CN109150923A - Transmitted data on network security processing based on Hybrid Encryption - Google Patents

Transmitted data on network security processing based on Hybrid Encryption Download PDF

Info

Publication number
CN109150923A
CN109150923A CN201811312669.9A CN201811312669A CN109150923A CN 109150923 A CN109150923 A CN 109150923A CN 201811312669 A CN201811312669 A CN 201811312669A CN 109150923 A CN109150923 A CN 109150923A
Authority
CN
China
Prior art keywords
key
client
public
data
symmetric
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811312669.9A
Other languages
Chinese (zh)
Inventor
王文娟
薛昊
袁韬
山欣
吴静
王发军
杨威
印襄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Etown Digital Technology Co Ltd
Original Assignee
Jiangsu Etown Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Etown Digital Technology Co Ltd filed Critical Jiangsu Etown Digital Technology Co Ltd
Priority to CN201811312669.9A priority Critical patent/CN109150923A/en
Publication of CN109150923A publication Critical patent/CN109150923A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of transmitted data on network security processing based on Hybrid Encryption, including server create the public and private key of a pair of of asymmetric encryption;Client creates the public and private key of a pair of of asymmetric encryption;Server receives client request, according to unique identification ID number, saves the public key of the client to background data base;Client is initiated to request to need to use to use symmetric key and asymmetric-key encryption data;Server gets client request to data decryption processing;Server feedback data, which need to use, uses symmetric key and asymmetric-key encryption data;Client is to data decryption processing.The present invention is encrypted transmitted data on network in such a way that asymmetric encryption and symmetric cryptography combine, securely and reliably, the purpose that can also quickly encrypt, pseudo-random number generator generating process is unique, cracks trouble, so that symmetric cryptographic key complexity is high, further increase safe effect, method is unique, ingenious in design, has a good application prospect.

