CN109040132A - One kind being based on the randomly selected encryption communication method of shared key - Google Patents
One kind being based on the randomly selected encryption communication method of shared key Download PDFInfo
- Publication number
- CN109040132A CN109040132A CN201811124840.3A CN201811124840A CN109040132A CN 109040132 A CN109040132 A CN 109040132A CN 201811124840 A CN201811124840 A CN 201811124840A CN 109040132 A CN109040132 A CN 109040132A
- Authority
- CN
- China
- Prior art keywords
- key
- communication
- recipient
- random number
- response message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Abstract
The present invention provides a kind of based on the randomly selected encryption communication method of shared key.The described method includes: initiator sends link request message to recipient;Receive the request response message from the recipient;The request response message is that the recipient is built-up based on communication key, and the communication key is the group key that the recipient randomly selects from shared key group;Decrypt the request response message;Verify the request response message;The consensus property of the communication key is verified based on the request response message;Coded communication is carried out with the communication key and the recipient.The present invention is by way of arranging shared key group, under the negotiation authentication mechanism based on random number, it realizes by way of random selection initial key and negotiation communication key, it realizes communication every time and uses different symmetric keys, and the communication means that key is randomly assigned by communication receiver, with exempting to configure, simple, the high feature of encryption efficiency is used.
Description
Technical field
The present invention relates to coded communication fields, and in particular to one kind is based on the randomly selected coded communication side of shared key
Method.
Background technique
In the communication protocol that electric system tool uses, frequently with standard or privately owned plaintext protocol communication.It is logical in plain text
Letter, be particularly based on communication standard plaintext communication facilitate tool in use to exceptional communication the problem of analysis and fixed
Position, but plaintext communication also brings the risk of information leakage, and there are certain information security hidden danger.
In electric system instrument communications, relatively common coded communication is the coded communication side based on shared symmetric key
Method.This method is arranged communication encryption algorithm and symmetric key in advance by communicating pair to realize coded communication.Shared symmetric key
Method using simple, encryption efficiency is high, and security intensity with higher.But this method is in the communication of tool and other equipment
In use same communication key pair, exist by by malicious attacker by obtain mass communication sample progress conversed analysis cracked
Risk.
Another common coded communication is the coded communication based on unsymmetrical key, and this method is led in communication process
The method that unsymmetrical key carries out symmetric key negotiation is crossed, solves the problems, such as that communication uses identical shared key every time;But it is non-
Symmetric key is computationally intensive, and working efficiency is low, needs periodically to be managed update to digital certificate, there are working service costs to compare
High problem.
Summary of the invention
The purpose of the embodiment of the present invention is that provide it is a kind of based on the randomly selected encryption communication method of shared key, by with
Machine overcomes common shared key method and uses in the communications from one group of the shared key group selection method as communication key
The problem that same key tape comes improves the privacy and safety of communication by the random selection mode of key.
The embodiment of the invention provides one kind to be based on the randomly selected encryption communication method of shared key, comprising:
Initiator sends link request message to recipient;
Receive the request response message from the recipient;The request response message is that the recipient is based on communication
Key is built-up, and the communication key is the group key that the recipient randomly selects from shared key group;
Decrypt the request response message;
Verify the request response message;
The consensus property of the communication key is verified based on the request response message;
Coded communication is carried out with the communication key and the recipient.
Further, the initiator sends signature message to recipient, comprising:
Initiator generates initial key and verifies random number;
Initial key is calculated based on initial key verifying random number;
Signature is carried out to initial key verifying random number with the initial key and forms linking request message;
The linking request message is sent to recipient.
Further, the request response message is that the recipient is built-up based on communication key, comprising:
The request response message be the recipient be based on the initial key, the initial key verifying random number,
Communication key is built-up from verification information, communication key verifying random number, communication key group number;
Wherein, the communication key is that the recipient is based on the communication key and the communication key from verification information
It is built-up to verify random number.
Further, the communication key verifying random number is that the recipient randomly selects a group key from key group
As what is generated after the communication key, the communication key group number is number of the communication key in key group.
Further, the communication key group number is number of the communication key in the shared key group.
Further, after the decryption request response message, decryption initial key verifying random number is obtained, decryption is led to
Believe key authentication random number, decryption communication key group number.
Further, the verifying request response message, comprising:
It verifies the decryption initial key verifying random number and whether initial key verifying random number is consistent, unanimously then
Determine that the request response message is correct.
Further, the consensus property that the communication key is verified based on the request response message, comprising:
Decryption communication key is determined based on the decryption communication key group number;
New traffic key authentication random number is generated based on the decryption communication key;
It verifies the new traffic key authentication random number and whether decryption communication key verifying random number is consistent, unanimously
Then determine that the decryption communication key is exactly the communication key.
Further, the shared key group includes 2048 groups for one that the initiator and the recipient share
The key group of 256 keys.
Further, described to be carried out in coded communication with the communication key and the recipient, the coded communication is adopted
With AES-256 Encryption Algorithm.
The technical solution that the embodiment of the present invention provides, by way of arranging shared key group, based on random number
Negotiate under authentication mechanism, realizes by way of random selection initial key and negotiation communication key, realize each communication
Using different symmetric keys, and the communication means that key is randomly assigned by communication receiver, it is logical to solve conventional symmetrical key
Letter uses the problem of same key every time, and has and exempt to configure, and uses simple, the high feature of encryption efficiency.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is that one kind that one embodiment of the invention provides is shown based on the randomly selected encryption communication method process of shared key
It is intended to;
Fig. 2 is that one kind of Fig. 1 embodiment is based on the randomly selected encryption communication method flow chart of shared key;
Fig. 3 be another embodiment of the present invention provides one kind be based on 2048 groups of 256 randomly selected encryptions of shared key
Communication means flow diagram.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below with reference to drawings and examples,
The specific embodiment progress of technical solution of the present invention in further detail, is clearly illustrated.However, specific implementations described below
Mode and embodiment are for illustrative purposes only, rather than limiting the invention.It only contains a part of the invention and implements
Example, instead of all the embodiments, the other embodiments that those skilled in the art obtain various change of the invention all belong to
In the scope of protection of the invention.
Communicating pair includes initiator and recipient, shares the key group K comprising N group keyG, wherein N >=2;It is close
Key KiIt is KGI-th (1≤i≤N) group key;Communicating pair arranges identical Encryption Algorithm E (Ki, x), corresponding decipherment algorithm
For D (Ki, x), and meet x=D (Ki, E (Ki, x)), wherein KiFor key, x is clear data;Communicating pair arranges identical Kazakhstan
Uncommon algorithm Hash (x) and the initial key Algorithms of Selecting K (x) according to random number cryptographic Hash, wherein K (x) is to each input value
With unique calculated result.
Fig. 1 is that one kind that one embodiment of the invention provides is shown based on the randomly selected encryption communication method process of shared key
It is intended to, Fig. 2 is that one kind of Fig. 1 embodiment is based on the randomly selected encryption communication method flow chart of shared key, the method packet
Include following steps.
In step s 110, initiator sends link request message to recipient.Step S110 includes following sub-step
S111、S112、S113、S114。
Step S111, initiator generate initial key verifying random number R firstd。
Step S112, initiator are based on initial key verifying random number and initial key K are calculatedI。
According to formula HR=Hash (Rd) calculate initial key verifying random number RdCryptographic Hash HR, then with cryptographic Hash HRMake
For input, foundation formula KI=K (HR) unique initial key K is calculatedI。
Step S113, initiator is with initial key KIRandom number R is verified to initial keydIt carries out signature and forms linking request
Message TReq。
Initiator passes through SHR=E (KI, HR) it is calculated as initial key verifying random number RdSignature value SHR, wherein HRIt is first
Beginning key authentication random number RdCryptographic Hash, KIFor initial key.Then linking request message T is constructedReq, TReq=(Rd, SHR)。
Step S114, initiator send link request message TReqTo recipient.
In the step s 120, initiator receives the request response message I from recipientRsp;Request response message is to receive
Side is built-up based on communication key, and communication key is the group key that recipient randomly selects from shared key group.
Request response message IRspIt is that recipient is based on initial key KI, initial key verify random number Rd', communication key are certainly
Verification information PT, communication key verify random number RT, communication key group number T it is built-up.Communication key is from verification information PTIt is to connect
Debit is based on communication key KTRandom number R is verified with communication keyTBuilt-up, PT=(RT, E (KT, RT))。
Wherein, initial key verifies random number Rd' is that recipient's parsing link request message obtains.
The correctness of recipient's verified link request message, first parsing link request message TReq=(Rd', SHR'),
Middle Rd' is the initial key verifying random number that parsing obtains, SHR' is its signature value, passes through HR'=Hash (Rd') calculate Rd''s
Cryptographic Hash HR', after pass through KI'=K (HR') obtain initial key KI', if SHR'=E (KI', HR'), then it is determined as linking request report
Literary TReqCorrectly, and KI=KI'.
Communication key KTIt is to be randomly selected from shared key group after the correctness of recipient's verified link request message
One group key, communication key group number are T, wherein KT≠KI。
Communication key verifies random number RTIt is recipient after randomly selecting a group key in key group as communication key
It generates, key group number T is number of the communication key in key group.Communication key is from verification information PTIt is that recipient is based on leading to
Believe key KTRandom number R is verified with communication keyTBuilt-up, PT=(RT, E (KT, RT)。
Recipient constructs request response message IRsp, structure IRsp=E (KI, (Rd', T, RT, E (KT, RT))), wherein KIFor
Initial key, Rd' is that initial key verifies random number, and T is communication key KTCorresponding key group group number, RTIt is tested for communication key
Demonstrate,prove random number, KTFor communication key.
Then recipient sends request response message IRspTo initiator, initiator is received.
In step s 130, initiator's decoding request response message.
After decoding request response message, obtain decryption initial key verifying random number, decryption communication key verifying random number,
Decrypt communication key group number.
Initiator passes through (Rd' ', T ', RT', Evalue)=D (KI, IRsp) decoding request response message IRsp, wherein Rd' ' is
It decrypts initial key and verifies random number, T ' is decryption communication key group number, RT' is that decryption communication key verifies random number, Evalue
To correspond to E (K after decryptionT, RT) secret value.
In step S140, initiator's checking request response message.
Initiator verifies decryption initial key and verifies random number Rd' ' and initial key verify random number RdIt is whether consistent, one
Cause then decision request response message IRspCorrectly.
In step S150, initiator is consensus based on request response message verifying random number verification communication key
Property.Step S150 includes sub-step S151, S152, S153.
Step S151 determines decryption communication key K based on decryption communication key group number T 'T'.
Step S152 generates new traffic key authentication random number R based on decryption communication keyT' '.
Pass through RT' '=D (KT', Evalue) decryption Evalue, obtain new traffic key authentication random number RT″。
Step S153, verifying decryption communication key verify random number RT' and new traffic key authentication random number RT' ' whether one
It causes, unanimously then determines the decryption communication key K receivedT' is exactly the communication key K of recipient's selectionT。
If RT' '=RT', then KT'=KT。
In step S160, initiator carries out coded communication with communication key and recipient.
Fig. 2 be another embodiment of the present invention provides one kind be based on 2048 groups of 256 randomly selected encryptions of shared key
Communication means flow diagram.
In the present embodiment, shared key group includes 2048 groups of 256 keys, and coded communication is calculated using AES-256 encryption
Method, key length are 256 (32 byte).The ciphering process of Encryption Algorithm AES-256 is labeled as EAES-256(Ki, x), decryption
Process markup is DAES-256(Ki, x), wherein KiFor 256bit (position) key, x is by the clear data of encryption and decryption;Using SHA256
As the hash algorithm of communicating pair, it is labeled as Hashsha-256(x);Using the last 12Bit of random number cryptographic Hash as key group
Group number choose initial key, i.e. key Algorithms of Selecting K (x).
It the described method comprises the following steps.
In step S210, initiator sends link request message to recipient.Step S110 includes following sub-step
S211、S212、S213、S214。
Step S211, initiator generate initial key verifying random number R firstd。
In the present embodiment, initial key verifies random number RdFor 1024bit.
Step S212, initiator are based on initial key verifying random number and initial key K are calculatedI。
According to formula HR=Hashsha-256(Rd) calculate initial key verifying random number RdCryptographic Hash HR, then with Hash
Value HRLast 12bit as key group KGGroup number choose initial key KI。
Step S213, initiator is with initial key KIRandom number R is verified to initial keydIt carries out signature and forms linking request
Message TReq。
Initiator passes through SHR=EAES-256(KI, HR) calculate initial key verifying random number RdSignature value SHR, wherein HR
Random number R is verified for initial keydCryptographic Hash, KIFor initial key.Then linking request message T is constructedReq, TReq=(Rd,
EAES-256(KI, HR))。
Step S214, initiator send link request message to recipient.
In step S220, initiator receives the request response message from recipient;Request response message is recipient
Built-up based on communication key, communication key is the group key that recipient randomly selects from shared key group.
Request response message IRspIt is that recipient is based on initial key KI, initial key verify random number Rd', communication key are certainly
Verification information PT, communication key verify random number RT, communication key group number T it is built-up, communication key is from verification information PTIt is
Recipient is based on communication key KTRandom number R is verified with communication keyTBuilding, PT=(RT, EAES-256(KT, RT)。
The correctness of recipient's verified link request message, first parsing link request message TReq=(Rd', SHR'),
Middle Rd' is the initial key verifying random number that parsing obtains, SHR' is its signature value, passes through HR'=Hashsha-256(Rd') calculate
RdThe cryptographic Hash H of 'R' chooses HRThe last 12bit of ' chooses initial key K as key group group numberI', if SHR'=EAES-256
(KI', HR'), then it is determined as linking request message TReqCorrectly, and KI=KI'.
Communication key KTIt is to be randomly selected from shared key group after the correctness of recipient's verified link request message
One group key, communication key group number are T, wherein KT≠KI。
Wherein, initial key verifies random number Rd' is that recipient's parsing link request message obtains.The communication of 256bit
Key authentication random number RTIt is recipient from a group key is randomly selected in key group as being generated after communication key, key group
Number T is communication key KTNumber in key group.Communication key is from verification information PTIt is that recipient is based on communication key KTWith it is logical
Believe key authentication random number RTBuilding, PT=(RT, EAES-256(KT, RT)。
Recipient constructs request response message IRsp, structure IRsp=EAES-256(KI, (Rd', T, RT, EAES-256(KT,
RT))), wherein KIFor initial key, Rd' is that initial key verifies random number, and T is communication key KTCorresponding key group group number, RT
Random number, K are verified for communication keyTFor communication key.
Then recipient sends request response message IRspTo initiator, initiator is received.
In step S230, initiator's decoding request response message.
After decoding request response message, obtain decryption initial key verifying random number, decryption communication key verifying random number,
Decrypt communication key group number.
Initiator passes through (Rd' ', T ', RT', Evalue)=DAES-256(KI, IRsp) decoding request response message IRsp, wherein
Rd' ' is that decryption initial key verifies random number, and T ' is decryption communication key group number, RT' is that decryption communication key verifies random number,
EvalueTo correspond to E after decryptionAES-256(KT, RT) secret value.
In step S240, initiator's checking request response message.
Initiator verifies decryption initial key and verifies random number Rd' ' and initial key verify random number RdIt is whether consistent, one
Cause then decision request response message IRspCorrectly.
In step s 250, consensus property of the initiator based on request response message verifying communication key.Step S250
Including sub-step S251, S252, S253.
Step S251 determines decryption communication key K based on decryption communication key group number T 'T'.
Step S252, based on decryption communication key KT' generates new traffic key authentication random number RT″。
Pass through RT' '=DAES-256(KT', Evalue) decryption Evalue, obtain new traffic key authentication random number RT' '.
Step S253, verifying decryption communication key verify random number RT' and new traffic key authentication random number RT' ' whether one
It causes, unanimously then determines the decryption communication key K receivedT' is exactly the communication key K of recipient's selectionT。
If RT' '=RT', then KT'=KT。
In step S260, initiator carries out coded communication with communication key and recipient.
It should be noted that each embodiment above by reference to described in attached drawing is only to illustrate the present invention rather than limits this
The range of invention, those skilled in the art should understand that, it is right under the premise without departing from the spirit and scope of the present invention
The modification or equivalent replacement that the present invention carries out, should all cover within the scope of the present invention.In addition, signified unless the context
Outside, the word occurred in the singular includes plural form, and vice versa.In addition, unless stated otherwise, then any embodiment
All or part of in combination with any other embodiment all or part of come using.
Claims (10)
1. one kind is based on the randomly selected encryption communication method of shared key, comprising:
Initiator sends link request message to recipient;
Receive the request response message from the recipient;The request response message is that the recipient is based on communication key
Built-up, the communication key is the group key that the recipient randomly selects from shared key group;
Decrypt the request response message;
Verify the request response message;
The consensus property of the communication key is verified based on the request response message;
Coded communication is carried out with the communication key and the recipient.
