CN112788051A - Https dynamic encryption transmission method - Google Patents
Https dynamic encryption transmission method Download PDFInfo
- Publication number
- CN112788051A CN112788051A CN202110097598.0A CN202110097598A CN112788051A CN 112788051 A CN112788051 A CN 112788051A CN 202110097598 A CN202110097598 A CN 202110097598A CN 112788051 A CN112788051 A CN 112788051A
- Authority
- CN
- China
- Prior art keywords
- end device
- https
- algorithm
- coding table
- dynamic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a https dynamic encryption transmission method, which comprises the steps of firstly making an original coding table, then customizing a coding table algorithm, and then adding an interface for acquiring a random number generated in an SSL handshake process in an OpenSSL library; after https connection is established between the sending end device and the receiving end device, the same dynamic coding table is generated by adopting a self-defined coding table algorithm, and then data are encrypted and decrypted. In the invention, the purpose of dynamic encryption is achieved by generating the dynamic coding table, and the safety of data transmission is ensured. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.
Description
Technical Field
The invention relates to the field of https encryption, in particular to a https dynamic encryption transmission method.
Background
The http is a secure hypertext transfer protocol, the SSL is used to encrypt data transmitted by the http, so as to ensure security during a session, and a user usually directly uses the SSL without performing other processing on the data. The simple SSL protocol heavily depends on a certificate issued by a third-party organization, and an encryption algorithm is public, so that the data transmission safety in a specific field cannot be ensured, or the attack of fake equipment cannot be prevented.
The patent "https encryption access method, system and device" (application number: 200710187240.7, publication number: CN 101436933a) discloses an encryption method with better confidentiality: firstly, a special encryption SSL channel is established between a client and https proxy equipment, then a specified https service port is continuously intercepted, then loop-back processing is carried out on the intercepted https message, re-encryption is carried out through a special encryption algorithm, finally the encrypted message is sent out, and the https proxy equipment reversely decodes data according to the process. But the method is only suitable for the encryption of https messages accessed by the browser; the https proxy service is needed, and the direct communication is not point-to-point, so that the risk of the third-party service link is increased, such as the possibility of data loss and manual configuration errors; in addition, the data are acquired by monitoring the designated port, so that the efficiency is low and the flexibility is not high.
Disclosure of Invention
The invention aims to provide a https dynamic encryption transmission method with good confidentiality and high flexibility.
The technical scheme of the invention is as follows:
a https dynamic encryption transmission method comprises the following steps:
step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively;
step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm;
step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library;
step S4, the sending end device and the receiving end device establish https connection through SSL handshake;
step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm;
step S6, the sending end equipment recodes the original data according to the dynamic coding table, generates the encrypted data and sends out the encrypted data;
and step S7, the receiving terminal equipment receives the encrypted data and decrypts the original data through the dynamic coding table.
Further, the method for making the original coding table comprises the following steps:
step S101, obtaining an ASCII table or a base64 encoding table;
step S102, the ASCII table or the base64 encoding table is used as an original encoding table, or the ASCII table or the base64 encoding table is transformed by adopting a preset encoding rule to generate the original encoding table.
Further, the predetermined coding rule includes fixed-length coding, variable-length coding, or entropy coding.
Further, the method for making the original coding table comprises the following steps:
and generating a compression header of the data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table.
Further, the encoding table algorithm is a hash algorithm.
Further, in a Linux environment, adding an interface for acquiring a random number generated in an SSL handshake process in an OpenSSL library includes the following steps:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable in a state _ count.c file, and respectively storing a random number received in a tls _ process _ server _ hello function and a random number generated in the tls _ constraint _ client _ hello function in a corresponding position of the first global two-dimensional array variable;
step S303, defining a second global two-dimensional array variable in a state _ srvr.c file, and respectively storing a random number received in a tls _ process _ client _ hello function and a random number generated in the tls _ constraint _ server _ hello function in corresponding positions of the second global two-dimensional array variable;
step S304, using the first global two-dimensional array variable and the second global two-dimensional array variable as external interfaces in the rand.h file;
and step S305, compiling the modified source code to generate an OpenSSL library.
Further, the process of establishing https connection between the sending end device and the receiving end device through SSL handshake is as follows:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; and if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, and terminate the https connection.
Has the advantages that: in the invention, a predetermined algorithm is adopted to manufacture an original coding table, a self-defined algorithm is adopted to obtain a dynamic coding table according to the random number generated by the SSL protocol and the original coding table, and the dynamic coding table is adopted to encrypt original data to be transmitted or decrypt received encrypted data. Therefore, the purpose of dynamic encryption can be achieved, efficient encryption and decryption can be achieved, and the safety of data transmission is guaranteed. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the present invention;
fig. 2 is a flow chart of another preferred embodiment of the present invention.
Detailed Description
In order to make the technical solutions in the embodiments of the present invention better understood and make the above objects, features and advantages of the embodiments of the present invention more comprehensible, the technical solutions in the embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
In the description of the present invention, unless otherwise specified and limited, it is to be noted that the term "connected" is to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, or a communication between two elements, or may be a direct connection or an indirect connection through an intermediate medium, and a specific meaning of the term may be understood by those skilled in the art according to specific situations.
Example 1
In this embodiment, a Linux system is adopted, and as shown in fig. 1, an embodiment of the https dynamic encryption transmission method of the present invention includes the following steps:
and step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively.
The manufacturing method of the original coding table comprises the following steps:
step S101, obtaining an ASCII table or a base64 encoding table;
step S102, the ASCII table or the base64 encoding table is used as an original encoding table, or the ASCII table or the base64 encoding table is transformed by adopting a preset encoding rule to generate the original encoding table. This embodiment is described by directly using the base64 encoding table as the original encoding table.
And step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm, so that the dynamic code tables generated each time are different. The encoding table algorithm needs to meet the related requirements of encryption and decryption, needs to consider the efficiency of encryption and decryption, and preferably adopts a hash algorithm to realize efficient encryption and decryption; for example, the customizable coding table algorithm is value ═ (num + rand)% 63. Num is a base64 encoding table sequence number value, rand is a numerical value generated according to a random number generated in the SSL handshake process (since the random number generated by OpenSSL is 32 bytes at most, for the sake of simplicity, only the last random number stored in the SSL handshake process can be taken, each byte of the random number is subjected to XOR, and a finally obtained byte is taken as rand, of course, other random numbers can be taken for calculation, or a plurality of random numbers are taken to increase the difficulty of decoding), and value is the finally obtained encoding table sequence number value.
Step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library; since the interface of the OpenSSL standard library does not provide a method for acquiring a random number, the source code of the OpenSSL standard library needs to be modified and recompiled in combination with the development environment. Taking an example of a method for modifying an OpenSSL library in a Linux environment as an example, adding an interface for acquiring a random number generated in an SSL handshake process includes the following steps:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable client _ random _ dat in a status _ client.c file, and appointing a random number received in a tls _ process _ server _ hello function to be stored in client _ random _ data [0], namely a server random number; appointing a random number generated in a tls _ constraint _ client _ hello function to be stored in client _ random _ data [1], namely a client random number;
step S303, defining a second global two-dimensional array variable server _ random _ data in a state _ srvr.c file, and appointing a random number received in a tls _ process _ client _ hello function to be stored in the server _ random _ data [0 ]; namely a client random number, and appointing a random number generated in a tls _ constract _ server _ hello function to be stored in a server _ random _ data [1], namely a server random number;
step S304, using a first global two-dimensional array variable client _ random _ dat and a second global two-dimensional array variable server _ random _ data as external interfaces in a random.h file;
and step S305, compiling the modified source code to generate a new OpenSSL library.
