CN110768978B - Communication encryption verification method and device, computer equipment and storage medium - Google Patents

Communication encryption verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110768978B
CN110768978B CN201911006761.7A CN201911006761A CN110768978B CN 110768978 B CN110768978 B CN 110768978B CN 201911006761 A CN201911006761 A CN 201911006761A CN 110768978 B CN110768978 B CN 110768978B
Authority
CN
China
Prior art keywords
communication
data
key field
native
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911006761.7A
Other languages
Chinese (zh)
Other versions
CN110768978A (en
Inventor
朱杰
周登祥
胡懿敏
许世林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Keda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Keda Technology Co Ltd filed Critical Suzhou Keda Technology Co Ltd
Priority to CN201911006761.7A priority Critical patent/CN110768978B/en
Publication of CN110768978A publication Critical patent/CN110768978A/en
Application granted granted Critical
Publication of CN110768978B publication Critical patent/CN110768978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Abstract

The invention provides a verification method and a device of communication encryption, wherein the verification method of the communication encryption comprises the following steps: acquiring communication transmission data transmitted by two communication parties, wherein the communication transmission data is first native data transmitted after the two communication parties establish communication; judging whether the first native data contains a first key field, wherein the first key field is a characteristic field generated by encrypting transmitted data by two communication parties; and if all the first native data contain the first key field, judging that the data transmitted by the two communication parties are encrypted. The communication encryption verification method provided by the invention finally obtains the judgment result of whether the data is encrypted or not by deeply analyzing the data generated in the communication process, so that the judgment result is more accurate and reliable.

Description

Communication encryption verification method and device, computer equipment and storage medium
Technical Field
The invention relates to the field of communication security, in particular to a communication encryption verification method and device.
Background
Most of the national secrets are used for enterprise access control management, transmission encryption and storage encryption of various sensitive information inside enterprises, and in recent years, some research and development personnel try to encrypt communication in a national secret manner in order to keep the communication secret, so that the safety and reliability of the communication process are ensured. When a national secret method is used for encrypting communication, not only an encryption method needs to be researched, but also whether the encryption is really realized needs to be verified, at present, research and development personnel indirectly check the encryption state of a terminal through a protocol version number, but because no public standard exists at present, the situation of misjudgment can exist only through the method for judging. In order to ensure the communication security, the problem to be solved urgently is to accurately verify whether encryption is carried out.
Disclosure of Invention
Therefore, the technical problem to be solved by the present invention is to overcome the defect in the prior art that the encryption status of the communication process cannot be accurately determined, thereby providing a method and an apparatus for verifying the communication encryption.
The first aspect of the present invention provides a method for verifying communication encryption, including: acquiring communication transmission data transmitted by two communication parties, wherein the communication transmission data is first native data transmitted after the two communication parties establish communication; judging whether the first native data contains a first key field, wherein the first key field is a characteristic field generated by encrypting transmitted data by two communication parties; and if all the first native data contain the first key field, judging that the data transmitted by the two communication parties are encrypted.
Optionally, if there is first native data that does not contain the first key field, calculating a fraction of the first native data that contains the first key field among all first native data; judging whether the ratio is greater than or equal to a preset threshold value; if the ratio is larger than or equal to the preset threshold value, the data transmitted by the two communication parties are encrypted; and if the ratio is smaller than the preset threshold value, judging that the data transmitted by the two communication parties are not encrypted.
Optionally, the verification method for communication encryption provided by the present invention further includes: acquiring negotiation data in a negotiation process of two communication parties, wherein the negotiation data comprises handshake protocol data transmitted by the two communication parties during handshake and second native data transmitted by the two communication parties after handshake; judging whether the handshake protocol data contains a second key field, wherein the second key field is a characteristic field generated by encrypting transmitted data when two communication parties handshake; if all the handshake protocol data contain the second key field, judging whether the second native data contain the first key field; determining that the negotiation process is encrypted if all of the second native data includes the first key field.
Optionally, if there is handshake protocol data not containing the second critical field, it is determined that the negotiation process is not encrypted.
Optionally, if there is second native data that does not contain the first key field, calculating a fraction of second native data that contains the first key field among all second native data; judging whether the ratio is greater than or equal to a preset threshold value; if the ratio is larger than or equal to the preset threshold value, judging that the negotiation process is encrypted; and if the ratio is smaller than the preset threshold value, judging that the negotiation process is not encrypted.
A second aspect of the present invention provides an authentication apparatus for communication encryption, including: the communication transmission data acquisition module is used for acquiring communication transmission data transmitted by two communication parties, wherein the communication transmission data is first native data transmitted after the two communication parties establish communication; the judging module is used for judging whether the first native data comprise first key fields, wherein the first key fields are characteristic fields generated by encrypting the transmitted data by both communication parties; and the encryption judging module is used for judging that the data transmitted by the two communication parties are encrypted if all the first originals contain the first key field.
A third aspect of the present invention provides a computer apparatus comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to perform the method of authentication of communication encryption as provided by the first aspect of the invention.
A fourth aspect of the present invention provides a computer-readable storage medium storing computer instructions for causing a computer to execute the method for authenticating a communication encryption as provided in the first aspect of the present invention.
The technical scheme of the invention has the following advantages:
1. when the encryption condition of data transmitted by two communication parties is judged, whether the first native data comprises the first key field or not is judged, and if yes, the communication process is judged to be encrypted. The communication encryption verification method starts from data generated in the communication process, and finally obtains the judgment result of whether the data is encrypted or not by deeply analyzing the data transmitted by two communication parties, so that the communication encryption verification method provided by the invention is more accurate and reliable in the judgment result of the encryption condition of the data transmitted by the two communication parties in the communication process.
2. When the encryption condition of the negotiation process is judged, whether handshake protocol data in the negotiation data contain second key fields is judged firstly, whether the occupation ratio of second primary data containing the first key fields in all the second primary data in the negotiation data is not smaller than a preset threshold value is judged, and if the two conditions are met, the negotiation process is judged to be encrypted. The communication encryption verification method starts from data generated in the negotiation process, and finally obtains the judgment result of whether to encrypt or not by deeply analyzing the data generated in the negotiation process, so that the communication encryption verification method provided by the invention is more accurate and reliable in the judgment result of the encryption condition in the negotiation process.
3. When the communication encryption verification device provided by the invention judges the encryption condition of the data transmitted by both communication parties, whether first original data contained in the communication transmission data in the data transmitted by both communication parties contain a first key field is judged, and if so, the communication process encryption is judged. The communication encryption verification method starts from data generated in the communication process, and finally obtains the judgment result of whether the data is encrypted or not by deeply analyzing the data generated in the communication process, so that the communication encryption verification device provided by the invention is more accurate and reliable in the judgment result of the encryption condition of the data transmitted by two communication parties in the communication process. .
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a specific example of a verification method of communication encryption in the embodiment of the present invention;
FIGS. 2-3 are schematic diagrams illustrating analysis results of data transmitted by two communication parties according to an embodiment of the present invention
