CN118509227A - Data transmission method, device and system - Google Patents
Data transmission method, device and system Download PDFInfo
- Publication number
- CN118509227A CN118509227A CN202410694792.0A CN202410694792A CN118509227A CN 118509227 A CN118509227 A CN 118509227A CN 202410694792 A CN202410694792 A CN 202410694792A CN 118509227 A CN118509227 A CN 118509227A
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- encryption algorithm
- data
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Communication Control (AREA)
Abstract
The invention discloses a data transmission method, a device and a system, wherein the method comprises the following steps: encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data; determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information; encrypting the target coding information based on a second encryption algorithm to obtain second encryption information; encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information; and sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data. By the technical scheme of the embodiment of the invention, the possibility that the encryption algorithm is violently broken is reduced, and the safety of data transmission is improved.
Description
Technical Field
The present invention relates to the field of power grid data transmission technologies, and in particular, to a data transmission method, device, and system.
Background
Along with the continuous development of the intelligent power grid, in order to improve the efficiency of data transmission, a lot of important data are transmitted through opening up a power grid channel, and the transmission of a lot of important data on the power grid needs to ensure the safety of data transmission.
At present, the traditional data transmission mode generally adopts a single encryption algorithm to encrypt data to be transmitted, and the encryption grade can be improved by improving the complexity of the single algorithm, so that the safety of data transmission is ensured. However, such a single encryption algorithm may often be broken through violence, thereby reducing the security of data transmission.
Disclosure of Invention
The invention provides a data transmission method, a data transmission device and a data transmission system, which are used for reducing the possibility that an encryption algorithm is violently broken and improving the safety of data transmission.
In a first aspect, an embodiment of the present invention provides a data transmission method, applied to a transmitting end, including:
encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data;
determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information;
encrypting the target coding information based on a second encryption algorithm to obtain second encryption information;
encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information;
And sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data.
In a second aspect, an embodiment of the present invention provides a data transmission method, applied to a receiving end, including:
Obtaining second encryption information and third encryption information sent by a sending end, wherein the second encryption information is obtained by encrypting target coding information based on a second encryption algorithm by the sending end, the third encryption information is obtained by encrypting the second encryption algorithm by the sending end based on a third encryption algorithm, the target coding information is obtained by encoding information to be encoded based on a preset data format by the sending end, the information to be encoded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting the target data to be transmitted by the sending end based on the first encryption algorithm;
And decrypting the second encryption information and the third encryption information based on a first encryption algorithm and a third encryption algorithm to obtain the target data.
In a third aspect, an embodiment of the present invention further provides a data transmission device, integrated at a transmitting end, including:
The first encryption information determining module is used for encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data;
The target coding information determining module is used for determining information to be coded based on the target data and the first encryption information, and coding the information to be coded based on a preset data format to obtain target coding information;
the second encryption information determining module is used for encrypting the target coding information based on a second encryption algorithm to obtain second encryption information;
The third encryption information determining module is used for encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information;
And the data sending module is used for sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data.
In a fourth aspect, an embodiment of the present invention further provides a data transmission device, integrated at a receiving end, including:
The data receiving module is used for acquiring second encryption information and third encryption information sent by the sending end, wherein the second encryption information is obtained by encrypting target coding information based on a second encryption algorithm by the sending end, the third encryption information is obtained by encrypting the second encryption algorithm by the sending end based on a third encryption algorithm, the target coding information is obtained by encoding information to be encoded based on a preset data format by the sending end, the information to be encoded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting the target data to be transmitted by the sending end based on a first encryption algorithm;
And the target data acquisition module is used for decrypting the second encryption information and the third encryption information to acquire the target data.
In a fifth aspect, an embodiment of the present invention further provides a data transmission system, including: a transmitting end and a receiving end;
the sending end is used for realizing the data transmission method provided by the first aspect;
the receiving end is used for realizing the data transmission method as provided in the second aspect.
According to the technical scheme provided by the embodiment of the invention, the sending end encrypts the target data to be transmitted based on the first encryption algorithm to obtain the first encryption information corresponding to the target data. And determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information. And encrypting the target coding information based on a second encryption algorithm to obtain second encryption information. And encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information. And sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data. The target data to be transmitted is encrypted through the first encryption algorithm and the second encryption algorithm, and then the second encryption algorithm is encrypted through the third encryption algorithm, so that the possibility that the encryption algorithm is violently broken is greatly reduced, meanwhile, the complexity of data encryption is increased, and the safety of data transmission is effectively improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a data transmission method according to a first embodiment of the present invention;
FIG. 2 is an exemplary diagram of an encryption process according to one embodiment of the present invention;
fig. 3 is a flowchart of a data transmission method according to a second embodiment of the present invention;
Fig. 4 is a flowchart of a data transmission method according to a third embodiment of the present invention;
fig. 5 is a flowchart of a data transmission method according to a fourth embodiment of the present invention;
Fig. 6 is an exemplary diagram of a decryption process according to a fourth embodiment of the present invention;
Fig. 7 is a schematic structural diagram of a data transmission device according to a fifth embodiment of the present invention;
fig. 8 is a schematic structural diagram of a data transmission device according to a sixth embodiment of the present invention;
fig. 9 is a schematic structural diagram of a data transmission system according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "target," "current," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a data transmission method according to an embodiment of the present invention, where the embodiment is applicable to a situation where data transmission is required. As shown in fig. 1, the method may be performed by a data transmission device, which may be implemented in hardware and/or software, and integrated in a transmitting end.
As shown in fig. 1, the method specifically includes the following steps:
S110, encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data.
The first encryption algorithm may refer to a mathematical algorithm that converts data into an unreadable form to protect confidentiality of the data. For example, the first encryption algorithm may be an RSA (Rivest-Shamir-Adleman) encryption algorithm. The target data may refer to any form of plaintext data that needs to be securely transmitted, i.e., original data that has not been subjected to any encryption or encoding process. The first encryption information may refer to a result of encryption conversion of the target data, which exists in an unreadable or unintelligible format for ensuring confidentiality and security of the target data during transmission.
Specifically, as shown in fig. 2, the sending end encrypts the target data to be transmitted based on the first encryption algorithm, obtains an encrypted form of the target data after being processed by the first encryption algorithm, and determines the encrypted form of the target data as first encrypted information corresponding to the target data, thereby ensuring confidentiality of the target data.
S120, determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information.
The information to be encoded may refer to a new information set generated by combining or associating the target data and the first encryption information corresponding to the target data. The preset data format may refer to a preset data structure and organization manner for specifying how data should be encoded, stored, and transmitted. The target coding information may be information to be coded after being coded in a preset data format.
Specifically, as shown in fig. 2, partial data in the target data and the first encryption information may be combined, and the combination result may be determined as the information to be encoded. The method comprises the steps of encoding information to be encoded according to a preset data format to obtain target encoding information of the preset data format, so that a standardized data representation containing target data and an encrypted form of the target data is obtained, data transmission is facilitated, and accuracy and consistency of the data in the transmission process are ensured.
S130, encrypting the target coding information based on a second encryption algorithm to obtain second encryption information.
The second encryption algorithm may refer to a mathematical algorithm that converts data into an unreadable form to protect confidentiality of the data. For example, the second encryption algorithm may be ECC (Elliptic Curve Cryptography) encryption algorithm. The second encryption information may refer to a result of encryption conversion of the target encoding information, which exists in an unreadable or unintelligible format for ensuring confidentiality and security of the target encoding information during transmission.
Specifically, as shown in fig. 2, the transmitting end performs encryption operation on the target encoded information based on the second encryption algorithm, and converts the target encoded data into encrypted data that appears to be random, that is, the second encrypted information. Through two layers of encryption, even if one layer of encryption is cracked, an attacker still needs to face the challenge of the second layer of encryption, so that the confidentiality of data is greatly improved, and the risk of data leakage is reduced. It should be noted that the first encryption algorithm and the second encryption algorithm are different types of encryption algorithms, and have different security characteristics and advantages, thereby providing stronger overall security.
And S140, encrypting the second encryption algorithm based on the third encryption algorithm to obtain third encryption information.
The third encryption algorithm may refer to a text encryption method. For example, a third encryption algorithm may refer to converting characters to Unicode codes using UTF-8 encoding, and then adding a constant to these code values to obtain an encrypted ciphertext. The third encryption information may refer to a result of encryption conversion of the second encryption algorithm, which exists in an unreadable or unintelligible format for ensuring confidentiality and security of the second encryption algorithm during transmission.
Specifically, the transmitting end performs encryption operation on the second encryption algorithm based on the third encryption algorithm, and converts the second encryption algorithm into random-like encrypted data, namely third encryption information. Through three layers of encryption, even if one layer of encryption is cracked, an attacker still needs to face the challenges of the second layer of encryption and the third layer of encryption, so that the confidentiality of data is greatly improved, and the risk of data leakage is reduced. It should be noted that the first encryption algorithm, the second encryption algorithm and the third encryption algorithm are all different types of encryption algorithms, and have different security characteristics and advantages, so that stronger overall security is provided.
For example, S140 may include: determining encryption parameters corresponding to a second encryption algorithm based on the second encryption algorithm; and encrypting the encryption parameters based on a third encryption algorithm to obtain third encryption information.
Wherein the encryption parameter may refer to a specific value or setting for controlling the behavior of the second encryption algorithm, the encryption parameter defining various aspects of the encryption process of the second encryption algorithm, ensuring that the data is encrypted and decrypted in a desired manner. For example, the second encryption algorithm may be an ECC encryption algorithm, and then the encryption parameter is a constant term of the ECC encryption algorithm.
Specifically, based on the second encryption algorithm, a parameter for controlling the behavior of the second encryption algorithm in the second encryption algorithm is determined, and the parameter is determined as an encryption parameter corresponding to the second encryption algorithm. And encrypting the encryption parameters corresponding to the second encryption algorithm based on the third encryption algorithm, and obtaining the ciphertext after the encryption is completed, namely third encryption information. By re-encrypting the encryption parameters, double protection of the data is realized, and even if the encrypted data of the second encryption algorithm is intercepted, an attacker still needs to face the challenge of the third encryption algorithm, so that the difficulty of cracking is increased.
And S150, the second encryption information and the third encryption information are sent to the receiving end, so that the receiving end decrypts the second encryption information and the third encryption information to obtain target data.
Specifically, the transmitting end transmits the second encryption information and the third encryption information to the receiving end through a secure communication channel, so that the receiving end receives the second encryption information and the third encryption information from the transmitting end through corresponding communication interfaces and protocols, and decrypts the second encryption information and the third encryption information to obtain target data. Through the transmission of double encryption information, the data security is greatly enhanced, even if one layer of encryption is cracked, an attacker still needs to face the challenge of the other layer of encryption, the possibility that an encryption algorithm is violently cracked is greatly reduced, and meanwhile, the complexity of data encryption is increased, so that the data transmission security is effectively improved.
According to the technical scheme provided by the embodiment of the invention, the sending end encrypts the target data to be transmitted based on the first encryption algorithm to obtain the first encryption information corresponding to the target data. And determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information. And encrypting the target coding information based on a second encryption algorithm to obtain second encryption information. And encrypting the second encryption algorithm based on the third encryption algorithm to obtain third encryption information. And sending the second encryption information and the third encryption information to the receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain target data. The target data to be transmitted is encrypted through the first encryption algorithm and the second encryption algorithm, and then the second encryption algorithm is encrypted through the third encryption algorithm, so that the possibility that the encryption algorithm is violently broken is greatly reduced, meanwhile, the complexity of data encryption is increased, and the safety of data transmission is effectively improved.
The first encryption algorithm may be, for example, an RSA (Rivest-Shamir-Adleman) encryption algorithm. The encryption principle is as follows:
the RSA encryption algorithm consists of two keys, namely a public key and a private key.
① Preparing two very large prime numbers p and q (1024 binary bits or more after conversion into binary, the more the number of bits is, the more difficult to crack);
② Calculating the product n=p×q of the product of the large prime numbers p and q by using string simulation;
③ The same method calculates m= (p-1) (q-1), where m is the euler function of n;
④ Finding one e (1 < e < m), satisfying gcb (m, e) =1 (i.e. e and m each other);
⑤ Calculating the inverse d of e over the modulo-m domain (i.e. satisfying ed mod m=1);
⑥ So far, both the public key and the private key have been generated, the public key being (n, e) and the private key being (n, d).
For target data x, firstly encrypting x by using a public key, namely converting x into numbers (character strings take Unicode values), and then calculating y by power modulus, wherein y is ciphertext;
the sending end encrypts the target data and the first encryption information by using a key of a second encryption algorithm to obtain second encryption information, and the method comprises the following steps:
y=xemod n
in the decryption process, for the ciphertext y, the decryption process of y by using the private key (n, d) is inverse calculation power modulo.
x=ydmod n
The second encryption algorithm may be, for example, ECC (Elliptic Curve Cryptography) encryption algorithms. The encryption principle is as follows:
The ECC encryption algorithm uses elliptic curves: y 2=x3 +ax+b, encrypting; for curve Ep (a, b) representing y 2=x3 +ax+b (mod p), x, y e [0, p ], p being a prime number, which curve is symmetrical about the x-axis, two non-negative integers a, b smaller than p (p being prime number) are chosen, which satisfy the following condition 3a 3+27b2 noteq 0;
① The negative element of P (x, y) is (x, -y mod P) = (x, P-y);
② Three points P (x 1, y 1), Q (x 2, y 2) and R (x 3, y 3) (where R is the point of symmetry about the x-axis of the intersection of the PQ line and the curve, i.e. r=p+q) have the following relationship:
X3=k2-x1-x2(mod p)
Y3=k(x1-x3)-y1(mod p)
③ Slope calculation (p=q, i.e. key calculation P tangent, need derivative);
if p=q, then k= (3x2+a)/2 y1
If P+.Q, then k= (y 2-y 1)/(x 2-x 1)
Substituting a and b given by the elliptic curve into target coding information z to obtain a first ciphertext U;
and otherwise, when decryption is carried out, solving an inverse operation expression of the elliptic curve, and substituting the inverse operation expression into U to solve z.
Example two
Fig. 3 is a flowchart of a data transmission method according to a second embodiment of the present invention, where the step of determining information to be encoded based on target data and first encryption information is optimized based on the above embodiments. Wherein the explanation of the same or corresponding terms as those of the above embodiments is not repeated herein.
Referring to fig. 3, another data transmission method provided in this embodiment specifically includes the following steps:
s210, encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data.
S220, data interception is carried out on the target data, and local target data are obtained.
Specifically, the target data is subjected to data interception based on a preset interception rule to obtain local target data, wherein the preset interception rule may be an interception rule set in advance based on the position, the length, the type or other attributes of the target data. By intercepting local data in the target data, the data volume to be transmitted can be greatly reduced, so that network bandwidth and transmission time are saved, and further, data interception can allow only sensitive or critical parts in the target data to be transmitted, and other non-critical information is hidden, so that the safety of the data is further improved.
S230, combining the local target data and the first encryption information, determining information to be encoded, and encoding the information to be encoded based on a preset data format to obtain target encoding information.
Specifically, the intercepted local target data and the first encrypted information are combined, and the combination mode can be simple splicing, or encapsulation is performed according to a certain data structure or protocol, the combined information is determined as the information to be encoded, and the subsequent encoding processing is prepared. By intercepting the target data and combining the target data with the first encryption information, the reduction of the data transmission quantity and the protection of the sensitive information can be realized, and the flexibility of data transmission and the data processing efficiency are improved.
S240, encrypting the target coding information based on a second encryption algorithm to obtain second encryption information.
S250, encrypting the second encryption algorithm based on the third encryption algorithm to obtain third encryption information.
And S260, the second encryption information and the third encryption information are sent to the receiving end, so that the receiving end decrypts the second encryption information and the third encryption information to obtain target data.
According to the technical scheme, the local target data is obtained by carrying out data interception on the target data, and the local target data and the first encryption information are further combined to determine the information to be encoded. By combining the local target data with the first encryption information, the information to be encoded with specific meaning can be flexibly created, and the combination can be customized based on different business logic and security requirements, so that diversified data processing requirements can be met.
Example III
Fig. 4 is a flowchart of a data transmission method according to a third embodiment of the present invention, where the present embodiment is applicable to a situation where data transmission is required. As shown in fig. 4, the method may be performed by a data transmission device, which may be implemented in hardware and/or software, and integrated in the receiving end.
As shown in fig. 4, the method specifically includes the following steps:
S310, obtaining second encryption information and third encryption information sent by a sending end, wherein the second encryption information is obtained by encrypting target coding information based on a second encryption algorithm by the sending end, the third encryption information is obtained by encrypting the second encryption algorithm based on a third encryption algorithm by the sending end, the target coding information is obtained by encoding information to be coded based on a preset data format by the sending end, the information to be coded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting the target data to be transmitted by the sending end based on the first encryption algorithm.
Specifically, the receiving end receives the second encryption information and the third encryption information from the sending end through corresponding communication interfaces and protocols. Through the transmission of double encryption information, even if one layer of encryption is cracked, an attacker still needs to face the challenge of the other layer of encryption, so that the possibility that an encryption algorithm is violently cracked is greatly reduced, meanwhile, the complexity of data encryption is increased, and the safety of data transmission is effectively improved.
S320, decrypting the second encryption information and the third encryption information based on the first encryption algorithm and the third encryption algorithm to obtain target data.
Specifically, the receiving end firstly decrypts the received third encrypted information according to the third encryption algorithm, and configures the second encryption algorithm according to the decryption result to prepare to decrypt the second encrypted information. And the receiving end decrypts the second encrypted information by using a second encryption algorithm and a corresponding key to obtain target encoded information. By decrypting different encrypted information by using different encryption algorithms (a first encryption algorithm and a third encryption algorithm), the receiving end can verify the integrity and authenticity of the data sent by the sending end, which is helpful to enhance the security of data transmission and ensure the correctness and reliability of the data received by the receiving end.
According to the technical scheme, through network communication connection established with the receiving end, the second encryption information and the third encryption information sent by the sending end are obtained, and the second encryption information and the third encryption information are decrypted based on the first encryption algorithm and the third encryption algorithm, so that target data are obtained. By decrypting different encrypted information by using different encryption algorithms (a first encryption algorithm and a third encryption algorithm), the receiving end can verify the integrity and authenticity of the data sent by the sending end, which is helpful to enhance the security of data transmission and ensure the correctness and reliability of the data received by the receiving end.
Example IV
Fig. 5 is a flowchart of a data transmission method according to a fourth embodiment of the present invention, where the step of decrypting the second encryption information and the third encryption information based on the first encryption algorithm and the third encryption algorithm to obtain the target data is optimized based on the above embodiments. Wherein the explanation of the same or corresponding terms as those of the above embodiments is not repeated herein.
Referring to fig. 5, another data transmission method provided in this embodiment specifically includes the following steps:
s410, acquiring second encryption information and third encryption information sent by a sending end.
S420, decrypting the received third encryption information based on the third encryption algorithm, and determining a second encryption algorithm.
Specifically, as shown in fig. 6, the receiving end firstly decrypts the received third encrypted information according to the third encryption algorithm, and configures the second encryption algorithm by using the result obtained by decryption to determine the second encryption algorithm, thereby improving the flexibility of the second encryption algorithm and enhancing the security of data transmission.
Illustratively, S420 may include: decrypting the received third encryption information based on the third encryption algorithm, and determining encryption parameters corresponding to the second encryption algorithm; and combining the locally stored public parameters of the second encryption algorithm with the encryption parameters corresponding to the second encryption algorithm to obtain the second encryption algorithm.
Specifically, the receiving end decrypts the received third encrypted information by using the third encryption algorithm, if the decryption is successful, the encryption parameters corresponding to the second encryption algorithm are obtained, otherwise, the data may be indicated to be tampered. The receiving end retrieves the common parameters of the second encryption algorithm from the local storage or configuration file. These common parameters may include some fixed configuration of the algorithm, predefined initialization vectors, or other information that does not need to be kept secret but is critical to the encryption process. And combining the encrypted parameters obtained by decryption with the locally stored public parameters to form a complete second encryption algorithm configuration. This combining process may be to populate parameters into an algorithmic structure or object, or to organize the parameters in a particular format. By encrypting and transmitting the encryption parameters separately from the public parameters, the security of the data is further enhanced, and even if the third encryption information is cracked, an attacker cannot directly utilize the encryption parameters, because the encryption parameters are combined with the locally stored public parameters to form a complete encryption algorithm.
S430, decrypting the received second encryption information based on the second encryption algorithm to determine the first encryption information.
Specifically, the receiving end decrypts the received second encrypted information according to the configured second encryption algorithm, and in the decryption process, the second encryption algorithm performs inverse operation on the second encrypted information according to the encryption parameters and the public parameters corresponding to the second encryption algorithm to restore the first encrypted information. The received second encrypted information is decrypted through the second encryption algorithm to determine the first encrypted information, so that stronger data security protection is provided, the integrity and reliability of data are ensured, and the trust relationship between the sending end and the receiving end is enhanced.
For example, S430 may include: decrypting the received second encryption information based on a second encryption algorithm to obtain target coding information; disassembling the target coding information to obtain coding information corresponding to the first encryption information; decoding the coded information corresponding to the first encrypted information based on a preset data format to obtain the first encrypted information.
Specifically, the receiving end decrypts the received second encrypted information according to the configured second encryption algorithm, performs inverse operation on the second encrypted information to restore target coded information, disassembles the restored target coded information, and determines coded information corresponding to the first encrypted information in the target coded information. The receiving end decodes the coded information corresponding to the first encrypted information based on a preset data format, and the decoding process is to convert the coded information corresponding to the first encrypted information back to the original format or the data structure so as to restore the first encrypted information. The data compatibility between the transmitting end and the receiving end can be ensured by encoding and decoding through a preset data format.
S440, decrypting the first encryption information based on the first encryption algorithm to obtain the target data.
Specifically, the receiving end uses the prepared first encryption algorithm and the corresponding key to decrypt the restored first encryption information, and the decryption process involves performing inverse operation on the first encryption information to restore the target data. The first encryption information is decrypted through the first encryption algorithm, so that the safety of the target data in the transmission process can be ensured.
According to the technical scheme, the second encryption algorithm is determined by decrypting the received third encryption information based on the third encryption algorithm. And decrypting the received second encryption information based on the second encryption algorithm to determine the first encryption information. And decrypting the first encryption information based on the first encryption algorithm to obtain the target data. The second encryption algorithm is determined through the third encryption algorithm, then the first encryption information is determined through the second encryption algorithm, and finally the first encryption information is decrypted according to the first encryption algorithm to obtain target data, so that the process of performing layer-by-layer decryption based on the multi-layer encryption algorithm is realized to improve the safety of data transmission, and the possibility that the encryption algorithm is violently broken is greatly reduced.
Example five
Fig. 7 is a schematic structural diagram of a data transmission device according to a fifth embodiment of the present invention. As shown in fig. 7, the device is integrated at a transmitting end, and specifically includes: the first encryption information determining module 510, the target encoding information determining module 520, the second encryption information determining module 530, the third encryption information determining module 540, and the data transmitting module 550.
The first encryption information determining module 510 is configured to encrypt target data to be transmitted based on a first encryption algorithm, so as to obtain first encryption information corresponding to the target data;
The target coding information determining module 520 is configured to determine information to be coded based on the target data and the first encryption information, and code the information to be coded based on a preset data format to obtain target coding information;
A second encryption information determining module 530, configured to encrypt the target encoding information based on a second encryption algorithm, to obtain second encryption information;
A third encryption information determining module 540, configured to encrypt the second encryption algorithm based on a third encryption algorithm, to obtain third encryption information;
And the data sending module 550 is configured to send the second encrypted information and the third encrypted information to a receiving end, so that the receiving end decrypts the second encrypted information and the third encrypted information to obtain the target data.
According to the technical scheme of the embodiment, a sending end encrypts target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data. And determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information. And encrypting the target coding information based on a second encryption algorithm to obtain second encryption information. And encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information. And sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data. The target data to be transmitted is encrypted through the first encryption algorithm and the second encryption algorithm, and then the second encryption algorithm is encrypted through the third encryption algorithm, so that the possibility that the encryption algorithm is violently broken is greatly reduced, meanwhile, the complexity of data encryption is increased, and the safety of data transmission is effectively improved.
Optionally, the target coding information determining module 520 is specifically configured to: intercepting the target data to obtain local target data; and combining the local target data and the first encryption information to determine information to be encoded.
Optionally, the third encryption information determining module 540 is specifically configured to: determining encryption parameters corresponding to the second encryption algorithm based on the second encryption algorithm; and encrypting the encryption parameters based on the third encryption algorithm to obtain third encryption information.
The data transmission device provided by the embodiment of the invention can execute the data transmission method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example six
Fig. 8 is a schematic structural diagram of a data transmission device according to a sixth embodiment of the present invention. As shown in fig. 8, the device is integrated at the receiving end, and specifically includes: a data receiving module 610 and a target data acquisition module 620.
The data receiving module 610 is configured to obtain second encryption information and third encryption information sent by a sending end, where the second encryption information is obtained by encrypting target encoding information by the sending end based on a second encryption algorithm, the third encryption information is obtained by encrypting the second encryption algorithm by the sending end based on a third encryption algorithm, the target encoding information is obtained by encoding information to be encoded by the sending end based on a preset data format, the information to be encoded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting target data to be transmitted by the sending end based on a first encryption algorithm;
And a target data obtaining module 620, configured to decrypt the second encrypted information and the third encrypted information to obtain the target data.
According to the technical scheme, through network communication connection established with a receiving end, second encryption information and third encryption information sent by the sending end are obtained, and the second encryption information and the third encryption information are decrypted based on a first encryption algorithm and a third encryption algorithm, so that the target data are obtained. By decrypting different encrypted information by using different encryption algorithms (a first encryption algorithm and a third encryption algorithm), the receiving end can verify the integrity and authenticity of the data sent by the sending end, which is helpful to enhance the security of data transmission and ensure the correctness and reliability of the data received by the receiving end.
Optionally, the target data acquisition module 620 includes:
The second encryption algorithm determining unit is used for decrypting the received third encryption information based on a third encryption algorithm to determine a second encryption algorithm;
the first encryption information determining unit is used for decrypting the received second encryption information based on the second encryption algorithm to determine first encryption information;
And the target data acquisition unit is used for decrypting the first encryption information based on a first encryption algorithm to acquire the target data.
Optionally, the second encryption algorithm determining unit is specifically configured to: decrypting the received third encryption information based on a third encryption algorithm, and determining encryption parameters corresponding to a second encryption algorithm; and combining the locally stored public parameters of the second encryption algorithm with the encryption parameters corresponding to the second encryption algorithm to obtain the second encryption algorithm.
Optionally, the first encryption information determining unit is specifically configured to: decrypting the received second encryption information based on a second encryption algorithm to obtain target coding information; disassembling the target coding information to obtain coding information corresponding to the first encryption information; and decoding the coded information corresponding to the first encrypted information based on a preset data format to obtain the first encrypted information.
The data transmission device provided by the embodiment of the invention can execute the data transmission method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example seven
Fig. 9 is a schematic structural diagram of a data transmission system according to a seventh embodiment of the present disclosure, which is applicable to a situation where data transmission is required. As shown in fig. 9, the system specifically includes: a transmitting end 710 and a receiving end 720.
The transmitting end 710 is configured to implement the data transmission method provided in the first embodiment or the second embodiment; the receiving end 720 is configured to implement the data transmission method provided in the third embodiment or the fourth embodiment.
According to the data transmission system in the embodiment of the disclosure, the target data to be transmitted is encrypted based on the first encryption algorithm, so that first encryption information corresponding to the target data is obtained. And determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information. And encrypting the target coding information based on a second encryption algorithm to obtain second encryption information. And encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information. And sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data. The target data to be transmitted is encrypted through the first encryption algorithm and the second encryption algorithm, and then the second encryption algorithm is encrypted through the third encryption algorithm, so that the possibility that the encryption algorithm is violently broken is greatly reduced, meanwhile, the complexity of data encryption is increased, and the safety of data transmission is effectively improved.
The present embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a data transmission method as provided by any of the embodiments of the present invention.
The computer storage media of embodiments of the invention may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium may be, for example, but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present invention may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
It will be appreciated by those of ordinary skill in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be centralized on a single computing device, or distributed over a network of computing devices, or they may alternatively be implemented in program code executable by a computer device, such that they are stored in a memory device and executed by the computing device, or they may be separately fabricated as individual integrated circuit modules, or multiple modules or steps within them may be fabricated as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.
Claims (10)
1. A data transmission method, applied to a transmitting end, the method comprising:
encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data;
determining information to be encoded based on the target data and the first encryption information, and encoding the information to be encoded based on a preset data format to obtain target encoding information;
encrypting the target coding information based on a second encryption algorithm to obtain second encryption information;
encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information;
And sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data.
2. The method of claim 1, wherein the determining information to be encoded based on the target data and the first encryption information comprises:
Intercepting the target data to obtain local target data;
and combining the local target data and the first encryption information to determine information to be encoded.
3. The method of claim 1, wherein encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information comprises:
Determining encryption parameters corresponding to the second encryption algorithm based on the second encryption algorithm;
And encrypting the encryption parameters based on the third encryption algorithm to obtain third encryption information.
4. A data transmission method, applied to a receiving end, the method comprising:
Obtaining second encryption information and third encryption information sent by a sending end, wherein the second encryption information is obtained by encrypting target coding information based on a second encryption algorithm by the sending end, the third encryption information is obtained by encrypting the second encryption algorithm by the sending end based on a third encryption algorithm, the target coding information is obtained by encoding information to be encoded based on a preset data format by the sending end, the information to be encoded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting the target data to be transmitted by the sending end based on the first encryption algorithm;
And decrypting the second encryption information and the third encryption information based on a first encryption algorithm and a third encryption algorithm to obtain the target data.
5. The method of claim 4, wherein decrypting the second encrypted information and the third encrypted information based on the first encryption algorithm and the third encryption algorithm to obtain the target data comprises:
Decrypting the received third encryption information based on a third encryption algorithm to determine a second encryption algorithm;
Decrypting the received second encryption information based on the second encryption algorithm to determine first encryption information;
And decrypting the first encryption information based on a first encryption algorithm to obtain the target data.
6. The method of claim 5, wherein the decrypting the received third encrypted information based on the third encryption algorithm to determine a second encryption algorithm comprises:
Decrypting the received third encryption information based on a third encryption algorithm, and determining encryption parameters corresponding to a second encryption algorithm;
And combining the locally stored public parameters of the second encryption algorithm with the encryption parameters corresponding to the second encryption algorithm to obtain the second encryption algorithm.
7. The method of claim 5, wherein decrypting the received second encrypted information based on the second encryption algorithm to determine the first encrypted information comprises:
decrypting the received second encryption information based on a second encryption algorithm to obtain target coding information;
disassembling the target coding information to obtain coding information corresponding to the first encryption information;
And decoding the coded information corresponding to the first encrypted information based on a preset data format to obtain the first encrypted information.
