Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 571-576.

• Interdiscipline & Application • Previous Articles     Next Articles

Application of Reserved Format Encryption Technology in InformationProcessing of Civil Aviation Information System

LIU Jun, LI Ze-hao, SU Guo-yu, LI Jing-wen   

  1. College of Computer Science and Technology,Civil Aviation University of China,Tianjin 300300,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: The usage of format-preserving encryption technology in the encryption of flight information,passenger information and ticket information was studied by choosing simple and effective algorithms such as FF1 algorithm,FF3 algorithm and a more flexible hybrid format encryption algorithm IFX.The functions of high bit offset,forward expansion,numerical indirect mapping,and using ID of database as random factors are used to optimize the function of the extended algorithm.While ensuring security,integrity and authenticity of the information,the internal format of flight data is kept,and the statistical analysis of civil aviation information is implemented without decryption,so as to reduce the risk of data leakage.

Key words: Flight information encryption, Format-preserving encryption, IFX

CLC Number: 

  • TP301
[1]么轶堃.浅谈民航电子商务及其信息安全[J].民航经济与技术,2000(6):60-62.
[2]PCI Security Standards Council.Payment Card Industry Data Security Standard[S].2006.
[3]刘哲理,贾春福,李经纬.保留格式加密模型研究[J].通信学报,2011,32(6):184-190.
[4]DWORKIN M.NIST Special Publication 800-38G,Recommen-dation for Block Cipher Modes of Operation:Methods for Format-Preserving Encryption[OL].https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38G.pdf.
[5]BELLARE M,RISTENPART T,ROGAWAY P.Format-Pre-serving encryption[C]∥Proc.of the Selected Areas in Cryptography (SAC 2009).LNCS 5867,Calgary:Springer-Verlag,2009:295-312.
[6]BLACK J,ROGAWAY P.Ciphers with arbitrary finite domains[C]∥Proc.of the Topics in Cryptology-CT-RSA 2002.LNCS 2271,San Jose:Springer-Verlag,2002:114-130.
[7]HOANG V T,ROGAWAY P.On generalized Feistel networks [C]∥Advances in Cryptology-CRYPTO 2010.LNCS 6223,Santa Barbara:Springer-Verlag,2010:613-630.
[8]王鹏.多类型数据保留格式加密技术的研究与实现[D].北京:北京邮电大学,2017.
[9]刘华宁.一类伪随机二进制数列的碰撞与雪崩效应[J].数学学报,2013,56(6):907-914.
[10]LIU Z L,JIA C F,LI J W,et al.Format-Preserving encryption for datetime[C]∥Proc.of the Intelligent Computing and Intelligent Systems 2010.Xiamen:IEEE Press,2010:201-205.
[11]SCHROEPPEL R.Hasty Pudding Cipher specification [OL].http://richard.schroeppel.name:8015/hpc/hpc-spec.
[12]LISKOV M,RIVEST R,WAGNER D.Tweakable block ciphers[C]∥Advances in Cryptology—CRYPTO2002,Lecture Notes in Computer Science 2442.Berlin:Springer,2002:31-46.
[13]姚远.信息系统数据遮蔽实现方式[J].软件导刊,2014,13(5):156-158.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] SHAO Zi-hao, YANG Shi-yu, MA Guo-jie. Foundation of Indoor Information Services:A Survey of Low-cost Localization Techniques [J]. Computer Science, 2022, 49(9): 228-235.
[3] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[4] SUN Gang, WU Jiang-jiang, CHEN Hao, LI Jun, XU Shi-yuan. Hidden Preference-based Multi-objective Evolutionary Algorithm Based on Chebyshev Distance [J]. Computer Science, 2022, 49(6): 297-304.
[5] WANG Yong, CUI Yuan. Cutting Edge Method for Traveling Salesman Problem Based on the Shortest Paths in Optimal Cycles of Quadrilaterals [J]. Computer Science, 2022, 49(6A): 199-205.
[6] LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222.
[7] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Clustered Federated Learning Methods Based on DBSCAN Clustering [J]. Computer Science, 2022, 49(6A): 232-237.
[8] HU Cong, HE Xiao-hui, SHAO Fa-ming, ZHANG Yan-wu, LU Guan-lin, WANG Jin-kang. Traffic Sign Detection Based on MSERs and SVM [J]. Computer Science, 2022, 49(6A): 325-330.
[9] YANG Jian-nan, ZHANG Fan. Classification Method for Small Crops Combining Dual Attention Mechanisms and Hierarchical Network Structure [J]. Computer Science, 2022, 49(6A): 353-357.
[10] ZHANG Jia-hao, LIU Feng, QI Jia-yin. Lightweight Micro-expression Recognition Architecture Based on Bottleneck Transformer [J]. Computer Science, 2022, 49(6A): 370-377.
[11] WANG Fang-hong, FAN Xing-gang, YANG Jing-jing, ZHOU Jie, WANG De-en. Strong Barrier Construction Algorithm Based on Adjustment of Directional Sensing Area [J]. Computer Science, 2022, 49(6A): 612-618.
[12] TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644.
[13] LIU Jian-mei, WANG Hong, MA Zhi. Optimization for Shor's Integer Factorization Algorithm Circuit [J]. Computer Science, 2022, 49(6A): 649-653.
[14] CHEN Bo-chen, TANG Wen-bing, HUANG Hong-yun, DING Zuo-hua. Pop-up Obstacles Avoidance for UAV Formation Based on Improved Artificial Potential Field [J]. Computer Science, 2022, 49(6A): 686-693.
[15] ZHANG Zhi-long, SHI Xian-jun, QIN Yu-feng. Diagnosis Strategy Optimization Method Based on Improved Quasi Depth Algorithm [J]. Computer Science, 2022, 49(6A): 729-732.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!