FIG. 4 is a diagram illustrating negotiation data generated for a negotiation process according to an embodiment of the present invention;
fig. 5 is a flowchart of a specific example of a verification method of communication encryption in the embodiment of the present invention;
fig. 6-8 are diagrams illustrating analysis results of negotiation data generated in the negotiation process according to the embodiment of the present invention;
fig. 9 is a block diagram showing a specific example of the authentication apparatus for communication encryption in the embodiment of the present invention;
fig. 10 is a block diagram showing a specific example of a computer device in the embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
In order to keep the communication process secret, some research and development personnel try to encrypt the communication process in a national secret manner, so that the safety and the reliability of the communication process are guaranteed. When a communication process is encrypted by a national encryption mode, not only an encryption method needs to be researched, but also whether the encryption is really realized needs to be verified, at present, research and development personnel indirectly check the encryption state of a terminal through a protocol version number, but because no public standard exists at present, the situation of misjudgment can exist only through the method for judging.
An embodiment of the present invention provides a method for verifying communication encryption, as shown in fig. 1, including:
step S101: the method comprises the steps of obtaining communication transmission data transmitted by two communication parties, wherein the communication transmission data are first original data transmitted after the two communication parties establish communication. In a specific embodiment, the obtained communication transmission data transmitted by the two communication parties is data generated when the two communication parties communicate within a preset time period, and a user can extract the communication transmission data within a certain time period according to actual requirements, so as to judge whether the data generated within the time period is encrypted, wherein the communication transmission data may be data generated when two terminals perform a video conference through the two terminals and perform communication between the two terminals.
Step S102: and judging whether the first native data contains a first key field, wherein the first key field is a characteristic field generated by encrypting the transmitted data by the two communication parties. In one embodiment, the first key field is a content type field with a value of 23.
Step S103: if all the first native data contain the first key field, executing step S104;
step S104: and judging that the data transmitted by the two communication parties is encrypted.
In a specific embodiment, by analyzing communication transmission data generated in an encrypted communication process between terminals, it is found that first native data with a Content Type (Content Type) field value of 23 (corresponding to a 16-ary system of 0x17) is encrypted, as shown in fig. 2, therefore, in the embodiment of the present invention, when determining an encryption state of data transmitted by two communicating parties, it may be determined whether the first native communication data includes the Content Type field with a value of 23 (corresponding to a 16-ary system of 0x17), and when all the first native data includes the Content Type field with a value of 23 (corresponding to a 16-ary system of 0x17), it may be determined that the data transmitted by two communicating parties is encrypted.
When the encryption condition of the data transmitted by the two communication parties is judged, whether first native data in the data transmitted by the two communication parties comprise a first key field or not is judged, and if yes, the encryption of the communication process is judged. The communication encryption verification method starts from data generated in the communication process, and finally obtains the judgment result of whether the data is encrypted or not by deeply analyzing the data generated in the communication process, so that the communication encryption verification method provided by the invention is more accurate and reliable in the judgment result of the encryption condition of the data transmitted by two communication parties in the communication process.
In an alternative embodiment, as shown in fig. 1, after the step S103, the method for verifying the communication encryption further includes:
step S105: if the first native data which does not contain the first key field exists, calculating the proportion of the first native data which contains the first key field in all the first native data;
step S106: judging whether the ratio is greater than or equal to a preset threshold value;
step S107: if the ratio is larger than or equal to a preset threshold value, the data transmitted by the two communication parties are encrypted;
step S108: and if the ratio is smaller than the preset threshold value, judging that the data transmitted by the two communication parties is not encrypted.
In a specific embodiment, through analyzing a large amount of communication transmission data, it is found that a few parts of encrypted first native communication data may have a content type field value of not 23 (corresponding to a 16-ary value of 0x17), which is caused by the packet parsing tool when segmenting a data packet, as shown in fig. 3, but the native communication data ratio of this occurrence is less than 1%, so in the embodiment of the present invention, the preset threshold is set to 99%, that is, the proportion of the number of the native communication data including the first key field in the first native communication data is not less than 99%, and it may also be considered that data transmitted by both communication parties is encrypted.
In a specific embodiment, when communication between two terminal devices needs to be encrypted with a national secret, the terminal devices need to register to a platform supporting the national secret encryption by using a Session Initiation Protocol (SIP), so that the two terminals can communicate through the platform to ensure encryption in the whole communication process. When registering a cryptographic platform, the whole process should be encrypted, which is called a negotiation process, and data transmitted in the negotiation process is called negotiation data. The key nodes in the negotiation process are shown in fig. 4, where data packets with serial numbers 810 and 812 are generated when authentication is performed between the terminal and the platform server supporting the national encryption, data packets with serial numbers 816 and 823 are generated when a password suite is exchanged between the terminal and the platform server supporting the national encryption, data packets with serial number 825 are generated when a key is exchanged between the terminal and the platform server supporting the national encryption, data packets with serial numbers 826 and 836 are generated when communication is performed between the terminal and the platform server supporting the national encryption by using the negotiated key, we authenticate the authentication between the terminal and the platform server supporting the national encryption, data transmitted when the cipher suite and the key are exchanged is called handshake protocol data, and data transmitted when the terminal and the platform server supporting the national encryption communicate by using the negotiated key is called second native data.
In an alternative embodiment, as shown in fig. 5, the method for verifying communication encryption according to the embodiment of the present invention further includes:
step S201: acquiring negotiation data in the negotiation process of the two communication parties, wherein the negotiation data comprises handshake protocol data transmitted by the two communication parties during handshake and second native data transmitted by the two communication parties after handshake, the handshake protocol data is data transmitted during authentication and exchange of cipher suite information and a secret key, and the second native data is data transmitted during communication through a negotiated secret key.
