Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 588-591.doi: 10.11896/jsjkx.210100024

• Information Security • Previous Articles     Next Articles

Application of Express Information Encryption Based on AES and QR

GU Shuang-jia1, LIU Wan-ping1, HUANG Dong2   

  1. 1 College of Computer Science and Engineering,Chongqing University of Technology,Chongqing 400054,China
    2 Information Engineering Institute,Chongqing Vocational and Technical University of Mechatronics,Chongqing 402760,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:GU Shuang-jia,born in 1994,postgraduate.Her main research interests include information security,cryptography and deep learning.
    LIU Wan-ping,born in 1986,Ph.D,associate professor,research supervisor,is a member of China Computer Federation.His main research interests include cyberspace security dynamics and information security.
  • Supported by:
    Science and Technology Research Project of Chongqing Education Commission(KJQN201901101) and Graduate Student Innovation Program of Chongqing University of Technology(CLGYCX 20203119).

Abstract: With the rapid development of e-commerce,the express industry is particularly hot.A large number of users habitually throw away the unprocessed express box after taking the express,at this time,a large number of users' plaintext privacy information on the express bill will face the risk of leakage.AES algorithm is a symmetric cipher algorithm,which has the characteristics of simple algorithm,fast encryption and decryption,high security and so on.It is an ideal algorithm for encrypting express industry users' plaintext information.QR code (fast response two-dimensional code) has the advantages of high security,fast reading speed,printing in small space,and reading from any direction.In order to ensure the efficiency of transportation,express delivery is based on the user's plaintext information.After the express delivery arrives at the destination,AES algorithm is used to encrypt the user's private plaintext information into ciphertext and generate the corresponding ciphertext two-dimensional code,which is printed and pasted on the express box.Python is used to realize the generation and recognition system of ciphertext two-dimensional code data,which not only protects the information security of users,but also reduces the phenomenon of pretending to get express delivery,which has high practicability.

Key words: AES, Express delivery, Information security, Python, QR Code

CLC Number: 