Description

Network transmission data security processing method based on hybrid encryption
Technical Field
The invention relates to the technical field of network security assessment, in particular to a network transmission data security processing method based on hybrid encryption.
Background
Internet is a public-oriented open system, and at the beginning of its design, security of information transmitted on network is not completely considered, and with the rapid development of network technology, the network security problem caused by this is becoming more and more serious, and how to protect the information transmitted on network, that is, the security problem of network transmission data, becomes more and more important.
All the relevant theories and technologies related to confidentiality, authenticity, availability, integrity and controllability of network information belong to the research field of network information security, the information security technology mainly comprises the aspects of encryption, detection, authentication, monitoring, scanning, auditing and the like, and in a plurality of technologies for guaranteeing the information security, the encryption technology (the science of information encryption, decryption and transformation thereof) is a core and key technology of the information security, the data transmission security can be improved to a certain extent through the data encryption technology, the integrity of transmitted data is guaranteed, and the method is the most reliable and practical method for protecting the information.
At present, when a B/S architecture mode network application becomes the mainstream development direction, an encryption technology is an important means for ensuring the security of transmission data, the transmission data needs to be encrypted before the data is transmitted on the network, and the ciphertext needs to be decrypted for the program to use after the ciphertext reaches the destination. At present, the DES algorithm is a typical symmetric encryption algorithm, the calculation cost is low, the encryption speed is high, but the security is not high, and the risk of being easily cracked by violence exists; the RSA algorithm is a typical asymmetric encryption algorithm and has high security, but the computation cost is high and the encryption speed is slow.
How to mix and use the symmetric encryption algorithm and symmetric encryption algorithm, realize the safe and reliable, purpose of encrypting fast, it is the problem that needs to solve at present.
Disclosure of Invention
The invention aims to overcome the problem that the existing symmetric encryption algorithm and the symmetric encryption algorithm have different defects. The network transmission data security processing method based on the hybrid encryption, disclosed by the invention, has the advantages that the network transmission data is encrypted by combining the asymmetric encryption and the symmetric encryption, the security and the reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
In order to achieve the purpose, the invention adopts the technical scheme that:
a network transmission data security processing method based on hybrid encryption comprises the following steps,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), the client creates a pair of asymmetric encryption public private keys B-public Key and B-PrivateKey, the client creates a local storage private key B-PrivateKey, initiates an uploading request to upload the public key B-public Key to a server, and uploads the unique identification ID number of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
In the network transmission data security processing method based on hybrid encryption, the server creates a pair of asymmetric encryption public and private keys comprising an A-public key and an A-private key, the client creates a pair of asymmetric encryption public and private keys B-public key and B-private key, the asymmetric encryption public and private keys are produced in an ECC mode, the ECC mode is that keys are generated by the property of an elliptic curve equation, and the A-public key, the A-private key, the B-public key and the B-private key are ECC 164-bit keys.
In the method for safely processing network transmission data based on hybrid encryption, the symmetric key AesKey and the symmetric key AesKey1 are generated by a pseudo-random number generator.
In the method for safely processing network transmission data based on hybrid encryption, the pseudo-random number generator generates two groups of pseudo-random number sequences { RnTwo sets of pseudo-random number sequences { R }nThe combinations constitute a symmetric key.
In the foregoing method for processing network transmission data based on hybrid encryption, the pseudo-random number sequence { R }nThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
In the foregoing network transmission data security processing method based on hybrid encryption, the unique identification ID number of the client is UDID, and the UDID is a unique device identifier of the client.
The invention has the beneficial effects that: the network transmission data security processing method based on the hybrid encryption, disclosed by the invention, has the advantages that the network transmission data is encrypted by combining the asymmetric encryption and the symmetric encryption, the security and the reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
Drawings
Fig. 1 is a flow chart of a network transmission data security processing method based on hybrid encryption of the invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings.
As shown in fig. 1, the method for processing network transmission data based on hybrid encryption of the present invention includes the following steps,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), a client creates a pair of asymmetric encryption public private keys B-public Key and B-private Key, the client creates a local storage private key B-private Key, initiates an uploading request to upload the public key B-public Key to a server, and uploads a unique identification ID number of the client, wherein the unique identification ID number of the client is UDID which is a unique equipment identifier of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
The asymmetric encryption public and private key is produced in an ECC mode, the ECC mode is that keys are generated through the property of an elliptic curve equation, and A-public Key, A-private Key, B-public Key and B-private Key are all ECC 164-bit keys.
Preferably, the symmetric key AesKey and the symmetric key AesKey1 are generated by a pseudo-random number generator that generates two sets of pseudo-random number sequences { R }nTwo sets of pseudo-random number sequences { R }nCombine to form a symmetric key, the pseudo-random number sequence RnThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
Pseudo-random number sequence R generated by the above processnAnd the generation process is complex, the constructed symmetric key is high in cracking difficulty, and the safety effect of network data transmission is further improved.
In conclusion, the network transmission data security processing method based on hybrid encryption, provided by the invention, has the advantages that the network transmission data is encrypted by combining asymmetric encryption and symmetric encryption, the security and reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (6)

1. The network transmission data security processing method based on the hybrid encryption is characterized in that: comprises the following steps of (a) carrying out,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), the client creates a pair of asymmetric encryption public private keys B-public Key and B-PrivateKey, the client creates a local storage private key B-PrivateKey, initiates an uploading request to upload the public key B-public Key to a server, and uploads the unique identification ID number of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
2. The network transmission data security processing method based on hybrid encryption according to claim 1, wherein: the server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the client creates a pair of asymmetric encryption public and private keys, B-public Key and B-private Key, the asymmetric encryption public and private keys are produced in an ECC mode, the ECC mode is to generate keys through the property of an elliptic curve equation, and the A-public Key, the A-private Key, the B-public Key and the B-private Key are ECC 164-bit keys.
3. The network transmission data security processing method based on hybrid encryption according to claim 1, wherein: the symmetric key AesKey, symmetric key AesKey1 is generated by a pseudo-random number generator.
4. The network transmission data security processing method based on hybrid encryption according to claim 3, wherein: the pseudo-random number generator generates two sets of pseudo-random number sequences RnTwo sets of pseudo-random number sequences { R }nThe combinations constitute a symmetric key.
5. The network transmission data security processing method based on hybrid encryption according to claim 4, wherein: the pseudo-random number sequence RnThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
6. The network transmission data security processing method based on hybrid encryption according to claim 4, wherein: the unique identification ID number of the client is UDID, and the UDID is a unique device identifier of the client.
CN201811312669.9A 2018-11-06 2018-11-06 Transmitted data on network security processing based on Hybrid Encryption Pending CN109150923A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811312669.9A CN109150923A (en) 2018-11-06 2018-11-06 Transmitted data on network security processing based on Hybrid Encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811312669.9A CN109150923A (en) 2018-11-06 2018-11-06 Transmitted data on network security processing based on Hybrid Encryption

