CN109274663A - Communication means based on SM2 dynamic key exchange and SM4 data encryption - Google Patents
Communication means based on SM2 dynamic key exchange and SM4 data encryption Download PDFInfo
- Publication number
- CN109274663A CN109274663A CN201811040653.7A CN201811040653A CN109274663A CN 109274663 A CN109274663 A CN 109274663A CN 201811040653 A CN201811040653 A CN 201811040653A CN 109274663 A CN109274663 A CN 109274663A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- responder
- originating end
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption comprising following steps: S1, handshake request stage;S2, authentication phase;S3: handshake phase is completed;S4: data encryption;S5: data deciphering.Data encryption of the present invention uses national secret algorithm, meet the policy that country promotes national secret algorithm, key length reaches national password commercialization requirement, the discrimination mark of other side is also calculated in shared key in SM2 cipher key agreement algorithm, it can be configured simultaneously to whether the data of transmission encrypt, it is ensured that the integrality of the data of transmission and whether be tampered.
Description
Technical field
The present invention relates to safe technique in network in correspondence fields, more particularly to a kind of SM2 dynamic key that is based on to exchange and SM4 number
According to the communication means of encryption.
Background technique
In the communication transmission field of data, in order to guarantee the safety of data, usual transmitting terminal can to the data of transmission into
Row encryption, data are decrypted in receiving end.In the prior art, the algorithm being commonly used is divided into two kinds i.e. symmetric cryptography and calculates
Method, rivest, shamir, adelman.
Symmetric cryptography refers to that encryption and decryption use the Encryption Algorithm of same key.It requires originating end and recipient in safety
Before communication, a key is decided through consultation.The safety of symmetry algorithm depends on key, and leakage key means that anyone is ok
To the message decryption that they send or receive, so the confidentiality of key is most important to the safety of communication.
Rivest, shamir, adelman needs two keys: public-key cryptography (public key) and private cipher key (private
key).Public-key cryptography and private cipher key are a pair, if encrypted with public-key cryptography to data, only with corresponding privately owned close
Key could be decrypted;If encrypted with private cipher key pair data, could only be decrypted with corresponding public-key cryptography.
However in the prior art, encryption communication method is there are following technical problem, 1, data encryption do not use state close
Algorithm does not meet country data security requirements (promoting national secret algorithm policy with country to run counter to);2, key safety coefficient is inadequate, holds
Easily it is cracked;3, RSA Algorithm itself can not take precautions against man-in-the-middle attack, and the digital authenticating that needs to arrange in pairs or groups uses;4, data transmission procedure
Whether encryption is unable to flexible configuration;5, it can not determine whether former data are altered.
Therefore, it is necessary to provide a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption, solve
Above-mentioned defect existing in the prior art.
Summary of the invention
In order to solve the above technical problems, the present invention provide it is a kind of logical based on the exchange of SM2 dynamic key and SM4 data encryption
Letter method.
A kind of communication means based on SM2 dynamic key exchange and SM4 data encryption provided by the invention, including following step
It is rapid:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication by SM2 algorithm progress key agreement, and show that negotiation is close
Key;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is sent after receiving end message to originating end
Handle arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, using treated, arranging key passes through SM4 algorithm to originating end
It is set as 1 to message encryption to be sent processing, and by the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, uses SM4 decipherment algorithm pair
Data are decrypted.
Further, the S2 authentication phase the following steps are included:
(1) first round authenticates: generating random number from originating end initial data
ra∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), send result to responder, responder generated from initial data with
Machine number rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughCalculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet
Curvilinear equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If
It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA|
|ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then sending out
Origin or beginning calculatesThen calculate elliptical curve point
Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously
Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase
Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1||
y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1
||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at
The key is set to arranging key by function.
Further, the S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key is that treated is close by arranging key
Key, and be stored in the len and data of communication structure;
1 is set by the flag of communication agency.
Further, the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is that will assist
Key after quotient's key handling;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, verifying sends information
Whether change is had.
Compared with the relevant technologies, the invention has the following advantages:
(1) data encryption uses national secret algorithm, meets the policy that country promotes national secret algorithm;
(2) key length reaches national password commercialization requirement;
(3) the discrimination mark of other side is also calculated in shared key in SM2 cipher key agreement algorithm;
(4) it can be configured to whether the data of transmission encrypt;
(5) it can guarantee the integrality of the data of transmission and whether be tampered.
Detailed description of the invention
Fig. 1 is the flow diagram of authentication phase of the present invention.
Specific embodiment
Below in conjunction with drawings and embodiments, the invention will be further described.
