CN112788051A - Https dynamic encryption transmission method - Google Patents

Https dynamic encryption transmission method Download PDF

Info

Publication number
CN112788051A
CN112788051A CN202110097598.0A CN202110097598A CN112788051A CN 112788051 A CN112788051 A CN 112788051A CN 202110097598 A CN202110097598 A CN 202110097598A CN 112788051 A CN112788051 A CN 112788051A
Authority
CN
China
Prior art keywords
end device
https
algorithm
coding table
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110097598.0A
Other languages
Chinese (zh)
Inventor
丁仕亮
周勇
王东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gaoxin Xingxunmei Technology Co ltd
Original Assignee
Gaoxin Xingxunmei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gaoxin Xingxunmei Technology Co ltd filed Critical Gaoxin Xingxunmei Technology Co ltd
Priority to CN202110097598.0A priority Critical patent/CN112788051A/en
Publication of CN112788051A publication Critical patent/CN112788051A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a https dynamic encryption transmission method, which comprises the steps of firstly making an original coding table, then customizing a coding table algorithm, and then adding an interface for acquiring a random number generated in an SSL handshake process in an OpenSSL library; after https connection is established between the sending end device and the receiving end device, the same dynamic coding table is generated by adopting a self-defined coding table algorithm, and then data are encrypted and decrypted. In the invention, the purpose of dynamic encryption is achieved by generating the dynamic coding table, and the safety of data transmission is ensured. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.

Description

Https dynamic encryption transmission method
Technical Field
The invention relates to the field of https encryption, in particular to a https dynamic encryption transmission method.
Background
The http is a secure hypertext transfer protocol, the SSL is used to encrypt data transmitted by the http, so as to ensure security during a session, and a user usually directly uses the SSL without performing other processing on the data. The simple SSL protocol heavily depends on a certificate issued by a third-party organization, and an encryption algorithm is public, so that the data transmission safety in a specific field cannot be ensured, or the attack of fake equipment cannot be prevented.
The patent "https encryption access method, system and device" (application number: 200710187240.7, publication number: CN 101436933a) discloses an encryption method with better confidentiality: firstly, a special encryption SSL channel is established between a client and https proxy equipment, then a specified https service port is continuously intercepted, then loop-back processing is carried out on the intercepted https message, re-encryption is carried out through a special encryption algorithm, finally the encrypted message is sent out, and the https proxy equipment reversely decodes data according to the process. But the method is only suitable for the encryption of https messages accessed by the browser; the https proxy service is needed, and the direct communication is not point-to-point, so that the risk of the third-party service link is increased, such as the possibility of data loss and manual configuration errors; in addition, the data are acquired by monitoring the designated port, so that the efficiency is low and the flexibility is not high.
Disclosure of Invention
The invention aims to provide a https dynamic encryption transmission method with good confidentiality and high flexibility.
The technical scheme of the invention is as follows:
a https dynamic encryption transmission method comprises the following steps:
step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively;
step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm;
step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library;
step S4, the sending end device and the receiving end device establish https connection through SSL handshake;
step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm;
step S6, the sending end equipment recodes the original data according to the dynamic coding table, generates the encrypted data and sends out the encrypted data;
and step S7, the receiving terminal equipment receives the encrypted data and decrypts the original data through the dynamic coding table.
Further, the method for making the original coding table comprises the following steps:
step S101, obtaining an ASCII table or a base64 encoding table;
step S102, the ASCII table or the base64 encoding table is used as an original encoding table, or the ASCII table or the base64 encoding table is transformed by adopting a preset encoding rule to generate the original encoding table.
Further, the predetermined coding rule includes fixed-length coding, variable-length coding, or entropy coding.
Further, the method for making the original coding table comprises the following steps:
and generating a compression header of the data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table.
Further, the encoding table algorithm is a hash algorithm.
Further, in a Linux environment, adding an interface for acquiring a random number generated in an SSL handshake process in an OpenSSL library includes the following steps:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable in a state _ count.c file, and respectively storing a random number received in a tls _ process _ server _ hello function and a random number generated in the tls _ constraint _ client _ hello function in a corresponding position of the first global two-dimensional array variable;
step S303, defining a second global two-dimensional array variable in a state _ srvr.c file, and respectively storing a random number received in a tls _ process _ client _ hello function and a random number generated in the tls _ constraint _ server _ hello function in corresponding positions of the second global two-dimensional array variable;
step S304, using the first global two-dimensional array variable and the second global two-dimensional array variable as external interfaces in the rand.h file;
and step S305, compiling the modified source code to generate an OpenSSL library.
Further, the process of establishing https connection between the sending end device and the receiving end device through SSL handshake is as follows:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; and if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, and terminate the https connection.
Has the advantages that: in the invention, a predetermined algorithm is adopted to manufacture an original coding table, a self-defined algorithm is adopted to obtain a dynamic coding table according to the random number generated by the SSL protocol and the original coding table, and the dynamic coding table is adopted to encrypt original data to be transmitted or decrypt received encrypted data. Therefore, the purpose of dynamic encryption can be achieved, efficient encryption and decryption can be achieved, and the safety of data transmission is guaranteed. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the present invention;
fig. 2 is a flow chart of another preferred embodiment of the present invention.
Detailed Description
In order to make the technical solutions in the embodiments of the present invention better understood and make the above objects, features and advantages of the embodiments of the present invention more comprehensible, the technical solutions in the embodiments of the present invention are described in further detail below with reference to the accompanying drawings.
In the description of the present invention, unless otherwise specified and limited, it is to be noted that the term "connected" is to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, or a communication between two elements, or may be a direct connection or an indirect connection through an intermediate medium, and a specific meaning of the term may be understood by those skilled in the art according to specific situations.
Example 1
In this embodiment, a Linux system is adopted, and as shown in fig. 1, an embodiment of the https dynamic encryption transmission method of the present invention includes the following steps:
and step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively.
The manufacturing method of the original coding table comprises the following steps:
step S101, obtaining an ASCII table or a base64 encoding table;
step S102, the ASCII table or the base64 encoding table is used as an original encoding table, or the ASCII table or the base64 encoding table is transformed by adopting a preset encoding rule to generate the original encoding table. This embodiment is described by directly using the base64 encoding table as the original encoding table.
And step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm, so that the dynamic code tables generated each time are different. The encoding table algorithm needs to meet the related requirements of encryption and decryption, needs to consider the efficiency of encryption and decryption, and preferably adopts a hash algorithm to realize efficient encryption and decryption; for example, the customizable coding table algorithm is value ═ (num + rand)% 63. Num is a base64 encoding table sequence number value, rand is a numerical value generated according to a random number generated in the SSL handshake process (since the random number generated by OpenSSL is 32 bytes at most, for the sake of simplicity, only the last random number stored in the SSL handshake process can be taken, each byte of the random number is subjected to XOR, and a finally obtained byte is taken as rand, of course, other random numbers can be taken for calculation, or a plurality of random numbers are taken to increase the difficulty of decoding), and value is the finally obtained encoding table sequence number value.
Step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library; since the interface of the OpenSSL standard library does not provide a method for acquiring a random number, the source code of the OpenSSL standard library needs to be modified and recompiled in combination with the development environment. Taking an example of a method for modifying an OpenSSL library in a Linux environment as an example, adding an interface for acquiring a random number generated in an SSL handshake process includes the following steps:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable client _ random _ dat in a status _ client.c file, and appointing a random number received in a tls _ process _ server _ hello function to be stored in client _ random _ data [0], namely a server random number; appointing a random number generated in a tls _ constraint _ client _ hello function to be stored in client _ random _ data [1], namely a client random number;
step S303, defining a second global two-dimensional array variable server _ random _ data in a state _ srvr.c file, and appointing a random number received in a tls _ process _ client _ hello function to be stored in the server _ random _ data [0 ]; namely a client random number, and appointing a random number generated in a tls _ constract _ server _ hello function to be stored in a server _ random _ data [1], namely a server random number;
step S304, using a first global two-dimensional array variable client _ random _ dat and a second global two-dimensional array variable server _ random _ data as external interfaces in a random.h file;
and step S305, compiling the modified source code to generate a new OpenSSL library.
Step S4, the sending end device establishes https connection with the receiving end device, and the specific process is as follows:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, namely the values in the client _ random _ data and the server _ random _ data, and terminate https connection; the SSL handshake needs to be resumed if the https connection is to continue to be established.
Step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm; according to the encoding table algorithm in the embodiment, the process of generating the dynamic encoding table is as follows:
XOR is carried out on the first byte and the second byte of the stored random number, the value after XOR is carried out on the third byte, the value after XOR is carried out on the fourth byte, and the like, and finally the XOR value obtained finally is used as rand to generate a new base64 coding table, namely a dynamic coding table; since the random numbers generated during each SSL handshake are different, the dynamic encoding table obtained each time will be different.
And step S6, the sending end equipment generates encrypted data and sends the encrypted data out by using the dynamic coding table as a base64 coding table according to the base64 coding rule of the original data to be sent. Or the original coding table is used as a base64 coding table to generate data to be encrypted, and then the data to be encrypted are replaced one by one according to the dynamic coding table and sent out.
Step S7, the receiving end device receives the encrypted data, and restores the original data according to the dynamic encoding table and the base64 encoding rule.
In this embodiment, an original coding table is made by using a predetermined coding rule, a dynamic coding table is obtained by using a custom algorithm according to a random number generated by an SSL protocol and the original coding table, and the dynamic coding table is used to encrypt original data to be transmitted or decrypt received encrypted data. Therefore, the purpose of dynamic encryption can be achieved, efficient encryption and decryption can be achieved, and the safety of data transmission is guaranteed. Because the coding rule for making the original coding table and the algorithm for generating the dynamic coding table can be defined by self, the method has extremely high safety, can effectively protect the data transmitted by the user, prevents a fake trust user from stealing the data, does not need to adopt a private network for transmitting the data, and can be directly suitable for public networks such as the Internet of things.
Example 2
In this embodiment, a Linux system is adopted, and as shown in fig. 1, an embodiment of the https dynamic encryption transmission method of the present invention includes the following steps:
step S1', creating an original encoding table, and storing the original encoding table in the sending end device and the receiving end device, respectively.
The manufacturing method of the original coding table comprises the following steps:
generating a compression header of data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table; the huffman compression algorithm is described below as an example, but of course, other compression algorithms may be used. And generating a Huffman prefix code by using data to be transmitted according to a Huffman compression algorithm, wherein the Huffman prefix code and specific characters represented by the Huffman prefix code form a compression header, and the compression header is used as an original coding table.
And step S2', self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm, takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm, and makes the generated dynamic code table different each time. For example, the customizable encoding table algorithm is value ═ (data + rand1+ rand 2)% 127. Wherein, data is the specific value of the original encoding table, rand1 is the first byte of a certain designated random number (for example, the last random number stored in the SSL handshake process), rand2 is the second byte of the random number, and value is the value obtained after calculation; of course, the encoding table algorithm can also take several more random numbers and add more bytes to perform the calculation.
Step S3', adding an interface for acquiring a random number generated in the SSL handshake process in the OpenSSL library; the specific procedure was the same as in example 1.
Step S4', the sending end device and the receiving end device establish https connection, and the specific process is the same as in embodiment 1.
Step S5', the sending end device and the receiving end device adopt the coding table algorithm to generate the same dynamic coding table; since the random numbers generated during each SSL handshake are different, the dynamic encoding table obtained each time will be different.
Step S6', the sending end device generates compressed data (without a compressed header) from the original data to be sent by the huffman compression algorithm, and then sends the compressed header and the compressed data together.
And step S7', the receiving terminal equipment receives the encrypted data, reversely restores a compression header according to the dynamic coding table and the user-defined algorithm, and restores the original data according to the Huffman compression algorithm.
The undescribed parts of the present invention are consistent with the prior art, and are not described herein.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures made by using the contents of the present specification and the drawings can be directly or indirectly applied to other related technical fields, and are within the scope of the present invention.