Step S4, the sending end device establishes https connection with the receiving end device, and the specific process is as follows:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, namely the values in the client _ random _ data and the server _ random _ data, and terminate https connection; the SSL handshake needs to be resumed if the https connection is to continue to be established.
Step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm; according to the encoding table algorithm in the embodiment, the process of generating the dynamic encoding table is as follows:
XOR is carried out on the first byte and the second byte of the stored random number, the value after XOR is carried out on the third byte, the value after XOR is carried out on the fourth byte, and the like, and finally the XOR value obtained finally is used as rand to generate a new base64 coding table, namely a dynamic coding table; since the random numbers generated during each SSL handshake are different, the dynamic encoding table obtained each time will be different.
And step S6, the sending end equipment generates encrypted data and sends the encrypted data out by using the dynamic coding table as a base64 coding table according to the base64 coding rule of the original data to be sent. Or the original coding table is used as a base64 coding table to generate data to be encrypted, and then the data to be encrypted are replaced one by one according to the dynamic coding table and sent out.
Step S7, the receiving end device receives the encrypted data, and restores the original data according to the dynamic encoding table and the base64 encoding rule.
In this embodiment, an original coding table is made by using a predetermined coding rule, a dynamic coding table is obtained by using a custom algorithm according to a random number generated by an SSL protocol and the original coding table, and the dynamic coding table is used to encrypt original data to be transmitted or decrypt received encrypted data. Therefore, the purpose of dynamic encryption can be achieved, efficient encryption and decryption can be achieved, and the safety of data transmission is guaranteed. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.
Example 2
In this embodiment, a Linux system is adopted, and as shown in fig. 1, an embodiment of the https dynamic encryption transmission method of the present invention includes the following steps:
step S1', creating an original encoding table, and storing the original encoding table in the sending end device and the receiving end device, respectively.
The manufacturing method of the original coding table comprises the following steps:
generating a compression header of data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table; the huffman compression algorithm is described below as an example, but of course, other compression algorithms may be used. And generating a Huffman prefix code by using data to be transmitted according to a Huffman compression algorithm, wherein the Huffman prefix code and specific characters represented by the Huffman prefix code form a compression header, and the compression header is used as an original coding table.
And step S2', self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm, takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm, and makes the generated dynamic code table different each time. For example, the customizable encoding table algorithm is value ═ (data + rand1+ rand 2)% 127. Wherein, data is the specific value of the original encoding table, rand1 is the first byte of a certain designated random number (for example, the last random number stored in the SSL handshake process), rand2 is the second byte of the random number, and value is the value obtained after calculation; of course, the encoding table algorithm can also take several more random numbers and add more bytes to perform the calculation.
Step S3', adding an interface for acquiring a random number generated in the SSL handshake process in the OpenSSL library; the specific procedure was the same as in example 1.
Step S4', the sending end device and the receiving end device establish https connection, and the specific process is the same as in embodiment 1.
Step S5', the sending end device and the receiving end device adopt the coding table algorithm to generate the same dynamic coding table; since the random numbers generated during each SSL handshake are different, the dynamic encoding table obtained each time will be different.
Step S6', the sending end device generates compressed data (without a compressed header) from the original data to be sent by the huffman compression algorithm, and then sends the compressed header and the compressed data together.
And step S7', the receiving terminal equipment receives the encrypted data, reversely restores a compression header according to the dynamic coding table and the user-defined algorithm, and restores the original data according to the Huffman compression algorithm.
The undescribed parts of the present invention are consistent with the prior art, and are not described herein.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures made by using the contents of the present specification and the drawings can be directly or indirectly applied to other related technical fields, and are within the scope of the present invention.
Claims (7)
1. A https dynamic encryption transmission method is characterized by comprising the following steps:
step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively;
step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm;
step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library;
step S4, the sending end device and the receiving end device establish https connection through SSL handshake;
step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm;
step S6, the sending end equipment recodes the original data according to the dynamic coding table, generates the encrypted data and sends out the encrypted data;
and step S7, the receiving terminal equipment receives the encrypted data and decrypts the original data through the dynamic coding table.
2. The https dynamic encryption transmission method according to claim 1, wherein the method for making the raw coding table includes the steps of:
step S101, obtaining an ASCI I table or a base64 encoding table;
step S102, using the ASCI I table or the base64 encoding table as an original encoding table, or transforming the ASCI I table or the base64 encoding table by using a predetermined encoding rule to generate the original encoding table.
3. The https dynamic encryption transmission method of claim 2, wherein the predetermined coding rule comprises fixed-length coding, variable-length coding, or entropy coding.
4. The https dynamic encryption transmission method according to claim 1, wherein the method for making the raw coding table includes the steps of:
and generating a compression header of the data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table.
5. The https dynamic encryption transmission method of claim 1, wherein the coding table algorithm is a hash algorithm.
6. The https dynamic encryption transmission method according to claim 1, wherein in a Linux environment, adding an interface for obtaining a random number generated in an SSL handshake process in an OpenSSL library comprises the steps of:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable in a state _ count.c file, and respectively storing a random number received in a tls _ process _ server _ hello function and a random number generated in the tls _ constraint _ client _ hello function in a corresponding position of the first global two-dimensional array variable;
step S303, defining a second global two-dimensional array variable in a state _ srvr.c file, and respectively storing a random number received in a tls _ process _ client _ hello function and a random number generated in the tls _ constraint _ server _ hello function in corresponding positions of the second global two-dimensional array variable;
step S304, using the first global two-dimensional array variable and the second global two-dimensional array variable as external interfaces in the rand.h file;
and step S305, compiling the modified source code to generate an OpenSSL library.
7. The https dynamic encryption transmission method according to claim 1, wherein the process of establishing the https connection by the transmitting end device and the receiving end device through SSL handshake is:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; and if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, and terminate the https connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110097598.0A CN112788051A (en) | 2021-01-25 | 2021-01-25 | Https dynamic encryption transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110097598.0A CN112788051A (en) | 2021-01-25 | 2021-01-25 | Https dynamic encryption transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112788051A true CN112788051A (en) | 2021-05-11 |
Family
ID=75759001
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110097598.0A Pending CN112788051A (en) | 2021-01-25 | 2021-01-25 | Https dynamic encryption transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112788051A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
CN103997759A (en) * | 2014-05-28 | 2014-08-20 | 北京邮电大学 | Data transmission method for wireless relay communication |
KR101438312B1 (en) * | 2013-03-20 | 2014-09-12 | 전북대학교산학협력단 | Method of data encryption and encrypted data transmitter-receiver system using thereof |
CN104393988A (en) * | 2014-12-03 | 2015-03-04 | 浪潮(北京)电子信息产业有限公司 | Reversible data encryption method and device |
CN105100085A (en) * | 2015-07-07 | 2015-11-25 | 浪潮通用软件有限公司 | Information encryption and decryption methods and devices |
CN107786338A (en) * | 2016-08-25 | 2018-03-09 | 大连楼兰科技股份有限公司 | Shared platform in dynamic password verification |
CN108418684A (en) * | 2018-03-09 | 2018-08-17 | 江苏科建教育软件有限责任公司 | A kind of character string symmetric cryptography and decryption method |
CN109413060A (en) * | 2018-10-19 | 2019-03-01 | 深信服科技股份有限公司 | Message processing method, device, equipment and storage medium |
CN111490984A (en) * | 2020-04-03 | 2020-08-04 | 上海宽创国际文化科技股份有限公司 | Network data coding and encryption algorithm thereof |
