programmable device (FPGA), the calculation speed is high, the insertion delay is small, and the method is suitable for safe data transmission of a large-data-volume continuous real-time communication scene.

Description

Technical field [0001] The invention belongs to the technical field of data communication, and specifically relates to a data block associated encryption algorithm based on a timestamp. Background technique [0002] At present, during data transmission, the common data authentication method is to process and mark the data with data transformation or additional information for part or all of the content of the data block, so that it must be restored through certain rules. The emergence of blockchain technology provides an authentication method based on time sequence association between data blocks. [0003] The advantage of the above two data authentication methods is to ensure the authenticity and security of data transmission, but they each have their own limitations. The former is only for a certain data block itself, and lacks attention to the relationship between the data blocks; the latter is difficult to apply in the real-time communication process due to the complexity of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0618H04L9/3297
Inventor 康前望张渝洲李晓孺刘浩浩康瑞明刘春妮
Owner 西安前观测控技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products