CN114640443B - Online engineering quotation safety interaction method and system - Google Patents
Online engineering quotation safety interaction method and system Download PDFInfo
- Publication number
- CN114640443B CN114640443B CN202210266708.6A CN202210266708A CN114640443B CN 114640443 B CN114640443 B CN 114640443B CN 202210266708 A CN202210266708 A CN 202210266708A CN 114640443 B CN114640443 B CN 114640443B
- Authority
- CN
- China
- Prior art keywords
- hash value
- ciphertext
- key
- plaintext
- online engineering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
Abstract
The invention provides a method, a system, electronic equipment and a storage medium for safe interaction of online engineering quotations. The method comprises the following steps: obtaining a first hash value of a plaintext of an online engineering quotation to be sent, obtaining a second hash value by using the first hash value, encrypting the plaintext of the online engineering quotation to be sent according to a plaintext secret key generated by the first hash value and the second hash value to obtain a first ciphertext, encrypting the first ciphertext by using the first secret key to obtain a second ciphertext, encrypting a third hash value generated according to the first ciphertext by using the second secret key to generate a third ciphertext, sending the second ciphertext and the third ciphertext to a receiver, and sending the first hash value to the receiver through quantum communication. According to the invention, the first hash value of the plaintext secret key is generated by different plaintext secret keys used by each online engineering quotation and using the quantum communication technology, compared with the traditional scheme of encrypting by using the fixed secret key, the safety of the online engineering quotation is effectively improved.
Description
Technical Field
The present invention relates to the field of online engineering quotations, and more particularly, to an online engineering quotation secure interaction method, system, electronic device, and storage medium.
Background
Currently, as internet technology matures, various web-based application services are rapidly developed. The online engineering quotation system has a certain potential safety hazard, and the existing online engineering quotation system mainly represents that the safety of online engineering quotation is not paid attention to enough, the online engineering quotation is generally only encrypted or digitally signed, the safety measure is not ideal enough, and the online engineering quotation is possibly tampered or stolen, so that the potential safety hazard is great.
Disclosure of Invention
To solve the above problems, according to one aspect of the present invention, there is provided an online engineering quotation secure interaction method, the method comprising:
obtaining a first hash value of an online engineering quotation plaintext, and obtaining a second hash value according to the first hash value;
generating a plaintext key by using the first hash value and the second hash value, and encrypting the online engineering quotation plaintext to obtain a first ciphertext; and calculating a third hash value of the first ciphertext;
encrypting the first ciphertext by using the first key to obtain a second ciphertext; encrypting the third hash value with the second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to a receiver;
decrypting the second ciphertext according to the secret key corresponding to the first secret key to obtain the first ciphertext, decrypting the third ciphertext according to the secret key corresponding to the second secret key to obtain the third hash value;
judging whether the first ciphertext is changed or not according to whether a fourth hash value calculated by the first ciphertext obtained after decryption is the same as the received third hash value; and if the fourth hash value is the same as the received third hash value, the first ciphertext is decrypted by using the plaintext key to obtain an online engineering quotation plaintext.
Preferably, obtaining the second hash value from the first hash value includes: and inputting the first hash value into a hash function for calculation to obtain the second hash value, wherein the hash function used for calculating the first hash value is different from the hash function used for calculating the second hash value.
Preferably, the first hash value and the third hash value are encrypted by a second key to obtain the third ciphertext and sent to a receiver, or after the online engineering quotation is finished, the first hash value is copied into the electronic equipment of the receiver by using a movable storage medium when the online engineering quotation result is published, so that the online engineering quotation result of each quoter is published; alternatively, the first hash value is transmitted using quantum communication techniques, and the second ciphertext and the third ciphertext are transmitted using non-quantum communication techniques.
Preferably, generating the plaintext key using the first hash value and the second hash value includes: encrypting the plaintext of the online engineering quotation by taking the numerical value processed according to the first hash value and the second hash value and the preset rule as a plaintext key; the preset rule comprises the following steps: and the first hash value and the second hash value are subjected to cascading or exclusive-or processing, or the result obtained after the exclusive-or operation of the first hash value and the second hash value is subjected to cascading to the processing after the first hash value or the second hash value, and the bit number with the proper length is selected from the processed result.
