CN109150923A - Transmitted data on network security processing based on Hybrid Encryption - Google Patents
Transmitted data on network security processing based on Hybrid Encryption Download PDFInfo
- Publication number
- CN109150923A CN109150923A CN201811312669.9A CN201811312669A CN109150923A CN 109150923 A CN109150923 A CN 109150923A CN 201811312669 A CN201811312669 A CN 201811312669A CN 109150923 A CN109150923 A CN 109150923A
- Authority
- CN
- China
- Prior art keywords
- key
- client
- public
- data
- symmetric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 title abstract description 8
- 230000005540 biological transmission Effects 0.000 claims description 30
- 238000003672 processing method Methods 0.000 claims description 18
- 239000013598 vector Substances 0.000 claims description 9
- PXUQTDZNOHRWLI-OXUVVOBNSA-O malvidin 3-O-beta-D-glucoside Chemical compound COC1=C(O)C(OC)=CC(C=2C(=CC=3C(O)=CC(O)=CC=3[O+]=2)O[C@H]2[C@@H]([C@@H](O)[C@H](O)[C@@H](CO)O2)O)=C1 PXUQTDZNOHRWLI-OXUVVOBNSA-O 0.000 claims description 3
- 238000000034 method Methods 0.000 abstract description 16
- 238000013461 design Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of transmitted data on network security processing based on Hybrid Encryption, including server create the public and private key of a pair of of asymmetric encryption;Client creates the public and private key of a pair of of asymmetric encryption;Server receives client request, according to unique identification ID number, saves the public key of the client to background data base;Client is initiated to request to need to use to use symmetric key and asymmetric-key encryption data;Server gets client request to data decryption processing;Server feedback data, which need to use, uses symmetric key and asymmetric-key encryption data;Client is to data decryption processing.The present invention is encrypted transmitted data on network in such a way that asymmetric encryption and symmetric cryptography combine, securely and reliably, the purpose that can also quickly encrypt, pseudo-random number generator generating process is unique, cracks trouble, so that symmetric cryptographic key complexity is high, further increase safe effect, method is unique, ingenious in design, has a good application prospect.
Description
Technical Field
The invention relates to the technical field of network security assessment, in particular to a network transmission data security processing method based on hybrid encryption.
Background
Internet is a public-oriented open system, and at the beginning of its design, security of information transmitted on network is not completely considered, and with the rapid development of network technology, the network security problem caused by this is becoming more and more serious, and how to protect the information transmitted on network, that is, the security problem of network transmission data, becomes more and more important.
All the relevant theories and technologies related to confidentiality, authenticity, availability, integrity and controllability of network information belong to the research field of network information security, the information security technology mainly comprises the aspects of encryption, detection, authentication, monitoring, scanning, auditing and the like, and in a plurality of technologies for guaranteeing the information security, the encryption technology (the science of information encryption, decryption and transformation thereof) is a core and key technology of the information security, the data transmission security can be improved to a certain extent through the data encryption technology, the integrity of transmitted data is guaranteed, and the method is the most reliable and practical method for protecting the information.
At present, when a B/S architecture mode network application becomes the mainstream development direction, an encryption technology is an important means for ensuring the security of transmission data, the transmission data needs to be encrypted before the data is transmitted on the network, and the ciphertext needs to be decrypted for the program to use after the ciphertext reaches the destination. At present, the DES algorithm is a typical symmetric encryption algorithm, the calculation cost is low, the encryption speed is high, but the security is not high, and the risk of being easily cracked by violence exists; the RSA algorithm is a typical asymmetric encryption algorithm and has high security, but the computation cost is high and the encryption speed is slow.
How to mix and use the symmetric encryption algorithm and symmetric encryption algorithm, realize the safe and reliable, purpose of encrypting fast, it is the problem that needs to solve at present.
