CN102025505A - Advanced encryption standard (AES) algorithm-based encryption/decryption method and device - Google Patents
Advanced encryption standard (AES) algorithm-based encryption/decryption method and device Download PDFInfo
- Publication number
- CN102025505A CN102025505A CN 201010593085 CN201010593085A CN102025505A CN 102025505 A CN102025505 A CN 102025505A CN 201010593085 CN201010593085 CN 201010593085 CN 201010593085 A CN201010593085 A CN 201010593085A CN 102025505 A CN102025505 A CN 102025505A
- Authority
- CN
- China
- Prior art keywords
- aes
- key
- ciphertext
- plaintext
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000012545 processing Methods 0.000 claims description 20
- 238000005457 optimization Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000006854 communication Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013478 data encryption standard Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides advanced encryption standard (AES) algorithm-based encryption/decryption method and an AES algorithm-based encryption/decryption device. The encryption method comprises the following steps of: encrypting a plaintext by using an AES secret key to obtain a ciphertext of the plaintext; encrypting the AES secret key by using a receiving end public key to obtain the ciphertext of the AES secret key; acquiring an informative abstract of the plaintext; and encrypting the informative abstract by using a transmitting end private key to obtain an abstract signature. By the encryption method and the decryption method corresponding to the encryption method, the safety problem in the data transmission process can be effectively solved, so that the safety performance of the whole system or product is improved.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of encryption, decryption method and device based on aes algorithm.
Background technology
At present since the application of network service more and more widely, in communication process, it is more and more important that data transmission security becomes, and adopts the mode that data are encrypted to become the preferably selection that guarantees data security undoubtedly in the transmission of data.
American National Standard and technical research institute (NIST) have set up new high-level data encryption standard (AES) standard on May 26th, 2002.AES is a new cryptographic algorithm that can be used to protect electronic data.In particular, AES is the password of an iteration, symmetric key grouping, and it can use 128,192 and 256 keys, and with 128 (16 byte) block encryption and data decryptions.Use key to different with public key cryptography, symmetric key cipher is used identical secret key encryption and data decryption.The figure place of the enciphered data of returning by block cipher is identical with the input data.Iterative cryptographic uses a loop structure, repeats displacement (permutations) and replace (substitutions) input data in this circulation.
But the Cipher Strength of aes algorithm is limited, and especially for the higher communications field of security requirement, its cipher round results is very desirable.
Summary of the invention
The technical problem to be solved in the present invention is, a kind of encryption based on aes algorithm, decryption method and device are provided, and effectively solved the safety problem of data in transmission course, thereby improves whole system or security of products energy.
In order to solve the problems of the technologies described above, the present invention proposes a kind of encryption method based on aes algorithm, comprising:
Use AES key to expressly carrying out encryption, obtain the ciphertext of described plaintext;
Use the receiving terminal PKI that described AES key is carried out encryption, obtain the ciphertext of described AES key;
Obtain the informative abstract of described plaintext, use the transmitting terminal private key that described informative abstract is carried out encryption, obtain digest.
Further, said method also can have following characteristics:
Obtain described AES key according to described transmitting terminal private key and described receiving terminal PKI.
Further, said method also can have following characteristics:
Use the aes algorithm of dynamic S-box optimization to come described plaintext is carried out encryption.
In order to solve the problems of the technologies described above, the present invention also proposes a kind of decryption method based on aes algorithm, be used for from comprising ciphertext expressly, the ciphertext of AES key, and decrypt in the signal of digest expressly, the ciphertext of described plaintext is encrypted by AES key, the ciphertext of described AES key is by the receiving terminal public key encryption, and described digest is by the transmitting terminal encrypted private key, and described decryption method comprises:
Use described receiving terminal private key that the ciphertext of described AES key is decrypted processing, obtain AES key;
Use described AES key that the ciphertext of described plaintext is decrypted processing, obtain expressly;
From described plaintext, obtain informative abstract, obtain first information summary;
Use described transmitting terminal private key that described digest is decrypted processing, obtain second informative abstract;
More described first information summary and described second informative abstract if both are identical, think that then deciphering is correct, otherwise, think and decipher failure.