Claims (7)

1. A https dynamic encryption transmission method is characterized by comprising the following steps:
step S1, making an original coding table, and storing the original coding table in the sending terminal device and the receiving terminal device respectively;
step S2, self-defining a code table algorithm, wherein the code table algorithm takes an original code table as a constant of the algorithm and takes a random number generated in at least one SSL handshake process as an independent variable of the algorithm;
step S3, adding an interface for acquiring random numbers generated in the SSL handshake process in the OpenSSL library;
step S4, the sending end device and the receiving end device establish https connection through SSL handshake;
step S5, the sending end device and the receiving end device generate the same dynamic coding table by adopting a coding table algorithm;
step S6, the sending end equipment recodes the original data according to the dynamic coding table, generates the encrypted data and sends out the encrypted data;
and step S7, the receiving terminal equipment receives the encrypted data and decrypts the original data through the dynamic coding table.
2. The https dynamic encryption transmission method according to claim 1, wherein the method for making the raw coding table includes the steps of:
step S101, obtaining an ASCI I table or a base64 encoding table;
step S102, using the ASCI I table or the base64 encoding table as an original encoding table, or transforming the ASCI I table or the base64 encoding table by using a predetermined encoding rule to generate the original encoding table.
3. The https dynamic encryption transmission method of claim 2, wherein the predetermined coding rule comprises fixed-length coding, variable-length coding, or entropy coding.
4. The https dynamic encryption transmission method according to claim 1, wherein the method for making the raw coding table includes the steps of:
and generating a compression header of the data to be transmitted according to a compression algorithm, and taking the compression header as an original coding table.
5. The https dynamic encryption transmission method of claim 1, wherein the coding table algorithm is a hash algorithm.
6. The https dynamic encryption transmission method according to claim 1, wherein in a Linux environment, adding an interface for obtaining a random number generated in an SSL handshake process in an OpenSSL library comprises the steps of:
step S301, downloading a source code OpenSSL-1.1.1d.tar.gz of an OpenSSL library in a Linux environment, and decompressing;
step S302, defining a first global two-dimensional array variable in a state _ count.c file, and respectively storing a random number received in a tls _ process _ server _ hello function and a random number generated in the tls _ constraint _ client _ hello function in a corresponding position of the first global two-dimensional array variable;
step S303, defining a second global two-dimensional array variable in a state _ srvr.c file, and respectively storing a random number received in a tls _ process _ client _ hello function and a random number generated in the tls _ constraint _ server _ hello function in corresponding positions of the second global two-dimensional array variable;
step S304, using the first global two-dimensional array variable and the second global two-dimensional array variable as external interfaces in the rand.h file;
and step S305, compiling the modified source code to generate an OpenSSL library.
7. The https dynamic encryption transmission method according to claim 1, wherein the process of establishing the https connection by the transmitting end device and the receiving end device through SSL handshake is:
the sending end device and the receiving end device perform SSL handshake, the sending end device and the receiving end device store random numbers generated in the SSL handshake process, if the handshake is successful, the sending end device and the receiving end device establish https connection, and step S5 is executed; and if the handshake fails, the sending end equipment and the receiving end equipment clear the random numbers generated in the SSL handshake process, and terminate the https connection.
CN202110097598.0A 2021-01-25 2021-01-25 Https dynamic encryption transmission method Pending CN112788051A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110097598.0A CN112788051A (en) 2021-01-25 2021-01-25 Https dynamic encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110097598.0A CN112788051A (en) 2021-01-25 2021-01-25 Https dynamic encryption transmission method

Publications (1)

Publication Number Publication Date
CN112788051A true CN112788051A (en) 2021-05-11

Family

ID=75759001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110097598.0A Pending CN112788051A (en) 2021-01-25 2021-01-25 Https dynamic encryption transmission method

Country Status (1)

Country Link
CN (1) CN112788051A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
CN103997759A (en) * 2014-05-28 2014-08-20 北京邮电大学 Data transmission method for wireless relay communication
KR101438312B1 (en) * 2013-03-20 2014-09-12 전북대학교산학협력단 Method of data encryption and encrypted data transmitter-receiver system using thereof
CN104393988A (en) * 2014-12-03 2015-03-04 浪潮(北京)电子信息产业有限公司 Reversible data encryption method and device
CN105100085A (en) * 2015-07-07 2015-11-25 浪潮通用软件有限公司 Information encryption and decryption methods and devices
CN107786338A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN108418684A (en) * 2018-03-09 2018-08-17 江苏科建教育软件有限责任公司 A kind of character string symmetric cryptography and decryption method
CN109413060A (en) * 2018-10-19 2019-03-01 深信服科技股份有限公司 Message processing method, device, equipment and storage medium
CN111490984A (en) * 2020-04-03 2020-08-04 上海宽创国际文化科技股份有限公司 Network data coding and encryption algorithm thereof
CN111818026A (en) * 2020-06-24 2020-10-23 杭州缥缈峰科技有限公司 Data encryption method and system for public network transmission
CN112230889A (en) * 2020-10-16 2021-01-15 湖南皖湘科技有限公司 Method for making software development coding specification

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904712A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method
KR101438312B1 (en) * 2013-03-20 2014-09-12 전북대학교산학협력단 Method of data encryption and encrypted data transmitter-receiver system using thereof
CN103997759A (en) * 2014-05-28 2014-08-20 北京邮电大学 Data transmission method for wireless relay communication
CN104393988A (en) * 2014-12-03 2015-03-04 浪潮(北京)电子信息产业有限公司 Reversible data encryption method and device
CN105100085A (en) * 2015-07-07 2015-11-25 浪潮通用软件有限公司 Information encryption and decryption methods and devices
CN107786338A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN108418684A (en) * 2018-03-09 2018-08-17 江苏科建教育软件有限责任公司 A kind of character string symmetric cryptography and decryption method
CN109413060A (en) * 2018-10-19 2019-03-01 深信服科技股份有限公司 Message processing method, device, equipment and storage medium
CN111490984A (en) * 2020-04-03 2020-08-04 上海宽创国际文化科技股份有限公司 Network data coding and encryption algorithm thereof
CN111818026A (en) * 2020-06-24 2020-10-23 杭州缥缈峰科技有限公司 Data encryption method and system for public network transmission
CN112230889A (en) * 2020-10-16 2021-01-15 湖南皖湘科技有限公司 Method for making software development coding specification

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ZEYAN LIU: "The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection", 《2020 IEEE 20TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 *
李明彩: "HTTPS文件服务器的搭建和应用", 《数字技术与应用》 *
韩宇贞: "基于Base64编码的数据加密技术", 《南昌水专学报》 *
高希然等: "HTTPS探析", 《信息记录材料》 *

Similar Documents

Publication Publication Date Title
KR102354456B1 (en) Post-quantum asymmetric key cryptosystem with one-to-many distributed key management based on prime modulo double encapsulation
EP1107504B1 (en) Method of updating encryption keys in a data communication system
US7221757B2 (en) Method and system for accelerated data encryption
US9172529B2 (en) Hybrid encryption schemes
US9608812B2 (en) Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program
KR102368749B1 (en) System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth
KR101737299B1 (en) Encoder, decoder and methods
CN114364062B (en) Method for safely accessing gateway of Internet of vehicles
CN112929166B (en) Master station, slave station and data transmission system based on Modbus-TCP protocol
Armanuzzaman et al. A secure and efficient data transmission technique using quantum key distribution
CN113221146B (en) Method and device for data transmission among block chain nodes
CN112073115A (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
US7213143B1 (en) Security over a network
CN116743505B (en) Safety transmission encryption method based on national secret
KR20110027560A (en) Secure communication of information over a wireless link
CN112188485A (en) Encryption and decryption method based on Bluetooth communication
CN112788051A (en) Https dynamic encryption transmission method
CN111800784A (en) Block chain cloud service system based on cloud computing
CN113596054B (en) Method for encrypting transmission soft frequency hopping between information systems
EP2571192A1 (en) Hybrid encryption schemes
WO2023070825A1 (en) Data processing method and device
Akhter et al. Bangla and English text cryptography based on modified blowfish and Lempel-Ziv-Welch algorithm to minimize execution time
US20100014670A1 (en) One-Way Hash Extension for Encrypted Communication
CN115473639B (en) Anti-quantum computing method and device based on Guomai technology
EP1529390B1 (en) Method and system for accelerated data encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210511

RJ01 Rejection of invention patent application after publication