  • TP391
[1]WEI Y X.Research on safety supervision of logistics express in-dustry in China[J].Cooperative Economy Science,2020(8):190-192.
[2]ZHANG Z Y,TENG M Y,LIAO H W,et al.User privacy information protection method for logistics industry[J].Journal of Hunan University of Arts and Science(Natural Science Edition),2016,28(2):74-78.
[3]LIU H F,LIU Y,LIANG X L.A two-dimensional code encryption algorithm combining optimized AES and RSA algorithm[J].Journal of Shaanxi University of Science & Technology,2019,37(6):153-159.
[4]YAO L S,ZHANG S L,FANG B,et al.Design and implementation of passenger information security system based on two dimensional code encryption[J].Journal of Changchun Teachers College,2020,39(2):68-77.
[5]YI L H,ZOU X C,LIU Z L,et al.Design of AES coprocessor with high throughput and low cost[J].Application Research of Computers,2009,26(6):2136-2137.
[6]FAN B X.Research on encryption method for big data[D].Huangshi:Hubei Normal University,2016.
[7]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-likecryptosystems[J].Journal of Cryptology,1991,4(1):3-72.
[8]MATSUI M.Linear cryptanalysis method for DES cipher [C]//Advances in Cryptology-EUROCRYPT.Berlin:Springer Verlag,1993:386-397.
[9]XU Y T,LV Z G,HUANG Y G,et al.Optimization and implementation of AES algorithm based on STM32 MCU[J].Automation Instrument,2020,41(7):56-60.
[10]CHEN Y W,LIU Y L,MA L T,et al.Research on AES and ECC algorithm improvement and hybrid encryption for substation[J].Foreign Electronic Measurement Technology,2020,39(10):60-65.
[11]ALMAZROOIE M,SAMSUDIN A,ABDULLAH R,et al.Quantumreversible circuit of AES-128[J].Quantum Information Processing,2018,17(5):112-129.
[12]ZHANG M H,CHEN Z J,XU X Y.Design and implementation of DSP security protection based on AES algorithm[J].Microelectronics and Computer,2019,39(10):32-36.
[13]DIFFIE W,HELLMAN M E.Special feature exhaustive cryptanalysis of the NBS data encryption standard[J].IEEE Compu-ter,1977,10(6):74-84.
[14]DERBEZ P,FOUQUE P,JEAN J.Improved key recovery attacks on reduced-round AES in the single-key setting[C]//32nd Annual International Conference on the Theory and Applications of Crypto-graphic Techniques.Springer,2013:371-387.
[15]MANGARD S.A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion[C]//Information Security and Cryptology-ICISC 2002.Berlin,Heidelberg:Springer,2003:343-358.
[16]MAGHREBI H.Deep learning based side channel attacks inpractice[J].IACR Cryptology ePrint Archive,2019,578.
[17]ZHANG Y J,HAN Y X,LIU X Y.Account Password management app based on AES algorithm[J].Computer Technology and Development,2019,29(8):125-129.
[18]LI G,YANG Y,SUN Y W,et al.Research on the application of AES algorithm in QR code generation and recognition[J].China New Communication,2020,22(9):95-96.
[19]LIAO Z X,WANG J.Research on multiple encryption algorithm based on QR code[J].Computer Knowledge and Technology,2015,11(30):64-65.
[20]QI N Q.Research on the application of RSA algorithm in two dimensional code anti-counterfeiting technology[D].Nanjing:Nanjing University of Posts and Telecommunication,2017.
[1] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[2] ZHU Di-chen, XIA Huan, YANG Xiu-zhang, YU Xiao-min, ZHANG Ya-cheng and WU Shuai. Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis [J]. Computer Science, 2020, 47(6A): 530-534.
[3] LU Yao, CHEN Kai-yan, WANG Yin-long and SHANG Qian-yi. L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method [J]. Computer Science, 2020, 47(6A): 375-380.
[4] CHEN Jing-xian. Design and Realization of Laboratory Equipment Management System Based on QR Code Technology and WeChat Mini-program Technology [J]. Computer Science, 2020, 47(11A): 673-677.
[5] LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41.
[6] XU Chuan-fu,WANG Xi,LIU Shu,CHEN Shi-zhao,LIN Yu. Large-scale High-performance Lattice Boltzmann Multi-phase Flow Simulations Based on Python [J]. Computer Science, 2020, 47(1): 17-23.
[7] SUN Lian-shan, OUYANG Xiao-tong, XU Yan-yan, WANG Yi-xing. Novel Sanitization Approach for Indirect Dependencies in Provenance Graph [J]. Computer Science, 2019, 46(3): 164-169.
[8] WANG Hui, ZHOU Ming-ming. Medical Information Security Storage Model Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 174-179.
[9] ZHAN Xiong, GUO Hao, HE Xiao-yun, LIU Zhou-bin, SUN Xue-jie, CHEN Hong-song. Research on Security Risk Assessment Method of State Grid Edge Computing Information System [J]. Computer Science, 2019, 46(11A): 428-432.
[10] ZHOU Yi-hua, ZHANG Bing, YANG Yu-guang, SHI Wei-min. Cluster-based Social Network Privacy Protection Method [J]. Computer Science, 2019, 46(10): 154-160.
[11] DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao. Information Security Framework Based on Blockchain for Cyber-physics System [J]. Computer Science, 2018, 45(2): 32-39.
[12] LENG Qiang, YANG Ying-jie, HU Hao. Self-adaption Adjustment Method for Experts in Risk Assessment [J]. Computer Science, 2018, 45(12): 98-103.
[13] DU Xing-zhou, ZHANG Kai, JIANG Kun, MA Hao-bo. Research on Blockchain-based Information Transmission and Tracing Pattern in Digitized Command-and-Control System [J]. Computer Science, 2018, 45(11A): 576-579.
[14] DONG Gui-shan, CHEN Yu-xiang, ZHANG Zhao-lei, BAI Jian, HAO Yao. Research on Identity Management Authentication Based on Blockchain [J]. Computer Science, 2018, 45(11): 52-59.
[15] CHEN Zhuang and YE Cheng-yin. Scheme of Cloud Audit Data Encryption Based on AES and ECC [J]. Computer Science, 2017, 44(Z6): 333-335.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!