Key generation method and encrypted transmission data method and system based on position combination
A technology for key generation and data transmission, which is applied in the field of cryptography, can solve the problem of occupying the resources of sending data frames, etc., and achieve the effect of reducing redundancy and complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] This embodiment discloses a key generation method based on location combination, the flow chart of which is as follows figure 1 shown, including the following steps:
[0038] Step 1: Determine the long key used for communication, the long key is a binary symbol sequence with a length of N; determine the short key length K and the position code length m, N>K>m; the short key is a binary symbol sequence whose length is K;
[0039] Step 2: Determine the position codebook, the position codebook includes a plurality of different position sequences and numbers corresponding to each position sequence, and each position sequence is arranged from K positions randomly selected from N positions;
[0040] The number of permutations for choosing K out of N is The number of the position sequence in the position codebook is Each element in the position sequence represents a symbol position in the long key.
[0041] In this embodiment, the length N of the long key is 4, the lengt...
Embodiment 2
[0053] This embodiment discloses a method for encrypting transmission data, such as image 3 shown, including:
[0054] Step 201, the sender generates an encryption key according to the key generation method in Embodiment 1;
[0055] Step 202, the sender uses the encryption key to encrypt the transmission data, and sends the encrypted data and the random short key to the receiver;
[0056] Step 203, the receiver decomposes the short key from the received data, analyzes the position code, calculates the number of the position sequence in the position codebook used to generate the encryption key, queries the position sequence, recovers the encryption key, and uses the recovered key key to decrypt the transmitted data.
[0057] In this embodiment, the data sent by the sender includes a short key with a length of K and encrypted data, and the encryption actually uses a key with a length of N, thus reducing the number of data frames sent in the data frame while ensuring the lengt...
Embodiment 3
[0064] This embodiment is an extension of Embodiment 1, a key generation method based on position combination, such as Figure 5 shown, including the following steps:
[0065] Step 301: determine a plurality of different long keys and numbers thereof, the long key is a binary symbol sequence with a length of N; determine the short key length K and the position code length m, N>K>m; the The short key is a binary code element sequence of length K;
[0066] Step 302: Determine the position codebook, the position codebook includes a plurality of different position sequences and numbers corresponding to each position sequence, and each position sequence is arranged from K positions randomly selected from N positions;
[0067] Step 303: Randomly generate a binary symbol sequence with a length of K as a short key, randomly select one from a plurality of long keys, the first m bits of the short key are position codes, and query the number in the position codebook to match the m bits ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


