CN105515762A - Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method - Google Patents

Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method Download PDF

Info

Publication number
CN105515762A
CN105515762A CN201610057834.5A CN201610057834A CN105515762A CN 105515762 A CN105515762 A CN 105515762A CN 201610057834 A CN201610057834 A CN 201610057834A CN 105515762 A CN105515762 A CN 105515762A
Authority
CN
China
Prior art keywords
encryption
rsa
aes
key
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610057834.5A
Other languages
Chinese (zh)
Inventor
韦显明
陈永喜
鲍民
陈珏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Le Technology Co., Ltd.
Original Assignee
Zhongshan Bnog Lighting Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Bnog Lighting Technology Co Ltd filed Critical Zhongshan Bnog Lighting Technology Co Ltd
Priority to CN201610057834.5A priority Critical patent/CN105515762A/en
Publication of CN105515762A publication Critical patent/CN105515762A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms, which comprises two communication entities which are a sender and a receiver, RSA secret keys and AES secret keys, a communication counting system, the sender and the receiver are respectively provided with the RSA secret key, a safe network channel which is built in a network by utilizing the RAS encryption algorithm when communicating is used to transport the AES secret keys, the receiver is provided with the AES secret keys, the AES secret keys are used for encryption and decryption when interacting data, and the communication counting system is used to mark a data package to prevent resetting and attacking when interacting the data. Furthermore, the invention further discloses an encryption method of the encryption system based on the RSA and the AES encryption algorithms. The encryption system based on the RSA and the AES encryption algorithms and the encryption system effective solve the storage problem of secret keys between the communication entities, and have the advantages that the encryption system based on the RSA and the AES encryption algorithms and the encryption system authenticate identity between the communication entities, rapid encrypt and decrypt when transporting data and prevent resetting and attacking.

Description

A kind of encryption system based on RSA and AES encryption algorithm and encryption method
Technical field
The present invention relates to technical field of network communication, particularly relate to a kind of encryption system based on RSA and AES encryption algorithm and encryption method.
Background technology
At present, along with Internet of Things is fast-developing, the network security of Intelligent hardware aspect induces one to show great attention to gradually.In prior art, exist and intercepted and captured by hacker the risk that the packet after encryption carries out Replay Attack, thus make encryption system suffer active attack and passive attack.
Summary of the invention
The present invention is directed to the above technical problem existed in prior art, a kind of encryption system based on RSA and AES encryption algorithm and encryption method are provided, effectively solve key keeping problem and Replay Attack problem between communication entity.
The technical solution adopted for the present invention to solve the technical problems is: a kind of encryption system based on RSA and AES encryption algorithm, and it comprises:
Two communication entities: transmit leg and recipient;
RSA key and AES key;
Communication count system;
Described transmit leg and described recipient are assigned described RSA key, utilize described RSA cryptographic algorithms to build safe network channel in a network during communication and transmit described AES key, for described recipient distributes described AES key, described AES key is used for encryption and decryption during data interaction, prevents Replay Attack when described communication count system is used for data interaction to the sign of packet.
Improve as to the one of technical scheme of the present invention, will be expressly encrypted by described AES key, described transmit leg sends ciphertext, and to be connected laggard row data communication by internet, described recipient receives ciphertext, is decrypted by AES key.
In addition, the present invention also provides a kind of encryption method of the encryption system based on RSA and AES encryption algorithm, and it is as follows that it comprises step:
A. RSA key is distributed to two communication entity transmit legs and recipient;
B. RSA cryptographic algorithms is utilized to build safe network channel in a network, for recipient distributes AES key during communication;
C. set up after shaking hands, the AES key according to distributing carries out data interaction, introduces the mechanism of communication count during data interaction simultaneously in ciphertext, judgement checking to be carried out to this counting after each deciphering, after being proved to be successful, carry out data processing, otherwise require that data receiver is retransmitted.
Improve as to the one of technical scheme of the present invention, before described step b, also comprise the step of when connecting for the first time, described transmit leg and described recipient being carried out to authentication.
Improve as to the one of technical scheme of the present invention, the step of described authentication is: AES key dynamically generates AES key, and the RSA PKI of transmit leg is encrypted, and recipient exposes transmit leg RSA PKI, obtains the AES key after exposing.
Improve as to the one of technical scheme of the present invention, described step c comprises: will be expressly encrypted by described AES key, ciphertext is sent afterwards by described transmit leg, to be connected laggard row data communication by internet, described recipient receives ciphertext, be decrypted by AES key, expressly represent.
Improving as to the one of technical scheme of the present invention, in described transmission ciphertext process, sending flag each time from adding 1 anti-replay-attack.
Encryption system based on RSA and AES encryption algorithm provided by the invention and encryption method, effectively to solve between communication entity key keeping problem, quick encryption and decryption when there is the authentication between communication entity, transfer of data and prevent the advantage of Replay Attack.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the encryption method workflow schematic diagram of the encryption system based on RSA and AES encryption algorithm of the specific embodiment of the invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The encryption system based on RSA and AES encryption algorithm of the specific embodiment of the invention, it comprises:
Two communication entities: transmit leg and recipient;
RSA key and AES key;
Communication count system;
Transmit leg and recipient are assigned RSA key, RSA cryptographic algorithms is utilized to build safe network channel transmission AES key in a network during communication, for recipient distributes AES key, AES key is used for encryption and decryption during data interaction, prevents Replay Attack when communication count system is used for data interaction to the sign of packet.
In the specific embodiment of the invention, will be expressly encrypted by AES key, transmit leg sends ciphertext, and to be connected laggard row data communication by internet, recipient receives ciphertext, is decrypted by AES key.
Fig. 1 is the encryption method workflow schematic diagram of the encryption system based on RSA and AES encryption algorithm of the specific embodiment of the invention, as shown in Figure 1, the encryption method of the encryption system based on RSA and AES encryption algorithm of the specific embodiment of the invention, it is as follows that it comprises step:
A. RSA key is distributed to two communication entity transmit legs and recipient;
B. RSA cryptographic algorithms is utilized to build safe network channel in a network, for recipient distributes AES key during communication;
C. set up after shaking hands, the AES key according to distributing carries out data interaction, introduces the mechanism of communication count during data interaction simultaneously in ciphertext, judgement checking to be carried out to this counting after each deciphering, after being proved to be successful, carry out data processing, otherwise require that data receiver is retransmitted.
Particularly, the step of when connecting for the first time, transmit leg and recipient being carried out to authentication is also comprised before step b.The step of authentication is: AES key dynamically generates AES key, and the RSA PKI of transmit leg is encrypted, and recipient exposes transmit leg RSA PKI, obtains the AES key after exposing.
Step c comprises: by being expressly encrypted by AES key, send ciphertext afterwards by transmit leg, and to be connected laggard row data communication by internet, recipient receives ciphertext, is decrypted by AES key, expressly represents.
Particularly, sending in ciphertext process, sending flag each time from adding 1 anti-replay-attack.
Encryption system based on RSA and AES encryption algorithm provided by the invention and encryption method, effectively to solve between communication entity key keeping problem, quick encryption and decryption when there is the authentication between communication entity, transfer of data and prevent the advantage of Replay Attack.
The RSA Algorithm that native system make use of asymmetric encryption mechanism is convenient to the advantage of key keeping and signature authentication and the fast advantage of symmetric encipherment algorithm AES encryption/decryption speed, the strong encryption system two kinds of cryptographic algorithm being combined into mixing, the advantage having played both avoids the deficiency of the two.Meanwhile, in ciphertext, introduce communication count mechanism carry out Replay Attack to prevent being intercepted and captured the packet after encryption by hacker, thus make this encryption system can prevent known active attack and passive attack.This technology the following aspects can also do better: exist by the threat of attacking when 1, shaking hands for the first time, should to improve when shaking hands for the first time fixing RSA key, be each product Random assignment RSA key when changing production into; 2, the encryption figure place of RSA cryptographic algorithms is improved.
The key between communication entity that solves of this technology effective takes care of problem, quick encryption and decryption when simultaneously also solving the authentication between communication entity, transfer of data and prevent the advantage of Replay Attack, in ciphertext, introduce communication count mechanism carry out Replay Attack to prevent being intercepted and captured the packet after encryption by hacker, thus make this encryption system can prevent known active attack and passive attack.
Should be understood that, for those of ordinary skills, can be improved according to the above description or convert, and all these improve and convert the protection range that all should belong to claims of the present invention.

Claims (7)

1., based on an encryption system for RSA and AES encryption algorithm, it is characterized in that, comprising:
Two communication entities: transmit leg and recipient;
RSA key and AES key;
Communication count system;
Described transmit leg and described recipient are assigned described RSA key, utilize described RSA cryptographic algorithms to build safe network channel in a network during communication and transmit described AES key, for described recipient distributes described AES key, described AES key is used for encryption and decryption during data interaction, prevents Replay Attack when described communication count system is used for data interaction to the sign of packet.
2. the encryption system based on RSA and AES encryption algorithm according to claim 1, it is characterized in that, to be expressly encrypted by described AES key, described transmit leg sends ciphertext, to be connected laggard row data communication by internet, described recipient receives ciphertext, is decrypted by AES key.
3., based on an encryption method for the encryption system of RSA and AES encryption algorithm, it is characterized in that, comprise step as follows:
A. RSA key is distributed to two communication entity transmit legs and recipient;
B. RSA cryptographic algorithms is utilized to build safe network channel in a network, for recipient distributes AES key during communication;
C. set up after shaking hands, the AES key according to distributing carries out data interaction, introduces the mechanism of communication count during data interaction simultaneously in ciphertext, judgement checking to be carried out to this counting after each deciphering, after being proved to be successful, carry out data processing, otherwise require that data receiver is retransmitted.
4. the encryption method of the encryption system based on RSA and AES encryption algorithm according to claim 3, is characterized in that, also comprises first time carries out authentication when connecting step to described transmit leg and described recipient before described step b.
5. the encryption method of the encryption system based on RSA and AES encryption algorithm according to claim 4, it is characterized in that, the step of described authentication is: AES key dynamically generates AES key, the RSA PKI of transmit leg is encrypted, recipient exposes transmit leg RSA PKI, obtains the AES key after exposing.
6. the encryption method of the encryption system based on RSA and AES encryption algorithm according to claim 3, it is characterized in that, described step c comprises: will be expressly encrypted by described AES key, ciphertext is sent afterwards by described transmit leg, to be connected laggard row data communication by internet, described recipient receives ciphertext, is decrypted by AES key, expressly represents.
7. the encryption method of the encryption system based on RSA and AES encryption algorithm according to claim 6, is characterized in that, in described transmission ciphertext process, sends flag each time from adding 1 anti-replay-attack.
CN201610057834.5A 2016-01-28 2016-01-28 Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method Pending CN105515762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610057834.5A CN105515762A (en) 2016-01-28 2016-01-28 Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610057834.5A CN105515762A (en) 2016-01-28 2016-01-28 Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method

Publications (1)

Publication Number Publication Date
CN105515762A true CN105515762A (en) 2016-04-20

Family

ID=55723438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610057834.5A Pending CN105515762A (en) 2016-01-28 2016-01-28 Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method

Country Status (1)

Country Link
CN (1) CN105515762A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898740A (en) * 2016-06-12 2016-08-24 Tcl集团股份有限公司 Information encryption and decryption method and system based on mobile device communication
CN108092761A (en) * 2016-11-22 2018-05-29 广东亿迅科技有限公司 A kind of key management method and system based on RSA and 3DES
CN109245891A (en) * 2018-09-13 2019-01-18 国云科技股份有限公司 A kind of random key generation method based on RSA Algorithm
CN115208632A (en) * 2022-06-16 2022-10-18 国网浙江省电力有限公司营销服务中心 Front-end and back-end data encryption transmission method and system
CN115941204A (en) * 2022-12-06 2023-04-07 镁佳(北京)科技有限公司 Data anti-replay method and system based on HSE
US11811909B2 (en) 2020-10-19 2023-11-07 Preet Raj Information processing apparatus, method and secure protocol for secure storage and transfer of data

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898740A (en) * 2016-06-12 2016-08-24 Tcl集团股份有限公司 Information encryption and decryption method and system based on mobile device communication
CN108092761A (en) * 2016-11-22 2018-05-29 广东亿迅科技有限公司 A kind of key management method and system based on RSA and 3DES
CN109245891A (en) * 2018-09-13 2019-01-18 国云科技股份有限公司 A kind of random key generation method based on RSA Algorithm
US11811909B2 (en) 2020-10-19 2023-11-07 Preet Raj Information processing apparatus, method and secure protocol for secure storage and transfer of data
CN115208632A (en) * 2022-06-16 2022-10-18 国网浙江省电力有限公司营销服务中心 Front-end and back-end data encryption transmission method and system
CN115208632B (en) * 2022-06-16 2023-11-07 国网浙江省电力有限公司营销服务中心 Front-end and back-end data encryption transmission method and system
CN115941204A (en) * 2022-12-06 2023-04-07 镁佳(北京)科技有限公司 Data anti-replay method and system based on HSE
CN115941204B (en) * 2022-12-06 2024-04-12 镁佳(北京)科技有限公司 Data anti-replay method and system based on HSE

Similar Documents

Publication Publication Date Title
US11323276B2 (en) Mutual authentication of confidential communication
US9172529B2 (en) Hybrid encryption schemes
CN105515762A (en) Encryption system based on Rivet, Shamir and Adleman (RSA) and advanced encryption standard (AES) encryption algorithms and encryption method
US11095624B2 (en) End-to-end encryption for personal communication nodes
KR20190073472A (en) Method, apparatus and system for transmitting data
CN105162599B (en) A kind of data transmission system and its transmission method
KR20150129824A (en) Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
US20130145169A1 (en) Efficient authentication for mobile and pervasive computing
CN107342977A (en) Suitable for the information security method of point-to-point instant messaging
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN105610848A (en) Centralized data preservation method and system with source data security guaranty mechanism
CN107770127A (en) The transmission method and device of a kind of data
KR101608815B1 (en) Method and system for providing service encryption in closed type network
US20120189122A1 (en) Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection
WO2016049053A1 (en) Facilitating encrypted communications between two parties
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN102281303A (en) Data exchange method
CN106302452A (en) Data encryption and decryption method and apparatus
CN107534552B (en) Method executed at server device, client device and server device
US20220038267A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
EP2571192A1 (en) Hybrid encryption schemes
CN101296077A (en) Identity authentication system based on bus type topological structure
Gobi et al. A comparative study on the performance and the security of RSA and ECC algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20161129

Address after: 518000 Guangdong city of Shenzhen province Nanshan District Qianhai Shenzhen Hong Kong cooperation zone before the Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Applicant after: Shenzhen Le Technology Co., Ltd.

Address before: 528415 Guangdong city of Zhongshan Province town Henglan Maohui Industrial Zone Yi Hui Road No. 1 on the third floor

Applicant before: ZHONGSHAN BNOG LIGHTING TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160420