CN101710964B - Method for enciphering and deciphering MPEG2 transport stream packets - Google Patents

Method for enciphering and deciphering MPEG2 transport stream packets Download PDF

Info

Publication number
CN101710964B
CN101710964B CN 200910109747 CN200910109747A CN101710964B CN 101710964 B CN101710964 B CN 101710964B CN 200910109747 CN200910109747 CN 200910109747 CN 200910109747 A CN200910109747 A CN 200910109747A CN 101710964 B CN101710964 B CN 101710964B
Authority
CN
China
Prior art keywords
grouping
bit
length
transport stream
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200910109747
Other languages
Chinese (zh)
Other versions
CN101710964A (en
Inventor
李新国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowei Group Shenzhen Co ltd
Original Assignee
Shenzhen State Micro Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen State Micro Technology Co Ltd filed Critical Shenzhen State Micro Technology Co Ltd
Priority to CN 200910109747 priority Critical patent/CN101710964B/en
Publication of CN101710964A publication Critical patent/CN101710964A/en
Application granted granted Critical
Publication of CN101710964B publication Critical patent/CN101710964B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a method for enciphering and deciphering MPEG2 transport stream packets. The method comprises the following steps of: based on the length of L bits, dividing the payload of transport stream packets into n subgroups of P1, P2, P3 till Pn; enciphering the ith subgroup Pi of the payload of the transport stream packets, and outputting the cipher subgroup Ci which is the enciphered result of the bit-by-bit XOR value of Pi and IVi-1 by using a secret key K, wherein n is less than n and not less than 1; if the length of the subgroup Pn is equal to L bits, the cipher subgroup Cn output after enciphering the subgroup Pn is the enciphered result of the bit-by-bit XOR value of Pn and IVn-1 by using the secret key K; and if the length t of the subgroup Pn is less than L bits, adding L-t zeros at the right of Pn, then XORing the result with added zeros and the enciphered result of IVn-1, and finally outputting the first t bits of the XOR result as the cipher of Pn (Cn). The invention has the advantages of high safety performance and easy implementation.

