CN110691098A - Civil explosion information multiple encryption communication method - Google Patents

Civil explosion information multiple encryption communication method Download PDF

Info

Publication number
CN110691098A
CN110691098A CN201911028770.6A CN201911028770A CN110691098A CN 110691098 A CN110691098 A CN 110691098A CN 201911028770 A CN201911028770 A CN 201911028770A CN 110691098 A CN110691098 A CN 110691098A
Authority
CN
China
Prior art keywords
information
random number
ciphertext
digest
sending end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911028770.6A
Other languages
Chinese (zh)
Inventor
王婧思
毛龙飞
王尹军
甘吉平
叶珊
卢凯
宗明哲
李健
毛得春
毛允德
孙守富
王清正
苏陆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LONGDER TIMES TECHNOLOGY SERVICE Co Ltd
Original Assignee
BEIJING LONGDER TIMES TECHNOLOGY SERVICE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LONGDER TIMES TECHNOLOGY SERVICE Co Ltd filed Critical BEIJING LONGDER TIMES TECHNOLOGY SERVICE Co Ltd
Priority to CN201911028770.6A priority Critical patent/CN110691098A/en
Publication of CN110691098A publication Critical patent/CN110691098A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Abstract

The embodiment of the invention discloses a civil explosion information multiple encryption communication method, which comprises a sending end and a receiving end, wherein the sending end generates a request plaintext containing sending end identification information and a first random number, and the receiving end encrypts a public key to obtain a first ciphertext; after the receiving end decrypts the data, the public key of the sending end is inquired according to the identification information of the sending end, the receiving end generates a second random number, the second random number and the first random number are combined to obtain a third random number, and the public key of the sending end is used for encrypting the third random number to obtain a second ciphertext; the sending end decrypts the second ciphertext, splits the third random number, compares whether the first random number is included, and encrypts the verification reply information by using a public key of the receiving end if the first random number is included to obtain a third ciphertext; and the receiving terminal decrypts to obtain a fourth random number, compares the third random number with the fourth random number, and if the third random number is the same as the fourth random number, the sending terminal is legal. The invention combines the encryption technology and the digital signature technology, and realizes the beneficial effects of high data encryption density and difficult cracking through multi-level information verification.

Description

Civil explosion information multiple encryption communication method
Technical Field
The embodiment of the invention relates to the technical field of civil explosion information encryption, in particular to a civil explosion information multiple encryption communication method.
Background
Civil blasting management is a special industry related to terrorism prevention, counter terrorism prevention and social stability, objects are production, storage, transportation and use of civil blasting articles, and related data can not be leaked, modified or even controlled in an informatization stage, which is extremely dangerous, so that the importance of data safety is self-evident in the field of civil blasting supervision. The civil explosive communication data is peeped, so that specific places and quantity of civil explosive articles and a next circulation destination are easily obtained by other people, problems of interception, theft and the like of the civil explosive articles can occur, and the probability of explosion cases is further improved. Therefore, encryption for data transmission and storage must be realized, and in order to ensure the security of original data and server instructions, an encryption technology and a digital signature technology need to be combined, and a multiple encryption and authentication technology suitable for the civil explosion supervision field is provided.
Disclosure of Invention
Therefore, the embodiment of the invention provides a civil explosion information multiple encryption communication method, which aims to solve the problem that the communication of civil explosion information is easy to crack and has low safety, so that the civil explosion articles are intercepted and stolen and the like in the prior art are high in risk.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
a civil explosion information multiple encryption communication method comprises a sending end and a receiving end, and comprises the following steps:
step S01, the sending end generates a request plaintext including the sending end identification information and the first random number, and encrypts the request plaintext using the receiving end public key to generate a first ciphertext.
And step S02, after receiving the first ciphertext, the receiving end decrypts the first ciphertext by using the private key of the receiving end to obtain the identification information of the sending end and the first random number in the plaintext, and the receiving end queries the corresponding public key of the sending end according to the identification information of the sending end.
Step S03, the receiving end generates a second random number, combines the second random number with the first random number to obtain a third random number, and encrypts the verification information including the third random number using the public key of the sending end to obtain a second ciphertext.
And step S04, after the sending end receives the second ciphertext, the sending end decrypts the second ciphertext by using the private key of the sending end to obtain a third random number in the verification information, splits the third random number to obtain a split random number, compares the split random number with the first random number, and encrypts the verification reply information containing a fourth random number by using the public key of the receiving end if the split random number and the first random number are the same, wherein the fourth random number is the same as the third random number to obtain a third ciphertext.
And step S05, after the receiving end receives the third ciphertext, the receiving end decrypts the third ciphertext by using the private key of the receiving end to obtain a fourth random number in the verification reply message, then the fourth random number is compared with the third random number generated in the step S03, if the fourth random number and the third random number are the same, the sending end is legal, and the establishment of the communication path is completed.
Further, after the communication path is established, the receiving end generates a symmetric encryption key, the symmetric encryption key is encrypted by using the public key of the sending end to obtain a sixth ciphertext, the sending end decrypts the sixth ciphertext by using the private key of the sending end to obtain the symmetric encryption key, and subsequent communication information is encrypted by using the symmetric encryption key to obtain a seventh ciphertext; and extracting eleventh abstract information of the communication information by using an information abstract algorithm, encrypting the eleventh abstract information by using the execution communication public key to generate a digital signature of a seventh ciphertext, and sending the seventh ciphertext with the digital signature to the receiving end.
Further, the symmetric encryption key is composed of a device code number of the sending end, a code number of an operator at the sending end, system time and a random number.
Further, in step S01, the sending end uses an information digest algorithm to extract the first digest information of the requested plaintext, encrypts the first digest information using a sending end digital signature private key, generates a first digital signature, and combines the first digital signature and the first ciphertext to send to the receiving end; in step S02, the receiving end decrypts the first digital signature using the public key of the digital signature of the sending end to obtain first digest information, generates second digest information of the requested plaintext using an information digest algorithm, and continues the subsequent steps if the first digest information is identical to the second digest information.
Further, in step S03, the receiving end uses an information digest algorithm to extract third digest information of the verification information, encrypts the third digest information using a receiving end digital signature private key, generates a second digital signature, and sends the second digital signature and the second ciphertext to the sending end; in step S04, the sending end decrypts the second digital signature using the receiving end digital signature public key to obtain third digest information, generates fourth digest information of the verification information using an information digest algorithm, and continues the subsequent steps if the third digest information is identical to the fourth digest information.
