CN107171799A - A kind of method of data transfer encryption - Google Patents
A kind of method of data transfer encryption Download PDFInfo
- Publication number
- CN107171799A CN107171799A CN201611074152.1A CN201611074152A CN107171799A CN 107171799 A CN107171799 A CN 107171799A CN 201611074152 A CN201611074152 A CN 201611074152A CN 107171799 A CN107171799 A CN 107171799A
- Authority
- CN
- China
- Prior art keywords
- client
- encryption
- message
- keys
- rsa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
Abstract
A kind of method of data transfer encryption, belongs to encryption technology field, is realized by following steps:Server receives and detects the login message from client, includes user name, password, timestamp and the RSA public keys of client;Server dynamic generation DEA DES keys, and encrypted with the RSA public keys from client dynamic generation for the DES keys, generate rsa encryption ciphertext;Client decrypts the rsa encryption ciphertext received, obtains the DES keys;Client empties RSA key pair;The message encryption after compression is handled using the message transmitted between RLE compression algorithm server and client sides, and with the DES keys;The message received is decrypted with the DES keys for client/server, and the message after decryption is decompressed with RLE algorithms.The AES that the present invention is provided compresses certain types of data in ciphering process using compression algorithm, and compression efficiency and performance are preferably improved.
Description
Technical field
The present invention relates to encryption technology field, and in particular to a kind of method of data transfer encryption.
Background technology
With the high speed development of computer communication technology, increasing important information can select to carry out by network
How transmission, therefore, ensure that the security that communication data is transmitted in a network has become the network that people pay close attention to
One of safety problem, and become the core research point of network security to be encrypted as the information security technology of means.
The content of the invention
It is an object of the invention to provide a kind of method of data transfer encryption.
To realize the purpose of the present invention, the technical solution adopted in the present invention is:
A kind of method of data transfer encryption, comprises the following steps:(1)Server receives and detects the login report from client
Text, includes user name, password, timestamp and the RSA public keys of client;(2)Server dynamic generation DEA DES is close
Key, and encrypted with the RSA public keys from client dynamic generation for the DES keys, generate rsa encryption ciphertext;(3)Client
Hold and decrypt the rsa encryption ciphertext received, obtain the DES keys;(4)Client empties RSA key pair;(5)Profit
With the message transmitted between RLE compression algorithm server and client sides, and with the DES keys to the message encryption after compression at
Reason;(6)The message received is decrypted with the DES keys for client/server, and with RLE algorithms to decryption after
Message is decompressed.
The step(1)Concrete methods of realizing be:Server receives and detects the user name from client, password,
Timestamp and RSA public keys;When correct and timestamp is denoted as current time to username and password, then step is performed(2).
The AES that the present invention is provided compresses certain types of data, compression effect in ciphering process using compression algorithm
Rate and performance are preferably improved.
Embodiment
The following implementation to the present invention is further described, so that those skilled in the art can be better understood from simultaneously
Implement.
Embodiment 1
A kind of method of data transfer encryption, comprises the following steps:(1)Server receives and detects the login report from client
Text, includes user name, password, timestamp and the RSA public keys of client;(2)Server dynamic generation DEA DES is close
Key, and encrypted with the RSA public keys from client dynamic generation for the DES keys, generate rsa encryption ciphertext;(3)Client
Hold and decrypt the rsa encryption ciphertext received, obtain the DES keys;(4)Client empties RSA key pair;(5)Profit
With the message transmitted between RLE compression algorithm server and client sides, and with the DES keys to the message encryption after compression at
Reason;(6)The message received is decrypted with the DES keys for client/server, and with RLE algorithms to decryption after
Message is decompressed.
Described above is only embodiments of the present invention, it is noted that come for those skilled in the art
Say, without departing from the technical principles of the invention, some improvement and modification can also be made, these improvement and modification also should
It is considered as protection scope of the present invention.
Claims (2)
1. a kind of method of data transfer encryption, it is characterised in that comprise the following steps:
(1)Server receives and detects the login message from client, including the user name of client, password, timestamp and
RSA public keys;
(2)Server dynamic generation DEA DES keys, and be institute with the RSA public keys from client dynamic generation
The encryption of DES keys is stated, rsa encryption ciphertext is generated;
Client decrypts the rsa encryption ciphertext received, obtains the DES keys;
Client empties RSA key pair;
(5)Using the message transmitted between RLE compression algorithm server and client sides, and with the DES keys to compression after
Message encryption processing;
(6)The message received is decrypted with the DES keys for client/server, and with RLE algorithms to decryption after
Message is decompressed.
2. a kind of method of data transfer encryption according to claim 1, it is characterised in that the step(1)Tool
Body implementation method is:Server receives and detects the user name from client, password, timestamp and RSA public keys;Work as user
When name and password be correct and timestamp is denoted as current time, then step is performed(2).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611074152.1A CN107171799A (en) | 2016-11-29 | 2016-11-29 | A kind of method of data transfer encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611074152.1A CN107171799A (en) | 2016-11-29 | 2016-11-29 | A kind of method of data transfer encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107171799A true CN107171799A (en) | 2017-09-15 |
Family
ID=59849403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611074152.1A Pending CN107171799A (en) | 2016-11-29 | 2016-11-29 | A kind of method of data transfer encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107171799A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266477A (en) * | 2019-05-23 | 2019-09-20 | 广州河东科技有限公司 | A kind of UDP communication realization dynamic encrypting method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333093A (en) * | 2011-09-28 | 2012-01-25 | 深圳市赛格导航科技股份有限公司 | Data encryption transmission method and system |
CN106453391A (en) * | 2016-11-13 | 2017-02-22 | 北海和思科技有限公司 | Long repeating data encryption and transmission method and system |
-
2016
- 2016-11-29 CN CN201611074152.1A patent/CN107171799A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333093A (en) * | 2011-09-28 | 2012-01-25 | 深圳市赛格导航科技股份有限公司 | Data encryption transmission method and system |
CN106453391A (en) * | 2016-11-13 | 2017-02-22 | 北海和思科技有限公司 | Long repeating data encryption and transmission method and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266477A (en) * | 2019-05-23 | 2019-09-20 | 广州河东科技有限公司 | A kind of UDP communication realization dynamic encrypting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Juang | Efficient multi-server password authenticated key agreement using smart cards | |
CN102333093A (en) | Data encryption transmission method and system | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
JP2012010052A5 (en) | ||
TW201417546A (en) | Instant messaging method and system | |
CN106453391A (en) | Long repeating data encryption and transmission method and system | |
CN102857479A (en) | Network communication encrypting method and system | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN107682152B (en) | Group key negotiation method based on symmetric cipher | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN101707767A (en) | Data transmission method and devices | |
CN101706854A (en) | USB information security equipment and method for communication between USB information security equipment and mainframe | |
CN104243493A (en) | Network identity authentication method and system | |
CN111404953A (en) | Message encryption method, message decryption method, related devices and related systems | |
CN109005151A (en) | A kind of encryption of information, decryption processing method and processing terminal | |
CN101431411A (en) | Dynamic encryption method for network game data | |
CN101789863A (en) | Safe data information transmission method | |
CN113572607A (en) | Secure communication method adopting unbalanced SM2 key exchange algorithm | |
CN102281303A (en) | Data exchange method | |
CN105187418B (en) | Weak signature algorithm | |
CN112532384B (en) | Method for quickly encrypting and decrypting transmission key based on packet key mode | |
WO2020042023A1 (en) | Instant messaging data encryption method and apparatus | |
CN110730366B (en) | Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption method | |
CN100464337C (en) | Method and equipment for carrying out safety communication between USB device and host |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170915 |