Communication means based on SM2 dynamic key exchange and SM4 data encryption of the invention, comprising the following steps:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication by SM2 algorithm progress key agreement, and show that negotiation is close
Key;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is sent after receiving end message to originating end
Handle arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, using treated, arranging key passes through SM4 algorithm to originating end
It is set as 1 to message encryption to be sent processing, and by the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, uses SM4 decipherment algorithm pair
Data are decrypted.
As shown in Figure 1, the S2 authentication phase the following steps are included:
(1) first round authenticates: generating random number from originating end initial data
ra∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), send result to responder, responder generated from initial data with
Machine number rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughCalculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet
Curvilinear equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If
It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA|
|ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then initiating
End calculatesThen calculate elliptical curve point
Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously
Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase
Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1||
y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1
||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at
The key is set to arranging key by function.
Wherein, the S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key is that treated is close by arranging key
Key, and be stored in the len and data of communication structure;
1 is set by the flag of communication agency.
Wherein, the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is that will assist
Key after quotient's key handling;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, verifying sends information
Whether change is had.
For example:
Originating end thinks transmission message, and " hello, China." responder is given, following steps need to be passed through:
Originating end and responder, which are established, to be communicated to connect;
Originating end and responder negotiate both sides shared key Ks, and carry out processing to Ks and form K, to be used for SM4
Encryption;
Using SM4 algorithm to message encryption is sent, cryptographic Hash is calculated, fill communication structure and other information is set;
Originating end sends communication structure data;Recipient receives communication structure data;Recipient parses communication structure data;
Checking that flag is indicated whether is 1;Data is decrypted using SM4 algorithm;It is breathed out using data of the hash algorithm to decryption
Whether uncommon operation, obtains cryptographic Hash, and consistent compared with hashData;
If cryptographic Hash is equal, then it represents that the data received are correct, and ciphertext data should be " hello, China."
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (4)
1. a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that the following steps are included:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication, and obtain arranging key by SM2 algorithm progress key agreement;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is handled after receiving end message to originating end transmission
Arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, originating end using treated, treated by SM4 algorithm by arranging key
Message encryption processing is sent, and sets 1 for the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, using SM4 decipherment algorithm to data
It is decrypted.
2. the communication means as described in claim 1 based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that:
The S2 authentication phase the following steps are included:
(1) first round authenticates: random number r is generated from originating end initial dataa∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), responder is sent result to, responder generates random number from initial data
rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughMeter
Calculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet curve
Equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If
It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA|
|ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then sending out
Origin or beginning calculatesThen calculate elliptical curve point
Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously
Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase
Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1||
y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1
||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at
The key is set to arranging key by function.
3. the communication means as described in claim 1 based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that:
The S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key be by arranging key treated key, and
It is stored in the len and data of communication structure;
1 is set by the flag of communication agency.
4. the communication means a method according to any one of claims 1-3 based on SM2 dynamic key exchange and SM4 data encryption, special
Sign is: the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is close for that will negotiate
Key treated key;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, whether verifying sends information
There is change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811040653.7A CN109274663A (en) | 2018-09-07 | 2018-09-07 | Communication means based on SM2 dynamic key exchange and SM4 data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811040653.7A CN109274663A (en) | 2018-09-07 | 2018-09-07 | Communication means based on SM2 dynamic key exchange and SM4 data encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109274663A true CN109274663A (en) | 2019-01-25 |
Family
ID=65187839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811040653.7A Withdrawn CN109274663A (en) | 2018-09-07 | 2018-09-07 | Communication means based on SM2 dynamic key exchange and SM4 data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274663A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310203A (en) * | 2020-02-10 | 2020-06-19 | 广东工业大学 | Electronic medical record hybrid encryption method based on SM2 and SM4 |
CN112713997A (en) * | 2020-12-28 | 2021-04-27 | 北京握奇数据股份有限公司 | Key agreement method and system |
CN113572607A (en) * | 2021-08-11 | 2021-10-29 | 太原理工大学 | Secure communication method adopting unbalanced SM2 key exchange algorithm |
CN114338047A (en) * | 2022-03-08 | 2022-04-12 | 科大天工智能装备技术(天津)有限公司 | Block chain industrial data encryption method and device based on state cipher and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466020A (en) * | 2007-12-17 | 2009-06-24 | 上海爱信诺航芯电子科技有限公司 | Decipher processing method for digital content format |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
CN104618108A (en) * | 2014-12-30 | 2015-05-13 | 北京奇虎科技有限公司 | Safety communication system |
CN105337955A (en) * | 2015-09-22 | 2016-02-17 | 电子科技大学 | Domestic, safe and controllable virtual desktop management control system |
CN106209360A (en) * | 2016-07-22 | 2016-12-07 | 安徽皖通邮电股份有限公司 | A kind of authentication identifying method of wildcard based on the close algorithm of state |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
CN107493169A (en) * | 2017-09-26 | 2017-12-19 | 安徽皖通邮电股份有限公司 | A kind of authentication identifying method based on quantum key and national secret algorithm |
-
2018
- 2018-09-07 CN CN201811040653.7A patent/CN109274663A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466020A (en) * | 2007-12-17 | 2009-06-24 | 上海爱信诺航芯电子科技有限公司 | Decipher processing method for digital content format |
CN103067170A (en) * | 2012-12-14 | 2013-04-24 | 深圳国微技术有限公司 | Encrypting file system, encrypting method and deciphering method based on EXT2 file system |
CN104618108A (en) * | 2014-12-30 | 2015-05-13 | 北京奇虎科技有限公司 | Safety communication system |
CN105337955A (en) * | 2015-09-22 | 2016-02-17 | 电子科技大学 | Domestic, safe and controllable virtual desktop management control system |
CN106209360A (en) * | 2016-07-22 | 2016-12-07 | 安徽皖通邮电股份有限公司 | A kind of authentication identifying method of wildcard based on the close algorithm of state |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
CN107493169A (en) * | 2017-09-26 | 2017-12-19 | 安徽皖通邮电股份有限公司 | A kind of authentication identifying method based on quantum key and national secret algorithm |
Non-Patent Citations (1)
Title |
---|
中国国家标准化管理委员会等: "信息安全技术 SM2椭圆曲线公钥密码算法 第三部分:密钥交换协议", 《中华人民共和国国家标准》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310203A (en) * | 2020-02-10 | 2020-06-19 | 广东工业大学 | Electronic medical record hybrid encryption method based on SM2 and SM4 |
CN111310203B (en) * | 2020-02-10 | 2023-02-03 | 广东工业大学 | SM2 and SM 4-based electronic medical record hybrid encryption method |
CN112713997A (en) * | 2020-12-28 | 2021-04-27 | 北京握奇数据股份有限公司 | Key agreement method and system |
CN112713997B (en) * | 2020-12-28 | 2022-04-22 | 北京握奇数据股份有限公司 | Key agreement method and system |
CN113572607A (en) * | 2021-08-11 | 2021-10-29 | 太原理工大学 | Secure communication method adopting unbalanced SM2 key exchange algorithm |
CN113572607B (en) * | 2021-08-11 | 2024-07-02 | 太原理工大学 | Secure communication method adopting unbalanced SM2 key exchange algorithm |
CN114338047A (en) * | 2022-03-08 | 2022-04-12 | 科大天工智能装备技术(天津)有限公司 | Block chain industrial data encryption method and device based on state cipher and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103338215B (en) | The method setting up TLS passage based on the close algorithm of state | |
CN112887338B (en) | Identity authentication method and system based on IBC identification password | |
CN110535868A (en) | Data transmission method and system based on Hybrid Encryption algorithm | |
CN108650227A (en) | Handshake method based on datagram secure transfer protocol and system | |
CN108683688A (en) | A method of information transmission security is realized based on Digital Envelope Technology | |
CN108768930A (en) | A kind of encrypted transmission method of data | |
CN109274663A (en) | Communication means based on SM2 dynamic key exchange and SM4 data encryption | |
US11870891B2 (en) | Certificateless public key encryption using pairings | |
EP1905186A2 (en) | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks | |
CN107294937A (en) | Data transmission method, client and server based on network service | |
CN104935553B (en) | Unified identity authentication platform and authentication method | |
CN111756529B (en) | Quantum session key distribution method and system | |
CN102387152A (en) | Preset-key-based symmetric encryption communication method | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN108683647A (en) | A kind of data transmission method based on multi-enciphering | |
CN106685969A (en) | Hybrid-encrypted information transmission method and transmission system | |
CN110048849A (en) | A kind of session cipher negotiating method of multilayer protection | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
CN102111273A (en) | Pre-sharing-based secure data transmission method for electric load management system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN111817846A (en) | Lightweight key negotiation communication protocol | |
CN114650173A (en) | Encryption communication method and system | |
CN116886288A (en) | Quantum session key distribution method and device | |
CN113572607A (en) | Secure communication method adopting unbalanced SM2 key exchange algorithm | |
WO2020115266A1 (en) | Methods and devices for secured identity-based encryption systems with two trusted centers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190125 |