Preferably, the second hash value is generated according to the first hash value, the plaintext key is obtained according to the preset rule, and the first ciphertext is decrypted according to the plaintext key to obtain the first plaintext.
According to another aspect of the present invention, there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of any one of the above-mentioned online engineering quotation secure interaction methods when executing the computer program.
According to another aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer program, characterized in that the program when executed by a processor implements the steps of any one of the above-mentioned online engineering quotation secure interaction methods.
According to another aspect of the present invention, there is provided an online engineering quotation security interaction system, the system comprising:
a first acquisition unit: obtaining a first hash value of an online engineering quotation plaintext, and obtaining a second hash value according to the first hash value;
a first encryption unit: encrypting the plaintext of the online engineering quotation by using a plaintext key generated by the first hash value and the second hash value to obtain a first ciphertext; and calculating a third hash value of the first ciphertext;
a second encryption unit: encrypting the first ciphertext by using the first key to obtain a second ciphertext; encrypting the third hash value with the second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to the receiver;
a first decryption unit: decrypting the second ciphertext according to the key corresponding to the first key to obtain the first ciphertext, decrypting the third ciphertext according to the key corresponding to the second key to obtain the third hash value;
a second decryption unit: calculating whether the hash value of the first ciphertext obtained after decryption is the same as the received third hash value or not, and judging whether the first ciphertext is changed or not; if the hash value calculated by the first ciphertext is the same as the received third hash value, the first ciphertext is not changed, and the plaintext key is utilized to decrypt the first ciphertext, so that the online engineering quotation plaintext is obtained.
Preferably, the first obtaining unit obtaining the second hash value according to the first hash value includes: inputting the first hash value into a hash function for calculation to obtain a second hash value, or cascading the online engineering quotation with the first hash value and then inputting the first hash value into the hash function to obtain the second hash value; wherein the hash function used to calculate the first hash value is different from the hash function used to calculate the second hash value.
Preferably, the second encryption unit is further configured to: the first hash value and the third hash value are encrypted by a second key to obtain a third ciphertext, and the third ciphertext is sent to a receiver; or after the online engineering quotation is finished, copying the first hash value into the electronic equipment of the receiver by using a movable storage medium when the online engineering quotation result is published so as to publish the online engineering quotation result of each quoter; alternatively, the first hash value is transmitted using quantum communication techniques, and the second ciphertext and the third ciphertext are transmitted using non-quantum communication techniques.
Preferably, the first encryption unit further encrypts the online engineering quotation plaintext by using a numerical value processed according to a preset rule according to the first hash value and the second hash value as a plaintext key; the preset rule comprises the following steps: and the first hash value and the second hash value are subjected to cascading or exclusive-or processing, or the result of the cascading exclusive-or operation of the first hash value and the second hash value is subjected to cascading to the processing of the first hash value or the second hash value, and the bit number with the proper length is selected from the processed result.
Preferably, the second decryption unit decrypts the first ciphertext using the plaintext key, including: and generating the second hash value according to the first hash value, obtaining the plaintext key according to the preset rule, and decrypting the first ciphertext according to the plaintext key to obtain a first plaintext.
The invention has the beneficial effects that: the invention uses the first hash value related to the online engineering quotation to generate the plaintext encryption of the online engineering quotation, and the first hash value related to the online engineering quotation and the corresponding plaintext encryption key are different due to the different online engineering quotations when each quotation is performed, so compared with the traditional encryption scheme of the fixed encryption key, the invention effectively improves the safety of the online engineering quotation, prevents the online engineering quotation from being tampered, eliminates the potential safety hazard of the online engineering quotation, and simultaneously avoids the need of a special encryption key generation function to generate the plaintext encryption key. Meanwhile, the first hash value is transmitted by utilizing the quantum communication technology, and the second ciphertext and the third ciphertext are transmitted by utilizing the non-quantum communication technology, so that the safety of online engineering quotation is enhanced, and meanwhile, the communication cost is considered.
Drawings
FIG. 1 is a flow chart of an online engineering quotation secure interaction method according to an embodiment of the invention;
fig. 2 is a schematic structural diagram of an online engineering quotation security interaction system according to an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
FIG. 1 is a flow chart of a safe interaction method for online engineering quotations according to an embodiment of the invention. As shown in fig. 1, the present implementation provides an online engineering quotation secure interaction method, which includes:
s101, obtaining a first hash value of a plaintext of an online engineering quotation to be encrypted, and obtaining a second hash value according to the first hash value; the online engineering quotation comprises quotation person information, quotation data information, quotation project, quotation receiver information and the like.
