计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 588-591.doi: 10.11896/jsjkx.210100024
辜双佳1, 刘万平1, 黄东2
GU Shuang-jia1, LIU Wan-ping1, HUANG Dong2
摘要: 随着电商的迅速开展,快递行业特别火爆。大量用户取完快递后习惯性将未经处理的快递盒随手扔掉,此时快递单上大量的用户明文隐私信息将面临被泄露的风险。AES算法是对称密码算法,具备算法简单易实现、加解密速度快、安全性高等特点,是加密快递业用户明文信息的理想算法。QR码(快速响应二维码)具有安全性高、读取数据速度快、可在小空间内打印、可从任意方向读取等优点。为了保证运输效率,快递基于用户明文信息运输,快递到达目的地后,利用AES算法将用户的隐私明文信息加密为密文并且生成对应的密文二维码,打印出来粘贴在快递盒上。使用Python实现了密文二维码数据的生成和识别系统,这样既保护了用户的信息安全,也可以减少冒充领取快递现象的发生,具有很高的实用性。
中图分类号:
[1]WEI Y X.Research on safety supervision of logistics express in-dustry in China[J].Cooperative Economy Science,2020(8):190-192. [2]ZHANG Z Y,TENG M Y,LIAO H W,et al.User privacy information protection method for logistics industry[J].Journal of Hunan University of Arts and Science(Natural Science Edition),2016,28(2):74-78. [3]LIU H F,LIU Y,LIANG X L.A two-dimensional code encryption algorithm combining optimized AES and RSA algorithm[J].Journal of Shaanxi University of Science & Technology,2019,37(6):153-159. [4]YAO L S,ZHANG S L,FANG B,et al.Design and implementation of passenger information security system based on two dimensional code encryption[J].Journal of Changchun Teachers College,2020,39(2):68-77. [5]YI L H,ZOU X C,LIU Z L,et al.Design of AES coprocessor with high throughput and low cost[J].Application Research of Computers,2009,26(6):2136-2137. [6]FAN B X.Research on encryption method for big data[D].Huangshi:Hubei Normal University,2016. [7]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-likecryptosystems[J].Journal of Cryptology,1991,4(1):3-72. [8]MATSUI M.Linear cryptanalysis method for DES cipher [C]//Advances in Cryptology-EUROCRYPT.Berlin:Springer Verlag,1993:386-397. [9]XU Y T,LV Z G,HUANG Y G,et al.Optimization and implementation of AES algorithm based on STM32 MCU[J].Automation Instrument,2020,41(7):56-60. [10]CHEN Y W,LIU Y L,MA L T,et al.Research on AES and ECC algorithm improvement and hybrid encryption for substation[J].Foreign Electronic Measurement Technology,2020,39(10):60-65. [11]ALMAZROOIE M,SAMSUDIN A,ABDULLAH R,et al.Quantumreversible circuit of AES-128[J].Quantum Information Processing,2018,17(5):112-129. [12]ZHANG M H,CHEN Z J,XU X Y.Design and implementation of DSP security protection based on AES algorithm[J].Microelectronics and Computer,2019,39(10):32-36. [13]DIFFIE W,HELLMAN M E.Special feature exhaustive cryptanalysis of the NBS data encryption standard[J].IEEE Compu-ter,1977,10(6):74-84. [14]DERBEZ P,FOUQUE P,JEAN J.Improved key recovery attacks on reduced-round AES in the single-key setting[C]//32nd Annual International Conference on the Theory and Applications of Crypto-graphic Techniques.Springer,2013:371-387. [15]MANGARD S.A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion[C]//Information Security and Cryptology-ICISC 2002.Berlin,Heidelberg:Springer,2003:343-358. [16]MAGHREBI H.Deep learning based side channel attacks inpractice[J].IACR Cryptology ePrint Archive,2019,578. [17]ZHANG Y J,HAN Y X,LIU X Y.Account Password management app based on AES algorithm[J].Computer Technology and Development,2019,29(8):125-129. [18]LI G,YANG Y,SUN Y W,et al.Research on the application of AES algorithm in QR code generation and recognition[J].China New Communication,2020,22(9):95-96. [19]LIAO Z X,WANG J.Research on multiple encryption algorithm based on QR code[J].Computer Knowledge and Technology,2015,11(30):64-65. [20]QI N Q.Research on the application of RSA algorithm in two dimensional code anti-counterfeiting technology[D].Nanjing:Nanjing University of Posts and Telecommunication,2017. |
[1] | 蒋成满, 华保健, 樊淇梁, 朱洪军, 徐波, 潘志中. Python虚拟机本地代码的安全性实证研究 Empirical Security Study of Native Code in Python Virtual Machines 计算机科学, 2022, 49(6A): 474-479. https://doi.org/10.11896/jsjkx.210600200 |
[2] | 刘凯祥, 谢永芳, 陈新, 吕飞, 刘俊矫. 基于DTMC的工业串行协议状态检测算法 Industrial Serial Protocol State Detection Algorithm Based on DTMC 计算机科学, 2022, 49(3): 301-307. https://doi.org/10.11896/jsjkx.210200078 |
[3] | 陆垚, 陈开颜, 王寅龙, 尚倩伊. 针对AES查表法最后一轮加密的L3缓存攻击 L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method 计算机科学, 2020, 47(6A): 375-380. https://doi.org/10.11896/JsJkx.190900157 |
[4] | 朱涤尘, 夏换, 杨秀璋, 于小民, 张亚成, 武帅. 基于文本挖掘和决策树分析的中国手游产业发展研究 Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis 计算机科学, 2020, 47(6A): 530-534. https://doi.org/10.11896/JsJkx.190700124 |
[5] | 陈静娴. 基于二维码技术·微信小程序技术的实验室设备管理的设计与实现 Design and Realization of Laboratory Equipment Management System Based on QR Code Technology and WeChat Mini-program Technology 计算机科学, 2020, 47(11A): 673-677. https://doi.org/10.11896/jsjkx.200400063 |
[6] | 李斌, 周清雷, 斯雪明, 陈晓杰. 基于FPGA集群的Office口令恢复优化实现 Optimized Implementation of Office Password Recovery Based on FPGA Cluster 计算机科学, 2020, 47(11): 32-41. https://doi.org/10.11896/jsjkx.200500040 |
[7] | 徐传福,王曦,刘舒,陈世钊,林玉. 基于Python的大规模高性能LBM多相流模拟 Large-scale High-performance Lattice Boltzmann Multi-phase Flow Simulations Based on Python 计算机科学, 2020, 47(1): 17-23. https://doi.org/10.11896/jsjkx.190500009 |
[8] | 孙连山,欧阳晓通,徐艳艳,王艺星. 面向间接依赖的数据起源过滤方法 Novel Sanitization Approach for Indirect Dependencies in Provenance Graph 计算机科学, 2019, 46(3): 164-169. https://doi.org/10.11896/j.issn.1002-137X.2019.03.025 |
[9] | 王辉, 周明明. 基于区块链的医疗信息安全存储模型 Medical Information Security Storage Model Based on Blockchain Technology 计算机科学, 2019, 46(12): 174-179. https://doi.org/10.11896/jsjkx.181102034 |
[10] | 高丹, 凌捷, 陈家辉. 基于可撤销外包属性加密的二维码加密 Two-dimensional Code Encryption Based on Revocable Outsourced Attribute Encryption 计算机科学, 2019, 46(12): 186-191. https://doi.org/10.11896/jsjkx.181102187 |
[11] | 詹雄, 郭昊, 何小芸, 刘周斌, 孙学洁, 陈红松. 国家电网边缘计算信息系统安全风险评估方法研究 Research on Security Risk Assessment Method of State Grid Edge Computing Information System 计算机科学, 2019, 46(11A): 428-432. |
[12] | 周艺华, 张冰, 杨宇光, 侍伟敏. 基于聚类的社交网络隐私保护方法 Cluster-based Social Network Privacy Protection Method 计算机科学, 2019, 46(10): 154-160. https://doi.org/10.11896/jsjkx.180901749 |
[13] | 丁庆洋,王秀利,朱建明,宋彪. 基于区块链的信息物理融合系统的信息安全保护框架 Information Security Framework Based on Blockchain for Cyber-physics System 计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006 |
[14] | 冷强, 杨英杰, 胡浩. 面向风险评估的专家权重自适应调整方法 Self-adaption Adjustment Method for Experts in Risk Assessment 计算机科学, 2018, 45(12): 98-103. https://doi.org/10.11896/j.issn.1002-137X.2018.12.015 |
[15] | 杜行舟, 张凯, 江坤, 马昊伯. 基于区块链的数字化指挥控制系统信息传输与追溯模式研究 Research on Blockchain-based Information Transmission and Tracing Pattern in Digitized Command-and-Control System 计算机科学, 2018, 45(11A): 576-579. |
|