Step S202: and judging whether the handshake protocol data contains a second key field, wherein the second key field is a characteristic field generated by encrypting the transmitted data when the two communication parties handshake. In one embodiment, the second key field is a content type field with a value of 22.
Step S203: if all the handshake protocol data contain the second key field, executing step S205;
step S205: judging whether the second native data contains a first key field;
step S206: if all the second native data contain the first key field, executing step S207;
step S207: it is determined that the negotiation process is encrypted.
In a specific embodiment, by analyzing the data generated in the negotiation process, it is found that the handshake protocol data includes a Content Type (Content Type) field in addition to carrying the key suite, version information, and length. Further analyzing the data transmitted during the authentication, exchanging the cipher suite information and the key exchange, it is found that the Content Type value in the handshake protocol data is 22 (corresponding to 16-ary 0x16), as shown in fig. 6 and 7. Therefore, in the embodiment of the present invention, when determining the encryption status of the negotiation process, it is first determined whether the handshake protocol data includes the content type field with a value of 22 (corresponding to a value of 0x16 in 16). By analyzing the data generated in the negotiation process, it is further found that, in the data transmitted during communication through the negotiated key after the handshake process is completed, the second native communication data with a Content Type value of 23 (corresponding to a 16-ary value of 0x17) is encrypted, as shown in fig. 8, and therefore, in the embodiment of the present invention, when determining the encryption state of the negotiation process, after the determination on the handshake protocol data is completed, it is further determined whether the second native communication data includes a Content Type field containing 23 (corresponding to a 16-ary value of 0x 17). When the handshake protocol data includes the second key field and the second native field includes the first key field, it can be determined that the negotiation process is encrypted.
In an alternative embodiment, as shown in fig. 5, after the step S203, if there is handshake protocol data not containing the second critical field, step S204 is executed: and judging that the negotiation process is not encrypted.
In a specific embodiment, since it is not found in the previous experiment that the encrypted handshake protocol data does not include the Content Type value of 22 (corresponding to a 16-ary value of 0x16), if at least one handshake protocol data does not include the second critical field, it is determined that the negotiation process is not encrypted.
In an alternative embodiment, as shown in fig. 5, after the step S206, when there is second native data that does not include the first key field, step S208 is executed;
step S208: calculating the proportion of second native data containing the first key field in all second native data;
step S209: judging whether the ratio is greater than or equal to a preset threshold value;
step S210: if the ratio is larger than or equal to a preset threshold value, judging that the negotiation process is encrypted;
step S211: and if the occupation ratio is smaller than a preset threshold value, judging that the negotiation process is not encrypted.
As in the above analysis of the first native data, since the packet parsing tool may cause the value of the content type field included in the second native data to be not 23 (corresponding to the 16 th system is 0x17) when the packet is segmented, but the proportion of the second native data in this case is less than 1%, when the handshake protocol data includes the second key field, the proportion of the amount of the native communication data including the first key field in the second native data is not less than 99%, and the negotiation process may also be considered to be encrypted.
When the encryption condition of the negotiation process is judged, it is first judged whether handshake protocol data all contain the second key field and whether the proportion of the number of the second native data containing the first key field in all the second native data is not less than a preset threshold value, and if the two conditions are both satisfied, it is judged that the negotiation process is encrypted. The communication encryption verification method starts from data generated in the negotiation process, and finally obtains the judgment result of whether to encrypt or not by deeply analyzing the data generated in the negotiation process, so that the communication encryption verification method provided by the embodiment of the invention is more accurate and reliable in the judgment result of the encryption condition in the negotiation process.
Example 2
The present embodiment provides an authentication apparatus for communication encryption, as shown in fig. 9, including:
the communication transmission data obtaining module 110 is configured to obtain communication transmission data transmitted by both communication parties, where the communication transmission data is first native data transmitted after both communication parties establish communication, and the detailed description is described in the above embodiment 1 for step S101.
The determining module 120 is configured to determine whether the first native data includes the first key field, which is described in detail in the above description of step S102 in embodiment 1.
The encryption determination module 130 is configured to determine that the data transmitted by the two communication parties is encrypted if all the first native data includes the first key field, and the detailed description is described in the above embodiment 1 for the step S104.
When the verification device for communication encryption provided by the embodiment of the invention is used for judging the encryption condition of data transmitted by two communication parties, whether first original data contained in communication transmission data in the data transmitted by the two communication parties both contain a first key field is judged, and if yes, the communication process is judged to be encrypted. The communication encryption verification method starts from data generated in the communication process, and finally obtains the judgment result of whether to encrypt or not by deeply analyzing the data generated in the communication process, so that the communication encryption verification device provided by the embodiment of the invention is more accurate and reliable in the judgment result of the encryption condition in the negotiation process.
Example 3
An embodiment of the present invention provides a computer device, as shown in fig. 10, the computer device mainly includes one or more processors 31 and a memory 32, and one processor 31 is taken as an example in fig. 10.
The computer device may further include: an input device 33 and an output device 34.
The processor 31, the memory 32, the input device 33 and the output device 34 may be connected by a bus or other means, and fig. 3 illustrates the connection by a bus as an example.
The processor 31 may be a Central Processing Unit (CPU). The Processor 31 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The memory 32 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of the authentication apparatus encrypted by communication, and the like. Further, the memory 32 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 32 may optionally include memory located remotely from the processor 31, and these remote memories may be connected to a communications-encrypted authentication device over a network. The input device 33 may receive a calculation request (or other numeric or character information) input by a user and generate a key signal input related to the authentication device for communication encryption. The output device 34 may include a display device such as a display screen for outputting the calculation result.
Example 4
A fourth aspect of the present invention provides a computer-readable storage medium storing computer instructions, the computer-readable storage medium storing computer-executable instructions, the computer-executable instructions being capable of executing the method for verifying communication encryption in any of the above-mentioned method embodiments. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (8)