Further, said method also can have following characteristics:
The ciphertext of described plaintext is to use the aes algorithm of dynamic S-box optimization to encrypt;
Use the aes algorithm of described dynamic S-box optimization to come the ciphertext of described plaintext is decrypted processing.
In order to solve the problems of the technologies described above, the present invention also proposes a kind of encryption device based on aes algorithm, comprising:
First encrypting module uses AES key to expressly carrying out encryption, obtains the ciphertext of described plaintext;
Second encrypting module uses the receiving terminal PKI that described AES key is carried out encryption, obtains the ciphertext of described AES key;
The 3rd encrypting module obtains the informative abstract of described plaintext, uses the transmitting terminal private key that described informative abstract is carried out encryption, obtains digest.
Further, above-mentioned encryption device also can have following characteristics:
The AES key generation module generates described AES key according to described transmitting terminal private key and described receiving terminal PKI.
Further, above-mentioned encryption device also can have following characteristics:
Described first encrypting module uses the aes algorithm of dynamic S-box optimization to come described plaintext is carried out encryption.
In order to solve the problems of the technologies described above, the present invention also proposes a kind of decryption device based on aes algorithm, be used for from comprising ciphertext expressly, the ciphertext of AES key, and decrypt in the signal of digest expressly, the ciphertext of described plaintext is encrypted by AES key, the ciphertext of described AES key is by the receiving terminal public key encryption, and described digest is by the transmitting terminal encrypted private key, and described decryption device comprises:
First deciphering module uses described receiving terminal private key that the ciphertext of described AES key is decrypted processing, obtains AES key;
Second deciphering module uses described AES key that the ciphertext of described plaintext is decrypted processing, obtains expressly;
The 3rd deciphering module obtains informative abstract from described plaintext, obtain first information summary;
The 4th deciphering module uses described transmitting terminal private key that described digest is decrypted processing, obtains second informative abstract;
Comparison module, more described first information summary and described second informative abstract if both are identical, think that then deciphering is correct, otherwise, think and decipher failure.
Further, above-mentioned decryption device also can have following characteristics:
The ciphertext of described plaintext is to use the aes algorithm of dynamic S-box optimization to encrypt;
Described first deciphering module uses the aes algorithm of described dynamic S-box optimization to come the ciphertext of described plaintext is decrypted processing.
A kind of encryption based on aes algorithm provided by the invention, decryption method and device can effectively solve the safety problem of data in transmission course, improve whole system or security of products energy.
Description of drawings
Fig. 1 is a kind of encryption method flow chart based on aes algorithm of the embodiment of the invention;
Fig. 2 is the operating process schematic diagram of a kind of encryption method based on aes algorithm of the embodiment of the invention;
Fig. 3 is the schematic diagram that the embodiment of the invention adopts the aes algorithm of dynamic S-box optimization;
Fig. 4 is the distribution method schematic diagram of a kind of symmetric key of the embodiment of the invention;
Fig. 5 is a kind of decryption method flow chart based on aes algorithm of the embodiment of the invention;
Fig. 6 is the operating process schematic diagram of a kind of decryption method based on aes algorithm of the embodiment of the invention.
Embodiment
Describe embodiment of the present invention in detail below in conjunction with accompanying drawing.
Referring to Fig. 1, the figure shows a kind of encryption method of the embodiment of the invention based on aes algorithm, comprise step:
Step S101: use AES key to expressly carrying out encryption, obtain the ciphertext of described plaintext;
Step S102: use the receiving terminal PKI that described AES key is carried out encryption, obtain the ciphertext of described AES key;
Step S103: obtain the informative abstract of described plaintext, use the transmitting terminal private key that described informative abstract is carried out encryption.
Wherein, the order of above-mentioned steps S101 to S103 is fixing, can be provided with as required, perhaps can carry out the encryption to plaintext, informative abstract and AES key simultaneously, and the present invention does not limit this.
In order to show embodiment of the invention encrypted process more intuitively, see also cryptographic operation process schematic diagram shown in Figure 2, in ciphering process, plaintext, informative abstract and AES key are carried out encryption respectively in different ways, effectively increase the intensity of aes algorithm, guaranteed safety of data.
In above-mentioned steps S103, described transmitting terminal can adopt for example SHA (SHA-1), md5-challenge (Message-Digest Algorithm5 is called for short md5) algorithm scheduling algorithm realization when obtaining the informative abstract of described plaintext.
In step S101, described transmitting terminal adopts aes algorithm to expressly carrying out encryption.Preferably, the aes algorithm that can adopt dynamic S-box to optimize, thus further strengthen the intensity of encrypting.Referring to Fig. 3, the figure shows a kind of formation of dynamic S-box, comprise a S box selector and several S boxes.Wherein, described S box selector calculates the hashed value of AES key, determines the S box of current use according to described hashed value.Preferably, design each S box in the described dynamic S-box to choose probability consistent and not related each other, this moment, the security intensity of each S box was approaching, and the S box in the dynamic S-box chooses and depend on key, therefore the intensity of described dynamic S-box is higher.When specific implementation, can adopt a plurality of irreducible polynomials to construct each S box respectively, make each S box Cipher Strength unanimity, and then can effectively improve by the security intensity of the dynamic S-box of described each S box structure.
Before step S101, also comprise the calculation procedure of AES key: obtain described AES key according to described transmitting terminal private key and described receiving terminal PKI.
Transmitting terminal has a key to (da, Qa), described cipher key pair comprises transmitting terminal PKI Qa and transmitting terminal private key da.Receiving terminal also has a key to (db, Qb), described cipher key pair comprises receiving terminal PKI Qb and receiving terminal private key db.Wherein, described AES key can be chosen symmetric key,, Qa=daP can be set that is, and Qb=dbP, P are a multiple value, and concrete value can be provided with as required.It is d=daQb=dbQa=dadbP that transmitting terminal is got the AES symmetric key.
Before the step that obtains described AES key according to described transmitting terminal private key and described receiving terminal PKI, also comprise transmitting terminal and receiving terminal obtains the right step of opposite end key.For example, right mode realizes can to adopt interchange key, is about to the local terminal key to being sent to the opposite end, and it is right to receive the key of opposite end.
Obtaining the opposite end key, also comprise the step that transmitting terminal and receiving terminal determine that the local terminal key is right to before.
The embodiment of the invention provides a kind of transmitting terminal and receiving terminal to determine the method that the local terminal key is right at this, as shown in Figure 4:
Described transmitting terminal is determined hash function and elliptic curve parameter, and sends it to described receiving terminal.Described transmitting terminal and described receiving terminal determine that according to described hash function and described elliptic curve parameter the local terminal key is right respectively.
In another embodiment, can also be directly the key of the described transmitting terminal of appointment and receiving terminal right, it is right perhaps to adopt RSA Algorithm to generate the key of described transmitting terminal and receiving terminal.
Correspondingly, the embodiment of the invention also provides a kind of decryption method, in order to the signal that adopts said method to encrypt is decrypted, promptly to the ciphertext that comprises described plaintext, the ciphertext of described AES key, and the signal of described digest is decrypted, the ciphertext of described plaintext is encrypted by AES key, and the ciphertext of described AES key is by the receiving terminal public key encryption, and described digest is by the transmitting terminal encrypted private key.Described decryption method comprises as shown in Figure 5:
Step S501: the private key that receiving terminal uses himself is decrypted processing to the ciphertext of described AES key, obtains AES key;
Step S502: described receiving terminal uses the described AES key that obtains that the ciphertext of described plaintext is decrypted processing, obtains expressly;
Step S503: described receiving terminal obtains the informative abstract of the described plaintext that obtains, and makes a summary as the first information;
Step S504: described receiving terminal uses the private key of transmit leg that described digest is decrypted processing, obtains informative abstract, as second informative abstract;
Step S505: whether the more described first information summary of described receiving terminal is identical with described second informative abstract, if identical, thinks that then deciphering is correct, otherwise, think and decipher failure.
In order to show the process of embodiment of the invention deciphering more intuitively, see also decryption oprerations process schematic diagram shown in Figure 6.
The algorithm that described receiving terminal adopts when plaintext is decrypted is corresponding with cryptographic algorithm.When encrypting, employing be the aes algorithm that dynamic S-box is optimized, then when deciphering, correspondingly, also adopt the aes algorithm of dynamic S-box optimization to be decrypted processing.
