Abstract

With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recognition and encryption transmission system based on a decision tree. By training sensitive data to build a decision tree, unknown data can be classified and identified. The identified sensitive information can be marked and encrypted to achieve intelligent recognition and protection of sensitive information. This lays the foundation for the development of an information recognition and encryption transmission system.

Highlights

  • Encryption technology is an important measure for information security

  • The decision tree model is readable and descriptive, which is helpful for manual analysis; It is highly efficient: the decision tree only needs to be constructed once and is used repeatedly; the maximum calculation time of each prediction cannot exceed the depth of the decision tree [12]

  • The SM4 algorithm is typical Feistel structure, this structure is symmetrical, so the decryption process is very similar to the encryption process, except that the subkeys are used in the reverse order, the decryption subkey is the reverse order of the encryption subkey, and the encrypted and decrypted data is 128 bits

Read more

Summary

Introduction

Encryption technology is an important measure for information security. this paper adopts FPGA (Field Programmable Gate Array) chip hardware to implement a domestic SM4 (A block cipher standard adopted by the government of the People’s Republic of China) encryption algorithm, and proposes a hardware encryption transmission design scheme based on a fully programmable. In the FPGA development environment, the PCIe (Peripheral Component Interconnect express) interface design is implemented with the IPI (Intellectual Property Integrator) tool to perform high-speed data transmission between the sending end and the FPGA board card [3]. In the field of communications, with the improvement of bandwidth and performance requirements, traditional buses have been gradually phased out At this time, the PCIe bus as a third-generation interconnect bus successfully solved the bottleneck problem during high-speed data transmission and obtained good. Hardware encryption is mainly implemented by a special encryption card or FPGA, with a fast encryption and decryption speed, a relatively complicated encryption process, and protection against being tracked by the outside world and attacked [10,11], as well as it being difficult to crack the hardware; the security reliability of hardware encryption is relatively high, which means hardware encryption is being adopted by more and more enterprises. The decision tree model is readable and descriptive, which is helpful for manual analysis; It is highly efficient: the decision tree only needs to be constructed once and is used repeatedly; the maximum calculation time of each prediction cannot exceed the depth of the decision tree [12]

Decision Tree
The Meaning of Information Entropy to a Decision Tree
Information Gain
Constructing a Classifier with Feature Faces
Principal Component Analysis
Building a Decision Tree with Sklearn
Basic Functions of the SM4 Encryption Algorithm
SM4 Encryption Algorithm Encryption and Decryption Process
SM4 Encryption IP Core Design
Design
PL-Side Design and Implementation
Results
Each vectordata
Encryption Transmission
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call