S102, generating a plaintext key by using the first hash value and the second hash value, and encrypting the plaintext of the online engineering quotation to obtain a first ciphertext; and calculating a third hash value of the first ciphertext; the first ciphertext may be obtained using a DES algorithm, a 3DES algorithm, or an AES algorithm; and calculating a third hash value of the first ciphertext; the first hash value and the second hash value are 128 bits, but may be of other lengths.
S103, encrypting the first ciphertext by using the first key to obtain a second ciphertext; encrypting the third hash value with the second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to the receiver;
s104, decrypting the second ciphertext according to the key corresponding to the first key to obtain a first ciphertext, and decrypting the third ciphertext according to the key corresponding to the second key to obtain a third hash value;
s105, judging whether the first ciphertext is changed according to whether a fourth hash value calculated by the first ciphertext obtained after decryption is the same as the received third hash value; if the fourth hash value is the same as the received third hash value, the first ciphertext is decrypted by using the plaintext key to obtain the plaintext of the online engineering quotation.
In the prior art, symmetric encryption and asymmetric encryption algorithms are included. The asymmetric encryption algorithm requires two keys, a public key (public key) and a private key (private key). The public key and the private key are a pair, and if the public key is used for encrypting the data, the data can be decrypted only by the corresponding private key; if the data is encrypted with a private key, then decryption is only possible with the corresponding public key. In the present invention, the first key and the second key, and the keys corresponding thereto may be public keys and private keys in an asymmetric encryption algorithm, respectively.
The hash algorithm in the present invention may be MD5 or SHA, SHA-224, SHA-256, SHA-384, and SHA-512 algorithms (collectively referred to as SHA-2), SHA-3, etc.
In this embodiment, obtaining the second hash value according to the first hash value includes: the first hash value is input into a hash function to be calculated so as to obtain a second hash value, wherein the hash function used for calculating the first hash value is different from the hash function used for calculating the second hash value. And calculating the third hash value and the hash function used for calculating the fourth hash value are the same.
In this embodiment, the first hash value and the third hash value may be encrypted with a second key to obtain a third ciphertext and sent to the receiver, or when the online engineering quotation result is published after the online engineering quotation is finished, the first hash value is copied to the electronic device of the receiver by using a removable storage medium so as to decrypt the first ciphertext and publish the online engineering quotation result of each quoter; the first hash value is transmitted using quantum communication techniques. Only the first hash value is transmitted by utilizing a quantum communication technology, so that not only is the online engineering quotation of the whole flow ensured, but also the safety of communication is ensured; and meanwhile, the increase of communication cost caused by using quantum communication to transmit all online engineering quotations is avoided. Therefore, the first hash value of the online engineering quotation is transmitted by utilizing quantum communication, and the second ciphertext and the third ciphertext encrypted by the online engineering quotation are transmitted by utilizing traditional network communication, so that the safety can be ensured, and the communication cost is not excessively increased.
In this embodiment, the plaintext of the online engineering quotation is encrypted by using the value processed according to the preset rule as the plaintext key according to the first hash value and the second hash value; the preset rule comprises the following steps: and the first hash value and the second hash value are subjected to cascading or exclusive-or processing, or the result obtained after the exclusive-or operation of the first hash value and the second hash value is subjected to cascading to the processing after the first hash value or the second hash value, and the bit number with the proper length is selected from the processed result.
For example, an exclusive or result of the 128-bit first hash value and the second hash value may be calculated, and a plaintext key for encrypting the plaintext of the online engineering quotation may be selected according to a preset rule; for example, the preset rule is that one of the second hash value of 128 bits and the exclusive or result of the first hash value and the second hash value is selected, and the first 56 bits or the last 56 bits or the middle 56 bits are selected from the selected values to be used as keys of a DES algorithm; or after the exclusive OR result of the first hash value and the second hash value is cascaded with the second hash value or the first hash value, selecting 3 56-bit numerical values from the first hash value and the second hash value, wherein the numerical values can be the first 56 bits, the last 56 bits and the middle 56 bits as keys of a 3DES algorithm; the preset rule further comprises that the value obtained after the exclusive OR of the first hash value and the second hash value is cascaded to the first hash value or the second hash value; and selects 192 bits from the concatenated result as the AES key, e.g., the first 192 bits or the last 192 bits, or the middle 192 bits. The concatenated 256 bits may also be used as an AES key.