In order to show the process of embodiment of the invention deciphering more intuitively, see also decryption oprerations process schematic diagram shown in Figure 6, in decrypting process, need receiving terminal private key, transmitting terminal private key and AES key, and obtaining of AES key depends on the receiving terminal private key, thereby strengthened the difficulty of deciphering, guaranteed safety of data.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those skilled in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (10)
1. the encryption method based on aes algorithm is characterized in that, comprising:
Use AES key to expressly carrying out encryption, obtain the ciphertext of described plaintext;
Use the receiving terminal PKI that described AES key is carried out encryption, obtain the ciphertext of described AES key;
Obtain the informative abstract of described plaintext, use the transmitting terminal private key that described informative abstract is carried out encryption, obtain digest.
2. the method for claim 1 is characterized in that, also comprises:
Obtain described AES key according to described transmitting terminal private key and described receiving terminal PKI.
3. the method for claim 1 is characterized in that,
Use the aes algorithm of dynamic S-box optimization to come described plaintext is carried out encryption.
4. decryption method based on aes algorithm, it is characterized in that, be used for from comprising ciphertext expressly, the ciphertext of AES key, and decrypt in the signal of digest expressly, the ciphertext of described plaintext is encrypted by AES key, the ciphertext of described AES key is by the receiving terminal public key encryption, and described digest is by the transmitting terminal encrypted private key, and described decryption method comprises:
Use described receiving terminal private key that the ciphertext of described AES key is decrypted processing, obtain AES key;
Use described AES key that the ciphertext of described plaintext is decrypted processing, obtain expressly;
From described plaintext, obtain informative abstract, obtain first information summary;
Use described transmitting terminal private key that described digest is decrypted processing, obtain second informative abstract;
More described first information summary and described second informative abstract if both are identical, think that then deciphering is correct, otherwise, think and decipher failure.
5. method as claimed in claim 4 is characterized in that:
The ciphertext of described plaintext is to use the aes algorithm of dynamic S-box optimization to encrypt;
Use the aes algorithm of described dynamic S-box optimization to come the ciphertext of described plaintext is decrypted processing.
6. the encryption device based on aes algorithm is characterized in that, comprising:
First encrypting module uses AES key to expressly carrying out encryption, obtains the ciphertext of described plaintext;
Second encrypting module uses the receiving terminal PKI that described AES key is carried out encryption, obtains the ciphertext of described AES key;
The 3rd encrypting module obtains the informative abstract of described plaintext, uses the transmitting terminal private key that described informative abstract is carried out encryption, obtains digest.
7. encryption device as claimed in claim 6 is characterized in that, also comprises:
The AES key generation module generates described AES key according to described transmitting terminal private key and described receiving terminal PKI.
8. encryption device as claimed in claim 6 is characterized in that:
Described first encrypting module uses the aes algorithm of dynamic S-box optimization to come described plaintext is carried out encryption.
9. decryption device based on aes algorithm, it is characterized in that, be used for from comprising ciphertext expressly, the ciphertext of AES key, and decrypt in the signal of digest expressly, the ciphertext of described plaintext is encrypted by AES key, the ciphertext of described AES key is by the receiving terminal public key encryption, and described digest is by the transmitting terminal encrypted private key, and described decryption device comprises:
First deciphering module uses described receiving terminal private key that the ciphertext of described AES key is decrypted processing, obtains AES key;
Second deciphering module uses described AES key that the ciphertext of described plaintext is decrypted processing, obtains expressly;
The 3rd deciphering module obtains informative abstract from described plaintext, obtain first information summary;
The 4th deciphering module uses described transmitting terminal private key that described digest is decrypted processing, obtains second informative abstract;
Comparison module, more described first information summary and described second informative abstract if both are identical, think that then deciphering is correct, otherwise, think and decipher failure.
10. decryption device as claimed in claim 9 is characterized in that:
The ciphertext of described plaintext is to use the aes algorithm of dynamic S-box optimization to encrypt;
Described first deciphering module uses the aes algorithm of described dynamic S-box optimization to come the ciphertext of described plaintext is decrypted processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010593085 CN102025505A (en) | 2010-12-16 | 2010-12-16 | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010593085 CN102025505A (en) | 2010-12-16 | 2010-12-16 | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102025505A true CN102025505A (en) | 2011-04-20 |
Family
ID=43866402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010593085 Pending CN102025505A (en) | 2010-12-16 | 2010-12-16 | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102025505A (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404108A (en) * | 2011-10-25 | 2012-04-04 | 宁波大学 | Novel fault attack method aiming at Advanced Encryption Standard (AES-128) algorithm |
CN102970676A (en) * | 2011-09-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method for processing original data, internet of thing system and terminal |
CN103338106A (en) * | 2013-07-18 | 2013-10-02 | 曙光云计算技术有限公司 | Methods and devices for ciphering and deciphering file |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN105187418A (en) * | 2015-08-26 | 2015-12-23 | 江西师范大学 | Weak signature algorithm |
CN105447407A (en) * | 2015-11-11 | 2016-03-30 | 中国建设银行股份有限公司 | Off-line data encryption method and decryption method and corresponding apparatus and system |
CN105556890A (en) * | 2013-10-04 | 2016-05-04 | 株式会社日立制作所 | Cryptographic processing method, cryptographic system, and server |
CN105791258A (en) * | 2014-12-26 | 2016-07-20 | 中国移动通信集团上海有限公司 | Data transmission method, terminal and open platform |
CN103580859B (en) * | 2013-11-11 | 2017-05-10 | 国家电网公司 | Asymmetric encryption method for intelligent electricity using interaction |
CN107231237A (en) * | 2017-06-02 | 2017-10-03 | 上海斐讯数据通信技术有限公司 | A kind of safe credit method and system |
CN107659396A (en) * | 2016-07-23 | 2018-02-02 | 刘金宏 | A kind of dynamic encrypting method |
CN107864036A (en) * | 2017-11-20 | 2018-03-30 | 安徽亿联智能有限公司 | A kind of computer with high safety performance reads box critical data recording mode |
CN108347419A (en) * | 2017-01-24 | 2018-07-31 | 腾讯科技(深圳)有限公司 | Data transmission method and device |
CN108833419A (en) * | 2018-06-22 | 2018-11-16 | 武汉彤科电力科技有限公司 | A kind of remote parameter between terminal and main website updates message safety interacting method |
CN109245905A (en) * | 2018-11-01 | 2019-01-18 | 四川长虹电器股份有限公司 | The method that message is digitally signed and is encrypted based on RSA and aes algorithm |
CN109818747A (en) * | 2018-12-28 | 2019-05-28 | 苏州科达科技股份有限公司 | Digital signature method and device |
CN110535868A (en) * | 2019-09-05 | 2019-12-03 | 山东浪潮商用系统有限公司 | Data transmission method and system based on Hybrid Encryption algorithm |
CN110572366A (en) * | 2019-08-09 | 2019-12-13 | 五八有限公司 | Network data transmission method and device, electronic equipment and storage medium |
CN110890965A (en) * | 2019-12-10 | 2020-03-17 | 天津华云软件有限公司 | Data encryption method and device, and data decryption method and device |
CN111030984A (en) * | 2019-10-22 | 2020-04-17 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN111131311A (en) * | 2019-12-31 | 2020-05-08 | 北京中电普华信息技术有限公司 | Data transmission method based on block chain and block chain link point |
CN111614667A (en) * | 2020-05-20 | 2020-09-01 | 北京科东电力控制系统有限责任公司 | Safety encryption method, device and system for real-time data transmission of power grid regulation and control information |
CN111769934A (en) * | 2020-07-08 | 2020-10-13 | 深圳思凯微电子有限公司 | Data transmission method, system and computer readable storage medium |
CN111818023A (en) * | 2020-06-23 | 2020-10-23 | 中国商用飞机有限责任公司 | Data transmission method and data transmission system suitable for air-ground communication link |
CN113098824A (en) * | 2019-12-23 | 2021-07-09 | 中国移动通信集团山西有限公司 | Method, device, system, equipment and medium for transmitting request message of CXF framework |