Further, in step S04, the sending end uses an information digest algorithm to extract fifth digest information of the verification reply information, encrypts the fifth digest information using a sending end digital signature private key, generates a third digital signature, and combines the third digital signature and the third ciphertext to send to the receiving end; in step S04, the receiving end decrypts the third digital signature using the public key of the digital signature of the transmitting end to obtain fifth digest information, generates sixth digest information of the verification reply information using an information digest algorithm, and continues the subsequent steps if the fifth digest information is identical to the sixth digest information.
Further, after verifying that the sending end is legal, before the communication path establishment is completed, the method further includes:
step S06, the sending end generates a fifth random number, and encrypts the reverse authentication information including the fifth random number using the receiving end public key to obtain a fourth ciphertext.
And step S07, after the receiving end receives the fourth ciphertext, decrypting the fourth ciphertext by using the private key of the receiving end to obtain a fifth random number in the reverse verification information, and encrypting the reverse verification reply information containing the sixth random number by using the public key of the sending end, wherein the sixth random number is the same as the fifth random number to obtain a fifth ciphertext.
And step S08, after the sending end receives the third ciphertext, the sending end decrypts the third ciphertext by using a private key of the sending end to obtain a sixth random number in the reverse verification reply message, then the fifth random number and the sixth random number are compared, if the fifth random number and the sixth random number are the same, the receiving end is legal, otherwise, the communication is interrupted.
Further, in step S06, the sending end uses an information digest algorithm to extract seventh digest information of the reverse verification information, encrypts the seventh digest information using the receiving end digital signature private key, generates a digital signature of a fourth ciphertext, and sends the fourth ciphertext with the digital signature to the receiving end; in step S07, the receiving end decrypts the digital signature using the public key of the digital signature of the transmitting end to obtain seventh digest information, generates eighth digest information of the reverse verification information using an information digest algorithm, and continues the subsequent steps if the seventh digest information is identical to the eighth digest information.
Further, in step S07, the receiving end uses an information digest algorithm to extract digest information of the reverse verification reply information to obtain ninth digest information, encrypts the ninth digest information using the sending end digital signature public key to generate a digital signature of a fifth ciphertext, and sends the fifth ciphertext with the digital signature to the sending end; in step S08, the sending end decrypts the digital signature of the fifth ciphertext using the digital signature private key of the sending end to obtain ninth digest information, generates digest information of the reverse verification reply information using an information digest algorithm to obtain tenth digest information, and continues the subsequent steps if the ninth digest information is identical to the tenth digest information.
Further, after the communication path is established, the receiving end generates a symmetric encryption key, the symmetric encryption key consists of an equipment code of the sending end, an operator code of the sending end, system time and a random number, and a sixth ciphertext is obtained after the encryption by using a public key of the sending end; after receiving the sixth ciphertext, the sending end decrypts the sixth ciphertext by using a private key of the sending end to obtain a symmetric encryption key, and encrypts subsequent communication information by using the symmetric encryption key to obtain a seventh ciphertext; and extracting eleventh abstract information of the communication information by using an information abstract algorithm, encrypting the eleventh abstract information by using the execution communication public key to generate a digital signature of a seventh ciphertext, and sending the seventh ciphertext with the digital signature to the receiving end.
The embodiment of the invention has the following advantages:
the civil explosion information multiple encryption communication method combines an encryption technology and a digital signature technology, and provides a multiple encryption and authentication technology suitable for the field of civil explosion supervision. The method is applied to identity authentication and important information transmission between a server and a terminal aiming at the advantage of high safety of an asymmetric encryption technology, is applied to encryption of mass data aiming at the advantage of high operation speed of symmetric encryption, has the function of tampering digital signatures, guarantees the integrity of transmitted data, and achieves the beneficial effects of high data encryption density and difficult decoding through multi-level information verification.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a flowchart of a method for establishing communication verification in a civil explosion information multiple encryption communication method according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for performing communication verification in a civil explosion information multiple encryption communication method according to an embodiment of the present invention;
fig. 3 is a flowchart of a first digital signature method in a civil explosion information multiple encryption communication method according to a second embodiment of the present invention;
fig. 4 is a flowchart of a second digital signature method in a civil explosion information multiple encryption communication method according to a second embodiment of the present invention;
