Encryption method and device, equipment and storage medium

An encryption method and technology for encrypting data, applied in the field of communication security, can solve problems such as difficulty in supporting high-complexity encryption mechanisms and communication authentication, multi-system power consumption, computing resource consumption and bandwidth overhead, etc., to improve information security, avoid Eavesdropping and Attack Effects

Pending Publication Date: 2022-04-22
CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The increase in encryption key length and complexity will undoubtedly bring more system power consumption, computing resource consumption and bandwidth overhead
A large number of sensor nodes in the Internet of Things are resource-constrained, have the characteristics of low power consumption, low computing power, etc., and it is difficult to support high-complexity encryption mechanisms and communication authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, equipment and storage medium
  • Encryption method and device, equipment and storage medium
  • Encryption method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flow chart of an encryption method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of railway communication encryption, especially suitable for the situation of railway locomotive point-to-point communication encryption. This method can be executed by an encryption device. The device It can be realized by means of software and / or hardware, and can be integrated in electronic equipment carrying encryption functions, such as in a server, such as a railway locomotive vehicle networking system in a server. Optionally, the system includes on-board automatic protection (Automatic Train Protection, ATP) module, encryption management module, data processing module and data sending module.

[0030] Such as figure 1 As shown, the method may specifically include:

[0031] S110. Obtain data to be encrypted.

[0032] In this embodiment, the data to be encrypted refers to the data that needs to be encrypted, for ex...

Embodiment 2

[0049] figure 2 It is a flow chart of an encryption method provided by Embodiment 2 of the present invention. On the basis of the above embodiments, the "obtaining the target static key of the data to be encrypted from the physical layer static key store" is further optimized to provide a Optional implementation.

[0050] Such as figure 2 As shown, the method may specifically include:

[0051] S210. Obtain data to be encrypted.

[0052] S220. Acquire a candidate static key from a physical layer static key store.

[0053] In this embodiment, the candidate static key refers to a static key randomly selected from the physical layer static key store.

[0054] Specifically, a static key is randomly selected from the physical layer static key store as a candidate static key.

[0055] It should be noted that the static keys in the physical layer static key store will be updated periodically. Exemplarily, if the number of static keys in the static key storehouse of the physica...

Embodiment 3

[0068] image 3 It is a flow chart of an encryption method provided by Embodiment 3 of the present invention. On the basis of the above embodiments, "determine the target dynamic key according to the characteristics of the wireless channel when transmitting the data to be encrypted" is further optimized to provide an encryption method that can Choose an implementation.

[0069] Such as image 3 As shown, the method may specifically include:

[0070] S310. Obtain data to be encrypted.

[0071] S320. Obtain the target static key of the data to be encrypted from the physical layer static key store.

[0072] S330. If it is identified that the communication link for the data to be encrypted is established successfully, determine the target dynamic key according to the characteristics of the wireless channel when the data to be encrypted is transmitted.

[0073] In this embodiment, if it is recognized that the communication link of the data to be encrypted is successfully establ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method, device and equipment and a storage medium, and belongs to the technical field of communication security. The method comprises the following steps: acquiring to-be-encrypted data; obtaining a target static key of the to-be-encrypted data from a physical layer static key library; determining a target dynamic key according to a wireless channel characteristic when the to-be-encrypted data is transmitted; and according to the target static key and the target dynamic key, encrypting the to-be-encrypted data to obtain target encrypted data. According to the technical scheme, the information safety of point-to-point wireless communication of the railway locomotive is improved, eavesdropping and attacks of illegal users are avoided, and a new thought is provided for railway communication safety.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communication security, and in particular, to an encryption method, device, device, and storage medium. Background technique [0002] Due to the inherent openness of wireless channels, wireless communication systems are always facing the danger of being eavesdropped. In order to solve the problem of transmission security in wireless communication systems, the traditional method is to use data encryption to avoid interception of wireless communication data content and prevent effective information leakage. The encryption algorithms commonly used at this stage are mainly based on the principles of cryptography, relying on computational complexity, and encrypting information through the network layer and upper layer protocols. [0003] However, with the continuous improvement of computer computing power, especially the emergence of quantum computers, it is difficult for traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/122H04W12/106H04W12/041H04W4/42
CPCH04W12/03H04W12/122H04W12/106H04W12/041H04W4/42
Inventor 王啸阳周宇晖师进吴昊冯迎辰杨姝刘洪强马瑞
Owner CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products