Description

The encryption and decryption method of MPEG2 transport stream data packet
Technical field
The present invention relates to the digital content protection technology, relate in particular to the encipher-decipher method that adopts the transport stream data packet of MPEG2 standard compression in a kind of digital interface content protective system.
Background technology
MPEG2 MPTS in the digital television broadcasting system is transferred to user side through radio network (wired, satellite or ground) after the front end scrambling.Typical ustomer premises access equipment adopts the separation between machine and card technology to receive MPTS: the MPTS of scrambling descrambling in smart card; MPTS behind the descrambling through the digital interface between smart card and the main frame (for example; PCMCIA; USB) arrive main frame, MPTS is accomplished demultiplexing, source coding and output in main frame.
As shown in Figure 1, MPTS is made up of continuous packet.Packet has the form of standard, and its total length is 188 bytes, and wherein preceding 4 bytes are packet packet header, next is optional elongated adaptation field, is the payload of some bytes at last.
In order to guarantee the fail safe of MPEG2 MPTS the time, need in card, the payload to MPTS encrypt again, and data packet head, adaptation field and total length of data packets remain unchanged through the digital interface between card and the main frame.Existing at present three standards define the encryption method here.
1, " CableCARD Copy Protection 2.0 Specification " adopt ECB (Electric Code Book, the electronic code book) pattern of TDES algorithm that the payload of transport stream data packet is encrypted in (2009-05-08); If the length of payload is not the integral multiple of 64 bits, need to use Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US005684876A) to keep fixing data packet length.
2, adopt CBC (Cipher Block Chaining, the link of the encrypted word group) pattern of aes algorithm data to be surrounded by effect load to encrypt in " CI Plus Specification:Content Security Extensions to the Common Interface.V1.2.2009-4-16 "; If the length of payload is not the integral multiple of 128 bits, adopt the method for transparent transmission tail data to keep fixing data packet length.
3, the CBC pattern that adopts aes algorithm in " Digital Video Broadcasting Content Protection Copy Management.Rev.1.2007-7 " is surrounded by data and imitates load and encrypt; If the length of payload is not the integral multiple of 128 bits, need to adopt other a kind of Cipher-Text Stealing technology (specifically seeing the U.S. Patent application of US20080137851A1) to keep fixing data packet length.
Said method all adopts the block cipher with fixing input length and fixing output length that the payload of packet is carried out encryption and decryption.The block length of supposing block cipher is the L bit, at first payload is divided into the grouping of some L bits when then encrypting, and then each grouping is encrypted.If the length of payload is not the integral multiple of block length L, then need special means to handle.In addition, the CBC pattern of employing block cipher has higher fail safe to the payload encryption of transport stream data packet than the employing ecb mode, adopts the Cipher-Text Stealing technology can effectively solve the problem that loaded length is not a block cipher block length integral multiple.
Summary of the invention
The present invention proposes a kind of encryption and decryption method of MPEG2 transport stream data packet; The present invention is based on block cipher; Can support two kinds of conventional cryptography patterns of CBC and PCBC, also support the higher FFM pattern of a kind of fail safe to encrypt, have the security performance height, realize simple advantage.
The present invention adopts following technical scheme to realize: a kind of encryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of transport stream data packet is divided into n grouping: P 1, P 2, P 3..., P nWherein preceding n-1 length of dividing into groups is the L bit, last grouping P nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: i grouping Pi to payload in the transport stream data packet carries out encryption, output ciphertext block C i, this ciphertext block C iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i>=1;
Step C: if grouping P nLength equal the L bit, then to grouping P nEncryption after the ciphertext block C that exports nFor using key K to P nWith IV N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P nLength t less than the L bit, at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as P nCiphertext C nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of transport stream data packet only constitutes a grouping P 1, then adopt the CFB pattern to P 1Encrypt, suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit as P 1Ciphertext C 1Output.
Wherein, when i=1, first grouping of encryption transport stream data packet P 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
In addition, the present invention discloses a kind of decryption method of MPEG2 transport stream data packet, and it comprises:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping (n>1): C 1, C 2, C 3..., C n, wherein preceding n-1 length of dividing into groups is the L bit, last grouping P nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet iCarry out decryption processing, the grouping P of i payload in the output transport stream packet i, this grouping P iFor to ciphertext block C iDecipher conversion earlier, again with IV I-1Obtain by the bit XOR, wherein, n>i>=1;
Step C: if last ciphertext block C nLength equal the L bit, then to grouping C nDecryption processing after the payload grouping P that exports nFor to ciphertext block C nDecipher conversion earlier, and and IV N-1Obtain by the bit XOR; If ciphertext block C nLength t less than the L bit, at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) intermediate variable of output, and IV iLength be L, and one of them input parameter Mode of conversion F value respectively when selecting CBC pattern, PCBC pattern and FFM pattern for use: 0,1 and 2.
Wherein, if the payload of the transport stream data packet of encrypting only constitutes a grouping C 1, then adopt the CFB pattern to C 1C is supposed in deciphering 1Length be t, t≤L is earlier at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet 1Output.
Wherein, when i=1, first grouping of decryption processing transport stream data packet C 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
Compared with prior art, the present invention has following beneficial effect:
The present invention is based on and divide into groups to encrypt or decryption processing, and support multiple encrypted work pattern, have the strong advantage of applicability.In addition; When the length of effective load is not the integral multiple of password block length; The present invention uses the method that is similar to the CFB pattern that the nubbin data are handled, and technological simple a lot of than Cipher-Text Stealing to the nubbin data processing method, and fail safe is equivalent to the CFB pattern.
