CN106850670A - A kind of charging pile communication system encrypting and decrypting method - Google Patents
A kind of charging pile communication system encrypting and decrypting method Download PDFInfo
- Publication number
- CN106850670A CN106850670A CN201710126537.6A CN201710126537A CN106850670A CN 106850670 A CN106850670 A CN 106850670A CN 201710126537 A CN201710126537 A CN 201710126537A CN 106850670 A CN106850670 A CN 106850670A
- Authority
- CN
- China
- Prior art keywords
- key
- charging pile
- public
- encryption
- cryptography
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of charging pile communication system encrypting and decrypting method, including asymmetric encryption and the symmetric cryptography of transmission real time data based on transmission key, symmetric cryptography mode is for transmitting real time data;Asymmetric encryption mode is in the encryption and decryption of information, use public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein, public-key cryptography is encrypted to information, charging pile preserves the private cipher key needed for decrypting, and is decrypted by the information of public key encryption by private cipher key, and public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode transmits key using improved RSA Algorithm.Above-mentioned technical proposal, effectively increases the security of system information transmission, and confrontation differential fault attack ability is good, safe and reliable and can more quickly decrypting ciphertext, practicality are good.
Description
Technical field
The present invention relates to the message encryption and decryption technology field of charging pile, and in particular to a kind of charging pile communication system encryption solution
Decryption method.
Background technology
AES is the safety guarantee of charging pile capital settlement, and the operation to ensureing charging pile is particularly important.
Symmetrical SM4 AESs being used existing charging pile AES, key is after authentication, and server is direct more
Charging pile is handed down to, is easy to be intercepted in communication process and is cracked.And SM4 AESs, using the random event of byte-oriented
Barrier model, only needs the 128 bit seeds that 32 wrong ciphertexts just can completely recover SM4 close with reference to attack technology of checking the mark
Key, confrontation differential fault attack ability is more fragile, and security is poor, easily causes economic loss.
The content of the invention
In view of the shortcomings of the prior art, it is an object of the invention to provide one kind confrontation differential fault attack ability
The good charging pile communication system encrypting and decrypting method of good, safe and reliable, practicality.
To achieve the above object, the invention provides following technical scheme:A kind of charging pile communication system encrypting and decrypting side
Method, including the asymmetric encryption based on transmission key and the symmetric cryptography for transmitting real time data, symmetric cryptography mode are used to transmit
Real time data;Asymmetric encryption mode information encryption with decryption in, using public-key cryptography and private cipher key pair, by server
End issues public-key cryptography to charging pile, wherein, public-key cryptography is encrypted to information, and charging pile is preserved privately owned needed for decrypting
Key, and decrypted by the information of public key encryption by private cipher key, public-key cryptography cannot speculate private cipher key;It is asymmetric to add
Close mode transmits key using improved RSA Algorithm.
The present invention is further arranged to:Improved RSA Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption uses public key (n, e), encryption
Formula is:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
The present invention is further arranged to:Symmetric cryptography is encrypted using hyperchaos, and chaos system uses nonlinear equation, adopts
Mapped with Henon:
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequences
Row x (1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is just
Initial value x (1), y (1), using Henon mapping two isometric chaos sequences of generation
X (i), y (i), chaos sequence x (i) that then will be obtained, y (i) press [x1(n)/2,y1(n)/2,y2(n)/2,x2
(n)/2] structural arrangement, constitute new sequence M1, wherein x1N ()/2 represent the first half of sequence x (i), x2N ()/2 represent sequence
The latter half of row y (i), y (i) is similarly;Initiation sequence is done into sort transformation by former order afterwards, new sequence M is obtained2, carry out
XOR M3=M1^M2, i.e., final ciphering sequence.
The present invention is further arranged to:Using the embedded system based on Cortex-M2 kernels, in embedded systems
The external SOC with hardware encrypting;By RSA Algorithm, after charging pile obtains the key of transmission real time data, then lead to
Cross the real time data that chaos encryption transmission need to be transmitted largely.
It is an advantage of the invention that:Compared with prior art, the present invention is using filling that asymmetric encryption and symmetric cryptography are combined
Electric stake encryption system, effectively increases the security of system information transmission, and on the basis of original cipher key transfer mode, i.e., identity is recognized
Increase the key that RSA Algorithm transmits real time data after card, greatly improve the security of real time data key, and can periodically repair
Change the key of real time data, it is to avoid the problem that key is changed without and is cracked for a long time.And real time data uses chaos encryption
Henon mappings in algorithm, the algorithm has extreme sensitivity, plan noise to primary condition, size of key is big, it is convenient to change key
Etc. natural excellent Cryptographic Properties, the problem of the resisting differential attacking ability difference of former SM4 AESs can be prevented effectively from, both ensured
Data it is safe and reliable, again can more quickly decrypting ciphertext.Possesses good practicality.
With reference to specific embodiment, the invention will be further described.
Specific embodiment
A kind of charging pile communication system encrypting and decrypting method disclosed by the invention, including added based on the asymmetric of transmission key
Close and transmission real time data symmetric cryptography, symmetric cryptography mode is used to transmit real time data;Asymmetric encryption mode is in information
Encryption with decryption in, using public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein,
Public-key cryptography is encrypted to information, and charging pile preserves the private cipher key needed for decrypting, and is decrypted by public affairs by private cipher key
The information of key encryption is opened, public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode is transmitted using improved RSA Algorithm
Key.
Asymmetric encryption mode uses " public-key cryptography " right with " private cipher key ", this hair in the encryption and decryption of information
Bright to issue public-key cryptography to charging pile by server end, wherein public-key cryptography is encrypted to information, and charging pile preserves decryption
Required private cipher key, and decrypted by the information of public key encryption by private cipher key, public-key cryptography cannot speculate privately owned close
Key, so as to greatly increase the security of information transmission.And symmetric encipherment algorithm is using AES, technology maturation earlier.
In a symmetric encryption algorithm, data transmission side (initial data) and encryption key will be processed by special AES together in plain text
Afterwards, make it become complicated encrypted cipher text to send.After destination receives ciphertext, if wanting to understand original text, need to use and add
The algorithm for inversion of close used key and identical algorithms is decrypted to ciphertext, it is reverted to readable plaintext.Symmetrically adding
In close algorithm, the key only one of which for using, hair collection of letters both sides are encrypted and decrypted using this data key, and this is just
It is required that decryption side must be known by encryption key in advance.
RSA Algorithm is 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs (AdiShamir)
Proposed together with Leonard A Deman (Leonard Adleman).Announce first within 1987, their three people were in fiber crops at that time
The Institute of Technology of province works.RSA is exactly that their three people's surnames start the alphabetical composition that is stitched together.
RSA is current most influential public key encryption algorithm, and it can resist the up to the present known overwhelming majority
Cryptographic attack, is recommended as public key data encryption standard by ISO.
Used as preferred, improved RSA Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption uses public key (n, e), encryption
Formula is:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
Because the n of 1024 in RSA Algorithm are considered as safe, three prime numbers that the present invention is used are on 500 left sides
The right side, can obtain the n of 1500, can obtain security very high, and the prime number of seniority top digit, the time for finding prime number can be lengthened
And difficulty, it is of the invention on the basis of the general algorithm of key generation, using the Miller- of Montgomery algorithm optimizations
Rabin algorithms and Pocklington theorem algorithms, construct the algorithm of generation of large prime, improve RSA Algorithm security and
The speed of service.
Used as preferred, symmetric cryptography is encrypted using hyperchaos, and chaos encryption has the random property of class, and with initial value
Sensitiveness, the small sample perturbations of initial value can bring huge difference, and chaos system uses nonlinear equation, be not easily susceptible to difference and attack
Hit, it is notable for AES design effect.
Mapped using Henon:
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequences
Row x (1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is just
Initial value x (1), y (1), using Henon mapping two isometric chaos sequences x (i) of generation, y (i), the chaos sequence that then will be obtained
Row x (i), y (i) presses [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/2] structural arrangement, constitute new sequence M1, wherein x1
N ()/2 represent the first half of sequence x (i), x2N ()/2 represent the latter half of sequences y (i), y (i) is similarly;Afterwards will be initial
Sequence does sort transformation by former order, obtains new sequence M2, carry out XOR M3=M1^M2, i.e., final ciphering sequence.
Used as preferred, the present embodiment is outer in embedded systems using the embedded system based on Cortex-M2 kernels
Connect the SOC with hardware encrypting;By RSA Algorithm, after charging pile obtains the key of transmission real time data, then pass through
The real time data that chaos encryption transmission need to be transmitted largely.
It is based on number theory using RSA Algorithm present invention mainly solves not strong enough the problem of existing cipher mode security
Public-key cryptosystem, be classic AES in public-key cryptosystem.But the time of encrypting and decrypting is more long, is especially suitable for
For transmitting to the unusual key transmission of security requirement.The cipher mode enhances the security of key transmission, using chaos
Encryption real time data, and chaos system possesses initial value sensitivity, the small sample perturbations of initial value can all bring huge difference,
Meet the avalanche effect of algorithm, chaos system uses nonlinear equation, for AES design, overcome SM4 encryptions to difference
Divide the fragility attacked, greatly increase the security of message transmission.
Symmetric cryptography and asymmetric encryption two ways, wherein asymmetric encryption are used for charging pile message transfer mode
Mode is used to transmit the encryption key of real time data, and symmetric cryptography mode is used to transmit real time data, and wherein asymmetric manner is adopted
Key is transmitted with improved RSA Algorithm, wherein the Miller- of three Big primes p, q, r using Montgomery algorithm optimizations
Rabin algorithms and Pocklington theorem algorithm constructions, and used as private key, improve security and the operation of RSA Algorithm
Speed.Server generates key as main website, main website by the following steps:
1. it is random to generate three unequal prime number p, q, r;
2. p, the product n of q, r are calculated;
3. Euler's function φ (n) of n is calculated;
4. an integer e is randomly choosed, and condition is 1<e<φ (n), and e and φ (n) is relatively prime;
5. mould antielement ds of the e to φ (n) is calculated;
6. n and e are packaged into public key, n and d are packaged into private key;
Using public key (n, e), encrypting formula is for encryption:C≡Memod n.Using private key (n, d), decrypting formula is for decryption:
C=Memod n。
In addition consider that the design is based on the embedded system of Cortex-M2 kernels, computing capability is limited, can only at most count
Calculate n and take the RSA Algorithm of 128, therefore the external SOC with hardware encrypting in embedded systems, 1024 can be calculated
The n values of position.
By RSA Algorithm, after charging pile obtains the key of transmission real time data, then transmit and need to largely pass by chaos encryption
The real time data passed.Chaos encryption is mapped using Henon, and the mapping has the characteristics of parameter range of choice is wide, key space is big,
Its control parameter a passes to charging pile by RSA Algorithm.Two isometric sequence generation chaos sequences are chosen, control parameter is a,
B, control parameter passes to charging pile as key by asymmetric encryption mode, isometric mixed using Henon mappings generation two
Ignorant sequence x (i), y (i), chaos sequence x (i) that then will be obtained, y (i) presses [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/
2] structural arrangement, constitutes new sequence M1;Initiation sequence is done into sort transformation by former order afterwards, new sequence M is obtained2, carry out different
Or computing M3=M1^M2, i.e., final ciphering sequence.Decipherment algorithm is identical with several steps of AES, unique the difference is that in encryption
With data disorder, and data order is used to recover in decryption.
The charging pile encryption system that the present invention is combined using asymmetric encryption and symmetric cryptography, effectively increases system information
The security of transmission, increases the close of RSA Algorithm transmission real time data on the basis of original cipher key transfer mode, i.e., after authentication
Key, greatly improves the security of real time data key, and can be with the key of periodic modification real time data, it is to avoid when key is long
Between the problem that is changed without and is cracked.And real time data is mapped using the Henon in chaos encryption algorithm, the algorithm is to initial strip
Part has extreme sensitivity, intends the natural excellent Cryptographic Properties such as noise, size of key are big, replacing key is convenient, can effectively keep away
Exempt from the problem of the resisting differential attacking ability difference of former SM4 AESs, both ensure that the safe and reliable of data, can more quickly solve again
Ciphertext.Possesses good practicality.
Above-described embodiment is served only for being further described the present invention, it is impossible to be interpreted as to specific descriptions of the invention
Limiting the scope of the present invention, it is non-that the technician of this area makes some according to the content of foregoing invention to the present invention
The modifications and adaptations of essence are each fallen within protection scope of the present invention.
Claims (4)
1. a kind of charging pile communication system encrypting and decrypting method, it is characterised in that:Including the asymmetric encryption based on transmission key
With the symmetric cryptography of transmission real time data, symmetric cryptography mode is for transmitting real time data;Asymmetric encryption mode is in information
In encryption and decryption, using public-key cryptography and private cipher key pair, public-key cryptography is issued to charging pile by server end, wherein, it is public
Open cipher key pair information to be encrypted, charging pile preserves the private cipher key needed for decrypting, and is decrypted by open by private cipher key
The information of key encryption, public-key cryptography cannot speculate private cipher key;Asymmetric encryption mode transmits close using improved RSA Algorithm
Key.
2. a kind of charging pile communication system encrypting and decrypting method according to claim 1, it is characterised in that:Improved RSA
Algorithm is comprised the following steps:
(1) three unequal prime number p, q, r of random generation;
(2) p, the product n of q, r are calculated;
(3) Euler's function of n is calculated
(4) an integer e is randomly choosed, condition isAnd e withIt is relatively prime;
(5) e pairs is calculatedMould antielement d;
(6) n and e are packaged into public key (n, e), n and d is packaged into private key (n, d);Encryption encrypts formula using public key (n, e)
For:C≡Memod n;Using private key (n, d), decrypting formula is for decryption:C=Memod n。
3. a kind of charging pile communication system encrypting and decrypting method according to claim 2, it is characterised in that:Symmetric cryptography is adopted
Encrypted with hyperchaos, chaos system uses nonlinear equation, mapped using Henon:
When 1.05<a<When 1.8, b=0.3, the system produces chaos phenomenon, chooses two isometric sequence generation chaos sequence x
(1), y (1), control parameter is a, and b, control parameter passes to charging pile as key by asymmetric encryption mode;Setting is initial
Value x (1), y (1), using Henon mapping two isometric chaos sequences x (i) of generation, y (i), the chaos sequence that then will be obtained
X (i), y (i) press [x1(n)/2,y1(n)/2,y2(n)/2,x2(n)/2] structural arrangement, constitute new sequence M1, wherein x1(n)/2
Represent the first half of sequence x (i), x2N ()/2 represent the latter half of sequences y (i), y (i) is similarly;Afterwards by initiation sequence
Sort transformation is done by former order, new sequence M is obtained2, carry out XOR M3=M1^M2。
4. a kind of charging pile communication system encrypting and decrypting method according to claim 1, it is characterised in that:Using being based on
The embedded system of Cortex-M2 kernels, the in embedded systems external SOC with hardware encrypting;By RSA
Algorithm, after charging pile obtains the key of transmission real time data, then transmits the real time data that need to largely transmit by chaos encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710126537.6A CN106850670A (en) | 2017-03-06 | 2017-03-06 | A kind of charging pile communication system encrypting and decrypting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710126537.6A CN106850670A (en) | 2017-03-06 | 2017-03-06 | A kind of charging pile communication system encrypting and decrypting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106850670A true CN106850670A (en) | 2017-06-13 |
Family
ID=59138962
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710126537.6A Pending CN106850670A (en) | 2017-03-06 | 2017-03-06 | A kind of charging pile communication system encrypting and decrypting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850670A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109245892A (en) * | 2018-11-13 | 2019-01-18 | 常熟理工学院 | Variable length key RSA cryptographic algorithms big data information security processing method and system |
CN110300110A (en) * | 2019-06-28 | 2019-10-01 | 炬星科技(深圳)有限公司 | A kind of encryption and decryption control method, charging pile and charging equipment |
CN111049830A (en) * | 2019-12-13 | 2020-04-21 | 重庆国翰能源发展有限公司 | Data information leakage prevention method for charging pile |
CN112202549A (en) * | 2020-09-02 | 2021-01-08 | 深圳市车电网络有限公司 | Charging management method, charging terminal data processing method and charging management platform data processing method |
CN112565206A (en) * | 2020-11-20 | 2021-03-26 | 国网天津市电力公司 | Charging pile information safety protection method and protection system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1472914A (en) * | 2003-06-27 | 2004-02-04 | 武汉理工大学 | High performance and quick public pin encryption |
US20080148043A1 (en) * | 2006-12-18 | 2008-06-19 | Nortel Networks Limited | Establishing a secured communication session |
CN101431410A (en) * | 2007-11-09 | 2009-05-13 | 康佳集团股份有限公司 | Authentication method for network game client and server cluster |
CN104202158A (en) * | 2014-09-22 | 2014-12-10 | 浪潮电子信息产业股份有限公司 | Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing |
CN104463267A (en) * | 2014-10-31 | 2015-03-25 | 武汉大学 | RFID comprehensive encryption method for electric vehicle charging station |
-
2017
- 2017-03-06 CN CN201710126537.6A patent/CN106850670A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1472914A (en) * | 2003-06-27 | 2004-02-04 | 武汉理工大学 | High performance and quick public pin encryption |
US20080148043A1 (en) * | 2006-12-18 | 2008-06-19 | Nortel Networks Limited | Establishing a secured communication session |
CN101431410A (en) * | 2007-11-09 | 2009-05-13 | 康佳集团股份有限公司 | Authentication method for network game client and server cluster |
CN104202158A (en) * | 2014-09-22 | 2014-12-10 | 浪潮电子信息产业股份有限公司 | Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing |
CN104463267A (en) * | 2014-10-31 | 2015-03-25 | 武汉大学 | RFID comprehensive encryption method for electric vehicle charging station |
Non-Patent Citations (2)
Title |
---|
焦树海: "《计算机安全概论》", 30 November 2001, 天津:南开大学出版社 * |
黄波: "一种基于Henon映射的图像加密算法", 《重庆工商大学学报(自然科学版)》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109245892A (en) * | 2018-11-13 | 2019-01-18 | 常熟理工学院 | Variable length key RSA cryptographic algorithms big data information security processing method and system |
CN110300110A (en) * | 2019-06-28 | 2019-10-01 | 炬星科技(深圳)有限公司 | A kind of encryption and decryption control method, charging pile and charging equipment |
CN111049830A (en) * | 2019-12-13 | 2020-04-21 | 重庆国翰能源发展有限公司 | Data information leakage prevention method for charging pile |
CN111049830B (en) * | 2019-12-13 | 2021-12-07 | 重庆国翰能源发展有限公司 | Data information leakage prevention method for charging pile |
CN112202549A (en) * | 2020-09-02 | 2021-01-08 | 深圳市车电网络有限公司 | Charging management method, charging terminal data processing method and charging management platform data processing method |
CN112565206A (en) * | 2020-11-20 | 2021-03-26 | 国网天津市电力公司 | Charging pile information safety protection method and protection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850670A (en) | A kind of charging pile communication system encrypting and decrypting method | |
Agrawal et al. | A comparative survey on symmetric key encryption techniques | |
CN101977112B (en) | Public key cipher encrypting and decrypting method based on neural network chaotic attractor | |
CN104967517B (en) | A kind of network data convergence method for wireless senser | |
CN106656475A (en) | Novel symmetric key algorithm for high speed encryption | |
CN103905187A (en) | Network communication encryption method based on contents | |
Abusukhon et al. | Secure network communication based on text-to-image encryption | |
CN106330432A (en) | DES encryption algorithm based encryption method | |
Viswanath et al. | A Public Key Cryptosystem Using Hiil's Cipher | |
Al Busafi et al. | Review and analysis of cryptography techniques | |
CN101882996B (en) | Information encryption and decryption method in distributed system based on identity | |
Balitanas et al. | Crossed crypto-scheme in WPA PSK mode | |
Kaur et al. | An encryption scheme based on AES and SHA-512 | |
Ahmed et al. | A hybrid model to secure the exchange of DH keys | |
CN107659396B (en) | Dynamic encryption method | |
Adomey | Introduction to cryptography | |
Saarinen | GCM, GHASH and Weak Keys. | |
CN104168266B (en) | A kind of encryption method for taking precautions against lasting leakage attack | |
Kumar et al. | A survey on various asymmetric algorithms | |
Bodkhe et al. | Hybrid encryption algorithm based improved RSA and Diffie-Hellman | |
Balitanas | Wi Fi protected access-pre-shared key hybrid algorithm | |
Olwenyi et al. | Modern Cryptographic Schemes: Applications and Comparative Study | |
Bali et al. | Securing informative text using color visual cryptography | |
Singh et al. | Public key cryptography using sphere and spheroid | |
Agrawal et al. | Analysis of different cryptography algorithms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |