CN108965310A - The anti-tamper encryption implementation method of crossing and device on a kind of batch data - Google Patents

The anti-tamper encryption implementation method of crossing and device on a kind of batch data Download PDF

Info

Publication number
CN108965310A
CN108965310A CN201810848432.6A CN201810848432A CN108965310A CN 108965310 A CN108965310 A CN 108965310A CN 201810848432 A CN201810848432 A CN 201810848432A CN 108965310 A CN108965310 A CN 108965310A
Authority
CN
China
Prior art keywords
data
encryption
terminal
key
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810848432.6A
Other languages
Chinese (zh)
Inventor
徐杰
张勤
冯国梁
陈杰永
邓义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd filed Critical GUANGZHOU MORNING STAR TECHNOLOGY Co Ltd
Priority to CN201810848432.6A priority Critical patent/CN108965310A/en
Publication of CN108965310A publication Critical patent/CN108965310A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the anti-tamper encryption implementation method of crossing and device on a kind of batch data, implementation method is the following steps are included: generate key pair using 3DES algorithm;It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key and RSA Algorithm encryption is carried out to the first digital digest, generate the first encryption data;It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.The present invention guarantees that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.

Description

The anti-tamper encryption implementation method of crossing and device on a kind of batch data
Technical field
The invention belongs to data uploading file field, be related on a kind of batch data the anti-tamper encryption implementation method of crossing and Device.
Background technique
Carried out data transmission by network, needs to verify the authenticity and integrity of data, prevent someone from passing through It distorts and causes heavy losses to relevant people with data falsification.Anti-fake current data transmission is in data transmission while to pass mostly 5 md5-challenge of MD5(Message-Digest Algorithm of the defeated data) code, then recipient is receiving MD5 code is generated after data again, determines whether data are complete by comparing MD5 twice.This mode have the disadvantage that by It may be by monitoring, intercept and distort in transmission process in data, and new MD5 code is regenerated with the data after distorting. Recipient can not perceive such case, if continuing to use the data after distorting and MD5 code, although data pass through verification, really Integrality is protected, but it is clear that being unable to ensure its authenticity.
Summary of the invention
The present invention is in view of the above-mentioned problems, one of the objects of the present invention is to provide crossing on a kind of batch data is anti-tamper Encryption implementation method, to guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The second object of the present invention is the provision of the anti-tamper encryption realization device of crossing on a kind of batch data, to guarantee The authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The third object of the present invention is the provision of the anti-tamper encryption implementation method of crossing on a kind of batch data, further Guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The fourth object of the present invention is the provision of the anti-tamper encryption realization device of crossing on a kind of batch data, further Guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
One of in order to achieve the above purpose, the technical solution adopted by the present invention is that:
A kind of anti-tamper encryption implementation method of crossing on batch data comprising following steps:
Key pair is generated using 3DES algorithm;The key pair includes private key and public key corresponding with the private key, the private Key assigns the transmission terminal of data, and the public key assigns the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key pair First digital digest carries out RSA Algorithm encryption, generates the first encryption data;
It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;
It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key to the second number Abstract carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
Preferably, the length of the key pair is 1024.
Preferably, the length of first digital digest and the second digital digest is 64.
Preferably, the length of first encryption data and the second encryption data is 128 bytes.
In order to achieve the above purpose two, the technical solution adopted by the present invention is that:
The anti-tamper encryption realization device of crossing on a kind of batch data comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
In order to achieve the above purpose three, the technical solution adopted by the present invention is that:
A kind of anti-tamper encryption implementation method of crossing on batch data comprising following steps:
Key pair is generated using 3DES algorithm;The key pair be two pairs, the key pair include the first private key, the second private key with And and corresponding first public key of first private key, the second public key corresponding with second private key, first private key and Two private keys assign the transmission terminal of data, and first public key and the second public key assign the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, it is private to reuse described first Key carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
It sends terminal to encrypt the initial data using the second private key, generates ciphertext;
It sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception;
It receives terminal the ciphertext is decrypted using the second public key, obtains ciphertext data;
It receives terminal and the second digital digest is extracted to the ciphertext data using SHA256 algorithm, reuse first public key pair Second digital digest carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
Preferably, the length of the key pair is 1024.
Preferably, the length of first digital digest and the second digital digest is 64.
Preferably, the length of first encryption data and the second encryption data is 128 bytes.
In order to achieve the above purpose four, the technical solution adopted by the present invention is that:
The anti-tamper encryption realization device of crossing on a kind of batch data comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