Description of drawings
Fig. 1 is the composition structural representation of the MPTS of reference format;
Fig. 2 is the payload encryption method among the present invention;
Payload nubbin encryption method among Fig. 3 the present invention;
Payload decryption method among Fig. 4 the present invention;
Payload nubbin decryption method among Fig. 5 the present invention.
Embodiment
The invention provides a kind of encryption and decryption method of MPEG2 transport stream data packet payload.This method can provide 3 kinds of different encrypted patterns as required; Be respectively: CBC (Cipher Block Chaining; Cipher block chaining) pattern, PCBC (Propagating Cipher Block Chaining; The expansion cipher block chaining) pattern, than CBC and the higher a kind of encryption mode of PCBC fail safe, this case abbreviates the FFM pattern as.When the length of effective load is not the integral multiple of password block length; This method uses the method that is similar to the CFB pattern that the nubbin data are handled; And technological simple a lot of than Cipher-Text Stealing to the nubbin data processing method, fail safe is equivalent to the CFB pattern.
For ease of describing, elder generation is following to each parameter introduction of this case embodiment:
In this case embodiment, input parameter comprises: IV 0, mode parameter Mode, key K, P 1, P 2, P 3..., P nWherein, IV 0, mode parameter Mode and key K be the shared parameter between encryption side and the deciphering side; P 1, P 2, P 3.., P nBe the grouping situation of payload in the transport stream data packet, the n-1 of front length of dividing into groups all is the block length L of block cipher, last grouping P nLength smaller or equal to L.Encryption method of the present invention is output as ciphertext block: C 1, C 2, C 3..., C nWherein, preceding n-1 length of dividing into groups all is the block length L of block cipher, and the length of last grouping equals corresponding clear packets P nLength.E KIt is the enciphering transformation that key K limits.
In addition, the definition of the conversion F that relates in this case subsequent descriptions is following: the input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i>=1 here; The output of conversion F is intermediate variable IV i(i>=1), IV iLength be L.The value of mode parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.
Figure G200910109747XD00031
representative is by the bit XOR among the figure.When the Mode value is 0, and F (0, P i, C i, IV I-1)=C i, (i>=1); When the Mode value is 1, F ( 1 , P i , C i , IV i - 1 ) = P i ⊕ C i , ( i ≥ 1 ) ; When the Mode value is 2, F ( 2 , P i , C i , IV i - 1 ) = IV i - 1 ⊕ P i ⊕ C i , ( i ≥ 1 ) .
Encryption method of the present invention is when encrypting a MPEG2 transport stream data packet, and at first the payload with packet is divided into n grouping (n>1): P 1, P 2, P 3..., P nWherein preceding n-1 length of dividing into groups is the L bit, last grouping P nLength smaller or equal to the L bit.
As shown in Figure 2, if last grouping P nLength equal the L bit, then the cipher mode of n clear packets is consistent, promptly to i grouping P of payload in the MPEG2 transport stream data packet iThe ciphertext block C that exports after the encryption carries out (n>=i>=1) iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, can represent with following formula:
C i = E K ( P i ⊕ IV i - 1 ) , Wherein, IV i=F (Mode, P i, C i, IV I-1), n>=i>=1.
As shown in Figure 3, if last grouping P nLength less than the L bit, then before the cipher mode of n-1 clear packets be consistent, but last grouping P nAdopt the cipher mode of similar CFB pattern.Suppose grouping P nLength be t, t<L is at first at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit C n *As P nCiphertext C nOutput.Can represent with following formula:
C i = E K ( P i ⊕ IV i - 1 ) , Wherein, IV i=F (Mode, P i, C i, IV I-1), n-1>=i>=1;
C n * | | C n * * = E K ( IV n - 1 ) ⊕ P n | | 00 , C n=C n *
Certainly, if the payload of transport stream data packet only constitutes a grouping, promptly n=1 then adopts the CFB pattern to P 1Encrypt.Suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit C 1 *As P 1Ciphertext C 1Output.Can represent with following formula:
C 1 * | | C 1 * * = E K ( IV 0 ) ⊕ P 1 | | 00 , C 1 = C 1 * .
As shown in Figure 4, decryption method of the present invention has following input parameter: IV 0, mode parameter Mode, key K, C 1, C 2, C 3..., C nWherein, IV 0, Mode and K be the parameter that share encryption side and deciphering side; C 1, C 2, C 3..., C nBe the grouping of payload in the transport stream data packet of an encryption, the n-1 of front length of dividing into groups all is the block length L of block cipher, last grouping C nLength smaller or equal to L.Encryption method of the present invention is output as clear packets: P 1, P 2, P 3..., P nWherein, preceding n-1 length of dividing into groups all is the block length L of block cipher, and the length of last grouping equals corresponding ciphertext block C nLength.D KIt is the deciphering conversion that key K limits.The input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i>=1 here; The output of conversion F is intermediate variable IV i(i>=1), IV iLength be L.The value of parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively.
Figure G200910109747XD00044
is by the bit XOR.
Decryption method of the present invention is when the MPEG2 transport stream data packet of an encryption of deciphering, and at first the payload with packet is divided into n grouping (n>1): C 1, C 2, C 3..., C nWherein preceding n-1 length of dividing into groups is the L bit, last grouping P nLength smaller or equal to the L bit.
If last grouping C nLength equal the L bit, then the manner of decryption of n ciphertext block is consistent, promptly to ciphertext block C iDecipher conversion earlier, and and IV I-1Obtain the grouping P of i payload in the MPEG2 transport stream data packet by the bit XOR i, can represent with following formula:
P i = D K ( C i ) ⊕ IV i , Wherein, IV i=F (Mode, P i, C i, IV I-1), n>=i>=1.
As shown in Figure 5, if last ciphertext block C nLength less than the L bit, then before the manner of decryption of n-1 ciphertext block be consistent, but last grouping C nAdopt the manner of decryption of similar CFB pattern.Suppose grouping C nLength be t, t<L is at first at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit P n *As C nPlaintext P nOutput.Can represent with following formula:
P i = D K ( C i ) ⊕ IV i - 1 , Wherein, IV i=F (Mode, P i, C i, IV I-1), n-1>=i>=1;
P n * | | P n * * = E K ( IV n - 1 ) ⊕ C n | | 00 , P n = P n * .
Certainly, if the payload of the transport stream data packet of encrypting only constitutes a grouping, promptly n=1 then adopts the CFB pattern to C 1Deciphering.Suppose C 1Length be t, t≤L is at first at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit P 1 *As C 1Plaintext P 1Output.Can represent with following formula:
P 1 * | | P 1 * * = E k ( IV 0 ) ⊕ C 1 | | 00 , P 1 = P 1 * .

Claims (4)

1. the encryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of transport stream data packet is divided into n grouping: P 1, P 2, P 3..., P nWherein preceding n-1 length of dividing into groups is the L bit, last grouping P nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping P of payload in the transport stream data packet iCarry out encryption, output ciphertext block C i, this ciphertext block C iFor using key K to P iWith IV I-1Carry out the result of enciphering transformation by bit XOR value, wherein, n>i>=1;
Step C: if grouping P nLength equal the L bit, then to grouping P nThe ciphertext block C that exports after the encryption nFor using key K to P nWith IV N-1Carry out the result of enciphering transformation by bit XOR value; If grouping P nLength t less than the L bit, at P nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as P nCiphertext C nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) output intermediate variable, the definition of conversion F is following: the input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i>=1 here; IV iLength be L, the value of mode parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively, when i=1, first grouping of encryption transport stream data packet P 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
2. according to the encryption method of the said MPEG2 transport stream data packet of claim 1, it is characterized in that, if the payload of transport stream data packet only constitutes a grouping P 1, then adopt the CFB pattern to P 1Encrypt, suppose P 1Length be t, t≤L is at first at P 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit as P 1Ciphertext C 1Output.
3. the decryption method of a MPEG2 transport stream data packet is characterized in that, comprising:
Steps A: the payload of the MPEG2 transport stream data packet of encrypting is divided into n grouping: C 1, C 2, C 3..., C n, wherein preceding n-1 length of dividing into groups is the L bit, last grouping C nLength be less than or equal to the L bit, n is more than or equal to 1;
Step B: to i grouping C of payload in the transport stream data packet iCarry out decryption processing, i grouping P of payload in the output transport stream packet i, this grouping P iFor to ciphertext block C iDecipher conversion earlier, again with IV I-1Obtain by the bit XOR, wherein, n>i>=1;
Step C: if last ciphertext block C nLength equal the L bit, then to grouping C nDecryption processing after the payload grouping P that exports nFor to ciphertext block C nDecipher conversion earlier, again with IV N-1Obtain by the bit XOR; If ciphertext block C nLength t less than the L bit, at C nThe right mend L-t " 0 ", then with result after the zero padding and IV N-1The encrypted result XOR, at last with XOR result's preceding t bit as the payload P that divides into groups nOutput;
Wherein, IV iBe conversion F (Mode, P i, C i, IV I-1) output intermediate variable, the definition of conversion F is following: the input parameter of conversion F has 4, is respectively: IV I-1, P i, C iAnd Mode, i>=1 here; IV iLength be L, the value of mode parameter Mode has three: 0,1 and 2, represent CBC pattern, PCBC pattern and the FFM pattern of encryption method respectively, when i=1, first grouping of encryption transport stream data packet P 1Input parameter IV 0, and parameter Mode and key K all are shared parameters known between encryption side and the deciphering side.
4. according to the decryption method of the said MPEG2 transport stream data packet of claim 4, it is characterized in that, if the payload of the transport stream data packet of encrypting only constitutes a grouping C 1, then adopt the CFB pattern to C 1C is supposed in deciphering 1Length be t, t≤L is earlier at C 1The right mend L-t " 0 ", then with result after the zero padding and IV 0The encrypted result XOR, at last with XOR result's preceding t bit payload P as deciphering back transport stream data packet 1Output.
CN 200910109747 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets Expired - Fee Related CN101710964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910109747 CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910109747 CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Publications (2)

Publication Number Publication Date
CN101710964A CN101710964A (en) 2010-05-19
CN101710964B true CN101710964B (en) 2012-09-05

Family

ID=42403722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910109747 Expired - Fee Related CN101710964B (en) 2009-11-17 2009-11-17 Method for enciphering and deciphering MPEG2 transport stream packets

Country Status (1)

Country Link
CN (1) CN101710964B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102917250B (en) * 2012-11-08 2015-07-01 四川虹微技术有限公司 Audio and video transmission method for digital media interface
CN108063760B (en) * 2017-12-11 2020-06-16 苏州科达科技股份有限公司 Method and system for block encryption and method for block decryption
CN112769875B (en) * 2021-04-08 2022-08-12 中国测绘科学研究院 GNSS reference station data transmission and deformation monitoring and early warning method and system
CN115801321B (en) * 2022-10-20 2023-11-14 北京海泰方圆科技股份有限公司 Data combination encryption method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0674440A2 (en) * 1994-03-21 1995-09-27 NOKIA TECHNOLOGY GmbH A process for encryption and decryption of a bit stream containing digital information
EP1471743A1 (en) * 2002-01-30 2004-10-27 Sony Corporation Streaming system for distributing encrypted compressed image data and streaming method thereof
WO2005009040A2 (en) * 2003-07-16 2005-01-27 Stmicroelectronics Sa Method for encrypting an error-tolerance compressed audio or video stream
CN1675877A (en) * 2002-08-08 2005-09-28 松下电器产业株式会社 Encrypting/decrypting device and method, encrypting device and method, decrypting device and method, and transmitting/receiving device
US7103184B2 (en) * 2002-05-09 2006-09-05 Intel Corporation System and method for sign mask encryption and decryption
CN1914852A (en) * 2004-12-07 2007-02-14 索尼株式会社 Information processing device, information recording medium, information processing method, and computer program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0674440A2 (en) * 1994-03-21 1995-09-27 NOKIA TECHNOLOGY GmbH A process for encryption and decryption of a bit stream containing digital information
EP1471743A1 (en) * 2002-01-30 2004-10-27 Sony Corporation Streaming system for distributing encrypted compressed image data and streaming method thereof
US7103184B2 (en) * 2002-05-09 2006-09-05 Intel Corporation System and method for sign mask encryption and decryption
CN1675877A (en) * 2002-08-08 2005-09-28 松下电器产业株式会社 Encrypting/decrypting device and method, encrypting device and method, decrypting device and method, and transmitting/receiving device
WO2005009040A2 (en) * 2003-07-16 2005-01-27 Stmicroelectronics Sa Method for encrypting an error-tolerance compressed audio or video stream
CN1914852A (en) * 2004-12-07 2007-02-14 索尼株式会社 Information processing device, information recording medium, information processing method, and computer program

Also Published As

Publication number Publication date
CN101710964A (en) 2010-05-19

Similar Documents

Publication Publication Date Title
RU2439668C2 (en) Methods to scramble and to unscramble data units
US6504930B2 (en) Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm
US8259934B2 (en) Methods and devices for a chained encryption mode
KR101737299B1 (en) Encoder, decoder and methods
CN108123794A (en) The generation method and encryption method of whitepack key, apparatus and system
CN101710964B (en) Method for enciphering and deciphering MPEG2 transport stream packets
CN110427762B (en) Encryption and decryption method for realizing video security transmission of power monitoring system
CN101247520B (en) Video data enciphering/deciphering method
CN101005603A (en) Method and device for enciphering, deenciphering and transfer code of image data
Amorado et al. Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques
EP2904731B1 (en) Method and device for digital data blocks encryption and decryption
CN111556004A (en) Hybrid dual network encryption system
US11057193B2 (en) Enhanced randomness for digital systems
CN112532384A (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
CN101500146A (en) Digital television receiving control method and apparatus based on bi-directional network
CN111556003A (en) Dual network encryption system
CN101119170A (en) Frequency modulated subcarrier based user management method
Nayana et al. VLSI implementation of AES Encryption/Decryption Algorithm using FPGA
Verma et al. Analysis of comparison between Single Encryption(Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme
Li et al. Further Improvements of Fast Encryption Algoirthm for Multimedia.
CN103338105A (en) Method for AES-encryption-based airport noise prediction data network transmission
Nuthan et al. Development of Randomized Hybrid Crypto system
THWE Secure Information Exchange System for Criminal Cases
Jaleel et al. Optimization of AES Encryption Algorithm with SBox
Khaing et al. Image Encryption Based on AES Stream Cipher in Counter Mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 22A, Guoshi building, 1801 Shahe West Road, high tech Zone, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee after: GUOWEI GROUP (SHENZHEN) Co.,Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District high tech Industrial Park South high SSMEC building two floor

Patentee before: SHENZHEN STATE MICRO TECHNOLOGY Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120905