Disclosure of Invention
The invention aims to overcome the problem that the existing symmetric encryption algorithm and the symmetric encryption algorithm have different defects. The network transmission data security processing method based on the hybrid encryption, disclosed by the invention, has the advantages that the network transmission data is encrypted by combining the asymmetric encryption and the symmetric encryption, the security and the reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
In order to achieve the purpose, the invention adopts the technical scheme that:
a network transmission data security processing method based on hybrid encryption comprises the following steps,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), the client creates a pair of asymmetric encryption public private keys B-public Key and B-PrivateKey, the client creates a local storage private key B-PrivateKey, initiates an uploading request to upload the public key B-public Key to a server, and uploads the unique identification ID number of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
In the network transmission data security processing method based on hybrid encryption, the server creates a pair of asymmetric encryption public and private keys comprising an A-public key and an A-private key, the client creates a pair of asymmetric encryption public and private keys B-public key and B-private key, the asymmetric encryption public and private keys are produced in an ECC mode, the ECC mode is that keys are generated by the property of an elliptic curve equation, and the A-public key, the A-private key, the B-public key and the B-private key are ECC 164-bit keys.
In the method for safely processing network transmission data based on hybrid encryption, the symmetric key AesKey and the symmetric key AesKey1 are generated by a pseudo-random number generator.
In the method for safely processing network transmission data based on hybrid encryption, the pseudo-random number generator generates two groups of pseudo-random number sequences { RnTwo sets of pseudo-random number sequences { R }nThe combinations constitute a symmetric key.
In the foregoing method for processing network transmission data based on hybrid encryption, the pseudo-random number sequence { R }nThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
In the foregoing network transmission data security processing method based on hybrid encryption, the unique identification ID number of the client is UDID, and the UDID is a unique device identifier of the client.
The invention has the beneficial effects that: the network transmission data security processing method based on the hybrid encryption, disclosed by the invention, has the advantages that the network transmission data is encrypted by combining the asymmetric encryption and the symmetric encryption, the security and the reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
Drawings
Fig. 1 is a flow chart of a network transmission data security processing method based on hybrid encryption of the invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings.
As shown in fig. 1, the method for processing network transmission data based on hybrid encryption of the present invention includes the following steps,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), a client creates a pair of asymmetric encryption public private keys B-public Key and B-private Key, the client creates a local storage private key B-private Key, initiates an uploading request to upload the public key B-public Key to a server, and uploads a unique identification ID number of the client, wherein the unique identification ID number of the client is UDID which is a unique equipment identifier of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
The asymmetric encryption public and private key is produced in an ECC mode, the ECC mode is that keys are generated through the property of an elliptic curve equation, and A-public Key, A-private Key, B-public Key and B-private Key are all ECC 164-bit keys.
Preferably, the symmetric key AesKey and the symmetric key AesKey1 are generated by a pseudo-random number generator that generates two sets of pseudo-random number sequences { R }nTwo sets of pseudo-random number sequences { R }nCombine to form a symmetric key, the pseudo-random number sequence RnThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
Pseudo-random number sequence R generated by the above processnAnd the generation process is complex, the constructed symmetric key is high in cracking difficulty, and the safety effect of network data transmission is further improved.
In conclusion, the network transmission data security processing method based on hybrid encryption, provided by the invention, has the advantages that the network transmission data is encrypted by combining asymmetric encryption and symmetric encryption, the security and reliability are realized, the purpose of rapid encryption is realized, the pseudo-random number generator is unique in generation process and troublesome to crack, the complexity of a symmetric encryption key is high, the security effect is further improved, the method is unique, the design is ingenious, the security of network communication is ensured, and the network transmission data security processing method has a good application prospect.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (6)
1. The network transmission data security processing method based on the hybrid encryption is characterized in that: comprises the following steps of (a) carrying out,
step (A), a server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the server stores the private key A-private Key, the public key A-public Key is public to all clients, and the clients need to store the public key;
step (B), the client creates a pair of asymmetric encryption public private keys B-public Key and B-PrivateKey, the client creates a local storage private key B-PrivateKey, initiates an uploading request to upload the public key B-public Key to a server, and uploads the unique identification ID number of the client;
step (C), the server receives the client request, and stores the public key B-PublicKey of the client to a background database according to the unique identification ID number, so that the client can call the corresponding public key B-PublicKey from the background database conveniently;
step (D), the client side initiates a request, the Data EncodeData needs to be encrypted by using a symmetric Key AesKey to obtain symmetric encrypted Data AesEncodeData, the symmetric Key AesKey is encrypted by using an A-public Key to obtain a mixed Key Key which is RsaEncodeData, and the Data which the client side initiates the request is Data (AesEncodeData & Key) which is RsaEncodeData;
after acquiring a client request, a server decrypts a mixed Key Key by using a private Key A-PrivateKey to acquire an AesKey, and then decrypts by using the AesKey to acquire real data EncodeData of the client;
step (F), the server returns the processed Data to the client, encrypts the processed Data EncodeData1 by using a symmetric Key AesKey1 to obtain symmetric encrypted Data AesEncodeData1, encrypts the symmetric Key AesKey1 by using B-public Key to obtain a mixed Key Key1 which is RsaEncodeData1, and returns Data1 which is AesEncodeData1 and Key1 which is RsaEncodeData 1;
and (G) the client receives the data returned by the server, decrypts the mixed Key1 by using the private Key B-PrivateKey to obtain the AesKey1, and decrypts the true data EncodeData1 returned by the server by using the AesKey 1.