Publications (1)

Publication Number Publication Date
CN109150923A true CN109150923A (en) 2019-01-04

Family

ID=64807683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811312669.9A Pending CN109150923A (en) 2018-11-06 2018-11-06 Transmitted data on network security processing based on Hybrid Encryption

Country Status (1)

Country Link
CN (1) CN109150923A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138795A (en) * 2019-05-23 2019-08-16 南威软件股份有限公司 A kind of multistep in communication process mixes encipher-decipher method
CN110177073A (en) * 2019-04-09 2019-08-27 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN110493265A (en) * 2019-09-18 2019-11-22 珠海格力电器股份有限公司 The method and storage medium of encryption data
CN110784480A (en) * 2019-11-01 2020-02-11 华云数据有限公司 Data transmission method, system, equipment and storage medium
CN111464549A (en) * 2020-04-09 2020-07-28 山东水利职业学院 Computer network information security event processing method
CN111818023A (en) * 2020-06-23 2020-10-23 中国商用飞机有限责任公司 Data transmission method and data transmission system suitable for air-ground communication link
CN111988299A (en) * 2020-08-14 2020-11-24 杭州视洞科技有限公司 Method for establishing trusted link between client and server
CN112866209A (en) * 2020-12-31 2021-05-28 复旦大学附属华山医院 Dialysis data safety management system and method
CN113204794A (en) * 2021-07-02 2021-08-03 深圳市深圳通有限公司 Transaction record safe storage method, device, equipment and storage medium
CN113301036A (en) * 2021-05-18 2021-08-24 中国经济信息社有限公司 Communication encryption method and device, equipment and storage medium
CN113645295A (en) * 2021-08-09 2021-11-12 东南大学 Block chain network security setting method based on Paxos algorithm
CN114243752A (en) * 2021-11-12 2022-03-25 国网浙江省电力有限公司杭州供电公司 Distributed emergency power grid-connected regulation and control system and method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101779412A (en) * 2007-06-05 2010-07-14 奥利多公司 Cryptographic methods and devices for the pseudo-random generation of data encryption and cryptographic hashing of a message
WO2013021360A1 (en) * 2011-08-10 2013-02-14 Pes Carlo Encryption and decryption method
CN103458296A (en) * 2013-09-10 2013-12-18 江苏银河电子股份有限公司 Method for generating intelligent set top box safe key
CN105024807A (en) * 2014-04-30 2015-11-04 宇龙计算机通信科技(深圳)有限公司 Data processing method and system
US20170063527A1 (en) * 2015-08-05 2017-03-02 TransferSoft, Inc. Symmetric stream cipher
CN106790037A (en) * 2016-12-16 2017-05-31 中国科学院软件研究所 The instant communication method and system of a kind of User space encryption
CN108462575A (en) * 2018-03-09 2018-08-28 西安电子科技大学 Upload data ciphering method based on no trusted party thresholding Hybrid Encryption
CN108599941A (en) * 2018-04-28 2018-09-28 陶宁宇 Random asymmetries expand byte encryption of communicated data method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101779412A (en) * 2007-06-05 2010-07-14 奥利多公司 Cryptographic methods and devices for the pseudo-random generation of data encryption and cryptographic hashing of a message
WO2013021360A1 (en) * 2011-08-10 2013-02-14 Pes Carlo Encryption and decryption method
CN103458296A (en) * 2013-09-10 2013-12-18 江苏银河电子股份有限公司 Method for generating intelligent set top box safe key
CN105024807A (en) * 2014-04-30 2015-11-04 宇龙计算机通信科技(深圳)有限公司 Data processing method and system
US20170063527A1 (en) * 2015-08-05 2017-03-02 TransferSoft, Inc. Symmetric stream cipher
CN106790037A (en) * 2016-12-16 2017-05-31 中国科学院软件研究所 The instant communication method and system of a kind of User space encryption
CN108462575A (en) * 2018-03-09 2018-08-28 西安电子科技大学 Upload data ciphering method based on no trusted party thresholding Hybrid Encryption
CN108599941A (en) * 2018-04-28 2018-09-28 陶宁宇 Random asymmetries expand byte encryption of communicated data method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROHIT RASTOGI, SHASHANK MITTAL, SHASHANK SHEKHAR: "Linear Algorithm for Imbricate Cryptography Using Pseudo Random Number Generator", 《2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM)》 *
闫茂德,纪志强,贺昱曜,张阳: "AES 与 ECC 混合加密算法的无线数据通信系统设计", 《微电子学与计算机》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177073B (en) * 2019-04-09 2021-11-09 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN110177073A (en) * 2019-04-09 2019-08-27 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN110138795A (en) * 2019-05-23 2019-08-16 南威软件股份有限公司 A kind of multistep in communication process mixes encipher-decipher method
CN110138795B (en) * 2019-05-23 2021-11-19 南威软件股份有限公司 Multi-step mixed encryption and decryption method in communication process
CN110493265A (en) * 2019-09-18 2019-11-22 珠海格力电器股份有限公司 The method and storage medium of encryption data
CN110784480A (en) * 2019-11-01 2020-02-11 华云数据有限公司 Data transmission method, system, equipment and storage medium
CN111464549A (en) * 2020-04-09 2020-07-28 山东水利职业学院 Computer network information security event processing method
CN111818023A (en) * 2020-06-23 2020-10-23 中国商用飞机有限责任公司 Data transmission method and data transmission system suitable for air-ground communication link
CN111988299A (en) * 2020-08-14 2020-11-24 杭州视洞科技有限公司 Method for establishing trusted link between client and server
CN112866209A (en) * 2020-12-31 2021-05-28 复旦大学附属华山医院 Dialysis data safety management system and method
CN113301036A (en) * 2021-05-18 2021-08-24 中国经济信息社有限公司 Communication encryption method and device, equipment and storage medium
CN113204794B (en) * 2021-07-02 2021-10-15 深圳市深圳通有限公司 Transaction record safe storage method, device, equipment and storage medium
CN113204794A (en) * 2021-07-02 2021-08-03 深圳市深圳通有限公司 Transaction record safe storage method, device, equipment and storage medium
CN113645295A (en) * 2021-08-09 2021-11-12 东南大学 Block chain network security setting method based on Paxos algorithm
CN114243752A (en) * 2021-11-12 2022-03-25 国网浙江省电力有限公司杭州供电公司 Distributed emergency power grid-connected regulation and control system and method

Similar Documents

Publication Publication Date Title
CN109150923A (en) Transmitted data on network security processing based on Hybrid Encryption
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
CN103414690B (en) One can openly be verified the high in the clouds data property held method of calibration
CN104219228B (en) A kind of user's registration, user identification method and system
KR20190073472A (en) Method, apparatus and system for transmitting data
US20140192976A1 (en) Method and system for id-based encryption and decryption
CN103731261A (en) Secret key distribution method under encrypted repeating data deleted scene
CN111797427A (en) Block chain user identity supervision method and system considering privacy protection
CN103036684B (en) Identity-based encryption (IBE) data encryption system and method capable of lowering damages of master key crack and disclosure
CN110958219A (en) SM2 proxy re-encryption method and device for medical cloud shared data
CN105743645A (en) PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
CA2639649A1 (en) Cryptography method and system
CN110999202A (en) Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
CN109104278A (en) A kind of encrypting and decrypting method
CN115632880A (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
Olumide et al. A hybrid encryption model for secure cloud computing
CN111464549A (en) Computer network information security event processing method
CN114095161A (en) Identity base pierceable encryption method supporting equality test
CN104320249B (en) A kind of elastoresistance leakage encryption method of identity-based
CN114070549B (en) Key generation method, device, equipment and storage medium
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
CN108848091A (en) A kind of mixed encryption method for instant messaging
CN114422114B (en) Time-controlled encryption method and system based on multi-time server
CN110048852A (en) Quantum communications service station Signcryption method and system based on unsymmetrical key pond

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190104

WD01 Invention patent application deemed withdrawn after publication