8. A data transmission device integrated at a transmitting end, comprising:
The first encryption information determining module is used for encrypting target data to be transmitted based on a first encryption algorithm to obtain first encryption information corresponding to the target data;
The target coding information determining module is used for determining information to be coded based on the target data and the first encryption information, and coding the information to be coded based on a preset data format to obtain target coding information;
the second encryption information determining module is used for encrypting the target coding information based on a second encryption algorithm to obtain second encryption information;
The third encryption information determining module is used for encrypting the second encryption algorithm based on a third encryption algorithm to obtain third encryption information;
And the data sending module is used for sending the second encryption information and the third encryption information to a receiving end so that the receiving end decrypts the second encryption information and the third encryption information to obtain the target data.
9. A data transmission device, integrated at a receiving end, comprising:
The data receiving module is used for acquiring second encryption information and third encryption information sent by the sending end, wherein the second encryption information is obtained by encrypting target coding information based on a second encryption algorithm by the sending end, the third encryption information is obtained by encrypting the second encryption algorithm by the sending end based on a third encryption algorithm, the target coding information is obtained by encoding information to be encoded based on a preset data format by the sending end, the information to be encoded is determined by the sending end based on target data and first encryption information, and the first encryption information is obtained by encrypting the target data to be transmitted by the sending end based on a first encryption algorithm;
And the target data acquisition module is used for decrypting the second encryption information and the third encryption information to acquire the target data.
10. A data transmission system, the system comprising: a transmitting end and a receiving end; wherein,
The transmitting end is used for realizing the data transmission method according to any one of claims 1-3;
the receiving end is configured to implement the data transmission method according to any one of claims 4 to 7.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410694792.0A CN118509227A (en) | 2024-05-31 | 2024-05-31 | Data transmission method, device and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410694792.0A CN118509227A (en) | 2024-05-31 | 2024-05-31 | Data transmission method, device and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN118509227A true CN118509227A (en) | 2024-08-16 |
Family
ID=92238510
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410694792.0A Pending CN118509227A (en) | 2024-05-31 | 2024-05-31 | Data transmission method, device and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118509227A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118972173A (en) * | 2024-10-15 | 2024-11-15 | 联通在线信息科技有限公司 | A data interaction processing method and system |
-
2024
- 2024-05-31 CN CN202410694792.0A patent/CN118509227A/en active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118972173A (en) * | 2024-10-15 | 2024-11-15 | 联通在线信息科技有限公司 | A data interaction processing method and system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111131278B (en) | Data processing method and device, computer storage medium and electronic equipment | |
| CN110138739B (en) | Data information encryption method and device, computer equipment and storage medium | |
| CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
| CN102377566A (en) | Security processing device and system for electric meter data | |
| US7894608B2 (en) | Secure approach to send data from one system to another | |
| CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
| CN115499118A (en) | Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium | |
| CN107249002B (en) | Method, system and device for improving safety of intelligent electric energy meter | |
| CN105339995A (en) | Decoding device, decoding ability providing device, method thereof, and program | |
| CN115102768A (en) | Data processing method and device and computer equipment | |
| WO2024187999A1 (en) | Communication method for quantum direct communication, and quantum direct communication system | |
| CN112948867A (en) | Method and device for generating and decrypting encrypted message and electronic equipment | |
| CN118174967A (en) | Information verification method and related equipment | |
| CN115175178A (en) | Data security processing method of nuclear power station, 5G terminal and system | |
| CN117675189A (en) | Data encryption method, data decryption device and electronic equipment | |
| CN118509227A (en) | Data transmission method, device and system | |
| CN118157855A (en) | Information transmission encryption method and device and electronic equipment | |
| CN111490874B (en) | Distribution network safety protection method, system, device and storage medium | |
| CN113259438A (en) | Method and device for sending model file and method and device for receiving model file | |
| CN118784347A (en) | A method, system, device and medium for power grid information encryption and authentication | |
| CN115955306B (en) | Data encryption transmission method and device, electronic equipment and storage medium | |
| CN117097551A (en) | Industrial control system communication protocol security enhancement method, system, equipment and storage medium | |
| CN117375836A (en) | Encryption and decryption method and system for long text segment based on RSA encryption algorithm | |
| CN117294514A (en) | Data transmission encryption and decryption method and device, electronic equipment and medium | |
| CN117221878A (en) | Information security control method and device based on wireless network equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |