Encryption and decryption method for wireless communication, data transmission method and wireless communication system

A technology of wireless communication and encryption method, which is applied in the fields of wireless communication encryption and decryption, data transmission and wireless communication systems, which can solve problems such as increasing network burden, affecting encryption strength, and affecting transmission quality, so as to ensure security and reduce network burden , the effect of shortening the transmission time

Active Publication Date: 2020-02-11
SOUTH CHINA UNIV OF TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the method of information encryption is often used to improve the security level of data, but because the key is too short, it will affect the encryption strength, and if it is too long, it will affect the encryption speed, and the encryption of a large amount of data will also increase the network burden and prolong the existing wireless communication system. The transmission time affects the transmission quality, therefore, in order to solve the current problem, it is necessary to develop a new information security technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for wireless communication, data transmission method and wireless communication system
  • Encryption and decryption method for wireless communication, data transmission method and wireless communication system
  • Encryption and decryption method for wireless communication, data transmission method and wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] This embodiment discloses an encryption method for wireless communication, such as figure 1 As shown, the steps are as follows:

[0083] (1) For the transmission request initiated by the decrypting party, encrypt and authenticate the decrypting party, the process is as follows:

[0084] Step 1. For the received transmission request, extract a random number from the transmission request, and generate a random key according to the random number;

[0085] Step 2. Use the generated random key to initialize: Perform chaotic compression encryption on the random key. During the compression encryption process, count the number of occurrences of each character in the random key to obtain the random key. The probability of each character in the key appearing again;

[0086] Use the RSA encryption algorithm to encrypt the pre-stored encryption party authentication message and the random key generated by the random number to obtain the encrypted encryption party authentication me...

Embodiment 2

[0103] This embodiment discloses a wireless communication decryption method, such as figure 2 As shown, the steps are as follows:

[0104] (1) Initiate a transmission request to the encryption party, and perform encryption authentication on the encryption party. The encryption authentication process is as follows:

[0105] Step 1. After receiving the encrypted authentication message from the encryption party, use the preset RSA key to decrypt the encryption party authentication message encrypted by the RSA encryption algorithm, and obtain the decrypted encryption party authentication message and random key ;

[0106] Step 2. Initialize with a random key: Perform chaotic compression encryption on the random key. During the process of compression and encryption, count the number of occurrences of each character in the random key to obtain the The probability of each character appearing again;

[0107] Verify the decrypted encryption party authentication message, and perform ...

Embodiment 3

[0124] This embodiment discloses a data transmission method for wireless communication, the steps are as follows:

[0125] Step S1, the decryption party initiates a transmission request to the encryption party, and after the encryption party receives the transmission request initiated by the decryption party, encryption authentication is performed between the encryption party and the decryption party;

[0126] Among them, the encryption authentication process is as follows:

[0127] Step S11, the encrypting party extracts a random number from the received transmission request, and generates a random key according to the random number;

[0128] Step S12, the encryption party uses the generated random key to initialize: perform chaotic compression encryption on the random key, and in the process of compression encryption, count the number of occurrences of each character in the random key to obtain the probability of each character in the random key appearing again;

[0129] T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless communication encryption and decryption method, a data transmission method and a wireless communication system. The encryption method comprises the steps: carrying out the encryption authentication of a decryption party when the encryption method aims at a transmission request initiated by the decryption party; after the encryption authentication is completed, performing chaotic compression encryption on the to-be-transmitted original data to generate encrypted data; and encoding the encrypted data to obtain transmission data, and sending the transmission data to a decrypting party subjected to encryption authentication. The decryption method comprises the following steps: initiating a transmission request to an encryption party, and performing encryptionauthentication on the encryption party; after the encryption authentication is completed, performing packet loss detection and code screening on the received transmission data to obtain encrypted data; and performing chaotic decompression and decryption on the encrypted data to obtain original data. According to the encryption method, encryption of the transmission data is achieved, decryption ofthe transmission data is achieved through the decryption method, and safe data transmission is achieved between the encryption party and the decryption party.

Description

technical field [0001] The invention relates to the technical field of information security of data compression encryption, in particular to encryption and decryption of wireless communication, a data transmission method and a wireless communication system. Background technique [0002] With the rapid development of Internet of Things technology, Internet of Things devices are becoming more and more common in life, and the Internet of Things can be extended to any item and between items for information exchange and communication. Compared with traditional PCs, embedded devices have the characteristics of small size, low power consumption, and low cost. It has the characteristics of easy expansion and high adaptability. In the process of using IoT devices, more and more attention has been paid to the information security of their wireless transmission data. [0003] At present, the method of information encryption is often used to improve the security level of data, but bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/08H04L9/00H04L29/06H04L1/00
CPCH04W12/02H04W12/06H04L9/0869H04L9/0822H04L9/001H04L63/0442H04L63/123H04L1/004H04L1/0061H04W12/03H04W12/041
Inventor 陆以勤黄俊贤覃健诚程喆
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products