CN111818026A (en) * | 2020-06-24 | 2020-10-23 | 杭州缥缈峰科技有限公司 | Data encryption method and system for public network transmission |
CN112230889A (en) * | 2020-10-16 | 2021-01-15 | 湖南皖湘科技有限公司 | Method for making software development coding specification |
-
2021
- 2021-01-25 CN CN202110097598.0A patent/CN112788051A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904712A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
KR101438312B1 (en) * | 2013-03-20 | 2014-09-12 | 전북대학교산학협력단 | Method of data encryption and encrypted data transmitter-receiver system using thereof |
CN103997759A (en) * | 2014-05-28 | 2014-08-20 | 北京邮电大学 | Data transmission method for wireless relay communication |
CN104393988A (en) * | 2014-12-03 | 2015-03-04 | 浪潮(北京)电子信息产业有限公司 | Reversible data encryption method and device |
CN105100085A (en) * | 2015-07-07 | 2015-11-25 | 浪潮通用软件有限公司 | Information encryption and decryption methods and devices |
CN107786338A (en) * | 2016-08-25 | 2018-03-09 | 大连楼兰科技股份有限公司 | Shared platform in dynamic password verification |
CN108418684A (en) * | 2018-03-09 | 2018-08-17 | 江苏科建教育软件有限责任公司 | A kind of character string symmetric cryptography and decryption method |
CN109413060A (en) * | 2018-10-19 | 2019-03-01 | 深信服科技股份有限公司 | Message processing method, device, equipment and storage medium |
CN111490984A (en) * | 2020-04-03 | 2020-08-04 | 上海宽创国际文化科技股份有限公司 | Network data coding and encryption algorithm thereof |
CN111818026A (en) * | 2020-06-24 | 2020-10-23 | 杭州缥缈峰科技有限公司 | Data encryption method and system for public network transmission |
CN112230889A (en) * | 2020-10-16 | 2021-01-15 | 湖南皖湘科技有限公司 | Method for making software development coding specification |
Non-Patent Citations (4)
Title |
---|
ZEYAN LIU: "The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection", 《2020 IEEE 20TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 * |
李明彩: "HTTPS文件服务器的搭建和应用", 《数字技术与应用》 * |
韩宇贞: "基于Base64编码的数据加密技术", 《南昌水专学报》 * |
高希然等: "HTTPS探析", 《信息记录材料》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102354456B1 (en) | Post-quantum asymmetric key cryptosystem with one-to-many distributed key management based on prime modulo double encapsulation | |
EP1107504B1 (en) | Method of updating encryption keys in a data communication system | |
US7221757B2 (en) | Method and system for accelerated data encryption | |
US9172529B2 (en) | Hybrid encryption schemes | |
US9608812B2 (en) | Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program | |
KR102368749B1 (en) | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth | |
KR101737299B1 (en) | Encoder, decoder and methods | |
CN114364062B (en) | Method for safely accessing gateway of Internet of vehicles | |
CN112929166B (en) | Master station, slave station and data transmission system based on Modbus-TCP protocol | |
Armanuzzaman et al. | A secure and efficient data transmission technique using quantum key distribution | |
CN113221146B (en) | Method and device for data transmission among block chain nodes | |
CN112073115A (en) | Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server | |
US7213143B1 (en) | Security over a network | |
CN116743505B (en) | Safety transmission encryption method based on national secret | |
KR20110027560A (en) | Secure communication of information over a wireless link | |
CN112188485A (en) | Encryption and decryption method based on Bluetooth communication | |
CN112788051A (en) | Https dynamic encryption transmission method | |
CN111800784A (en) | Block chain cloud service system based on cloud computing | |
CN113596054B (en) | Method for encrypting transmission soft frequency hopping between information systems | |
EP2571192A1 (en) | Hybrid encryption schemes | |
WO2023070825A1 (en) | Data processing method and device | |
Akhter et al. | Bangla and English text cryptography based on modified blowfish and Lempel-Ziv-Welch algorithm to minimize execution time | |
US20100014670A1 (en) | One-Way Hash Extension for Encrypted Communication | |
CN115473639B (en) | Anti-quantum computing method and device based on Guomai technology | |
EP1529390B1 (en) | Method and system for accelerated data encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210511 |
|
RJ01 | Rejection of invention patent application after publication |