Compared with prior art, the anti-tamper encryption implementation method of crossing and device on batch data of the present invention, beneficial to effect Fruit is:
3DES, SHA256 of selection, RSA cryptographic algorithms safety coefficient are higher, have not only carried out digital signature to initial data and have tested Card, while can also first encrypt data in transmission, data, which can be effectively prevented, and be intercepted by ciphertext transmission causes It divulges a secret.The result of digital signature authentication can not only guarantee the integrality of data, it is also ensured that the authenticity of data and can not The property denied, effective guarantee data transmit the interests of both sides.
Detailed description of the invention
Fig. 1 is the flow chart of the anti-tamper encryption implementation method of crossing in batch of embodiment of the present invention data;
Fig. 2 is the flow chart of the anti-tamper encryption implementation method of crossing on three batch data of the embodiment of the present invention.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Embodiment one
The anti-tamper encryption implementation method of crossing on a kind of batch data, is used to guarantee the authenticity and non repudiation of data, It please refers to shown in Fig. 1 comprising following steps:
110, using 3DES algorithm, (the triple data encryption algorithm of Triple Data Encryption Algorithm, are that block is close The common name of code) generate key pair;Key pair can be provided by third party's security platform, be used for digital signature, effective guarantee number According to the interests of transmission both sides.The length of key pair will guarantee safe enough, such as can use 1024 key pairs.It is described close For key to including private key and public key corresponding with the private key, the private key assigns the transmission terminal of data, and the public key assigns The reception terminal of data.
120, using SHA256 algorithm, (Secure Hash Algorithm secure hash algorithm is one close to transmission terminal Code hash function family, is the secure hash algorithm that FIPS is authenticated) the first digital digest is extracted to sent initial data, The length of first digital digest can be 64.It sends terminal and reuses the private key to the first digital digest progress RSA Algorithm (a kind of rivest, shamir, adelman, RSA Algorithm are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Disamo What your (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together, RSA is exactly their three people's surnames The alphabetical composition that is stitched together of beginning) encryption, generate the first encryption data that length is 128 bytes.
130, it sends terminal and uploads the initial data and the first encryption data, to be received terminal reception.
140, the extraction that terminal carries out the second digital digest using SHA256 algorithm to received initial data is received, The second digital digest extracted is also 64, and reception terminal reuses the public key and adds to the second digital digest progress RSA Algorithm It is close, generate the second encryption data of 128 bytes.
150, it receives terminal and the second encryption data of generation and received first encryption data is subjected to consistency checking.
If 160, consistency checking passes through, it is determined that receive the true of the data (i.e. initial data) that terminal receives Property and integrality.
If consistency checking does not pass through, data are untrue, return to 120 steps and retransmit data.
Embodiment two
Embodiment two provides the anti-tamper encryption realization device of crossing on a kind of batch data, is the virtual dress of above-described embodiment one It sets comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
Embodiment three
Embodiment is first encrypted third is that the improvement carried out on the basis of embodiment to sent initial data, even if The data of transmission are intercepted, and divulging a secret for data will not be caused, and more effectively prevent that data are intercepted to lead to risk of divulging a secret Generation.Shown in referring to figure 2. comprising following steps:
210, key pair is generated using 3DES algorithm;The key pair is two pairs, and the key pair includes the first private key, the second private Key and and corresponding first public key of first private key, the second public key corresponding with second private key.Key pair can lead to The offer of third party's security platform is provided, digital signature is used for, effective guarantee data transmit the interests of both sides.The length of key pair will protect Safe enough is demonstrate,proved, such as can use 1024 key pairs.First private key and the second private key assign the transmission of data Terminal, first public key and the second public key assign the reception terminal of data.
220, it sends terminal and extracts the first digital digest, the first number to sent initial data using SHA256 algorithm The length of abstract can be 64.Transmission terminal reuses first private key and carries out RSA Algorithm encryption to the first digital digest, Generate the first encryption data that length is 128 bytes.
230, it sends terminal to encrypt the initial data using the second private key, generates ciphertext.
240, it sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception.
250, it receives terminal first the ciphertext is decrypted using the second public key, obtains ciphertext data.
260, it receives terminal and the second digital digest, the second number of extraction is extracted to the ciphertext data using SHA256 algorithm Word abstract is also 64, receives terminal and reuses first public key to the progress RSA Algorithm encryption of the second digital digest, generates Second encryption data of 128 bytes.
270, it receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If 280, consistency checking passes through, it is determined that receive the authenticity of the data (ciphertext) that terminal receives and complete Property.The authenticity and integrity of ciphertext is determined, then ciphertext data is to want received initial data.
If consistency checking does not pass through, data are untrue, return to 220 steps and retransmit data.
Example IV
Example IV provides the anti-tamper encryption realization device of crossing on a kind of batch data, is the virtual dress of above-described embodiment three It sets comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto, The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention Claimed range.

Claims (10)

1. the anti-tamper encryption implementation method of crossing on a kind of batch data, which is characterized in that itself the following steps are included:
Key pair is generated using 3DES algorithm;The key pair includes private key and public key corresponding with the private key, the private Key assigns the transmission terminal of data, and the public key assigns the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key pair First digital digest carries out RSA Algorithm encryption, generates the first encryption data;
It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;
It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key to the second number Abstract carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
2. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: the key Pair length be 1024.
3. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: described first The length of digital digest and the second digital digest is 64.
4. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: described first The length of encryption data and the second encryption data is 128 bytes.
5. the anti-tamper encryption realization device of crossing on a kind of batch data, characterized in that it comprises:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
6. the anti-tamper encryption implementation method of crossing on a kind of batch data, which is characterized in that itself the following steps are included:
Key pair is generated using 3DES algorithm;The key pair be two pairs, the key pair include the first private key and with it is described Corresponding first public key of first private key, the second private key and the second public key corresponding with second private key, first private key The transmission terminal of data is assigned with the second private key, first public key and the second public key assign the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, it is private to reuse described first Key carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
It sends terminal to encrypt the initial data using the second private key, generates ciphertext;
It sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception;
It receives terminal the ciphertext is decrypted using the second public key, obtains ciphertext data;
It receives terminal and the second digital digest is extracted to the ciphertext data using SHA256 algorithm, reuse first public key pair Second digital digest carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
7. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: the key Pair length be 1024.
8. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: described first The length of digital digest and the second digital digest is 64.
9. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: described first The length of encryption data and the second encryption data is 128 bytes.
10. the anti-tamper encryption realization device of crossing on a kind of batch data, characterized in that it comprises:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete Whole property.
CN201810848432.6A 2018-07-27 2018-07-27 The anti-tamper encryption implementation method of crossing and device on a kind of batch data Pending CN108965310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810848432.6A CN108965310A (en) 2018-07-27 2018-07-27 The anti-tamper encryption implementation method of crossing and device on a kind of batch data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810848432.6A CN108965310A (en) 2018-07-27 2018-07-27 The anti-tamper encryption implementation method of crossing and device on a kind of batch data

Publications (1)

Publication Number Publication Date
CN108965310A true CN108965310A (en) 2018-12-07

Family

ID=64466368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810848432.6A Pending CN108965310A (en) 2018-07-27 2018-07-27 The anti-tamper encryption implementation method of crossing and device on a kind of batch data

Country Status (1)

Country Link
CN (1) CN108965310A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617876A (en) * 2018-12-11 2019-04-12 北京首汽智行科技有限公司 Data encryption, decryption method and system based on Http agreement
CN111770185A (en) * 2020-07-03 2020-10-13 中国农业银行股份有限公司贵州省分行 System for data encryption transmission and storage
CN111783120A (en) * 2020-06-30 2020-10-16 曙光信息产业(北京)有限公司 Data interaction method, computing device, BMC chip and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429738B1 (en) * 2002-01-14 2013-04-23 F5 Networks, Inc. Method and system for performing asynchronous cryptographic operations
CN103731270A (en) * 2013-12-25 2014-04-16 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN106874270A (en) * 2015-12-10 2017-06-20 中国移动通信集团云南有限公司 A kind of method and apparatus of data consistency certification
CN107395371A (en) * 2017-09-11 2017-11-24 中国电子科技集团公司第五十八研究所 Data encryption in wireless sensor network
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107612910A (en) * 2017-09-19 2018-01-19 北京邮电大学 A kind of distributed document data access method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429738B1 (en) * 2002-01-14 2013-04-23 F5 Networks, Inc. Method and system for performing asynchronous cryptographic operations
CN103731270A (en) * 2013-12-25 2014-04-16 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN106874270A (en) * 2015-12-10 2017-06-20 中国移动通信集团云南有限公司 A kind of method and apparatus of data consistency certification
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107395371A (en) * 2017-09-11 2017-11-24 中国电子科技集团公司第五十八研究所 Data encryption in wireless sensor network
CN107612910A (en) * 2017-09-19 2018-01-19 北京邮电大学 A kind of distributed document data access method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617876A (en) * 2018-12-11 2019-04-12 北京首汽智行科技有限公司 Data encryption, decryption method and system based on Http agreement
CN111783120A (en) * 2020-06-30 2020-10-16 曙光信息产业(北京)有限公司 Data interaction method, computing device, BMC chip and electronic device
CN111770185A (en) * 2020-07-03 2020-10-13 中国农业银行股份有限公司贵州省分行 System for data encryption transmission and storage

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
EP3324572B1 (en) Information transmission method and mobile device
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
CN107317677B (en) Secret key storage and equipment identity authentication method and device
CN103001976A (en) Safe network information transmission method
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
JPH07287514A (en) Message signature system execution device and chip card with it
KR100860573B1 (en) Method for User Authentication
JP2022521525A (en) Cryptographic method for validating data
CN104243494A (en) Data processing method
CN108965310A (en) The anti-tamper encryption implementation method of crossing and device on a kind of batch data
CN103493428B (en) Data encryption
CN107483388A (en) A kind of safety communicating method and its terminal and high in the clouds
CN108401494B (en) Method and system for transmitting data
CN108616516A (en) A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
CN107682156A (en) A kind of encryption communication method and device based on SM9 algorithms
CN116743470A (en) Service data encryption processing method and device
Thapar et al. A study of data threats and the role of cryptography algorithms
CN103312671A (en) Method and system for verifying server
CN107230081A (en) A kind of secure payment encryption system
CN110572257A (en) Anti-quantum computing data source identification method and system based on identity
CN105703904B (en) A kind of method for anti-counterfeit and system based on public key cryptography
Masadeh et al. A novel paradigm in authentication system using swifi encryption/decryption approach
Zarkar et al. Secure Server Verification by using Encryption Algorithm and Visual Cryptography
Madhukar Cryptography technology with network security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181207

WD01 Invention patent application deemed withdrawn after publication