And the receiver generates the second hash value according to the first hash value, obtains the plaintext key according to the preset rule, and decrypts the first ciphertext according to the plaintext key to obtain a first plaintext. The fifth hash value is calculated by using the first plaintext, the adopted hash function is the same as the hash function for calculating the first hash value, and whether the first plaintext is tampered or not is verified according to the first hash value and the fifth hash value so as to verify the transmission security.
Example 2
The present embodiment provides an online engineering quotation secure interaction system, as shown in fig. 2, which includes a first acquisition unit 201, a first encryption unit 202, a second encryption unit 203, a first decryption unit 204, and a second decryption unit 205.
The system comprises:
the first acquisition unit 201: obtaining a first hash value of an online engineering quotation plaintext, and obtaining a second hash value according to the first hash value;
the first encryption unit 202: encrypting the plaintext of the online engineering quotation by using a plaintext key generated by the first hash value and the second hash value to obtain a first ciphertext; and calculating a third hash value of the first ciphertext;
the second encryption unit 203: encrypting the first ciphertext by using the first key to obtain a second ciphertext; encrypting the third hash value with the second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to the receiver;
the first decryption unit 204: decrypting the second ciphertext according to the secret key corresponding to the first secret key to obtain a first ciphertext, and decrypting the third ciphertext according to the secret key corresponding to the second secret key to obtain a third hash value;
the second decryption unit 205: judging whether the first ciphertext is changed according to whether a fourth hash value calculated by the first ciphertext obtained after decryption is the same as the received third hash value; if the fourth hash value is the same as the received third hash value, the first ciphertext is decrypted by using the plaintext key to obtain the plaintext of the online engineering quotation.
In the prior art, symmetric encryption and asymmetric encryption algorithms are included. The asymmetric encryption algorithm requires two keys, a public key (public key) and a private key (private key). The public key and the private key are a pair, and if the public key is used for encrypting the data, the data can be decrypted only by the corresponding private key; if the data is encrypted with a private key, then decryption is only possible with the corresponding public key. In the present invention, the first key and the second key, and the keys corresponding thereto may be public keys and private keys in an asymmetric encryption algorithm, respectively.
The hash algorithm in the present invention may be MD5 or SHA, SHA-224, SHA-256, SHA-384, and SHA-512 algorithms (collectively referred to as SHA-2), SHA-3, etc.
In this embodiment, the first obtaining unit 201 obtaining the second hash value according to the first hash value includes: inputting the first hash value into a hash function for calculation to obtain a second hash value, or cascading the online engineering quotation with the first hash value and then inputting the first hash value into the hash function to obtain the second hash value; wherein the hash function used to calculate the first hash value is different from the hash function used to calculate the second hash value. The hash function used to calculate the third hash value and the fourth hash value is the same.
In this embodiment, the second encryption unit 203 is further configured to: the first hash value and the third hash value can be encrypted by a second key to obtain a third ciphertext and sent to a receiver, or the first hash value is copied into electronic equipment of the receiver by a movable storage medium when the online engineering quotation result is published after the online engineering quotation is finished so as to decrypt the first ciphertext and publish the online engineering quotation result of each quoter; the first hash value is transmitted using quantum communication techniques. Only the first hash value is transmitted by utilizing a quantum communication technology, so that not only is the online engineering quotation of the whole flow ensured, but also the safety of communication is ensured; and meanwhile, the increase of communication cost caused by using quantum communication to transmit all online engineering quotations is avoided. Therefore, the first hash value of the online engineering quotation is transmitted by utilizing quantum communication, and the second ciphertext and the third ciphertext encrypted by the online engineering quotation are transmitted by utilizing traditional network communication, so that the safety can be ensured, and the communication cost is not excessively increased.
In this embodiment, the first encryption unit 202 further encrypts the online engineering quotation plaintext by using the value processed according to the first hash value and the second hash value and the preset rule as the plaintext key; the preset rule comprises the following steps: and the first hash value and the second hash value are subjected to cascading or exclusive-or processing, or the result obtained after the exclusive-or operation of the first hash value and the second hash value is subjected to cascading to the processing after the first hash value or the second hash value, and the bit number with the proper length is selected from the processed result.
For example, an exclusive or result of the 128-bit first hash value and the second hash value may be calculated, and a key for encrypting the plaintext of the online engineering quotation may be selected according to a preset rule; for example, the preset rule is that one of the second hash value of 128 bits and the exclusive or result of the first hash value and the second hash value is selected, and the first 56 bits or the last 56 bits or the middle 56 bits are selected from the selected values to be used as keys of a DES algorithm; or after cascade connection of the second hash value and the exclusive or result of the first hash value and the second hash value, selecting 3 values of 56 bits from the second hash value, wherein the values can be the first 56 bits, the last 56 bits and the middle 56 bits as keys of a 3DES algorithm; the preset rule further comprises that the value obtained after the exclusive OR of the first hash value and the second hash value is cascaded to the first hash value or the second hash value; and selects 192 bits from the concatenated result as the AES key, e.g., the first 192 bits or the last 192 bits, or the middle 192 bits. The concatenated 256 bits may also be used as an AES key.
In this embodiment, the second decryption unit 205 generates the second hash value according to the first hash value, obtains the plaintext key according to the preset rule, and decrypts the first ciphertext according to the plaintext key to obtain the first plaintext. The fifth hash value may be calculated by using the first plaintext, the hash function used is the same as the hash function used to calculate the first hash value, and whether the first plaintext is tampered is verified according to the first hash value and the fifth hash value, so as to verify the security of transmission.
Example 3
The present embodiment provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the online engineering quotation secure interaction method described in embodiment 1 when the computer program is executed.
Example 4
The present embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the online engineering quotation secure interaction method described in embodiment 1.
More specifically, among others, readable storage media may be employed including, but not limited to: portable disk, hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible embodiment, the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps of implementing the online engineering quotation secure interaction method as described in example 1, when said program product is run on the terminal device.
Wherein the program code for carrying out the invention may be written in any combination of one or more programming languages, which program code may execute entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device and partly on the remote device or entirely on the remote device.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. An online engineering quotation safe interaction method, which is characterized by comprising the following steps:
obtaining a first hash value of an online engineering quotation plaintext, and obtaining a second hash value according to the first hash value;
generating a plaintext key by using the first hash value and the second hash value, and encrypting the online engineering quotation plaintext to obtain a first ciphertext; and calculating a third hash value of the first ciphertext;
encrypting the first ciphertext by using the first key to obtain a second ciphertext;
encrypting the third hash value with the second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to the receiver;
decrypting the second ciphertext according to the key corresponding to the first key to obtain a first ciphertext, and decrypting the third ciphertext according to the key corresponding to the second key to obtain a third hash value;
judging whether the first ciphertext is changed according to whether a fourth hash value calculated by the first ciphertext obtained after decryption is the same as the received third hash value;
if the fourth hash value is the same as the received third hash value, the first ciphertext is decrypted by using the plaintext key without modification, and an online engineering quotation plaintext is obtained;
the first hash value and the third hash value are encrypted by the second key to obtain the third ciphertext and sent to a receiver, or after the online engineering quotation is finished, the first hash value is copied into electronic equipment of the receiver by using a movable storage medium when the online engineering quotation result is published so as to publish the online engineering quotation result of each quoter; alternatively, the first hash value is transmitted using quantum communication techniques, and the second ciphertext and the third ciphertext are transmitted using non-quantum communication techniques.
2. The method of claim 1, wherein obtaining the second hash value from the first hash value comprises: and inputting the first hash value into a hash function for calculation to obtain the second hash value, wherein the hash function used for calculating the first hash value is different from the hash function used for calculating the second hash value.
3. The method of claim 1, wherein generating the plaintext key using the first hash value and the second hash value encrypts an online engineering quote plaintext, comprising:
encrypting the plaintext of the online engineering quotation by taking the numerical value processed according to the first hash value and the second hash value and the preset rule as a plaintext key;
the preset rule comprises the following steps: the first hash value and the second hash value are subjected to cascading or exclusive-or processing, or the result obtained after exclusive-or operation of the first hash value and the second hash value is subjected to cascading to the processing of the first hash value or the second hash value, and the bit number with the proper length is selected from the processed result;
and/or the number of the groups of groups,
the decrypting the first ciphertext using the plaintext key includes: and generating the second hash value according to the first hash value, obtaining the plaintext key according to the preset rule, and decrypting the first ciphertext according to the plaintext key to obtain a first plaintext.