fig. 5 is a flowchart of a third digital signature method in the civil explosion information multiple encryption communication method according to the second embodiment of the present invention;
fig. 6 is a flowchart of a method of multiple encryption communication for civil explosion information according to a third embodiment of the present invention;
fig. 7 is a flowchart of a fourth digital signature method in a civil explosion information multiple encryption communication method according to a fourth embodiment of the present invention;
fig. 8 is a flowchart of a fifth digital signature method in the civil explosion information multiple encryption communication method according to the fourth embodiment of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
A civil explosion information multiple encryption communication method comprises a sending end and a receiving end, wherein the receiving end is unique, communication verification is established and executed, and the method specifically comprises the following steps:
a. establishing communication authentication
As shown in fig. 1, in step S01, the sender generates a request plaintext including sender identification information and a first random number (the first random number is preferably not less than 16 bits), and encrypts the request plaintext using a receiver public key to generate a first ciphertext;
step S02, after receiving the first ciphertext, the receiving end decrypts the first ciphertext by using a private key of the receiving end to obtain the identification information of the sending end and the first random number in the plaintext, and the receiving end queries the corresponding public key of the sending end according to the identification information of the sending end;
step S03, the receiving end generates a second random number (the second random number is preferably not less than 16 bits), combines the second random number with the first random number to obtain a third random number (the third random number is preferably not less than 32 bits), and encrypts the authentication information including the third random number using the public key of the transmitting end to obtain a second ciphertext. The combination mode of the third random number comprises any combination mode, the receiving end can set various combination modes, different sending ends can be set with different combination modes, and the random number disassembling and combination modes of the sending end can be inquired according to the identification information of the sending end, so that the diversity of the third random number is improved, and the encryption effect of the random number is improved.
Step S04, after the sending end receives the second ciphertext, the sending end decrypts the second ciphertext by using a private key of the sending end to obtain a third random number in the verification information, and splits the third random number, wherein the splitting mode is the reverse mode of the combination mode in the step S03, each sending end is provided with a unique splitting method or all sending ends are provided with a uniform splitting mode, the splitting random number is extracted by using the splitting method, namely the splitting random number can be split into a first random number and a second random number after being split into the third random number, and if the splitting random number obtained by the splitting method does not contain the first random number, the communication is interrupted; if the split random number comprises the first random number, the receiving end generates a fourth random number, the verification reply information comprising the fourth random number is encrypted by using a public key of the receiving end, and the fourth random number is the same as the third random number to obtain a third ciphertext. Or, the second random number and the third random number are stored into the verification information, and the sending end excludes the second random number from the third random number according to the splitting method to obtain the split random number.
Step S05, after the receiving end receives the third ciphertext, the receiving end uses the private key of the receiving end to decrypt, so as to obtain a fourth random number in the verification reply message, then the third random number and the fourth random number are compared, if the third random number and the fourth random number are the same, the sending end is legal, and the establishment of the communication path is completed; otherwise, the communication is interrupted.
b. Performing communication authentication
As shown in fig. 2, after the communication path is established, the receiving end generates a symmetric encryption key, where the symmetric encryption key is formed by disassembling, splicing, and reassembling the device code number of the transmitting end, the code number of the transmitting end operator, the system time, and the random number in a predetermined order, both the device code number of the transmitting end and the code number of the transmitting end operator are transmitted by the previous first ciphertext, the system time and the random number are generated by the receiving end, and the random number cannot be less than 8 bits to prevent brute force, and the symmetric encryption key is encrypted by using the transmitting end public key to obtain the sixth ciphertext. After receiving the sixth ciphertext, the sending end decrypts the sixth ciphertext by using a private key of the sending end to obtain a symmetric encryption key, and encrypts subsequent communication information by using the symmetric encryption key to obtain a seventh ciphertext; and extracting eleventh abstract information of the communication information by using an information abstract algorithm, encrypting the eleventh abstract information by using the execution communication public key to generate a digital signature of a seventh ciphertext, and sending the seventh ciphertext with the digital signature to the receiving end.
Example two
In order to improve the encryption of the information and add the function of verifying the authenticity and integrity of the information in each step, the following technical features are added on the basis of the first embodiment:
as shown in fig. 3, in step S01, the sending end extracts the first digest information of the requested plaintext by using an information digest algorithm (e.g., a hash algorithm), encrypts the first digest information by using a sending end digital signature private key, generates a first digital signature, and combines the first digital signature and the first ciphertext to send to the receiving end; in step S02, the receiving end decrypts the first digital signature using the public key of the digital signature of the sending end to obtain first digest information, generates second digest information using the same information digest algorithm as that of the sending end for the requested plaintext, and if the first digest information is completely the same as the second digest information, the first digital signature passes verification and continues the subsequent steps.
As shown in fig. 4, in step S03, the receiving end extracts the third digest information of the verification information by using an information digest algorithm, encrypts the third digest information by using the receiving end digital signature private key, generates a second digital signature, and sends the second digital signature and the second ciphertext to the sending end in a combined manner. In step S04, the sending end decrypts the second digital signature using the receiving end digital signature public key to obtain third digest information, generates fourth digest information of the verification information using an information digest algorithm, and continues the subsequent steps if the third digest information is identical to the fourth digest information.
As shown in fig. 5, in step S04, the sending end uses an information digest algorithm to extract fifth digest information of the verification reply information, encrypts the fifth digest information using a sending end digital signature private key, generates a digital signature of a third ciphertext, and sends the third ciphertext with the digital signature to the receiving end; in step S05, the receiving end decrypts the digital signature using the public key of the digital signature of the sending end to obtain fifth digest information, generates sixth digest information of the verification reply information using an information digest algorithm, and continues the subsequent steps if the fifth digest information is identical to the sixth digest information.
EXAMPLE III
If the receiving end is not unique, that is, if there are multiple receiving ends, add the secondary verification to the receiving end on the basis of the first or second embodiment, as shown in fig. 6, and then enter the stage of performing communication verification:
in step S01, the sender encrypts the request plaintext using the recipient public keys of the multiple receivers, and after the sender passes the validity verification, before the establishment of the communication path is completed.
In step S03, the verification information includes a receiving-side public key, which is a unique receiving-side public key different from the receiving-side public key.
After verifying that the sending end is legal and before the communication path establishment is completed, the method further comprises the following steps:
step S06, the sending end generates a fifth random number, and the public key of the receiving end is used for encrypting the reverse verification information containing the fifth random number to obtain a fourth ciphertext;
step S07, after the receiving end receives the fourth ciphertext, the receiving end decrypts the fourth ciphertext by using the receiving end private key to obtain a fifth random number in the reverse verification information, and then the sending end public key is used for encrypting the reverse verification reply information containing the sixth random number, wherein the sixth random number is the same as the fifth random number to obtain a fifth ciphertext;
and step S08, after the sending end receives the third ciphertext, the sending end decrypts the third ciphertext by using a private key of the sending end to obtain a sixth random number in the reverse verification reply message, then the fifth random number and the sixth random number are compared, if the fifth random number and the sixth random number are the same, the receiving end is legal, otherwise, the communication is interrupted.
Example four
In order to improve the encryption of the information and add the function of verifying the authenticity and integrity of the information in each step, the following technical features are added on the basis of the third embodiment:
as shown in fig. 7, in step S06, the sending end extracts seventh digest information of the reverse verification information by using an information digest algorithm, encrypts the seventh digest information by using the receiving end digital signature private key, generates a digital signature of a fourth ciphertext, and combines the fourth digital signature and the fourth ciphertext to send to the receiving end; in step S07, the receiving end decrypts the digital signature using the public key of the digital signature of the transmitting end to obtain seventh digest information, generates eighth digest information of the reverse verification information using an information digest algorithm, and continues the subsequent steps if the seventh digest information is identical to the eighth digest information.
As shown in fig. 8, in step S07, the receiving end extracts the digest information of the reverse verification reply information by using an information digest algorithm to obtain ninth digest information, encrypts the ninth digest information by using the public key of the digital signature of the sending end to generate a digital signature of a fifth ciphertext, and combines the fifth digital signature and the fifth ciphertext to send to the sending end; in step S08, the sending end decrypts the digital signature of the fifth ciphertext using the digital signature private key of the sending end to obtain ninth digest information, generates digest information of the reverse verification reply information using an information digest algorithm to obtain tenth digest information, and continues the subsequent steps if the ninth digest information is identical to the tenth digest information.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (9)

1. A civil explosion information multiple encryption communication method comprises a sending end and a receiving end, and is characterized by comprising the following steps:
step S01, the sending end generates a request plaintext containing the identification information of the sending end and a first random number, and encrypts the request plaintext by using a public key of the receiving end to generate a first ciphertext;
step S02, after receiving the first ciphertext, the receiving end decrypts the first ciphertext by using a private key of the receiving end to obtain the identification information of the sending end and the first random number in the plaintext, and the receiving end queries the corresponding public key of the sending end according to the identification information of the sending end;
step S03, the receiving end generates a second random number, the second random number is combined with the first random number to obtain a third random number, and the public key of the sending end is used for encrypting the verification information containing the third random number to obtain a second ciphertext;
step S04, after receiving the second ciphertext, the sending end decrypts by using a private key of the sending end to obtain a third random number in the verification information, splits the third random number to obtain a split random number, compares the split random number with the first random number, and encrypts verification reply information containing a fourth random number by using a public key of the receiving end if the split random number and the first random number are the same, wherein the fourth random number is the same as the third random number to obtain a third ciphertext;
and step S05, after the receiving end receives the third ciphertext, the receiving end decrypts the third ciphertext by using the private key of the receiving end to obtain a fourth random number in the verification reply message, then the fourth random number is compared with the third random number generated in the step S03, if the fourth random number and the third random number are the same, the sending end is legal, and the establishment of the communication path is completed.
2. The civil explosion information multiple encryption communication method according to claim 1, characterized in that:
in step S01, the sending end uses an information digest algorithm to extract the first digest information of the requested plaintext, uses a sending end digital signature private key to encrypt the first digest information, generates a first digital signature, and combines the first digital signature and the first ciphertext to send to the receiving end;
in step S02, the receiving end decrypts the first digital signature using the public key of the digital signature of the sending end to obtain first digest information, generates second digest information of the requested plaintext using an information digest algorithm, and continues the subsequent steps if the first digest information is identical to the second digest information.
3. The civil explosion information multiple encryption communication method according to claim 1, characterized in that:
in step S03, the receiving end uses an information digest algorithm to extract the third digest information of the verification information, uses the receiving end digital signature private key to encrypt the third digest information, generates a second digital signature, and sends the second digital signature and the second ciphertext to the sending end;
in step S04, the sending end decrypts the second digital signature using the receiving end digital signature public key to obtain third digest information, generates fourth digest information of the verification information using an information digest algorithm, and continues the subsequent steps if the third digest information is identical to the fourth digest information.
4. The civil explosion information multiple encryption communication method according to claim 1, characterized in that:
in step S04, the sending end uses an information digest algorithm to extract fifth digest information of the verification reply information, encrypts the fifth digest information using a sending end digital signature private key, generates a third digital signature, and combines the third digital signature and a third ciphertext to send to the receiving end;
in step S04, the receiving end decrypts the third digital signature using the public key of the digital signature of the transmitting end to obtain fifth digest information, generates sixth digest information of the verification reply information using an information digest algorithm, and continues the subsequent steps if the fifth digest information is identical to the sixth digest information.
5. The civil explosion information multiple encryption communication method according to any one of claims 1 to 4, wherein after verifying that the sending end is legal, before the establishment of the communication path is completed, the method further comprises:
step S06, the sending end generates a fifth random number, and the public key of the receiving end is used for encrypting the reverse verification information containing the fifth random number to obtain a fourth ciphertext;
step S07, after the receiving end receives the fourth ciphertext, the receiving end decrypts the fourth ciphertext by using the receiving end private key to obtain a fifth random number in the reverse verification information, and then the sending end public key is used for encrypting the reverse verification reply information containing the sixth random number, wherein the sixth random number is the same as the fifth random number to obtain a fifth ciphertext;
and step S08, after the sending end receives the third ciphertext, the sending end decrypts the third ciphertext by using a private key of the sending end to obtain a sixth random number in the reverse verification reply message, then the fifth random number and the sixth random number are compared, if the fifth random number and the sixth random number are the same, the receiving end is legal, otherwise, the communication is interrupted.
6. The civil explosion information multiple encryption communication method according to claim 5, wherein:
in step S06, the sending end extracts seventh digest information of the reverse verification information using an information digest algorithm, encrypts the seventh digest information using the receiving end digital signature private key, generates a digital signature of a fourth ciphertext, and sends the fourth ciphertext with the digital signature to the receiving end;
in step S07, the receiving end decrypts the digital signature using the public key of the digital signature of the transmitting end to obtain seventh digest information, generates eighth digest information of the reverse verification information using an information digest algorithm, and continues the subsequent steps if the seventh digest information is identical to the eighth digest information.
7. The civil explosion information multiple encryption communication method according to claim 5, wherein:
in step S07, the receiving end uses an information digest algorithm to extract digest information of the reverse verification reply information to obtain ninth digest information, encrypts the ninth digest information using the sending end digital signature public key to generate a digital signature of a fifth ciphertext, and sends the fifth ciphertext with the digital signature to the sending end;
in step S08, the sending end decrypts the digital signature of the fifth ciphertext using the digital signature private key of the sending end to obtain ninth digest information, generates digest information of the reverse verification reply information using an information digest algorithm to obtain tenth digest information, and continues the subsequent steps if the ninth digest information is identical to the tenth digest information.
8. The civil explosion information multiple encryption communication method according to any one of claims 1 to 7, further comprising the following steps after the establishment of the communication path is completed:
step S06, the receiving end generates a symmetric encryption key, the symmetric encryption key is encrypted by using the public key of the sending end to obtain a sixth ciphertext, the sending end decrypts by using the private key of the sending end after receiving the sixth ciphertext to obtain the symmetric encryption key, and the subsequent communication information is encrypted by using the symmetric encryption key to obtain a seventh ciphertext;
and step S07, extracting eleventh abstract information of the communication information by using an information abstract algorithm, encrypting the eleventh abstract information by using the execution communication public key, generating a digital signature of a seventh ciphertext, and sending the seventh ciphertext with the digital signature to the receiving terminal.
9. The civil explosion information multiple encryption communication method according to claim 8, wherein: the symmetric encryption key consists of a device code number of a sending end, a code number of an operator of the sending end, system time and a random number.
CN201911028770.6A 2019-10-29 2019-10-29 Civil explosion information multiple encryption communication method Pending CN110691098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911028770.6A CN110691098A (en) 2019-10-29 2019-10-29 Civil explosion information multiple encryption communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911028770.6A CN110691098A (en) 2019-10-29 2019-10-29 Civil explosion information multiple encryption communication method

Publications (1)

Publication Number Publication Date
CN110691098A true CN110691098A (en) 2020-01-14

Family

ID=69114211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911028770.6A Pending CN110691098A (en) 2019-10-29 2019-10-29 Civil explosion information multiple encryption communication method

Country Status (1)

Country Link
CN (1) CN110691098A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111431710A (en) * 2020-03-24 2020-07-17 数据通信科学技术研究所 Encryption method and device, reference method and device, supervision method and device
CN112422275A (en) * 2020-10-26 2021-02-26 深圳Tcl新技术有限公司 Key negotiation method, system, equipment and computer storage medium in UART communication
CN114205103A (en) * 2020-08-27 2022-03-18 富士通株式会社 Communication program, communication device, communication method, user terminal, and communication system
CN114978554A (en) * 2022-07-29 2022-08-30 广州匠芯创科技有限公司 Software authorization authentication system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237004A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Key download method, key management method, method, device and system for download management
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
CN105871920A (en) * 2016-06-08 2016-08-17 美的集团股份有限公司 Communication system and method of terminal and cloud server as well as terminal and cloud server
CN106712952A (en) * 2015-11-13 2017-05-24 航天信息股份有限公司 Radio frequency tag safety identification method and system
CN110113745A (en) * 2019-04-29 2019-08-09 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237004A (en) * 2013-03-15 2013-08-07 福建联迪商用设备有限公司 Key download method, key management method, method, device and system for download management
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
CN106712952A (en) * 2015-11-13 2017-05-24 航天信息股份有限公司 Radio frequency tag safety identification method and system
CN105871920A (en) * 2016-06-08 2016-08-17 美的集团股份有限公司 Communication system and method of terminal and cloud server as well as terminal and cloud server
CN110113745A (en) * 2019-04-29 2019-08-09 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111431710A (en) * 2020-03-24 2020-07-17 数据通信科学技术研究所 Encryption method and device, reference method and device, supervision method and device
CN114205103A (en) * 2020-08-27 2022-03-18 富士通株式会社 Communication program, communication device, communication method, user terminal, and communication system
CN114205103B (en) * 2020-08-27 2023-10-17 富士通株式会社 Communication program, communication device, communication method, user terminal, and communication system
CN112422275A (en) * 2020-10-26 2021-02-26 深圳Tcl新技术有限公司 Key negotiation method, system, equipment and computer storage medium in UART communication
CN114978554A (en) * 2022-07-29 2022-08-30 广州匠芯创科技有限公司 Software authorization authentication system and method
CN114978554B (en) * 2022-07-29 2022-10-18 广州匠芯创科技有限公司 Software authorization authentication system and method

Similar Documents

Publication Publication Date Title
CN110691098A (en) Civil explosion information multiple encryption communication method
CN112688784B (en) Digital signature and verification method, device and system
CN109559122A (en) Block chain data transmission method and block chain data transmission system
CN105025019B (en) A kind of data safety sharing method
CN109104271B (en) Digital signature method, device and system
CN1160900C (en) Self authentication ciphertext chaining
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN101715638A (en) Secure electronic messaging system requiring key retrieval for deriving decryption key
CN103166958A (en) Protection method and protection system of file
CN107306181B (en) Authentication system and encryption and verification method and device of authentication information thereof
CN104243494A (en) Data processing method
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN113300842B (en) Method for improving security of symmetric encryption algorithm
CN111934888B (en) Safety communication system of improved software defined network
Luring et al. Analysis of security features in DLMS/COSEM: Vulnerabilities and countermeasures
US8782406B2 (en) Secure digital communications
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
KR20120069387A (en) A method for searching keyword based on public key
CN114173303A (en) Train-ground session key generation method and system for CTCS-3 level train control system
CN114567431A (en) Security authentication method for unidirectional transmission
EP2289227B1 (en) Improvements related to the authentication of messages
Xue-Zhou Network data encryption strategy for cloud computing
CN109104393B (en) Identity authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200114

RJ01 Rejection of invention patent application after publication