2. the method according to claim 1, wherein the initiator sends signature message to recipient, comprising:
Initiator generates initial key and verifies random number;
Initial key is calculated based on initial key verifying random number;
Signature is carried out to initial key verifying random number with the initial key and forms linking request message;
The linking request message is sent to recipient.
3. according to the method described in claim 2, it is characterized in that, the request response message is that the recipient is based on communication
Key is built-up, comprising:
The request response message is that the recipient is based on the initial key, initial key verifying random number, communication
Key is built-up from verification information, communication key verifying random number, communication key group number;
Wherein, the communication key is that the recipient is based on the communication key and the communication key is verified from verification information
Random number is built-up.
4. according to the method described in claim 3, it is characterized in that, communication key verifying random number be the recipient from
A group key is randomly selected in key group as what is generated after the communication key, the communication key group number is that the communication is close
Number of the key in key group.
5. according to the method described in claim 4, it is characterized in that, the communication key group number is the communication key described
Number in shared key group.
6. according to the method described in claim 5, it is characterized in that, being decrypted after the decryption request response message
Initial key verifies random number, decryption communication key verifying random number, decryption communication key group number.
7. according to the method described in claim 6, it is characterized in that, the verifying request response message, comprising:
It verifies the decryption initial key verifying random number and whether initial key verifying random number is consistent, unanimously then determine
The request response message is correct.
8. the method according to the description of claim 7 is characterized in that described verify the communication based on the request response message
The consensus property of key, comprising:
Decryption communication key is determined based on the decryption communication key group number;
New traffic key authentication random number is generated based on the decryption communication key;
It verifies the new traffic key authentication random number and whether decryption communication key verifying random number is consistent, unanimously then sentence
The fixed decryption communication key is exactly the communication key.
9. the method according to claim 1, wherein the shared key group is the initiator and the reception
The just shared one key group comprising 2048 groups of 256 keys.
10. the method according to claim 1, wherein described carried out with the communication key and the recipient
In coded communication, the coded communication uses AES-256 Encryption Algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124840.3A CN109040132B (en) | 2018-09-26 | 2018-09-26 | Encryption communication method based on random selection of shared secret key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124840.3A CN109040132B (en) | 2018-09-26 | 2018-09-26 | Encryption communication method based on random selection of shared secret key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040132A true CN109040132A (en) | 2018-12-18 |
CN109040132B CN109040132B (en) | 2021-05-28 |
Family
ID=64618035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811124840.3A Active CN109040132B (en) | 2018-09-26 | 2018-09-26 | Encryption communication method based on random selection of shared secret key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040132B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266485A (en) * | 2019-06-28 | 2019-09-20 | 宁波奥克斯电气股份有限公司 | A kind of Internet of Things secure communication control method based on NB-IoT |
CN111431717A (en) * | 2020-03-31 | 2020-07-17 | 兴唐通信科技有限公司 | Encryption method for satellite mobile communication system |
CN113726502A (en) * | 2021-06-11 | 2021-11-30 | 华帝股份有限公司 | Encryption and decryption method suitable for cigarette machine |
CN114710282A (en) * | 2022-05-10 | 2022-07-05 | 北京紫光展锐通信技术有限公司 | Identity authentication method, device, equipment and storage medium |
CN114760047A (en) * | 2020-12-28 | 2022-07-15 | 科大国盾量子技术股份有限公司 | Quantum key management method, device and system |
CN116340954A (en) * | 2023-03-24 | 2023-06-27 | 合芯科技有限公司 | Data security channel establishment method, system control processor and starting firmware |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120114124A1 (en) * | 2009-07-15 | 2012-05-10 | China Iwncomm Co., Ltd. | Method for combining authentication and secret keys management mechanism in a sensor network |
CN103986723A (en) * | 2014-05-28 | 2014-08-13 | 大唐移动通信设备有限公司 | Secret communication control and secret communication method and device |
CN104618093A (en) * | 2015-01-16 | 2015-05-13 | 深圳市中兴物联科技有限公司 | Data encrypting method and device |
CN104994085A (en) * | 2015-06-19 | 2015-10-21 | 浪潮(北京)电子信息产业有限公司 | Identity authentication method and system in wireless sensor network |
CN105024807A (en) * | 2014-04-30 | 2015-11-04 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and system |
CN106612176A (en) * | 2016-12-16 | 2017-05-03 | 中国电子科技集团公司第三十研究所 | Negotiation system and negotiation method based on quantum truly random number negotiation secret key |
CN107508672A (en) * | 2017-09-07 | 2017-12-22 | 浙江神州量子网络科技有限公司 | A kind of cipher key synchronization method and key synchronization device based on pool of symmetric keys, key synchronization system |
-
2018
- 2018-09-26 CN CN201811124840.3A patent/CN109040132B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120114124A1 (en) * | 2009-07-15 | 2012-05-10 | China Iwncomm Co., Ltd. | Method for combining authentication and secret keys management mechanism in a sensor network |
CN105024807A (en) * | 2014-04-30 | 2015-11-04 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and system |
CN103986723A (en) * | 2014-05-28 | 2014-08-13 | 大唐移动通信设备有限公司 | Secret communication control and secret communication method and device |
CN104618093A (en) * | 2015-01-16 | 2015-05-13 | 深圳市中兴物联科技有限公司 | Data encrypting method and device |
CN104994085A (en) * | 2015-06-19 | 2015-10-21 | 浪潮(北京)电子信息产业有限公司 | Identity authentication method and system in wireless sensor network |
CN106612176A (en) * | 2016-12-16 | 2017-05-03 | 中国电子科技集团公司第三十研究所 | Negotiation system and negotiation method based on quantum truly random number negotiation secret key |
CN107508672A (en) * | 2017-09-07 | 2017-12-22 | 浙江神州量子网络科技有限公司 | A kind of cipher key synchronization method and key synchronization device based on pool of symmetric keys, key synchronization system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266485A (en) * | 2019-06-28 | 2019-09-20 | 宁波奥克斯电气股份有限公司 | A kind of Internet of Things secure communication control method based on NB-IoT |
CN111431717A (en) * | 2020-03-31 | 2020-07-17 | 兴唐通信科技有限公司 | Encryption method for satellite mobile communication system |
CN114760047A (en) * | 2020-12-28 | 2022-07-15 | 科大国盾量子技术股份有限公司 | Quantum key management method, device and system |
CN113726502A (en) * | 2021-06-11 | 2021-11-30 | 华帝股份有限公司 | Encryption and decryption method suitable for cigarette machine |
CN114710282A (en) * | 2022-05-10 | 2022-07-05 | 北京紫光展锐通信技术有限公司 | Identity authentication method, device, equipment and storage medium |
CN116340954A (en) * | 2023-03-24 | 2023-06-27 | 合芯科技有限公司 | Data security channel establishment method, system control processor and starting firmware |
CN116340954B (en) * | 2023-03-24 | 2024-01-23 | 合芯科技有限公司 | Data security channel establishment method, system control processor and starting firmware |
Also Published As
Publication number | Publication date |
---|---|
CN109040132B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040132A (en) | One kind being based on the randomly selected encryption communication method of shared key | |
CN110535868A (en) | Data transmission method and system based on Hybrid Encryption algorithm | |
CN109559122A (en) | Block chain data transmission method and block chain data transmission system | |
KR101549034B1 (en) | Method for guarantying the confidentiality and integrity of a data in Controller Area Networks | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN104092663A (en) | Encryption communication method and encryption communication system | |
JP2012019511A (en) | System and method of safety transaction between wireless communication apparatus and server | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
JP2022521525A (en) | Cryptographic method for validating data | |
CN106162537B (en) | A kind of method, wireless telecom equipment and the terminal of safety certification connection | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN114364062B (en) | Method for safely accessing gateway of Internet of vehicles | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN103179514A (en) | Cell phone safe group-sending method and device for sensitive message | |
Mathur et al. | Solving security issues in mobile computing using cryptography techniques—A Survey | |
CN114024672B (en) | Safety protection method and system for power line carrier communication system | |
CN110691359A (en) | Safety protection method for power marketing professional Bluetooth communication | |
CN109587149A (en) | A kind of safety communicating method and device of data | |
CN110012467A (en) | The packet authentication method of narrowband Internet of Things | |
Juang et al. | Efficient 3GPP authentication and key agreement with robust user privacy protection | |
CN104394532A (en) | Anti-brute force safe log-in method for mobile terminal | |
CN107040921B (en) | Short message encryption system based on point-to-point | |
WO2022135379A1 (en) | Identity authentication method and apparatus | |
WO2022135383A1 (en) | Identity authentication method and apparatus | |
KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |