计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 588-591.doi: 10.11896/jsjkx.210100024

• 信息安全 • 上一篇    下一篇

基于AES和QR的快递信息加密应用

辜双佳1, 刘万平1, 黄东2   

  1. 1 重庆理工大学计算机科学与工程学院 重庆400054
    2 重庆机电职业技术大学信息工程学院 重庆402760
  • 出版日期:2021-11-10 发布日期:2021-11-12
  • 通讯作者: 刘万平(wpliu@cqut.edu.cn)
  • 作者简介:1219826515@qq.com
  • 基金资助:
    重庆市教育委员会科学技术研究项目(KJQN201901101);重庆理工大学研究生创新项目资助(CLGYCX 20203119)

Application of Express Information Encryption Based on AES and QR

GU Shuang-jia1, LIU Wan-ping1, HUANG Dong2   

  1. 1 College of Computer Science and Engineering,Chongqing University of Technology,Chongqing 400054,China
    2 Information Engineering Institute,Chongqing Vocational and Technical University of Mechatronics,Chongqing 402760,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:GU Shuang-jia,born in 1994,postgraduate.Her main research interests include information security,cryptography and deep learning.
    LIU Wan-ping,born in 1986,Ph.D,associate professor,research supervisor,is a member of China Computer Federation.His main research interests include cyberspace security dynamics and information security.
  • Supported by:
    Science and Technology Research Project of Chongqing Education Commission(KJQN201901101) and Graduate Student Innovation Program of Chongqing University of Technology(CLGYCX 20203119).

摘要: 随着电商的迅速开展,快递行业特别火爆。大量用户取完快递后习惯性将未经处理的快递盒随手扔掉,此时快递单上大量的用户明文隐私信息将面临被泄露的风险。AES算法是对称密码算法,具备算法简单易实现、加解密速度快、安全性高等特点,是加密快递业用户明文信息的理想算法。QR码(快速响应二维码)具有安全性高、读取数据速度快、可在小空间内打印、可从任意方向读取等优点。为了保证运输效率,快递基于用户明文信息运输,快递到达目的地后,利用AES算法将用户的隐私明文信息加密为密文并且生成对应的密文二维码,打印出来粘贴在快递盒上。使用Python实现了密文二维码数据的生成和识别系统,这样既保护了用户的信息安全,也可以减少冒充领取快递现象的发生,具有很高的实用性。

关键词: AES, Python, 二维码, 快递单, 信息安全

Abstract: With the rapid development of e-commerce,the express industry is particularly hot.A large number of users habitually throw away the unprocessed express box after taking the express,at this time,a large number of users' plaintext privacy information on the express bill will face the risk of leakage.AES algorithm is a symmetric cipher algorithm,which has the characteristics of simple algorithm,fast encryption and decryption,high security and so on.It is an ideal algorithm for encrypting express industry users' plaintext information.QR code (fast response two-dimensional code) has the advantages of high security,fast reading speed,printing in small space,and reading from any direction.In order to ensure the efficiency of transportation,express delivery is based on the user's plaintext information.After the express delivery arrives at the destination,AES algorithm is used to encrypt the user's private plaintext information into ciphertext and generate the corresponding ciphertext two-dimensional code,which is printed and pasted on the express box.Python is used to realize the generation and recognition system of ciphertext two-dimensional code data,which not only protects the information security of users,but also reduces the phenomenon of pretending to get express delivery,which has high practicability.

Key words: AES, Express delivery, Information security, Python, QR Code

中图分类号: 

  • TP391
[1]WEI Y X.Research on safety supervision of logistics express in-dustry in China[J].Cooperative Economy Science,2020(8):190-192.
[2]ZHANG Z Y,TENG M Y,LIAO H W,et al.User privacy information protection method for logistics industry[J].Journal of Hunan University of Arts and Science(Natural Science Edition),2016,28(2):74-78.
[3]LIU H F,LIU Y,LIANG X L.A two-dimensional code encryption algorithm combining optimized AES and RSA algorithm[J].Journal of Shaanxi University of Science & Technology,2019,37(6):153-159.
[4]YAO L S,ZHANG S L,FANG B,et al.Design and implementation of passenger information security system based on two dimensional code encryption[J].Journal of Changchun Teachers College,2020,39(2):68-77.
[5]YI L H,ZOU X C,LIU Z L,et al.Design of AES coprocessor with high throughput and low cost[J].Application Research of Computers,2009,26(6):2136-2137.
[6]FAN B X.Research on encryption method for big data[D].Huangshi:Hubei Normal University,2016.
[7]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-likecryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
[8]MATSUI M.Linear cryptanalysis method for DES cipher [C]//Advances in Cryptology-EUROCRYPT.Berlin:Springer Verlag,1993:386-397.
[9]XU Y T,LV Z G,HUANG Y G,et al.Optimization and implementation of AES algorithm based on STM32 MCU[J].Automation Instrument,2020,41(7):56-60.
[10]CHEN Y W,LIU Y L,MA L T,et al.Research on AES and ECC algorithm improvement and hybrid encryption for substation[J].Foreign Electronic Measurement Technology,2020,39(10):60-65.
[11]ALMAZROOIE M,SAMSUDIN A,ABDULLAH R,et al.Quantumreversible circuit of AES-128[J].Quantum Information Processing,2018,17(5):112-129.
[12]ZHANG M H,CHEN Z J,XU X Y.Design and implementation of DSP security protection based on AES algorithm[J].Microelectronics and Computer,2019,39(10):32-36.
[13]DIFFIE W,HELLMAN M E.Special feature exhaustive cryptanalysis of the NBS data encryption standard[J].IEEE Compu-ter,1977,10(6):74-84.
[14]DERBEZ P,FOUQUE P,JEAN J.Improved key recovery attacks on reduced-round AES in the single-key setting[C]//32nd Annual International Conference on the Theory and Applications of Crypto-graphic Techniques.Springer,2013:371-387.
[15]MANGARD S.A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion[C]//Information Security and Cryptology-ICISC 2002.Berlin,Heidelberg:Springer,2003:343-358.
[16]MAGHREBI H.Deep learning based side channel attacks inpractice[J].IACR Cryptology ePrint Archive,2019,578.
[17]ZHANG Y J,HAN Y X,LIU X Y.Account Password management app based on AES algorithm[J].Computer Technology and Development,2019,29(8):125-129.
[18]LI G,YANG Y,SUN Y W,et al.Research on the application of AES algorithm in QR code generation and recognition[J].China New Communication,2020,22(9):95-96.
[19]LIAO Z X,WANG J.Research on multiple encryption algorithm based on QR code[J].Computer Knowledge and Technology,2015,11(30):64-65.
[20]QI N Q.Research on the application of RSA algorithm in two dimensional code anti-counterfeiting technology[D].Nanjing:Nanjing University of Posts and Telecommunication,2017.
[1] 蒋成满, 华保健, 樊淇梁, 朱洪军, 徐波, 潘志中.
Python虚拟机本地代码的安全性实证研究
Empirical Security Study of Native Code in Python Virtual Machines
计算机科学, 2022, 49(6A): 474-479. https://doi.org/10.11896/jsjkx.210600200
[2] 刘凯祥, 谢永芳, 陈新, 吕飞, 刘俊矫.
基于DTMC的工业串行协议状态检测算法
Industrial Serial Protocol State Detection Algorithm Based on DTMC
计算机科学, 2022, 49(3): 301-307. https://doi.org/10.11896/jsjkx.210200078
[3] 陆垚, 陈开颜, 王寅龙, 尚倩伊.
针对AES查表法最后一轮加密的L3缓存攻击
L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method
计算机科学, 2020, 47(6A): 375-380. https://doi.org/10.11896/JsJkx.190900157
[4] 朱涤尘, 夏换, 杨秀璋, 于小民, 张亚成, 武帅.
基于文本挖掘和决策树分析的中国手游产业发展研究
Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis
计算机科学, 2020, 47(6A): 530-534. https://doi.org/10.11896/JsJkx.190700124
[5] 陈静娴.
基于二维码技术·微信小程序技术的实验室设备管理的设计与实现
Design and Realization of Laboratory Equipment Management System Based on QR Code Technology and WeChat Mini-program Technology
计算机科学, 2020, 47(11A): 673-677. https://doi.org/10.11896/jsjkx.200400063
[6] 李斌, 周清雷, 斯雪明, 陈晓杰.
基于FPGA集群的Office口令恢复优化实现
Optimized Implementation of Office Password Recovery Based on FPGA Cluster
计算机科学, 2020, 47(11): 32-41. https://doi.org/10.11896/jsjkx.200500040
[7] 徐传福,王曦,刘舒,陈世钊,林玉.
基于Python的大规模高性能LBM多相流模拟
Large-scale High-performance Lattice Boltzmann Multi-phase Flow Simulations Based on Python
计算机科学, 2020, 47(1): 17-23. https://doi.org/10.11896/jsjkx.190500009
[8] 孙连山,欧阳晓通,徐艳艳,王艺星.
面向间接依赖的数据起源过滤方法
Novel Sanitization Approach for Indirect Dependencies in Provenance Graph
计算机科学, 2019, 46(3): 164-169. https://doi.org/10.11896/j.issn.1002-137X.2019.03.025
[9] 王辉, 周明明.
基于区块链的医疗信息安全存储模型
Medical Information Security Storage Model Based on Blockchain Technology
计算机科学, 2019, 46(12): 174-179. https://doi.org/10.11896/jsjkx.181102034
[10] 高丹, 凌捷, 陈家辉.
基于可撤销外包属性加密的二维码加密
Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption
计算机科学, 2019, 46(12): 186-191. https://doi.org/10.11896/jsjkx.181102187
[11] 詹雄, 郭昊, 何小芸, 刘周斌, 孙学洁, 陈红松.
国家电网边缘计算信息系统安全风险评估方法研究
Research on Security Risk Assessment Method of State Grid Edge Computing Information System
计算机科学, 2019, 46(11A): 428-432.
[12] 周艺华, 张冰, 杨宇光, 侍伟敏.
基于聚类的社交网络隐私保护方法
Cluster-based Social Network Privacy Protection Method
计算机科学, 2019, 46(10): 154-160. https://doi.org/10.11896/jsjkx.180901749
[13] 丁庆洋,王秀利,朱建明,宋彪.
基于区块链的信息物理融合系统的信息安全保护框架
Information Security Framework Based on Blockchain for Cyber-physics System
计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006
[14] 冷强, 杨英杰, 胡浩.
面向风险评估的专家权重自适应调整方法
Self-adaption Adjustment Method for Experts in Risk Assessment
计算机科学, 2018, 45(12): 98-103. https://doi.org/10.11896/j.issn.1002-137X.2018.12.015
[15] 杜行舟, 张凯, 江坤, 马昊伯.
基于区块链的数字化指挥控制系统信息传输与追溯模式研究
Research on Blockchain-based Information Transmission and Tracing Pattern in Digitized Command-and-Control System
计算机科学, 2018, 45(11A): 576-579.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!