4. An online engineering quotation secure interactive system, the system comprising:
a first acquisition unit: obtaining a first hash value of an online engineering quotation plaintext, and obtaining a second hash value according to the first hash value;
a first encryption unit: encrypting the plaintext of the online engineering quotation by using the plaintext key generated by the first hash value and the second hash value to obtain a first ciphertext; and calculating a third hash value of the first ciphertext;
a second encryption unit: encrypting the first ciphertext by using the first key to obtain a second ciphertext; encrypting the third hash value with a second key to obtain a third ciphertext; transmitting the second ciphertext and the third ciphertext to a receiver;
a first decryption unit: decrypting the second ciphertext according to the key corresponding to the first key to obtain a first ciphertext, and decrypting the third ciphertext according to the key corresponding to the second key to obtain the third hash value;
a second decryption unit: judging whether the first ciphertext is changed according to whether a fourth hash value calculated by the first ciphertext obtained after decryption is the same as the received third hash value; if the fourth hash value is the same as the received third hash value, the first ciphertext is decrypted by using the plaintext key without modification, and an online engineering quotation plaintext is obtained;
the first hash value and the third hash value are encrypted by the second key to obtain the third ciphertext and sent to a receiver, or after the online engineering quotation is finished, the first hash value is copied into electronic equipment of the receiver by using a movable storage medium when the online engineering quotation result is published so as to publish the online engineering quotation result of each quoter; alternatively, the first hash value is transmitted using quantum communication techniques, and the second ciphertext and the third ciphertext are transmitted using non-quantum communication techniques.
5. The system of claim 4, wherein the first obtaining unit obtaining the second hash value from the first hash value comprises:
inputting the first hash value into a hash function for calculation to obtain the second hash value, or cascading the online engineering quotation with the first hash value and then inputting the first hash value into the hash function to obtain the second hash value; wherein the hash function used to calculate the first hash value is different from the hash function used to calculate the second hash value.
6. The system of claim 4, wherein the first encryption unit further encrypts the online engineering bid plaintext using the value processed according to the first hash value and the second hash value according to a preset rule as a plaintext key;
the preset rule comprises the following steps: the first hash value and the second hash value are cascaded or exclusive-or processed, or the result of the cascade exclusive-or operation of the first hash value and the second hash value is cascaded to the processing of the first hash value or the second hash value, and the bit number with proper length is selected from the processed result;
and/or the number of the groups of groups,
the decrypting the first ciphertext using the plaintext key includes: and generating the second hash value according to the first hash value, obtaining the plaintext key according to the preset rule, and decrypting the first ciphertext according to the plaintext key to obtain a first plaintext.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1-3 when executing the computer program.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the steps of the method according to any of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210266708.6A CN114640443B (en) | 2022-03-17 | 2022-03-17 | Online engineering quotation safety interaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210266708.6A CN114640443B (en) | 2022-03-17 | 2022-03-17 | Online engineering quotation safety interaction method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114640443A CN114640443A (en) | 2022-06-17 |
CN114640443B true CN114640443B (en) | 2023-05-09 |
Family
ID=81949883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210266708.6A Active CN114640443B (en) | 2022-03-17 | 2022-03-17 | Online engineering quotation safety interaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114640443B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117278986B (en) * | 2023-11-23 | 2024-03-15 | 浙江小遛信息科技有限公司 | Data processing method and data processing equipment for sharing travel |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312501A (en) * | 2012-01-26 | 2013-09-18 | 英飞凌科技股份有限公司 | Apparatus and method for producing a message authentication code |
US9407437B1 (en) * | 2014-03-25 | 2016-08-02 | Amazon Technologies, Inc. | Secure initialization vector generation |
CN108683688A (en) * | 2018-07-20 | 2018-10-19 | 中国建设银行股份有限公司浙江省分行 | A method of information transmission security is realized based on Digital Envelope Technology |
CN109120573A (en) * | 2017-06-22 | 2019-01-01 | 武汉大学 | Transmission key generation method, terminal and server |
CN109933995A (en) * | 2019-01-31 | 2019-06-25 | 广州中国科学院软件应用技术研究所 | A kind of user's protecting sensitive data and system based on cloud service and block chain |
CN111082935A (en) * | 2019-12-31 | 2020-04-28 | 江苏芯盛智能科技有限公司 | Media key generation method and device and terminal based on media key |
CN111726224A (en) * | 2020-05-13 | 2020-09-29 | 北京信息科技大学 | Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium |
CN112544052A (en) * | 2020-07-30 | 2021-03-23 | 华为技术有限公司 | Key agreement method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101984574B (en) * | 2010-11-29 | 2012-09-05 | 北京卓微天成科技咨询有限公司 | Data encryption and decryption method and device |
-
2022
- 2022-03-17 CN CN202210266708.6A patent/CN114640443B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312501A (en) * | 2012-01-26 | 2013-09-18 | 英飞凌科技股份有限公司 | Apparatus and method for producing a message authentication code |
US9407437B1 (en) * | 2014-03-25 | 2016-08-02 | Amazon Technologies, Inc. | Secure initialization vector generation |
CN109120573A (en) * | 2017-06-22 | 2019-01-01 | 武汉大学 | Transmission key generation method, terminal and server |
CN108683688A (en) * | 2018-07-20 | 2018-10-19 | 中国建设银行股份有限公司浙江省分行 | A method of information transmission security is realized based on Digital Envelope Technology |
CN109933995A (en) * | 2019-01-31 | 2019-06-25 | 广州中国科学院软件应用技术研究所 | A kind of user's protecting sensitive data and system based on cloud service and block chain |
CN111082935A (en) * | 2019-12-31 | 2020-04-28 | 江苏芯盛智能科技有限公司 | Media key generation method and device and terminal based on media key |
CN111726224A (en) * | 2020-05-13 | 2020-09-29 | 北京信息科技大学 | Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium |
CN112544052A (en) * | 2020-07-30 | 2021-03-23 | 华为技术有限公司 | Key agreement method and device |
Non-Patent Citations (4)
Title |
---|
Generation of Symmetric Key Using Randomness of Hash Function;Kamana Sai Charan等;2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT);全文 * |
哈希加密方案;黄智颖,冯新喜,张焕国;通信技术(第07期);全文 * |
基于超混沌和一次性密钥的通用分组加密算法;阿布都热合曼・卡的尔;米热古丽・艾力;木塔力甫・沙塔尔;;计算机工程与设计(第09期);全文 * |
面向数据去重的基于二次哈希的收敛加密策略;周玉坤;冯丹;夏文;付忞;计算机工程与科学(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114640443A (en) | 2022-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9641331B2 (en) | Method for converting a conditional access content and receiver for the implementation for said method | |
US8358781B2 (en) | Nonlinear feedback mode for block ciphers | |
US8416947B2 (en) | Block cipher using multiplication over a finite field of even characteristic | |
CN107086915B (en) | Data transmission method, data sending end and data receiving end | |
JP2015104119A (en) | Block encryption method including integrity verification, and block decryption method | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
US11431489B2 (en) | Encryption processing system and encryption processing method | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
US8804953B2 (en) | Extensive ciphertext feedback | |
US8041033B2 (en) | Cipher feedback with variable block chaining | |
CN114640443B (en) | Online engineering quotation safety interaction method and system | |
US9473471B2 (en) | Method, apparatus and system for performing proxy transformation | |
CN113326518A (en) | Data processing method and device | |
CN114629620A (en) | Homomorphic encryption calculation method and system, homomorphic request, calculation and key system | |
CN114499825A (en) | Double-control key management method, system, encryption machine and storage medium | |
CN114205144A (en) | Data transmission method, device, equipment, storage medium and program product | |
KR101595056B1 (en) | System and method for data sharing of intercloud enviroment | |
JP5586758B1 (en) | Dynamic encryption key generation system | |
CN113408013A (en) | Encryption and decryption chip framework with multiple algorithm rules mixed | |
Kaur et al. | Monitoring data integrity while using TPA in cloud environment | |
Kim et al. | A modified exhaustive search on a password system using SHA-1 | |
Charru et al. | Improved Cryptography Algorithm to Enhanced Data Security | |
Malhotra et al. | Genetic symmetric key generation for idea | |
CN113141249B (en) | Threshold decryption method, system and readable storage medium | |
JP5293612B2 (en) | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |