CN108965310A - The anti-tamper encryption implementation method of crossing and device on a kind of batch data - Google Patents
The anti-tamper encryption implementation method of crossing and device on a kind of batch data Download PDFInfo
- Publication number
- CN108965310A CN108965310A CN201810848432.6A CN201810848432A CN108965310A CN 108965310 A CN108965310 A CN 108965310A CN 201810848432 A CN201810848432 A CN 201810848432A CN 108965310 A CN108965310 A CN 108965310A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- terminal
- key
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the anti-tamper encryption implementation method of crossing and device on a kind of batch data, implementation method is the following steps are included: generate key pair using 3DES algorithm;It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key and RSA Algorithm encryption is carried out to the first digital digest, generate the first encryption data;It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.The present invention guarantees that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
Description
Technical field
The invention belongs to data uploading file field, be related on a kind of batch data the anti-tamper encryption implementation method of crossing and
Device.
Background technique
Carried out data transmission by network, needs to verify the authenticity and integrity of data, prevent someone from passing through
It distorts and causes heavy losses to relevant people with data falsification.Anti-fake current data transmission is in data transmission while to pass mostly
5 md5-challenge of MD5(Message-Digest Algorithm of the defeated data) code, then recipient is receiving
MD5 code is generated after data again, determines whether data are complete by comparing MD5 twice.This mode have the disadvantage that by
It may be by monitoring, intercept and distort in transmission process in data, and new MD5 code is regenerated with the data after distorting.
Recipient can not perceive such case, if continuing to use the data after distorting and MD5 code, although data pass through verification, really
Integrality is protected, but it is clear that being unable to ensure its authenticity.
Summary of the invention
The present invention is in view of the above-mentioned problems, one of the objects of the present invention is to provide crossing on a kind of batch data is anti-tamper
Encryption implementation method, to guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The second object of the present invention is the provision of the anti-tamper encryption realization device of crossing on a kind of batch data, to guarantee
The authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The third object of the present invention is the provision of the anti-tamper encryption implementation method of crossing on a kind of batch data, further
Guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
The fourth object of the present invention is the provision of the anti-tamper encryption realization device of crossing on a kind of batch data, further
Guarantee that the authenticity and non repudiation of data, effective guarantee data transmit the interests of both sides.
One of in order to achieve the above purpose, the technical solution adopted by the present invention is that:
A kind of anti-tamper encryption implementation method of crossing on batch data comprising following steps:
Key pair is generated using 3DES algorithm;The key pair includes private key and public key corresponding with the private key, the private
Key assigns the transmission terminal of data, and the public key assigns the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key pair
First digital digest carries out RSA Algorithm encryption, generates the first encryption data;
It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;
It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key to the second number
Abstract carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
Preferably, the length of the key pair is 1024.
Preferably, the length of first digital digest and the second digital digest is 64.
Preferably, the length of first encryption data and the second encryption data is 128 bytes.
In order to achieve the above purpose two, the technical solution adopted by the present invention is that:
The anti-tamper encryption realization device of crossing on a kind of batch data comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private
The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal
It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
In order to achieve the above purpose three, the technical solution adopted by the present invention is that:
A kind of anti-tamper encryption implementation method of crossing on batch data comprising following steps:
Key pair is generated using 3DES algorithm;The key pair be two pairs, the key pair include the first private key, the second private key with
And and corresponding first public key of first private key, the second public key corresponding with second private key, first private key and
Two private keys assign the transmission terminal of data, and first public key and the second public key assign the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, it is private to reuse described first
Key carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
It sends terminal to encrypt the initial data using the second private key, generates ciphertext;
It sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception;
It receives terminal the ciphertext is decrypted using the second public key, obtains ciphertext data;
It receives terminal and the second digital digest is extracted to the ciphertext data using SHA256 algorithm, reuse first public key pair
Second digital digest carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
Preferably, the length of the key pair is 1024.
Preferably, the length of first digital digest and the second digital digest is 64.
Preferably, the length of first encryption data and the second encryption data is 128 bytes.
In order to achieve the above purpose four, the technical solution adopted by the present invention is that:
The anti-tamper encryption realization device of crossing on a kind of batch data comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes
First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public
Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data
Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal
Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal
Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
Compared with prior art, the anti-tamper encryption implementation method of crossing and device on batch data of the present invention, beneficial to effect
Fruit is:
3DES, SHA256 of selection, RSA cryptographic algorithms safety coefficient are higher, have not only carried out digital signature to initial data and have tested
Card, while can also first encrypt data in transmission, data, which can be effectively prevented, and be intercepted by ciphertext transmission causes
It divulges a secret.The result of digital signature authentication can not only guarantee the integrality of data, it is also ensured that the authenticity of data and can not
The property denied, effective guarantee data transmit the interests of both sides.
Detailed description of the invention
Fig. 1 is the flow chart of the anti-tamper encryption implementation method of crossing in batch of embodiment of the present invention data;
Fig. 2 is the flow chart of the anti-tamper encryption implementation method of crossing on three batch data of the embodiment of the present invention.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not
Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination
Example.
Embodiment one
The anti-tamper encryption implementation method of crossing on a kind of batch data, is used to guarantee the authenticity and non repudiation of data,
It please refers to shown in Fig. 1 comprising following steps:
110, using 3DES algorithm, (the triple data encryption algorithm of Triple Data Encryption Algorithm, are that block is close
The common name of code) generate key pair;Key pair can be provided by third party's security platform, be used for digital signature, effective guarantee number
According to the interests of transmission both sides.The length of key pair will guarantee safe enough, such as can use 1024 key pairs.It is described close
For key to including private key and public key corresponding with the private key, the private key assigns the transmission terminal of data, and the public key assigns
The reception terminal of data.
120, using SHA256 algorithm, (Secure Hash Algorithm secure hash algorithm is one close to transmission terminal
Code hash function family, is the secure hash algorithm that FIPS is authenticated) the first digital digest is extracted to sent initial data,
The length of first digital digest can be 64.It sends terminal and reuses the private key to the first digital digest progress RSA Algorithm
(a kind of rivest, shamir, adelman, RSA Algorithm are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Disamo
What your (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together, RSA is exactly their three people's surnames
The alphabetical composition that is stitched together of beginning) encryption, generate the first encryption data that length is 128 bytes.
130, it sends terminal and uploads the initial data and the first encryption data, to be received terminal reception.
140, the extraction that terminal carries out the second digital digest using SHA256 algorithm to received initial data is received,
The second digital digest extracted is also 64, and reception terminal reuses the public key and adds to the second digital digest progress RSA Algorithm
It is close, generate the second encryption data of 128 bytes.
150, it receives terminal and the second encryption data of generation and received first encryption data is subjected to consistency checking.
If 160, consistency checking passes through, it is determined that receive the true of the data (i.e. initial data) that terminal receives
Property and integrality.
If consistency checking does not pass through, data are untrue, return to 120 steps and retransmit data.
Embodiment two
Embodiment two provides the anti-tamper encryption realization device of crossing on a kind of batch data, is the virtual dress of above-described embodiment one
It sets comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private
The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal
It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
Embodiment three
Embodiment is first encrypted third is that the improvement carried out on the basis of embodiment to sent initial data, even if
The data of transmission are intercepted, and divulging a secret for data will not be caused, and more effectively prevent that data are intercepted to lead to risk of divulging a secret
Generation.Shown in referring to figure 2. comprising following steps:
210, key pair is generated using 3DES algorithm;The key pair is two pairs, and the key pair includes the first private key, the second private
Key and and corresponding first public key of first private key, the second public key corresponding with second private key.Key pair can lead to
The offer of third party's security platform is provided, digital signature is used for, effective guarantee data transmit the interests of both sides.The length of key pair will protect
Safe enough is demonstrate,proved, such as can use 1024 key pairs.First private key and the second private key assign the transmission of data
Terminal, first public key and the second public key assign the reception terminal of data.
220, it sends terminal and extracts the first digital digest, the first number to sent initial data using SHA256 algorithm
The length of abstract can be 64.Transmission terminal reuses first private key and carries out RSA Algorithm encryption to the first digital digest,
Generate the first encryption data that length is 128 bytes.
230, it sends terminal to encrypt the initial data using the second private key, generates ciphertext.
240, it sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception.
250, it receives terminal first the ciphertext is decrypted using the second public key, obtains ciphertext data.
260, it receives terminal and the second digital digest, the second number of extraction is extracted to the ciphertext data using SHA256 algorithm
Word abstract is also 64, receives terminal and reuses first public key to the progress RSA Algorithm encryption of the second digital digest, generates
Second encryption data of 128 bytes.
270, it receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If 280, consistency checking passes through, it is determined that receive the authenticity of the data (ciphertext) that terminal receives and complete
Property.The authenticity and integrity of ciphertext is determined, then ciphertext data is to want received initial data.
If consistency checking does not pass through, data are untrue, return to 220 steps and retransmit data.
Example IV
Example IV provides the anti-tamper encryption realization device of crossing on a kind of batch data, is the virtual dress of above-described embodiment three
It sets comprising:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes
First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public
Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data
Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal
Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal
Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto,
The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention
Claimed range.
Claims (10)
1. the anti-tamper encryption implementation method of crossing on a kind of batch data, which is characterized in that itself the following steps are included:
Key pair is generated using 3DES algorithm;The key pair includes private key and public key corresponding with the private key, the private
Key assigns the transmission terminal of data, and the public key assigns the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, reuse the private key pair
First digital digest carries out RSA Algorithm encryption, generates the first encryption data;
It sends terminal and uploads the initial data and the first encryption data, to be received terminal reception;
It receives terminal and the second digital digest is extracted to initial data using SHA256 algorithm, reuse the public key to the second number
Abstract carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
2. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: the key
Pair length be 1024.
3. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: described first
The length of digital digest and the second digital digest is 64.
4. the anti-tamper encryption implementation method of crossing on batch data according to claim 1, it is characterised in that: described first
The length of encryption data and the second encryption data is 128 bytes.
5. the anti-tamper encryption realization device of crossing on a kind of batch data, characterized in that it comprises:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair include private key and with the private
The corresponding public key of key, the private key assign the transmission terminal of data, and the public key assigns the reception terminal of data;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses the private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Transmission unit uploads the initial data and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is plucked using SHA256 algorithm to the second number of initial data extraction for receiving terminal
It wants, reuses the public key and RSA Algorithm encryption is carried out to the second digital digest, generate the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
6. the anti-tamper encryption implementation method of crossing on a kind of batch data, which is characterized in that itself the following steps are included:
Key pair is generated using 3DES algorithm;The key pair be two pairs, the key pair include the first private key and with it is described
Corresponding first public key of first private key, the second private key and the second public key corresponding with second private key, first private key
The transmission terminal of data is assigned with the second private key, first public key and the second public key assign the reception terminal of data;
It sends terminal and extracts the first digital digest to sent initial data using SHA256 algorithm, it is private to reuse described first
Key carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
It sends terminal to encrypt the initial data using the second private key, generates ciphertext;
It sends terminal and uploads the ciphertext and the first encryption data, to be received terminal reception;
It receives terminal the ciphertext is decrypted using the second public key, obtains ciphertext data;
It receives terminal and the second digital digest is extracted to the ciphertext data using SHA256 algorithm, reuse first public key pair
Second digital digest carries out RSA Algorithm encryption, generates the second encryption data;
It receives terminal and the second encryption data and the first encryption data is subjected to consistency checking;
If consistency checking passes through, it is determined that receive the authenticity and integrity for the data that terminal receives.
7. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: the key
Pair length be 1024.
8. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: described first
The length of digital digest and the second digital digest is 64.
9. the anti-tamper encryption implementation method of crossing on batch data according to claim 6, it is characterised in that: described first
The length of encryption data and the second encryption data is 128 bytes.
10. the anti-tamper encryption realization device of crossing on a kind of batch data, characterized in that it comprises:
Key pair generation unit, for generating key pair using 3DES algorithm;The key pair is two pairs, and the key pair includes
First private key, the second private key and and corresponding first public key of first private key, corresponding with second private key second public
Key, first private key and the second private key assign the transmission terminal of data, and first public key and the second public key assign data
Receive terminal;
First encryption data generates unit, extracts first to sent initial data using SHA256 algorithm for sending terminal
Digital digest reuses first private key and carries out RSA Algorithm encryption to the first digital digest, generates the first encryption data;
Ciphertext generates unit, is encrypted using the second private key to the initial data for sending terminal, generates ciphertext;
Transmission unit uploads the ciphertext and the first encryption data for sending terminal, to be received terminal reception;
Second encryption data generates unit, is decrypted, is decrypted to the ciphertext using the second public key for receiving terminal
Data;
Second encryption data generates unit, extracts the second number to the ciphertext data using SHA256 algorithm for receiving terminal
Abstract reuses first public key and carries out RSA Algorithm encryption to the second digital digest, generates the second encryption data;
Second encryption data and the first encryption data are carried out consistency checking for receiving terminal by authentication unit;
Determination unit, if passed through for consistency checking, it is determined that receive the authenticity of the data that terminal receives and complete
Whole property.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810848432.6A CN108965310A (en) | 2018-07-27 | 2018-07-27 | The anti-tamper encryption implementation method of crossing and device on a kind of batch data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810848432.6A CN108965310A (en) | 2018-07-27 | 2018-07-27 | The anti-tamper encryption implementation method of crossing and device on a kind of batch data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108965310A true CN108965310A (en) | 2018-12-07 |
Family
ID=64466368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810848432.6A Pending CN108965310A (en) | 2018-07-27 | 2018-07-27 | The anti-tamper encryption implementation method of crossing and device on a kind of batch data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108965310A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617876A (en) * | 2018-12-11 | 2019-04-12 | 北京首汽智行科技有限公司 | Data encryption, decryption method and system based on Http agreement |
CN111770185A (en) * | 2020-07-03 | 2020-10-13 | 中国农业银行股份有限公司贵州省分行 | System for data encryption transmission and storage |
CN111783120A (en) * | 2020-06-30 | 2020-10-16 | 曙光信息产业(北京)有限公司 | Data interaction method, computing device, BMC chip and electronic device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429738B1 (en) * | 2002-01-14 | 2013-04-23 | F5 Networks, Inc. | Method and system for performing asynchronous cryptographic operations |
CN103731270A (en) * | 2013-12-25 | 2014-04-16 | 华南理工大学 | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm |
CN106874270A (en) * | 2015-12-10 | 2017-06-20 | 中国移动通信集团云南有限公司 | A kind of method and apparatus of data consistency certification |
CN107395371A (en) * | 2017-09-11 | 2017-11-24 | 中国电子科技集团公司第五十八研究所 | Data encryption in wireless sensor network |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN107612910A (en) * | 2017-09-19 | 2018-01-19 | 北京邮电大学 | A kind of distributed document data access method and system |
-
2018
- 2018-07-27 CN CN201810848432.6A patent/CN108965310A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429738B1 (en) * | 2002-01-14 | 2013-04-23 | F5 Networks, Inc. | Method and system for performing asynchronous cryptographic operations |
CN103731270A (en) * | 2013-12-25 | 2014-04-16 | 华南理工大学 | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm |
CN106874270A (en) * | 2015-12-10 | 2017-06-20 | 中国移动通信集团云南有限公司 | A kind of method and apparatus of data consistency certification |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN107395371A (en) * | 2017-09-11 | 2017-11-24 | 中国电子科技集团公司第五十八研究所 | Data encryption in wireless sensor network |
CN107612910A (en) * | 2017-09-19 | 2018-01-19 | 北京邮电大学 | A kind of distributed document data access method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617876A (en) * | 2018-12-11 | 2019-04-12 | 北京首汽智行科技有限公司 | Data encryption, decryption method and system based on Http agreement |
CN111783120A (en) * | 2020-06-30 | 2020-10-16 | 曙光信息产业(北京)有限公司 | Data interaction method, computing device, BMC chip and electronic device |
CN111770185A (en) * | 2020-07-03 | 2020-10-13 | 中国农业银行股份有限公司贵州省分行 | System for data encryption transmission and storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111079128B (en) | Data processing method and device, electronic equipment and storage medium | |
EP3324572B1 (en) | Information transmission method and mobile device | |
CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
CN107317677B (en) | Secret key storage and equipment identity authentication method and device | |
CN103001976A (en) | Safe network information transmission method | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
JPH07287514A (en) | Message signature system execution device and chip card with it | |
KR100860573B1 (en) | Method for User Authentication | |
JP2022521525A (en) | Cryptographic method for validating data | |
CN104243494A (en) | Data processing method | |
CN108965310A (en) | The anti-tamper encryption implementation method of crossing and device on a kind of batch data | |
CN103493428B (en) | Data encryption | |
CN107483388A (en) | A kind of safety communicating method and its terminal and high in the clouds | |
CN108401494B (en) | Method and system for transmitting data | |
CN108616516A (en) | A kind of third party's plaintext password method of calibration based on multiple encryption algorithms | |
CN107682156A (en) | A kind of encryption communication method and device based on SM9 algorithms | |
CN116743470A (en) | Service data encryption processing method and device | |
Thapar et al. | A study of data threats and the role of cryptography algorithms | |
CN103312671A (en) | Method and system for verifying server | |
CN107230081A (en) | A kind of secure payment encryption system | |
CN110572257A (en) | Anti-quantum computing data source identification method and system based on identity | |
CN105703904B (en) | A kind of method for anti-counterfeit and system based on public key cryptography | |
Masadeh et al. | A novel paradigm in authentication system using swifi encryption/decryption approach | |
Zarkar et al. | Secure Server Verification by using Encryption Algorithm and Visual Cryptography | |
Madhukar | Cryptography technology with network security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181207 |
|
WD01 | Invention patent application deemed withdrawn after publication |