2. The network transmission data security processing method based on hybrid encryption according to claim 1, wherein: the server creates a pair of asymmetric encryption public and private keys, including A-public Key and A-private Key, the client creates a pair of asymmetric encryption public and private keys, B-public Key and B-private Key, the asymmetric encryption public and private keys are produced in an ECC mode, the ECC mode is to generate keys through the property of an elliptic curve equation, and the A-public Key, the A-private Key, the B-public Key and the B-private Key are ECC 164-bit keys.
3. The network transmission data security processing method based on hybrid encryption according to claim 1, wherein: the symmetric key AesKey, symmetric key AesKey1 is generated by a pseudo-random number generator.
4. The network transmission data security processing method based on hybrid encryption according to claim 3, wherein: the pseudo-random number generator generates two sets of pseudo-random number sequences RnTwo sets of pseudo-random number sequences { R }nThe combinations constitute a symmetric key.
5. The network transmission data security processing method based on hybrid encryption according to claim 4, wherein: the pseudo-random number sequence RnThe generation mode comprises the following steps,
(A1) let the vector sequence { SnThe number of the channels is as follows,
wherein,is a sequence of vectors SnI is in the range of 0 ≦ i ≦ 14, and an initial vector S0Is composed of
S0=[65535,0,0,65535,0,65535,0,65535,0,0,0,0,0,0,0]Mod is a modulo operation, b is 65536;
step (A2), set the sequence EnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), set the sequence FnIn order to realize the purpose,
where mod is a modulo operation, b 65536;
step (A3), and arranging the sequence EnAnd series FnBitwise AND to obtain a random number sequence { R }nThe number of the channels is as follows,
Rn=En&Fn
wherein n belongs to Z, n is more than or equal to 0, Z is an integer field, and & is bitwise AND operation.
6. The network transmission data security processing method based on hybrid encryption according to claim 4, wherein: the unique identification ID number of the client is UDID, and the UDID is a unique device identifier of the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811312669.9A CN109150923A (en) | 2018-11-06 | 2018-11-06 | Transmitted data on network security processing based on Hybrid Encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811312669.9A CN109150923A (en) | 2018-11-06 | 2018-11-06 | Transmitted data on network security processing based on Hybrid Encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109150923A true CN109150923A (en) | 2019-01-04 |
Family
ID=64807683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811312669.9A Pending CN109150923A (en) | 2018-11-06 | 2018-11-06 | Transmitted data on network security processing based on Hybrid Encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150923A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138795A (en) * | 2019-05-23 | 2019-08-16 | 南威软件股份有限公司 | A kind of multistep in communication process mixes encipher-decipher method |
CN110177073A (en) * | 2019-04-09 | 2019-08-27 | 北京奇艺世纪科技有限公司 | Data processing method, device, system and computer readable storage medium |
CN110493265A (en) * | 2019-09-18 | 2019-11-22 | 珠海格力电器股份有限公司 | The method and storage medium of encryption data |
CN110784480A (en) * | 2019-11-01 | 2020-02-11 | 华云数据有限公司 | Data transmission method, system, equipment and storage medium |
CN111464549A (en) * | 2020-04-09 | 2020-07-28 | 山东水利职业学院 | Computer network information security event processing method |
CN111818023A (en) * | 2020-06-23 | 2020-10-23 | 中国商用飞机有限责任公司 | Data transmission method and data transmission system suitable for air-ground communication link |
CN111988299A (en) * | 2020-08-14 | 2020-11-24 | 杭州视洞科技有限公司 | Method for establishing trusted link between client and server |
CN112866209A (en) * | 2020-12-31 | 2021-05-28 | 复旦大学附属华山医院 | Dialysis data safety management system and method |
CN113204794A (en) * | 2021-07-02 | 2021-08-03 | 深圳市深圳通有限公司 | Transaction record safe storage method, device, equipment and storage medium |
CN113301036A (en) * | 2021-05-18 | 2021-08-24 | 中国经济信息社有限公司 | Communication encryption method and device, equipment and storage medium |
CN113645295A (en) * | 2021-08-09 | 2021-11-12 | 东南大学 | Block chain network security setting method based on Paxos algorithm |
CN114243752A (en) * | 2021-11-12 | 2022-03-25 | 国网浙江省电力有限公司杭州供电公司 | Distributed emergency power grid-connected regulation and control system and method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101779412A (en) * | 2007-06-05 | 2010-07-14 | 奥利多公司 | Cryptographic methods and devices for the pseudo-random generation of data encryption and cryptographic hashing of a message |
WO2013021360A1 (en) * | 2011-08-10 | 2013-02-14 | Pes Carlo | Encryption and decryption method |
CN103458296A (en) * | 2013-09-10 | 2013-12-18 | 江苏银河电子股份有限公司 | Method for generating intelligent set top box safe key |
CN105024807A (en) * | 2014-04-30 | 2015-11-04 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and system |
US20170063527A1 (en) * | 2015-08-05 | 2017-03-02 | TransferSoft, Inc. | Symmetric stream cipher |
CN106790037A (en) * | 2016-12-16 | 2017-05-31 | 中国科学院软件研究所 | The instant communication method and system of a kind of User space encryption |
CN108462575A (en) * | 2018-03-09 | 2018-08-28 | 西安电子科技大学 | Upload data ciphering method based on no trusted party thresholding Hybrid Encryption |
CN108599941A (en) * | 2018-04-28 | 2018-09-28 | 陶宁宇 | Random asymmetries expand byte encryption of communicated data method |
-
2018
- 2018-11-06 CN CN201811312669.9A patent/CN109150923A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101779412A (en) * | 2007-06-05 | 2010-07-14 | 奥利多公司 | Cryptographic methods and devices for the pseudo-random generation of data encryption and cryptographic hashing of a message |
WO2013021360A1 (en) * | 2011-08-10 | 2013-02-14 | Pes Carlo | Encryption and decryption method |
CN103458296A (en) * | 2013-09-10 | 2013-12-18 | 江苏银河电子股份有限公司 | Method for generating intelligent set top box safe key |
CN105024807A (en) * | 2014-04-30 | 2015-11-04 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and system |
US20170063527A1 (en) * | 2015-08-05 | 2017-03-02 | TransferSoft, Inc. | Symmetric stream cipher |
CN106790037A (en) * | 2016-12-16 | 2017-05-31 | 中国科学院软件研究所 | The instant communication method and system of a kind of User space encryption |
CN108462575A (en) * | 2018-03-09 | 2018-08-28 | 西安电子科技大学 | Upload data ciphering method based on no trusted party thresholding Hybrid Encryption |
CN108599941A (en) * | 2018-04-28 | 2018-09-28 | 陶宁宇 | Random asymmetries expand byte encryption of communicated data method |
Non-Patent Citations (2)
Title |
---|
ROHIT RASTOGI, SHASHANK MITTAL, SHASHANK SHEKHAR: "Linear Algorithm for Imbricate Cryptography Using Pseudo Random Number Generator", 《2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM)》 * |
闫茂德,纪志强,贺昱曜,张阳: "AES 与 ECC 混合加密算法的无线数据通信系统设计", 《微电子学与计算机》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110177073B (en) * | 2019-04-09 | 2021-11-09 | 北京奇艺世纪科技有限公司 | Data processing method, device, system and computer readable storage medium |
CN110177073A (en) * | 2019-04-09 | 2019-08-27 | 北京奇艺世纪科技有限公司 | Data processing method, device, system and computer readable storage medium |
CN110138795A (en) * | 2019-05-23 | 2019-08-16 | 南威软件股份有限公司 | A kind of multistep in communication process mixes encipher-decipher method |
CN110138795B (en) * | 2019-05-23 | 2021-11-19 | 南威软件股份有限公司 | Multi-step mixed encryption and decryption method in communication process |
CN110493265A (en) * | 2019-09-18 | 2019-11-22 | 珠海格力电器股份有限公司 | The method and storage medium of encryption data |
CN110784480A (en) * | 2019-11-01 | 2020-02-11 | 华云数据有限公司 | Data transmission method, system, equipment and storage medium |
CN111464549A (en) * | 2020-04-09 | 2020-07-28 | 山东水利职业学院 | Computer network information security event processing method |
CN111818023A (en) * | 2020-06-23 | 2020-10-23 | 中国商用飞机有限责任公司 | Data transmission method and data transmission system suitable for air-ground communication link |
CN111988299A (en) * | 2020-08-14 | 2020-11-24 | 杭州视洞科技有限公司 | Method for establishing trusted link between client and server |
CN112866209A (en) * | 2020-12-31 | 2021-05-28 | 复旦大学附属华山医院 | Dialysis data safety management system and method |
CN113301036A (en) * | 2021-05-18 | 2021-08-24 | 中国经济信息社有限公司 | Communication encryption method and device, equipment and storage medium |
CN113204794B (en) * | 2021-07-02 | 2021-10-15 | 深圳市深圳通有限公司 | Transaction record safe storage method, device, equipment and storage medium |
CN113204794A (en) * | 2021-07-02 | 2021-08-03 | 深圳市深圳通有限公司 | Transaction record safe storage method, device, equipment and storage medium |
CN113645295A (en) * | 2021-08-09 | 2021-11-12 | 东南大学 | Block chain network security setting method based on Paxos algorithm |
CN114243752A (en) * | 2021-11-12 | 2022-03-25 | 国网浙江省电力有限公司杭州供电公司 | Distributed emergency power grid-connected regulation and control system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150923A (en) | Transmitted data on network security processing based on Hybrid Encryption | |
CN105939191B (en) | The client secure De-weight method of ciphertext data in a kind of cloud storage | |
CN103414690B (en) | One can openly be verified the high in the clouds data property held method of calibration | |
CN104219228B (en) | A kind of user's registration, user identification method and system | |
KR20190073472A (en) | Method, apparatus and system for transmitting data | |
US20140192976A1 (en) | Method and system for id-based encryption and decryption | |
CN103731261A (en) | Secret key distribution method under encrypted repeating data deleted scene | |
CN111797427A (en) | Block chain user identity supervision method and system considering privacy protection | |
CN103036684B (en) | Identity-based encryption (IBE) data encryption system and method capable of lowering damages of master key crack and disclosure | |
CN110958219A (en) | SM2 proxy re-encryption method and device for medical cloud shared data | |
CN105743645A (en) | PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method | |
CA2639649A1 (en) | Cryptography method and system | |
CN110999202A (en) | Computer-implemented system and method for highly secure, high-speed encryption and transmission of data | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
CN109104278A (en) | A kind of encrypting and decrypting method | |
CN115632880A (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
Olumide et al. | A hybrid encryption model for secure cloud computing | |
CN111464549A (en) | Computer network information security event processing method | |
CN114095161A (en) | Identity base pierceable encryption method supporting equality test | |
CN104320249B (en) | A kind of elastoresistance leakage encryption method of identity-based | |
CN114070549B (en) | Key generation method, device, equipment and storage medium | |
CN111526131B (en) | Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station | |
CN108848091A (en) | A kind of mixed encryption method for instant messaging | |
CN114422114B (en) | Time-controlled encryption method and system based on multi-time server | |
CN110048852A (en) | Quantum communications service station Signcryption method and system based on unsymmetrical key pond |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190104 |
|
WD01 | Invention patent application deemed withdrawn after publication |