1. A method for authenticating a communication encryption, comprising:
Acquiring communication transmission data transmitted by two communication parties, wherein the communication transmission data is first native data transmitted after the two communication parties establish communication;
judging whether the first native data contains a first key field, wherein the first key field is a characteristic field generated by encrypting transmitted data by two communication parties;
if all the first native data contain the first key field, judging that the data transmitted by the two communication parties are encrypted;
calculating a fraction of first native data that includes the first key field among all first native data if there is first native data that does not include the first key field;
judging whether the ratio is greater than or equal to a preset threshold value;
and if the ratio is larger than or equal to the preset threshold value, judging that the data transmitted by the two communication parties are encrypted.
2. The method of claim 1, wherein the authentication of the communication encryption,
and if the ratio is smaller than the preset threshold value, judging that the data transmitted by the two communication parties are not encrypted.
3. The method for verifying the encryption of communication according to claim 1, further comprising:
Acquiring negotiation data in a negotiation process of two communication parties, wherein the negotiation data comprises handshake protocol data transmitted by the two communication parties during handshake and second native data transmitted by the two communication parties after handshake;
judging whether the handshake protocol data contains a second key field, wherein the second key field is a characteristic field generated by encrypting transmitted data when two communication parties handshake;
if all the handshake protocol data contain the second key field, judging whether the second native data contain the first key field;
determining that the negotiation process is encrypted if all of the second native data includes the first key field.
4. The method of claim 3, wherein the authentication of the communication encryption,
and if handshake protocol data which does not contain the second key field exists, determining that the negotiation process is not encrypted.
5. The method of claim 3, wherein the authentication of the communication encryption,
calculating a fraction of second native data that includes the first key field among all second native data if there is second native data that does not include the first key field;
Judging whether the ratio is greater than or equal to a preset threshold value;
if the ratio is larger than or equal to the preset threshold value, judging that the negotiation process is encrypted;
and if the ratio is smaller than the preset threshold value, judging that the negotiation process is not encrypted.
6. An authentication apparatus for communication encryption, comprising:
the communication transmission data acquisition module is used for acquiring communication transmission data transmitted by two communication parties, wherein the communication transmission data is first native data transmitted after the two communication parties establish communication;
the judging module is used for judging whether the first native data contains a first key field, wherein the first key field is a characteristic field generated by encrypting transmitted data by two communication parties;
the encryption judging module is used for judging that the data transmitted by the two communication parties are encrypted if all the first native data contain the first key field;
calculating a fraction of first native data that includes the first key field among all first native data if there is first native data that does not include the first key field;
judging whether the ratio is greater than or equal to a preset threshold value;
And if the ratio is larger than or equal to the preset threshold value, judging that the data transmitted by the two communication parties are encrypted.
7. A computer device, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to perform the method of authentication of a communication cipher according to any one of claims 1 to 5.
8. A computer-readable storage medium storing computer instructions for causing a computer to execute the method for authenticating a communication encryption according to any one of claims 1 to 5.
CN201911006761.7A 2019-10-22 2019-10-22 Communication encryption verification method and device, computer equipment and storage medium Active CN110768978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911006761.7A CN110768978B (en) 2019-10-22 2019-10-22 Communication encryption verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911006761.7A CN110768978B (en) 2019-10-22 2019-10-22 Communication encryption verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110768978A CN110768978A (en) 2020-02-07
CN110768978B true CN110768978B (en) 2022-02-11

Family

ID=69332659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911006761.7A Active CN110768978B (en) 2019-10-22 2019-10-22 Communication encryption verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110768978B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164049A (en) * 2011-04-28 2011-08-24 中国人民解放军信息工程大学 Universal identification method for encrypted flow
CN104009836A (en) * 2014-05-26 2014-08-27 南京泰锐斯通信科技有限公司 Encrypted data detection method and system
CN108696713A (en) * 2018-04-27 2018-10-23 苏州科达科技股份有限公司 Safety detecting method, device and the test equipment of code stream

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI528219B (en) * 2014-10-01 2016-04-01 財團法人資訊工業策進會 Method, electronic device, and computer readable recording media for identifying confidential data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164049A (en) * 2011-04-28 2011-08-24 中国人民解放军信息工程大学 Universal identification method for encrypted flow
CN104009836A (en) * 2014-05-26 2014-08-27 南京泰锐斯通信科技有限公司 Encrypted data detection method and system
CN108696713A (en) * 2018-04-27 2018-10-23 苏州科达科技股份有限公司 Safety detecting method, device and the test equipment of code stream

Also Published As

Publication number Publication date
CN110768978A (en) 2020-02-07

Similar Documents

Publication Publication Date Title
US10499243B2 (en) Authentication of phone caller identity
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
EP2023262A2 (en) Authentication system and authentication method
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN109145651B (en) Data processing method and device
CN110647641A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN112235301A (en) Method and device for verifying access authority and electronic equipment
CN110417740B (en) User data processing method, intelligent terminal, server and storage medium
CN107548542B (en) User authentication method with enhanced integrity and security
CN112328415A (en) Interface calling method and device, computer equipment and readable storage medium
CN110768978B (en) Communication encryption verification method and device, computer equipment and storage medium
CN109302425B (en) Identity authentication method and terminal equipment
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
CN116827551A (en) Method and device for preventing global override
CN113243093A (en) System and method for message transmission and retrieval using blockchains
CN113225348B (en) Request anti-replay verification method and device
CN106533685B (en) Identity authentication method, device and system
JP2008541221A (en) Bootstrap message security transmission method and device in device management
CN110069415B (en) Software integrity checking and software testing method used in software testing process
KR102551592B1 (en) Method for preventing mileage tampering of car and mileage recording device using the same
KR20180034199A (en) Unified login method and system based on single sign on service
CN112825093A (en) Security baseline checking method, host, server, electronic device and storage medium
CN105323287B (en) Third-party application program login method and system
CN109117647A (en) A kind of the permission control management method and management system of mobile application SDK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant