CN116896461A - Quantum secret communication system - Google Patents
Quantum secret communication system Download PDFInfo
- Publication number
- CN116896461A CN116896461A CN202310834637.XA CN202310834637A CN116896461A CN 116896461 A CN116896461 A CN 116896461A CN 202310834637 A CN202310834637 A CN 202310834637A CN 116896461 A CN116896461 A CN 116896461A
- Authority
- CN
- China
- Prior art keywords
- characters
- data
- data packet
- address
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 86
- 238000012795 verification Methods 0.000 claims abstract description 50
- 238000012216 screening Methods 0.000 claims abstract description 43
- 238000012545 processing Methods 0.000 claims abstract description 40
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 238000007781 pre-processing Methods 0.000 claims abstract description 11
- 238000012217 deletion Methods 0.000 claims description 13
- 230000037430 deletion Effects 0.000 claims description 13
- 238000013075 data extraction Methods 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 claims description 7
- 101100309712 Arabidopsis thaliana SD11 gene Proteins 0.000 claims description 3
- 238000013524 data verification Methods 0.000 claims description 3
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000005215 recombination Methods 0.000 abstract description 3
- 230000006798 recombination Effects 0.000 abstract description 3
- 238000005336 cracking Methods 0.000 abstract description 2
- 238000011084 recovery Methods 0.000 abstract 1
- 238000000034 method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a quantum secret communication system, which comprises a sending end used for sending communication information and a receiving end used for receiving the communication information, wherein the sending end comprises a data acquisition unit, a preprocessing unit, a data processing unit and a data transmission unit. According to the quantum secret communication system, the preprocessing unit is arranged to add interference characters to the content of communication information, then scrambling processing is carried out, the safety of data transmission is improved, the safety of data transmission is guaranteed, the split communication characters are matched through sequence number marks, recovery and recombination of the communication information are facilitated, and the safety of quantum secret communication is further improved through multiple times of encryption of the communication information; and verifying through the verification model and generating a deleting signal, the scattered sheet data packet and the screening data packet can be removed rapidly, and communication data leakage caused by artificial malicious cracking of the stored scattered sheet data packet and the screening data packet is avoided.
Description
Technical Field
The invention relates to the technical field of secret communication, in particular to a quantum secret communication system.
Background
In recent years, new applications such as the internet of things, cloud computing, artificial intelligence, mobile internet and big data continue to develop, mobile data communication demands with large-scale and high real-time requirements are increased in an explosive manner, and higher requirements are put on transmission capacity of a communication system.
With the advent of new hacking techniques, more advanced electronic interception and information interception and tampering techniques, the security of information is greatly threatened, and data must be prevented from being tampered, so that unauthorized data modification can be found in time. Thus, the security of data transmissions has become a factor that must be considered by the design of communication systems.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a quantum secret communication system, which solves the problems in the background technology.
In order to achieve the above purpose, the invention is realized by the following technical scheme: a quantum secret communication system comprising a transmitting end for transmitting communication information and a receiving end for receiving communication information, wherein the receiving end contains unique ID information, the transmitting end comprising:
the data acquisition unit is used for acquiring the ID information of the receiving end and the communication information sent by the sender to the receiving end of the receiver through the sending end, and then respectively transmitting the ID information and the communication information of the receiving end to the data processing unit and the preprocessing unit;
the preprocessing unit is used for acquiring all characters in the communication information, then importing all characters into a pre-trained marking model, then integrating all characters by the marking model to obtain a plurality of groups of scattered sheet data packets, and then transmitting the scattered sheet data packets to the data verification unit;
the data processing unit is used for carrying out encryption processing on the scattered data packet and the screening data packet by utilizing a quantum key distribution technology to obtain a scattered data packet and a screening data packet, simultaneously obtaining a decryption key, then taking ID information of a receiving end as a subnet mask to generate an IP address read by the decryption key, then deleting the subnet mask generated by the ID information of the receiving end to obtain an address to be verified, and then transmitting the encrypted scattered data packet, the screening data packet and the address to be verified to the data transmission unit;
the data transmission unit is used for transmitting the encrypted scattered data packet, the screening data packet and the decryption key to the receiving end;
the receiving end comprises:
the data temporary storage unit is used for temporarily storing scattered data packets and screening data packets;
the key verification unit is used for receiving the address to be verified, importing the address to be verified into a pre-trained verification model for verification processing, acquiring a decryption key according to a verification processing result and sending the decryption key to the data extraction unit;
the data extraction unit is used for decrypting the scattered data packet and the screening data packet in the data temporary storage unit according to the decryption key and extracting the scattered data packet and the screening data packet to the read-out processing unit:
and the reading processing unit is used for guiding the screening data packet and the scattered data packet into a pre-trained reading model, and then acquiring complete communication information through the reading model.
Preferably, the preprocessing unit integrates the following processing modes:
after SS1, all characters are imported into a pre-trained marking model, the marking model marks all characters according to serial numbers of reading sequences from front to back and marks the characters as communication characters;
SS2, then, obtaining a plurality of inserted characters different from all the communication characters from the character library of the marking model;
binding all inserted characters into screening data packets at the same time;
SS3, then, disturbing the sequence of the communication characters and the inserted characters to generate a messy text, then, extracting quantitative characters from the messy text and binding to generate a group of scattered sheet data packets, and then, repeatedly extracting until all the characters in the messy text are extracted to obtain a plurality of groups of scattered sheet data packets;
SS4, then sends several groups of hash-chip packets and screening packets to the data processing unit.
Preferably, the key verification unit performs the following verification processing in the following manner:
SD1, importing an address to be verified into a pre-trained verification model;
SD2, the verification model acquires the ID information of the receiving end and converts the ID information into a subnet mask;
SD3, merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD4, then the verification model opens the new IP address and obtains the decryption key and sends the decryption key to the data extraction unit.
Preferably, the key verification unit is further configured to obtain a deletion signal according to a verification processing result, and then send the deletion signal to the data temporary storage unit, where the deletion signal is obtained in the following manner:
SD11, merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD12, then the verification model opens the new IP address and judges whether the new IP address contains decryption keys:
if the IP address contains the decryption key, acquiring the decryption key;
if the IP address does not contain the decryption key, a deletion signal is generated.
Preferably, the data temporary storage unit is further configured to delete the temporarily stored scattered data packet and the screened data packet according to the deletion signal.
Preferably, the reading mode of the reading model is as follows:
SA1, importing a screening data packet and a scattered data packet into a pre-trained reading model;
SA2, decompressing the screening data packet through a pre-trained reading model to obtain all inserted characters, and decompressing the scattered data packet through the pre-trained reading model to obtain messy text;
SA3, then, screening out characters which are repeated with all inserted characters from each character in the messy text by the pre-trained reading model, and deleting the characters which are repeated with the inserted characters in the messy text to obtain communication characters;
SA4, reading serial number marks of all communication characters according to a pre-trained reading model;
SA5, sequencing the communication characters corresponding to the sequence numbers according to the sequence from small to large, and then obtaining complete communication information.
Preferably, the receiving end further comprises a data display unit, which is used for displaying complete communication information at the receiving end.
Advantageous effects
The invention provides a quantum secret communication system. Compared with the prior art, the method has the following beneficial effects:
according to the invention, the preprocessing unit is arranged to add interference characters to the content of the communication information, then the scrambling processing is carried out, the safety of data transmission is improved, the safety of data transmission is ensured, and the split communication characters are matched through sequence number marks, so that the subsequent restoration and recombination of the communication information are facilitated;
the invention encrypts the communication information by using the quantum key distribution technology through the data processing unit, simultaneously uses the ID information of the receiving end as a subnet mask, and generates the address to be verified, so that the unspecified receiving end cannot acquire the decryption key, and further improves the safety of quantum secret communication by encrypting the communication information for a plurality of times;
the invention verifies through the verification model, judges whether to generate the decryption key according to the obtained new IP address, generates the deletion signal under the condition of not generating the decryption key, can rapidly reject scattered data packets and screening data packets, and avoids artificial malicious cracking of stored scattered data packets and screening data packets, thereby causing communication data leakage.
