电信科学 ›› 2020, Vol. 36 ›› Issue (11): 89-97.doi: 10.11959/j.issn.1000-0801.2020304

• 研究与开发 • 上一篇    下一篇

多密钥加密方法设计

衷宇清,王浩,林泽兵,王敏,陈立业   

  1. 广东电网有限责任公司广州供电局,广东 广州 510699
  • 修回日期:2020-11-10 出版日期:2020-11-20 发布日期:2020-12-09
  • 作者简介:衷宇清(1968- ),男,广东电网有限责任公司广州供电局通信中心高级工程师,主要研究方向为电力通信|王浩(1986- ),男,广东电网有限责任公司广州供电局通信中心高级工程师,主要研究方向为电力通信|林泽兵(1988- ),男,广东电网有限责任公司广州供电局通信中心工程师,主要研究方向为电力通信|王敏(1971- ),女,广东电网有限责任公司广州供电局通信中心高级工程师,主要研究方向为电力通信|陈立业(1989- ),男,广东电网有限责任公司广州供电局通信中心工程师,主要研究方向为电力通信
  • 基金资助:
    中国南方电网有限责任公司科技项目(GZHKJXM20180038)

Design of multi-key encryption method

Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN   

  1. Guangzhou Power Supply Bureau of Guangdong Power Grid Co.,Ltd.,Guangzhou 510699,China
  • Revised:2020-11-10 Online:2020-11-20 Published:2020-12-09
  • Supported by:
    Science and Technology Project of China Southern Power Grid Co.,Ltd.(GZHKJXM20180038)

摘要:

为了提高信息传输过程中的安全性,对当前的加密方法进行了研究,并介绍了通过对密钥进行处理增加加密安全性的研究现状。根据数据在发送和加密过程中要进行分段和分组的原理,设计了一种多密钥加密的方法:由源密钥和随机数生成分段密钥组和分组密钥组,由序号按匹配算法为每个分段和分组的数据选取相应密钥,实现多个密钥对信息传输过程中的加密。最后,一方面通过MATLAB测试验证该方法的加密效率,另一方面从理论和数学角度分析该方法的安全性并和传统方法进行对比,得到结论:该方法不需要太多开销即可在传统方法的基础上增加安全性。

关键词: 信息安全, 加密, 密钥

Abstract:

In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.

Key words: information security, encryption, key

中图分类号: 

No Suggested Reading articles found!