CN113709121A (en) * | 2021-08-13 | 2021-11-26 | 华能济南黄台发电有限公司 | Data sending, receiving and transmitting method and system |
WO2021237542A1 (en) * | 2020-05-27 | 2021-12-02 | 深圳市大疆创新科技有限公司 | Data processing, encryption, and decryption methods, device, and storage medium |
CN117220973A (en) * | 2023-09-22 | 2023-12-12 | 淮北师范大学 | Data security exchange method and system based on public key encryption |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN101447870A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Safe storage method of private key based on technology of distributed password |
-
2010
- 2010-12-16 CN CN 201010593085 patent/CN102025505A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064595A (en) * | 2006-04-27 | 2007-10-31 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN101262341A (en) * | 2008-02-22 | 2008-09-10 | 北京航空航天大学 | A mixed encryption method in session system |
CN101447870A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Safe storage method of private key based on technology of distributed password |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970676A (en) * | 2011-09-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method for processing original data, internet of thing system and terminal |
CN102404108B (en) * | 2011-10-25 | 2014-07-09 | 宁波大学 | Novel fault attack method aiming at Advanced Encryption Standard (AES-128) algorithm |
CN102404108A (en) * | 2011-10-25 | 2012-04-04 | 宁波大学 | Novel fault attack method aiming at Advanced Encryption Standard (AES-128) algorithm |
CN103338106A (en) * | 2013-07-18 | 2013-10-02 | 曙光云计算技术有限公司 | Methods and devices for ciphering and deciphering file |
CN105556890A (en) * | 2013-10-04 | 2016-05-04 | 株式会社日立制作所 | Cryptographic processing method, cryptographic system, and server |
CN105556890B (en) * | 2013-10-04 | 2018-11-13 | 株式会社日立制作所 | Cipher processing method, encryption system and server |
CN103580859B (en) * | 2013-11-11 | 2017-05-10 | 国家电网公司 | Asymmetric encryption method for intelligent electricity using interaction |
CN105791258A (en) * | 2014-12-26 | 2016-07-20 | 中国移动通信集团上海有限公司 | Data transmission method, terminal and open platform |
CN104993928A (en) * | 2015-05-11 | 2015-10-21 | 昆明理工大学 | Unmanned plane safe communication link encryption method based on real-time embedded control system |
CN105187418A (en) * | 2015-08-26 | 2015-12-23 | 江西师范大学 | Weak signature algorithm |
CN105187418B (en) * | 2015-08-26 | 2020-09-08 | 江西师范大学 | Weak signature algorithm |
CN105447407A (en) * | 2015-11-11 | 2016-03-30 | 中国建设银行股份有限公司 | Off-line data encryption method and decryption method and corresponding apparatus and system |
CN107659396A (en) * | 2016-07-23 | 2018-02-02 | 刘金宏 | A kind of dynamic encrypting method |
CN108347419A (en) * | 2017-01-24 | 2018-07-31 | 腾讯科技(深圳)有限公司 | Data transmission method and device |
CN107231237A (en) * | 2017-06-02 | 2017-10-03 | 上海斐讯数据通信技术有限公司 | A kind of safe credit method and system |
CN107864036A (en) * | 2017-11-20 | 2018-03-30 | 安徽亿联智能有限公司 | A kind of computer with high safety performance reads box critical data recording mode |
CN108833419A (en) * | 2018-06-22 | 2018-11-16 | 武汉彤科电力科技有限公司 | A kind of remote parameter between terminal and main website updates message safety interacting method |
CN108833419B (en) * | 2018-06-22 | 2021-12-14 | 武汉彤科电力科技有限公司 | Remote parameter updating message safety interaction method between terminal and main station |
CN109245905A (en) * | 2018-11-01 | 2019-01-18 | 四川长虹电器股份有限公司 | The method that message is digitally signed and is encrypted based on RSA and aes algorithm |
CN109818747A (en) * | 2018-12-28 | 2019-05-28 | 苏州科达科技股份有限公司 | Digital signature method and device |
CN109818747B (en) * | 2018-12-28 | 2022-01-28 | 苏州科达科技股份有限公司 | Digital signature method and device |
CN110572366A (en) * | 2019-08-09 | 2019-12-13 | 五八有限公司 | Network data transmission method and device, electronic equipment and storage medium |
CN110572366B (en) * | 2019-08-09 | 2021-08-20 | 五八有限公司 | Network data transmission method and device, electronic equipment and storage medium |
CN110535868A (en) * | 2019-09-05 | 2019-12-03 | 山东浪潮商用系统有限公司 | Data transmission method and system based on Hybrid Encryption algorithm |
CN111030984A (en) * | 2019-10-22 | 2020-04-17 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN111030984B (en) * | 2019-10-22 | 2022-08-19 | 上海泰宇信息技术股份有限公司 | Data safety transmission system and method |
CN110890965A (en) * | 2019-12-10 | 2020-03-17 | 天津华云软件有限公司 | Data encryption method and device, and data decryption method and device |
CN113098824A (en) * | 2019-12-23 | 2021-07-09 | 中国移动通信集团山西有限公司 | Method, device, system, equipment and medium for transmitting request message of CXF framework |
CN111131311A (en) * | 2019-12-31 | 2020-05-08 | 北京中电普华信息技术有限公司 | Data transmission method based on block chain and block chain link point |
CN111614667A (en) * | 2020-05-20 | 2020-09-01 | 北京科东电力控制系统有限责任公司 | Safety encryption method, device and system for real-time data transmission of power grid regulation and control information |
WO2021237542A1 (en) * | 2020-05-27 | 2021-12-02 | 深圳市大疆创新科技有限公司 | Data processing, encryption, and decryption methods, device, and storage medium |
CN111818023A (en) * | 2020-06-23 | 2020-10-23 | 中国商用飞机有限责任公司 | Data transmission method and data transmission system suitable for air-ground communication link |
CN111769934A (en) * | 2020-07-08 | 2020-10-13 | 深圳思凯微电子有限公司 | Data transmission method, system and computer readable storage medium |
CN111769934B (en) * | 2020-07-08 | 2023-12-08 | 深圳思凯微电子有限公司 | Data transmission method, system and computer readable storage medium |
CN113709121A (en) * | 2021-08-13 | 2021-11-26 | 华能济南黄台发电有限公司 | Data sending, receiving and transmitting method and system |
CN117220973A (en) * | 2023-09-22 | 2023-12-12 | 淮北师范大学 | Data security exchange method and system based on public key encryption |
CN117220973B (en) * | 2023-09-22 | 2024-06-04 | 淮北师范大学 | Data security exchange method and system based on public key encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102025505A (en) | Advanced encryption standard (AES) algorithm-based encryption/decryption method and device | |
CN102131188B (en) | Method and system for transmitting user identity information as well as user equipment and network side equipment | |
US9172529B2 (en) | Hybrid encryption schemes | |
CN101103586B (en) | Apparatus and method for ciphering/deciphering a signal in a communication system | |
CN104821944A (en) | Hybrid encrypted network data security method and system | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN102740239B (en) | The method and system of secure transmission of media information | |
CN116321129B (en) | Lightweight dynamic key-based power transaction private network communication encryption method | |
WO2013056502A1 (en) | Hierarchical hybrid encryption method and apparatus of smart home system | |
CN105024807A (en) | Data processing method and system | |
KR101516114B1 (en) | Certificate-based proxy re-encryption method and its system | |
Rege et al. | Bluetooth communication using hybrid encryption algorithm based on AES and RSA | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
US20120237020A1 (en) | Methods for customizing a rijndael block cipher | |
CN101867471A (en) | Irrational number based DES authentication encryption algorithm | |
Zegers et al. | A lightweight encryption and secure protocol for smartphone cloud | |
CN114499857A (en) | Method for realizing data correctness and consistency in big data quantum encryption and decryption | |
Mahalakshmi et al. | Image encryption method using differential expansion technique, AES and RSA algorithm | |
EP2571192A1 (en) | Hybrid encryption schemes | |
CN101877849A (en) | Communication method between wireless module and external equipment | |
CN104796254A (en) | ECC-based official document transferring method | |
CN113347153A (en) | File encryption transmission method combining identity authentication and dynamic key | |
Arora et al. | Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm | |
Valluri et al. | Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks | |
CN103812652A (en) | Computer information transmission intelligent encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110420 |
|
RJ01 | Rejection of invention patent application after publication |