Drawings
FIG. 1 is a system block diagram of the present invention;
fig. 2 is a flow chart of the key verification unit of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As an embodiment of the invention
Referring to fig. 1, the present invention provides a technical solution: a quantum secret communication system comprises a sending end for sending communication information and a receiving end for receiving the communication information, wherein the receiving end comprises unique ID information;
the transmitting end comprises:
the data acquisition unit is used for acquiring the ID information of the receiving end and the communication information sent by the sender to the receiving end of the receiver through the sending end, and then respectively transmitting the ID information and the communication information of the receiving end to the data processing unit and the preprocessing unit;
the preprocessing unit is used for acquiring all characters in the communication information, then importing all characters into a pre-trained marking model, then integrating all characters by the marking model to obtain a plurality of groups of scattered sheet data packets, and then transmitting the scattered sheet data packets to the data verification unit;
the way of the integration treatment is as follows:
after SS1, all characters are imported into a pre-trained marking model, the marking model marks all characters according to serial numbers of reading sequences from front to back and marks the characters as communication characters;
SS2, then, obtaining a plurality of inserted characters different from all the communication characters from the character library of the marking model;
binding all inserted characters into screening data packets at the same time;
SS3, then, disturbing the sequence of the communication characters and the inserted characters to generate a messy text, then, extracting quantitative characters from the messy text and binding to generate a group of scattered sheet data packets, and then, repeatedly extracting until all the characters in the messy text are extracted to obtain a plurality of groups of scattered sheet data packets;
SS4, then sending the several groups of scattered packets and the screening packets to a data processing unit;
the preprocessing unit is arranged to add interference characters to the content of the communication information, then the scrambling processing is carried out, the safety of data transmission is improved, the safety of the data transmission is ensured, and the split communication characters are matched through sequence number marks, so that the subsequent restoration and recombination of the communication information are facilitated;
the data processing unit is used for carrying out encryption processing on the scattered data packet and the screening data packet by utilizing a quantum key distribution technology to obtain the scattered data packet and the screening data packet, and simultaneously obtaining a decryption key, then using ID information of a receiving end as a subnet mask to generate an IP address read by the decryption key, and then deleting the subnet mask generated by the ID information of the receiving end to obtain an address to be verified, wherein the quantum key distribution technology is the prior art, so that the description is omitted here;
the data processing unit is arranged to encrypt the communication information by using the quantum key distribution technology, meanwhile, the ID information of the receiving end is used as a subnet mask, and the address to be verified is generated, so that the unspecified receiving end cannot acquire the decryption key, and the security of quantum secret communication is further improved by encrypting the communication information for a plurality of times;
then transmitting the encrypted scattered data packet, the screening data packet and the address to be verified to a data transmission unit;
the data transmission unit is used for transmitting the encrypted scattered data packet, the screening data packet and the decryption key to the receiving end;
the receiving end comprises:
the data temporary storage unit is used for temporarily storing scattered data packets and screening data packets;
the key verification unit is used for receiving the address to be verified, importing the address to be verified into a pre-trained verification model for verification processing, then acquiring a decryption key according to a verification processing result and sending the decryption key to the data extraction unit, wherein the verification processing mode is as follows:
SD1, importing an address to be verified into a pre-trained verification model;
SD2, the verification model acquires the ID information of the receiving end and converts the ID information into a subnet mask;
SD3, merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD4, opening a new IP address by the verification model, acquiring a decryption key, and sending the decryption key to the data extraction unit;
the data extraction unit is used for decrypting the scattered data packet and the screening data packet in the data temporary storage unit according to the decryption key and extracting the scattered data packet and the screening data packet to the read-out processing unit:
the reading processing unit is used for guiding the screening data packet and the scattered data packet into a pre-trained reading model, then acquiring complete communication information through the reading model and sending the complete communication information to the data display unit; the reading mode of the reading model is as follows:
SA1, importing a screening data packet and a scattered data packet into a pre-trained reading model;
SA2, decompressing the screening data packet through a pre-trained reading model to obtain all inserted characters, and decompressing the scattered data packet through the pre-trained reading model to obtain messy text;
SA3, then, screening out characters which are repeated with all inserted characters from each character in the messy text by the pre-trained reading model, and deleting the characters which are repeated with the inserted characters in the messy text to obtain communication characters;
SA4, reading serial number marks of all communication characters according to a pre-trained reading model;
SA5, sequencing the communication characters corresponding to the sequence numbers according to the sequence from small to large, and then obtaining complete communication information;
the data display unit is used for displaying the complete communication information obtained after the processing;
as embodiment II of the present invention
Referring to fig. 2, the difference between this embodiment and the first embodiment is that the key verification unit further generates a deletion signal, specifically:
the key verification unit is used for receiving the address to be verified, importing the address to be verified into a pre-trained verification model for verification processing, acquiring a decryption key and/or a deletion signal according to a verification processing result, and then sending the decryption key and/or the deletion signal to the data extraction unit and/or the data temporary storage unit, wherein the verification processing mode is as follows:
SD11, importing an address to be verified into a pre-trained verification model;
SD12, the verification model acquires the ID information of the receiving end, and the ID information is converted into a subnet mask;
SD13, then merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD14, then the verification model opens the new IP address and judges whether the new IP address contains decryption keys:
if the IP address contains the decryption key, acquiring the decryption key and sending the decryption key to the data extraction unit;
if the IP address does not contain the decryption key, a deleting signal is generated, the deleting signal is led into the data temporary storage unit, and then the data temporary storage unit deletes the temporarily stored scattered data packet and the screened data packet according to the deleting signal;
and verifying through a verification model, judging whether to generate a decryption key according to the obtained new IP address, and generating a deleting signal under the condition that the decryption key is not generated, so that the scattered data packet and the screened data packet can be rapidly removed, and the stored scattered data packet and the screened data packet are prevented from being artificially and maliciously cracked, so that communication data leakage is caused.
And all that is not described in detail in this specification is well known to those skilled in the art.
The foregoing describes one embodiment of the present invention in detail, but the disclosure is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.
Claims (7)
1. A quantum secret communication system comprising a transmitting end for transmitting communication information and a receiving end for receiving communication information, wherein the receiving end contains unique ID information, the quantum secret communication system comprising:
the data acquisition unit is used for acquiring the ID information of the receiving end and the communication information sent by the sender to the receiving end of the receiver through the sending end, and then respectively transmitting the ID information and the communication information of the receiving end to the data processing unit and the preprocessing unit;
the preprocessing unit is used for acquiring all characters in the communication information, then importing all characters into a pre-trained marking model, then integrating all characters by the marking model to obtain a plurality of groups of scattered sheet data packets, and then transmitting the scattered sheet data packets to the data verification unit;
the data processing unit is used for carrying out encryption processing on the scattered data packet and the screening data packet by utilizing a quantum key distribution technology to obtain a scattered data packet and a screening data packet, simultaneously obtaining a decryption key, then taking ID information of a receiving end as a subnet mask to generate an IP address read by the decryption key, then deleting the subnet mask generated by the ID information of the receiving end to obtain an address to be verified, and then transmitting the encrypted scattered data packet, the screening data packet and the address to be verified to the data transmission unit;
the data transmission unit is used for transmitting the encrypted scattered data packet, the screening data packet and the decryption key to the receiving end;
the receiving end comprises:
the data temporary storage unit is used for temporarily storing scattered data packets and screening data packets;
the key verification unit is used for receiving the address to be verified, importing the address to be verified into a pre-trained verification model for verification processing, acquiring a decryption key according to a verification processing result and sending the decryption key to the data extraction unit;
the data extraction unit is used for decrypting the scattered data packet and the screening data packet in the data temporary storage unit according to the decryption key and extracting the scattered data packet and the screening data packet to the read-out processing unit:
and the reading processing unit is used for guiding the screening data packet and the scattered data packet into a pre-trained reading model, and then acquiring complete communication information through the reading model.
2. A quantum secret communication system according to claim 1, wherein: the pretreatment unit integrates the following treatment modes:
after SS1, all characters are imported into a pre-trained marking model, the marking model marks all characters according to serial numbers of reading sequences from front to back and marks the characters as communication characters;
SS2, then, obtaining a plurality of inserted characters different from all the communication characters from the character library of the marking model;
binding all inserted characters into screening data packets at the same time;
SS3, then, disturbing the sequence of the communication characters and the inserted characters to generate a messy text, then, extracting quantitative characters from the messy text and binding to generate a group of scattered sheet data packets, and then, repeatedly extracting until all the characters in the messy text are extracted to obtain a plurality of groups of scattered sheet data packets;
SS4, then sends several groups of hash-chip packets and screening packets to the data processing unit.
3. A quantum secret communication system according to claim 1, wherein: the key verification unit verifies the following processing mode:
SD1, importing an address to be verified into a pre-trained verification model;
SD2, the verification model acquires the ID information of the receiving end and converts the ID information into a subnet mask;
SD3, merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD4, then the verification model opens the new IP address and obtains the decryption key and sends the decryption key to the data extraction unit.
4. A quantum secret communication system according to claim 3, wherein: the key verification unit is further used for acquiring a deletion signal according to a verification processing result, and then sending the deletion signal to the data temporary storage unit, wherein the acquisition mode of the deletion signal is as follows:
SD11, merging the subnet mask of the receiving end of the verification model with the address to be verified to obtain a new IP address;
SD12, then the verification model opens the new IP address and judges whether the new IP address contains decryption keys:
if the IP address contains the decryption key, acquiring the decryption key;
if the IP address does not contain the decryption key, a deletion signal is generated.
5. A quantum private communication system according to claim 4, wherein: the data temporary storage unit is also used for deleting the temporarily stored scattered data packets and the screened data packets according to the deleting signal.
6. A quantum secret communication system according to claim 1, wherein: the reading mode of the reading model is as follows:
SA1, importing a screening data packet and a scattered data packet into a pre-trained reading model;
SA2, decompressing the screening data packet through a pre-trained reading model to obtain all inserted characters, and decompressing the scattered data packet through the pre-trained reading model to obtain messy text;
SA3, then, screening out characters which are repeated with all inserted characters from each character in the messy text by the pre-trained reading model, and deleting the characters which are repeated with the inserted characters in the messy text to obtain communication characters;
SA4, reading serial number marks of all communication characters according to a pre-trained reading model;
SA5, sequencing the communication characters corresponding to the sequence numbers according to the sequence from small to large, and then obtaining complete communication information.
7. A quantum secret communication system according to claim 1, wherein: the receiving end also comprises a data display unit which is used for displaying complete communication information at the receiving end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310834637.XA CN116896461A (en) | 2023-07-10 | 2023-07-10 | Quantum secret communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310834637.XA CN116896461A (en) | 2023-07-10 | 2023-07-10 | Quantum secret communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116896461A true CN116896461A (en) | 2023-10-17 |
Family
ID=88312968
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310834637.XA Pending CN116896461A (en) | 2023-07-10 | 2023-07-10 | Quantum secret communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116896461A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117394996A (en) * | 2023-11-14 | 2024-01-12 | 苏州格知量子科技有限公司 | Quantum security key distributing and encrypting-decrypting system |
-
2023
- 2023-07-10 CN CN202310834637.XA patent/CN116896461A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117394996A (en) * | 2023-11-14 | 2024-01-12 | 苏州格知量子科技有限公司 | Quantum security key distributing and encrypting-decrypting system |
CN117394996B (en) * | 2023-11-14 | 2024-08-02 | 苏州格知量子科技有限公司 | Quantum security key distributing and encrypting-decrypting system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1197023C (en) | Method and system for securely transferring data set in a data communications system | |
CN111555872B (en) | Communication data processing method, device, computer system and storage medium | |
US5960086A (en) | Unified end-to-end security methods and systems for operating on insecure networks | |
CN108229188A (en) | It is a kind of to be signed documents with tagged keys and verification method | |
CN105812366B (en) | Server, anti-crawler system and anti-crawler verification method | |
NO174730C (en) | Procedure for routing secret data keys to security modules and user cards in an information processing network | |
CN101803270A (en) | Method and system for data encryption | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
WO2000049764A1 (en) | Data authentication system employing encrypted integrity blocks | |
CN111698084B (en) | Block chain-based concealed communication method | |
HU227781B1 (en) | Symmetric key cryptographic apparatus and method for encryption and decryption of information | |
CN108471404A (en) | File sharing method, device, computer equipment and storage medium | |
CN101206542B (en) | Ciphering signature writing pad with press keys and display screen | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
CN111177763A (en) | Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption | |
CN107333262A (en) | A kind of system and method based on CN39 code authentication phone numbers | |
CN116455572B (en) | Data encryption method, device and equipment | |
CN116896461A (en) | Quantum secret communication system | |
CN104735094A (en) | Information separation based data security transmission system and method | |
US20080025497A1 (en) | Multiple key encryption with "Red Herrings" | |
CN107612678A (en) | A kind of steganography method based on network topology structure figure | |
CN201063641Y (en) | High safety encryption/decryption device including human information | |
CN114422230B (en) | Information transmission system based on data encryption | |
CN109379194A (en) | With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file | |
Othman | Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Using Linked List Concepts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |