CN106850670A - A kind of charging pile communication system encrypting and decrypting method - Google Patents

A kind of charging pile communication system encrypting and decrypting method Download PDF

Info

Publication number
CN106850670A
CN106850670A CN201710126537.6A CN201710126537A CN106850670A CN 106850670 A CN106850670 A CN 106850670A CN 201710126537 A CN201710126537 A CN 201710126537A CN 106850670 A CN106850670 A CN 106850670A
Authority
CN
China
Prior art keywords
key
charging pile
public
encryption
cryptography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710126537.6A
Other languages
Chinese (zh)
Inventor
项超
林明光
刘光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Risesun Science and Technology Co Ltd
Original Assignee
Zhejiang Risesun Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Risesun Science and Technology Co Ltd filed Critical Zhejiang Risesun Science and Technology Co Ltd
Priority to CN201710126537.6A priority Critical patent/CN106850670A/en
Publication of CN106850670A publication Critical patent/CN106850670A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of charging pile communication system encrypting and decrypting method, including asymmetric encryption and the symmetric cryptography of transmission real time data based on transmission key, symmetric cryptography mode is for transmitting real time data;Asymmetric encryption mode is in the encryption and decryption of information, use public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein, public-key cryptography is encrypted to information, charging pile preserves the private cipher key needed for decrypting, and is decrypted by the information of public key encryption by private cipher key, and public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode transmits key using improved RSA Algorithm.Above-mentioned technical proposal, effectively increases the security of system information transmission, and confrontation differential fault attack ability is good, safe and reliable and can more quickly decrypting ciphertext, practicality are good.

Description

A kind of charging pile communication system encrypting and decrypting method
Technical field
The present invention relates to the message encryption and decryption technology field of charging pile, and in particular to a kind of charging pile communication system encryption solution Decryption method.
Background technology
AES is the safety guarantee of charging pile capital settlement, and the operation to ensureing charging pile is particularly important.
Symmetrical SM4 AESs being used existing charging pile AES, key is after authentication, and server is direct more Charging pile is handed down to, is easy to be intercepted in communication process and is cracked.And SM4 AESs, using the random event of byte-oriented Barrier model, only needs the 128 bit seeds that 32 wrong ciphertexts just can completely recover SM4 close with reference to attack technology of checking the mark Key, confrontation differential fault attack ability is more fragile, and security is poor, easily causes economic loss.
The content of the invention
In view of the shortcomings of the prior art, it is an object of the invention to provide one kind confrontation differential fault attack ability The good charging pile communication system encrypting and decrypting method of good, safe and reliable, practicality.
To achieve the above object, the invention provides following technical scheme:A kind of charging pile communication system encrypting and decrypting side Method, including the asymmetric encryption based on transmission key and the symmetric cryptography for transmitting real time data, symmetric cryptography mode are used to transmit Real time data;Asymmetric encryption mode information encryption with decryption in, using public-key cryptography and private cipher key pair, by server End issues public-key cryptography to charging pile, wherein, public-key cryptography is encrypted to information, and charging pile is preserved privately owned needed for decrypting Key, and decrypted by the information of public key encryption by private cipher key, public-key cryptography cannot speculate private cipher key;It is asymmetric to add Close mode transmits key using improved RSA Algorithm.
The present invention is further arranged to:Improved RSA Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption uses public key (n, e), encryption Formula is:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
The present invention is further arranged to:Symmetric cryptography is encrypted using hyperchaos, and chaos system uses nonlinear equation, adopts Mapped with Henon:
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequences Row x (1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is just Initial value x (1), y (1), using Henon mapping two isometric chaos sequences of generation
X (i), y (i), chaos sequence x (i) that then will be obtained, y (i) press [x1(n)/2,y1(n)/2,y2(n)/2,x2 (n)/2] structural arrangement, constitute new sequence M1, wherein x1N ()/2 represent the first half of sequence x (i), x2N ()/2 represent sequence The latter half of row y (i), y (i) is similarly;Initiation sequence is done into sort transformation by former order afterwards, new sequence M is obtained2, carry out XOR M3=M1^M2, i.e., final ciphering sequence.
The present invention is further arranged to:Using the embedded system based on Cortex-M2 kernels, in embedded systems The external SOC with hardware encrypting;By RSA Algorithm, after charging pile obtains the key of transmission real time data, then lead to Cross the real time data that chaos encryption transmission need to be transmitted largely.
It is an advantage of the invention that:Compared with prior art, the present invention is using filling that asymmetric encryption and symmetric cryptography are combined Electric stake encryption system, effectively increases the security of system information transmission, and on the basis of original cipher key transfer mode, i.e., identity is recognized Increase the key that RSA Algorithm transmits real time data after card, greatly improve the security of real time data key, and can periodically repair Change the key of real time data, it is to avoid the problem that key is changed without and is cracked for a long time.And real time data uses chaos encryption Henon mappings in algorithm, the algorithm has extreme sensitivity, plan noise to primary condition, size of key is big, it is convenient to change key Etc. natural excellent Cryptographic Properties, the problem of the resisting differential attacking ability difference of former SM4 AESs can be prevented effectively from, both ensured Data it is safe and reliable, again can more quickly decrypting ciphertext.Possesses good practicality.
With reference to specific embodiment, the invention will be further described.
Specific embodiment
A kind of charging pile communication system encrypting and decrypting method disclosed by the invention, including added based on the asymmetric of transmission key Close and transmission real time data symmetric cryptography, symmetric cryptography mode is used to transmit real time data;Asymmetric encryption mode is in information Encryption with decryption in, using public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein, Public-key cryptography is encrypted to information, and charging pile preserves the private cipher key needed for decrypting, and is decrypted by public affairs by private cipher key The information of key encryption is opened, public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode is transmitted using improved RSA Algorithm Key.
Asymmetric encryption mode uses " public-key cryptography " right with " private cipher key ", this hair in the encryption and decryption of information Bright to issue public-key cryptography to charging pile by server end, wherein public-key cryptography is encrypted to information, and charging pile preserves decryption Required private cipher key, and decrypted by the information of public key encryption by private cipher key, public-key cryptography cannot speculate privately owned close Key, so as to greatly increase the security of information transmission.And symmetric encipherment algorithm is using AES, technology maturation earlier. In a symmetric encryption algorithm, data transmission side (initial data) and encryption key will be processed by special AES together in plain text Afterwards, make it become complicated encrypted cipher text to send.After destination receives ciphertext, if wanting to understand original text, need to use and add The algorithm for inversion of close used key and identical algorithms is decrypted to ciphertext, it is reverted to readable plaintext.Symmetrically adding In close algorithm, the key only one of which for using, hair collection of letters both sides are encrypted and decrypted using this data key, and this is just It is required that decryption side must be known by encryption key in advance.
RSA Algorithm is 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs (AdiShamir) Proposed together with Leonard A Deman (Leonard Adleman).Announce first within 1987, their three people were in fiber crops at that time The Institute of Technology of province works.RSA is exactly that their three people's surnames start the alphabetical composition that is stitched together.
RSA is current most influential public key encryption algorithm, and it can resist the up to the present known overwhelming majority Cryptographic attack, is recommended as public key data encryption standard by ISO.
Used as preferred, improved RSA Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption uses public key (n, e), encryption Formula is:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
Because the n of 1024 in RSA Algorithm are considered as safe, three prime numbers that the present invention is used are on 500 left sides The right side, can obtain the n of 1500, can obtain security very high, and the prime number of seniority top digit, the time for finding prime number can be lengthened And difficulty, it is of the invention on the basis of the general algorithm of key generation, using the Miller- of Montgomery algorithm optimizations Rabin algorithms and Pocklington theorem algorithms, construct the algorithm of generation of large prime, improve RSA Algorithm security and The speed of service.
Used as preferred, symmetric cryptography is encrypted using hyperchaos, and chaos encryption has the random property of class, and with initial value Sensitiveness, the small sample perturbations of initial value can bring huge difference, and chaos system uses nonlinear equation, be not easily susceptible to difference and attack Hit, it is notable for AES design effect.
Mapped using Henon:
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequences Row x (1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is just Initial value x (1), y (1), using Henon mapping two isometric chaos sequences x (i) of generation, y (i), the chaos sequence that then will be obtained Row x (i), y (i) presses [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/2] structural arrangement, constitute new sequence M1, wherein x1 N ()/2 represent the first half of sequence x (i), x2N ()/2 represent the latter half of sequences y (i), y (i) is similarly;Afterwards will be initial Sequence does sort transformation by former order, obtains new sequence M2, carry out XOR M3=M1^M2, i.e., final ciphering sequence.
Used as preferred, the present embodiment is outer in embedded systems using the embedded system based on Cortex-M2 kernels Connect the SOC with hardware encrypting;By RSA Algorithm, after charging pile obtains the key of transmission real time data, then pass through The real time data that chaos encryption transmission need to be transmitted largely.
It is based on number theory using RSA Algorithm present invention mainly solves not strong enough the problem of existing cipher mode security Public-key cryptosystem, be classic AES in public-key cryptosystem.But the time of encrypting and decrypting is more long, is especially suitable for For transmitting to the unusual key transmission of security requirement.The cipher mode enhances the security of key transmission, using chaos Encryption real time data, and chaos system possesses initial value sensitivity, the small sample perturbations of initial value can all bring huge difference, Meet the avalanche effect of algorithm, chaos system uses nonlinear equation, for AES design, overcome SM4 encryptions to difference Divide the fragility attacked, greatly increase the security of message transmission.
Symmetric cryptography and asymmetric encryption two ways, wherein asymmetric encryption are used for charging pile message transfer mode Mode is used to transmit the encryption key of real time data, and symmetric cryptography mode is used to transmit real time data, and wherein asymmetric manner is adopted Key is transmitted with improved RSA Algorithm, wherein the Miller- of three Big primes p, q, r using Montgomery algorithm optimizations Rabin algorithms and Pocklington theorem algorithm constructions, and used as private key, improve security and the operation of RSA Algorithm Speed.Server generates key as main website, main website by the following steps:
1. it is random to generate three unequal prime number p, q, r;
2. p, the product n of q, r are calculated;
3. Euler's function φ (n) of n is calculated;
4. an integer e is randomly choosed, and condition is 1<e<φ (n), and e and φ (n) is relatively prime;
5. mould antielement ds of the e to φ (n) is calculated;
6. n and e are packaged into public key, n and d are packaged into private key;
Using public key (n, e), encrypting formula is for encryption:C≡Memod n.Using private key (n, d), decrypting formula is for decryption: C=Memod n。
In addition consider that the design is based on the embedded system of Cortex-M2 kernels, computing capability is limited, can only at most count Calculate n and take the RSA Algorithm of 128, therefore the external SOC with hardware encrypting in embedded systems, 1024 can be calculated The n values of position.
By RSA Algorithm, after charging pile obtains the key of transmission real time data, then transmit and need to largely pass by chaos encryption The real time data passed.Chaos encryption is mapped using Henon, and the mapping has the characteristics of parameter range of choice is wide, key space is big, Its control parameter a passes to charging pile by RSA Algorithm.Two isometric sequence generation chaos sequences are chosen, control parameter is a, B, control parameter passes to charging pile as key by asymmetric encryption mode, isometric mixed using Henon mappings generation two Ignorant sequence x (i), y (i), chaos sequence x (i) that then will be obtained, y (i) presses [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/ 2] structural arrangement, constitutes new sequence M1;Initiation sequence is done into sort transformation by former order afterwards, new sequence M is obtained2, carry out different Or computing M3=M1^M2, i.e., final ciphering sequence.Decipherment algorithm is identical with several steps of AES, unique the difference is that in encryption With data disorder, and data order is used to recover in decryption.
The charging pile encryption system that the present invention is combined using asymmetric encryption and symmetric cryptography, effectively increases system information The security of transmission, increases the close of RSA Algorithm transmission real time data on the basis of original cipher key transfer mode, i.e., after authentication Key, greatly improves the security of real time data key, and can be with the key of periodic modification real time data, it is to avoid when key is long Between the problem that is changed without and is cracked.And real time data is mapped using the Henon in chaos encryption algorithm, the algorithm is to initial strip Part has extreme sensitivity, intends the natural excellent Cryptographic Properties such as noise, size of key are big, replacing key is convenient, can effectively keep away Exempt from the problem of the resisting differential attacking ability difference of former SM4 AESs, both ensure that the safe and reliable of data, can more quickly solve again Ciphertext.Possesses good practicality.
Above-described embodiment is served only for being further described the present invention, it is impossible to be interpreted as to specific descriptions of the invention Limiting the scope of the present invention, it is non-that the technician of this area makes some according to the content of foregoing invention to the present invention The modifications and adaptations of essence are each fallen within protection scope of the present invention.

Claims (4)

1. a kind of charging pile communication system encrypting and decrypting method, it is characterised in that:Including the asymmetric encryption based on transmission key With the symmetric cryptography of transmission real time data, symmetric cryptography mode is for transmitting real time data;Asymmetric encryption mode is in information In encryption and decryption, using public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein, it is public Open cipher key pair information to be encrypted, charging pile preserves the private cipher key needed for decrypting, and is decrypted by open by private cipher key The information of key encryption, public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode transmits close using improved RSA Algorithm Key.
2. a kind of charging pile communication system encrypting and decrypting method according to claim 1, it is characterised in that:Improved RSA Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption encrypts formula using public key (n, e) For:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
3. a kind of charging pile communication system encrypting and decrypting method according to claim 2, it is characterised in that:Symmetric cryptography is adopted Encrypted with hyperchaos, chaos system uses nonlinear equation, mapped using Henon:
x n + 1 = - a x n 2 + y n + 1 y n + 1 = b x n
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequence x (1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is initial Value x (1), y (1), using Henon mapping two isometric chaos sequences x (i) of generation, y (i), the chaos sequence that then will be obtained X (i), y (i) press [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/2] structural arrangement, constitute new sequence M1, wherein x1(n)/2 Represent the first half of sequence x (i), x2N ()/2 represent the latter half of sequences y (i), y (i) is similarly;Afterwards by initiation sequence Sort transformation is done by former order, new sequence M is obtained2, carry out XOR M3=M1^M2
4. a kind of charging pile communication system encrypting and decrypting method according to claim 1, it is characterised in that:Using being based on The embedded system of Cortex-M2 kernels, the in embedded systems external SOC with hardware encrypting;By RSA Algorithm, after charging pile obtains the key of transmission real time data, then transmits the real time data that need to largely transmit by chaos encryption.
CN201710126537.6A 2017-03-06 2017-03-06 A kind of charging pile communication system encrypting and decrypting method Pending CN106850670A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710126537.6A CN106850670A (en) 2017-03-06 2017-03-06 A kind of charging pile communication system encrypting and decrypting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710126537.6A CN106850670A (en) 2017-03-06 2017-03-06 A kind of charging pile communication system encrypting and decrypting method

Publications (1)

Publication Number Publication Date
CN106850670A true CN106850670A (en) 2017-06-13

Family

ID=59138962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710126537.6A Pending CN106850670A (en) 2017-03-06 2017-03-06 A kind of charging pile communication system encrypting and decrypting method

Country Status (1)

Country Link
CN (1) CN106850670A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245892A (en) * 2018-11-13 2019-01-18 常熟理工学院 Variable length key RSA cryptographic algorithms big data information security processing method and system
CN110300110A (en) * 2019-06-28 2019-10-01 炬星科技(深圳)有限公司 A kind of encryption and decryption control method, charging pile and charging equipment
CN111049830A (en) * 2019-12-13 2020-04-21 重庆国翰能源发展有限公司 Data information leakage prevention method for charging pile
CN112202549A (en) * 2020-09-02 2021-01-08 深圳市车电网络有限公司 Charging management method, charging terminal data processing method and charging management platform data processing method
CN112565206A (en) * 2020-11-20 2021-03-26 国网天津市电力公司 Charging pile information safety protection method and protection system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472914A (en) * 2003-06-27 2004-02-04 武汉理工大学 High performance and quick public pin encryption
US20080148043A1 (en) * 2006-12-18 2008-06-19 Nortel Networks Limited Establishing a secured communication session
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster
CN104202158A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing
CN104463267A (en) * 2014-10-31 2015-03-25 武汉大学 RFID comprehensive encryption method for electric vehicle charging station

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472914A (en) * 2003-06-27 2004-02-04 武汉理工大学 High performance and quick public pin encryption
US20080148043A1 (en) * 2006-12-18 2008-06-19 Nortel Networks Limited Establishing a secured communication session
CN101431410A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Authentication method for network game client and server cluster
CN104202158A (en) * 2014-09-22 2014-12-10 浪潮电子信息产业股份有限公司 Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing
CN104463267A (en) * 2014-10-31 2015-03-25 武汉大学 RFID comprehensive encryption method for electric vehicle charging station

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
焦树海: "《计算机安全概论》", 30 November 2001, 天津:南开大学出版社 *
黄波: "一种基于Henon映射的图像加密算法", 《重庆工商大学学报(自然科学版)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245892A (en) * 2018-11-13 2019-01-18 常熟理工学院 Variable length key RSA cryptographic algorithms big data information security processing method and system
CN110300110A (en) * 2019-06-28 2019-10-01 炬星科技(深圳)有限公司 A kind of encryption and decryption control method, charging pile and charging equipment
CN111049830A (en) * 2019-12-13 2020-04-21 重庆国翰能源发展有限公司 Data information leakage prevention method for charging pile
CN111049830B (en) * 2019-12-13 2021-12-07 重庆国翰能源发展有限公司 Data information leakage prevention method for charging pile
CN112202549A (en) * 2020-09-02 2021-01-08 深圳市车电网络有限公司 Charging management method, charging terminal data processing method and charging management platform data processing method
CN112565206A (en) * 2020-11-20 2021-03-26 国网天津市电力公司 Charging pile information safety protection method and protection system

Similar Documents

Publication Publication Date Title
CN106850670A (en) A kind of charging pile communication system encrypting and decrypting method
Agrawal et al. A comparative survey on symmetric key encryption techniques
CN101977112B (en) Public key cipher encrypting and decrypting method based on neural network chaotic attractor
CN104967517B (en) A kind of network data convergence method for wireless senser
CN106656475A (en) Novel symmetric key algorithm for high speed encryption
CN103905187A (en) Network communication encryption method based on contents
Abusukhon et al. Secure network communication based on text-to-image encryption
CN106330432A (en) DES encryption algorithm based encryption method
Viswanath et al. A Public Key Cryptosystem Using Hiil's Cipher
Al Busafi et al. Review and analysis of cryptography techniques
CN101882996B (en) Information encryption and decryption method in distributed system based on identity
Balitanas et al. Crossed crypto-scheme in WPA PSK mode
Kaur et al. An encryption scheme based on AES and SHA-512
Ahmed et al. A hybrid model to secure the exchange of DH keys
CN107659396B (en) Dynamic encryption method
Adomey Introduction to cryptography
Saarinen GCM, GHASH and Weak Keys.
CN104168266B (en) A kind of encryption method for taking precautions against lasting leakage attack
Kumar et al. A survey on various asymmetric algorithms
Bodkhe et al. Hybrid encryption algorithm based improved RSA and Diffie-Hellman
Balitanas Wi Fi protected access-pre-shared key hybrid algorithm
Olwenyi et al. Modern Cryptographic Schemes: Applications and Comparative Study
Bali et al. Securing informative text using color visual cryptography
Singh et al. Public key cryptography using sphere and spheroid
Agrawal et al. Analysis of different cryptography algorithms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613