﻿ 舰船数据链信息加密传输方法
 舰船科学技术  2022, Vol. 44 Issue (24): 153-156    DOI: 10.3404/j.issn.1672-7649.2022.24.032 PDF

Design of encrypted transmission method for ship data link information
XIE Fu-wen
College of Science and Technology, GanNan Normal University, Ganzhou 341000, China
Abstract: In the face of the hidden danger in the encryption transmission of ship data link information, the encryption transmission method of ship data link information is designed to improve the security of ship data link information. The ship data link information is converted into an encrypted bit stream, and the bit stream is encrypted by SM4 symmetric encryption algorithm to complete the encryption of ship data link information; After encapsulating the encrypted multi-source data package of the ship data link information and further improving its security, the intuitionistic fuzzy set is used to evaluate the information transmission environment of the ship data link, and the transmission protocol with high trust value is selected according to the evaluation results to complete the encryption transmission of the ship data link information. The experimental results show that the encryption transmission effect of the ship data link information is good under the condition of information scrambling, without information loss, and the information position is consistent with the ideal situation; It can realize effective encryption of ship data link information, and the information after encryption has high anti-interference performance.
Key words: ship data link     information encryption     transmission method     symmetrical grouping     encryption algorithm     transport protocol
0 引　言

1 舰船数据链信息的加密传输方法 1.1 舰船数据链信息加密方法

1）参数设置

S盒：S盒输出输入都是8 bit。

$y$ 表示输出， $x$ 表示输入， $Sbox$ 表示S盒运算，则S盒计算式为：

 $y = Sbox(x)。$ (1)

 $Y=\lambda (X)=(Sbox({x}_{0})\text{，}Sbox({x}_{1})\text{，}Sbox({x}_{2})\text{，}Sbox({x}_{3})) 。$ (2)

 $\begin{split} F =& L\left( Y \right) = Y \oplus \left( {Y < < < 2} \right) \oplus \left( {Y < < < 10} \right) \oplus\\ &\left( {Y < < < 18} \right) \oplus \left( {Y < < < 24} \right)。\end{split}$ (3)

 $T\left( {} \right) = L\left( {\lambda \left( {} \right)} \right)。$ (4)

2）轮函数

 $\begin{split} H( {{C_0},{C_1},{C_2},{C_3},rk} ) =& {C_0} \oplus T\left( {{C_1} \oplus {C_2} \oplus {C_3} \oplus rk} \right) =\\ & {C_0} \oplus L\left( {\lambda \left( {{C_1} \oplus {C_2} \oplus {C_3} \oplus rk} \right)} \right) 。\end{split}$ (5)

3）加密解密

SM4算法的加密解密都为32轮迭代架构，1个轮密钥仅与其中1轮相对应。将舰船数据链信息作为明文输入，设 $\left( {{C_0},{C_1},{C_2},{C_3}} \right) \in {\left( {Z_2^{32}} \right)^4}$ 表示该明文，明文长度为128 bit。轮密钥输入用 $r{k_i},i = 0,1, \cdots ,31,$ 描述，最后输出舰船数据链信息的比特流密文用 $( {D_0},{D_1}, {D_2}, {D_3}) \in {\left( {Z_2^{32}} \right)^4}$ 描述，舰船数据链信息比特流密文长度为128 bit。舰船数据链信息加密公式为：

 $\begin{split} {C_{i + 4}} = & H\left( {{C_i},{C_{i + }}_1,{C_{i + }}_2,{C_{i + }}_3,r{k_i}} \right) ={C_i} \oplus \\ &T\left( {{C_{i + }}_1 \oplus {C_{i + }}_2 \oplus {C_{i + }}_3 \oplus r{k_i}} \right)\;\;\;\;\; i = 0,1, \cdots ,31 。\end{split}$ (6)

 $\begin{split} \left( {{D_0},{D_1},{D_2},{D_3}} \right) =& Q\left( {{C_{32}},{C_{33}},{C_{34}},{C_{35}}} \right) =\\ &\left( {{C_{35}},{C_{34}},{C_{33}},{C_{32}}} \right) 。\end{split}$ (7)

 图 1 SM4算法的舰船数据链信息加密过程 Fig. 1 Encryption process of ship data link information based on SM4 algorithm

1.2 数据包封装处理

 图 2 数据包加密封装处理流程 Fig. 2 Data packet encryption encapsulation processing flow
1.3 传输环境评判方法及传输协议设计

1）利用舰船数据链信息传输属性对其传输环境实施信任判断。

2）利用专家评判法构建用 $W = \left( {{w_{\alpha \beta }}} \right)n*m$ 表示的评判矩阵，通过直觉模糊集方法构建用 $G=\left\{{g}_{1}, {g}_{2},\cdots {g}_{n}\right\}$ 表示的评判对象因素集合后，明确用 $U = \{ {u_1}, {u_2}, \cdots {u_m} \}$ 表示的适合评语集合。

3）构建直觉模糊评价矩阵，即任意因素 ${g_\alpha }$ $U$ 的直觉模糊评价矩阵用 ${w_\alpha } = \left\{ {{w_\alpha }_1,{w_\alpha }_2, \cdots {w_\alpha }_m} \right\}$ 描述，通常情况利用直觉模糊评判一级模型，可实现舰船数据链信息传输环境综合评判，公式如下：

 $O \cdot W = P = \left( {{p_1},{p_2}, \cdots {p_n}} \right) 。$ (8)

2 性能测试与分析

 图 3 信息置乱情况下本文方法加密传输结果 Fig. 3 Encrypted transmission results of this method in case of information scrambling

 图 4 舰船数据链信息加密结果 Fig. 4 Encryption results of ship data link information

 图 5 本文方法的信息加密抗攻击性结果 Fig. 5 Anti attack results of data encryption in this method
3 结　语

 [1] 张玉磊, 骆广萍, 张永洁, 等. 基于格式保留的敏感信息加密方案[J]. 计算机工程与科学, 2020, 42(2): 236-240. DOI:10.3969/j.issn.1007-130X.2020.02.007 [2] 杜俊逸, 肖磊, 周志恒. 基于部分空间耦合扰乱编码的数据链信息安全技术[J]. 电子科技大学学报, 2021, 50(3): 332-338. DOI:10.12178/1001-0548.2020444 [3] 张盼华, 张伟涛. 军事战术数据链信息传输技术研究[J]. 火力与指挥控制, 2020, 45(3): 167-170. DOI:10.3969/j.issn.1002-0640.2020.03.030 [4] 辜双佳, 刘万平, 黄东. 基于AES和QR的快递信息加密应用[J]. 计算机科学, 2021, 48(S2): 588-591+624. DOI:10.11896/jsjkx.210100024 [5] 任仪. 基于区块链与人工智能的网络多服务器SIP信息加密系统设计[J]. 计算机科学, 2020, 47(S1): 634-638.