Unlock instant, AI-driven research and patent intelligence for your innovation.

Key generation method and data encryption transmission method and system based on position combination

A technology for key generation and data transmission, applied in the field of cryptography, can solve the problem of occupying resources for sending data frames, and achieve the effect of reducing redundancy and complexity

Active Publication Date: 2019-09-20
STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +4
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The security of encryption is proportional to the length of the key. The longer the key, the better the encryption effect, but the key that is too long will occupy most of the resources of the sent data frame, especially when the sent data frame is very short. became a huge expense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and data encryption transmission method and system based on position combination
  • Key generation method and data encryption transmission method and system based on position combination
  • Key generation method and data encryption transmission method and system based on position combination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment discloses a key generation method based on location combination, the flow chart of which is as follows figure 1 shown, including the following steps:

[0038] Step 1: Determine the long key used for communication, the long key is a binary symbol sequence with a length of N; determine the short key length K and the position code length m, N>K>m; the short key is a binary symbol sequence whose length is K;

[0039] Step 2: Determine the position codebook, the position codebook includes a plurality of different position sequences and numbers corresponding to each position sequence, and each position sequence is arranged from K positions randomly selected from N positions;

[0040] The number of permutations for choosing K out of N is The number of the position sequence in the position codebook is Each element in the position sequence represents a symbol position in the long key.

[0041] In this embodiment, the length N of the long key is 4, the lengt...

Embodiment 2

[0053] This embodiment discloses a method for encrypting transmission data, such as image 3 shown, including:

[0054] Step 201, the sender generates an encryption key according to the key generation method in Embodiment 1;

[0055] Step 202, the sender uses the encryption key to encrypt the transmission data, and sends the encrypted data and the random short key to the receiver;

[0056] Step 203, the receiver decomposes the short key from the received data, analyzes the position code, calculates the number of the position sequence in the position codebook used to generate the encryption key, queries the position sequence, recovers the encryption key, and uses the recovered key key to decrypt the transmitted data.

[0057] In this embodiment, the data sent by the sender includes a short key with a length of K and encrypted data, and the encryption actually uses a key with a length of N, thus reducing the number of data frames sent in the data frame while ensuring the lengt...

Embodiment 3

[0064] This embodiment is an extension of Embodiment 1, a key generation method based on location combinations, such as Figure 5 shown, including the following steps:

[0065] Step 301: determine a plurality of different long keys and numbers thereof, the long key is a binary symbol sequence with a length of N; determine the short key length K and the position code length m, N>K>m; the The short key is a binary code element sequence of length K;

[0066] Step 302: Determine the position codebook, the position codebook includes a plurality of different position sequences and numbers corresponding to each position sequence, and each position sequence is arranged from K positions randomly selected from N positions;

[0067] Step 303: Randomly generate a binary symbol sequence with a length of K as a short key, randomly select one from a plurality of long keys, the first m bits of the short key are position codes, and query the number in the position codebook to match the m bits...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key generation method and a data encryption transmission method and system based on position combination, and the method comprises the steps: 1, determining a long key used for communication, and enabling the length of the long key to be N; determining a short key length K and a position code length m, N>K>m; 2, determining a position codebook, wherein the position codebook comprises a plurality of different position sequences and numbers corresponding to the position sequences, and each position sequence is formed by selecting K positions from N positions and arranging the K positions; and 3, randomly generating a short secret key with the length of K, taking m bits in front of the short secret key as position codes, inquiring a position sequence q with the number corresponding to the m bits of position codes in a position codebook, and carrying out operation on K code elements in the short secret key and code elements at K positions corresponding to the position sequence q in the long secret key to obtain an encryption secret key with the length of N. According to the method, the communication overhead required by the length of the data frame sending key can be reduced under the requirement of ensuring the encryption security.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a method and system for generating a key, and a method and system for encrypting and transmitting data using the key. Background technique [0002] Cryptography is an ancient and young science. With the development of information society, the role and status of information in social development is becoming more and more important. Everyone's life is inseparable from the generation, storage, processing and transmission of information. Business , finance and other fields pay more attention to the issue of information security. At the same time, the security of information system has become a strategic issue affecting social stability and national security. [0003] The security of encryption is proportional to the length of the key. The longer the key, the better the encryption effect, but the key that is too long will occupy most of the resources of the sent data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14H04L29/06
CPCH04L9/0819H04L9/0861H04L9/14H04L63/0435
Inventor 徐江涛贾骏胡成博张照辉徐阳刘子全路永玲张国江张军陶风波杨景刚刘洋王真吴斌
Owner STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST