Encryption method and system based on information transmission

A technology of information transmission and encryption method, which is applied in the field of encryption, can solve the problems of poor security, poor information security, and no protection, etc., and achieve the effect of small dependence

Inactive Publication Date: 2019-11-19
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Plaintext transmission: no protection, poor security, low attack cost for attackers, poor information security, very easy to cause leakage of sensitive information transmitted
[0008] Transmission using an irreversible encryption algorithm: poor applicability, in some business scenarios, the receiver needs to obtain the original text, and the scope of use is small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system based on information transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Embodiment 1: Determine the character number N that is confused once based on the length of the original text; in the pre-defined encryption set, according to the character number N that is confused once, randomly select N confusing characters in turn to form the first confusing set;

[0057] When N is an odd number, all elements of the first confusion set are inserted sequentially in the original text from small to large odd-numbered column positions;

[0058] When N is an even number, then insert all elements of the first confusion set in sequence from small to large even column positions in the original text;

[0059] Obtain an obfuscated ciphertext after one obfuscated encryption, calculate the adding position of the next obfuscated character based on the length of the first obfuscated ciphertext, and insert the obfuscated characters to obtain a complete transmission ciphertext.

[0060] Among them, the number N of characters to be confused based on the length of th...

Embodiment 2

[0078] Embodiment 2: Based on the same inventive concept, the present invention also provides an encryption system based on information transmission, including:

[0079] A determination module is used to determine the number N of characters to be confused based on the length of the original text;

[0080] A building block, used to randomly select N obfuscated characters in sequence according to the number N of obfuscated characters in a predefined encryption set to form a first obfuscated set;

[0081] A primary obfuscation module, configured to insert all elements of the first obfuscation set according to the parity attribute of N, complete an obfuscation, and perform an obfuscation encryption on the original text after an obfuscation to obtain an obfuscated ciphertext;

[0082] The acquisition module is used to perform secondary obfuscation on the primary obfuscated ciphertext to obtain a complete transmission ciphertext.

[0083] Those skilled in the art should understand ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method and system based on information transmission. The encryption method comprises the steps: determining the number N of characters confused once based on the length of an original text; in a predefined encryption set, randomly and sequentially selecting N confused characters according to the number N of the characters confused once to form a first confusedset; inserting all elements of the first obfuscated set according to odd-even attributes of N to finish one-time obfuscation, and performing one-time obfuscation encryption on the original text afterone-time obfuscation to obtain a one-time obfuscated ciphertext; and carrying out secondary obfuscation on the primary obfuscated ciphertext to obtain a complete transmission ciphertext. The encryption method disturbs the attacker by adopting the multiple obfuscation strategies, so that the cracking cost of the attacker is increased; depending on a universal base64 algorithm and a random number algorithm, the encryption method is suitable for parameter transmission of various scenes; and compared with other technologies, the scheme is less in dependence and lighter in weight.

Description

technical field [0001] The present invention relates to an encryption method and system, in particular to an encryption method and system based on information transmission. Background technique [0002] The current transmission between systems is mainly through http and https transmission. When transmitting sensitive information, such as authentication information, passwords, phone numbers, personal identity information, personal property information, etc., the following methods are usually used: [0003] Clear text transmission without any action; [0004] Use irreversible encryption algorithm to encrypt transmission; [0005] The transmission is encrypted using a common reversible encryption algorithm. [0006] The disadvantages of the above three methods are as follows: [0007] Plain text transmission: without any protection, the security is poor, the attack cost is too low for the attacker, the information security is poor, and it is very easy to cause the leakage of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 杨鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products