Data encryption transmission method
A transmission method and data encryption technology, which is applied in digital transmission systems, transmission systems, and key distribution, can solve problems such as leakage and modification, and achieve the effect of secure connection establishment and data transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0169] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the connection establishment process provided by the present invention will be described in detail.
[0170] The present invention provides the authentication of the connection establishment process, including the following steps:
[0171] The client initiates a connection request;
[0172] After receiving the connection request, the server randomly generates a set of NxN state transition matrix A, NxM observation state probability matrix B, initial state transition probability vector Π, and observation sequence of the first HMM model λ1=(A,B,∏) O={o 1 ,o 2 ,...o T}; Randomly generate an observation sequence O={o 1 ,o 2 ,...o T}, where N is the number of states in the HMM model, and T is the length of the observation sequence.
[0173] According to the randomly generated first HMM model λ1=(A,B,∏) and the observation sequence O={o 1 ,o 2 ,...o T} get the password K1(O...
Embodiment 2
[0188] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.
[0189] The invention provides a method for encrypted data transmission, comprising the following steps:
[0190] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted D={d i} N , get the preliminary encryption vector D'={d' i} N ;
[0191] in, N is the number of states in the HMM model;
[0192] Replace the vector P with the vector of preliminary encrypted data α , let α T (i)=d' i ;
[0193] Among them, P α for α T (i) The vector formed, P α ={α T (i)} N , the password randomly generated and saved for the connection establishment process; the randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O=...
Embodiment 3
[0200] Refer to attached Figure 1-3 , according to a specific embodiment of the present invention, the data encryption transmission process provided by the present invention will be described in detail.
[0201] The invention provides a method for hiding and completing data in encrypted data transmission, comprising the following steps:
[0202] The sender uses the password in the connection establishment process to process the original vector data that needs to be encrypted and transmitted H={h i} N , get the preliminary encryption vector H'={h' i} N ;
[0203] in, N is the number of states in the HMM model;
[0204] Randomly given state transition matrix A=[a ij ] N×N , Observation result V={v 1 ,v 2 ,...,v N}, observation sequence O={o 1 ,o 2 ,...o T} and (N-2)xN data in the observation probability matrix B, N is the number of states in the HMM model, and T is the length of the observation sequence;
[0205] The initial encryption vector H'={h' i} N The v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


