CN113472780A - Data encryption transmission method for block chain - Google Patents
Data encryption transmission method for block chain Download PDFInfo
- Publication number
- CN113472780A CN113472780A CN202110735920.8A CN202110735920A CN113472780A CN 113472780 A CN113472780 A CN 113472780A CN 202110735920 A CN202110735920 A CN 202110735920A CN 113472780 A CN113472780 A CN 113472780A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- packet
- receiving end
- data encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000005540 biological transmission Effects 0.000 title claims abstract description 30
- 238000013478 data encryption standard Methods 0.000 claims description 6
- 238000005520 cutting process Methods 0.000 claims description 3
- 238000009826 distribution Methods 0.000 abstract description 12
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Abstract
The invention discloses a data encryption transmission method for a block chain, which comprises the following steps of preparing a flow before data encryption, generating a distribution end secret key by a data distribution end, transmitting a distribution end public key in the distribution end secret key to a data receiving end, generating a receiving end secret key by the data receiving end, encrypting the receiving end secret key through the distribution end public key to obtain a receiving end ciphertext packet, transmitting the receiving end ciphertext packet to the data distribution end, and decrypting the receiving end ciphertext packet through the distribution end public key by the data distribution end to obtain the receiving end secret key. According to the data encryption transmission method for the block chain, a key encryption mode is adopted, the situation that the key is stolen in the transmission process can be effectively avoided, the risk in the data transmission process is reduced, data can be obtained without multiple times of encryption, the data transmission rate is greatly improved, and convenience is brought to users.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data encryption transmission method for a block chain.
Background
In the prior art, a "block" in a block chain refers to an information block, and a specific information contained in the information block is a time stamp. The information blocks containing the time stamps are interconnected with each other, and the chain of information blocks formed is called a "block chain". The block chain is a distributed account book, and is a technical scheme for collectively maintaining a reliable database in a decentralized and information-removing mode.
The block chain technology is very important, and along with the application and development of the block chain technology, the digital encryption technology is key, data encryption refers to the fact that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, the method is the most reliable method for protecting information, the information hiding function can be achieved, the information safety is protected, the data transmission encryption technology aims at encrypting data streams in transmission and preventing data in a storage link from being lost, the data encryption technology comprises symmetric encryption, but the symmetric encryption has the problem that the data can be stolen in a key transmission process, and the risk is high; and when the data is encrypted, the data needs to be encrypted for many times, and the data transmission rate is low, which brings inconvenience to users.
Disclosure of Invention
The present invention is directed to a method for encrypted data transmission of a block chain, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a data encryption transmission method for a blockchain, the method comprising the steps of:
s1, preparing before data encryption;
s101, a data issuing end generates an issuing end key and sends an issuing end public key in the issuing end key to a data receiving end;
s102, a data receiving end generates a receiving end secret key, encrypts the receiving end secret key through a public key of a releasing end to obtain a receiving end ciphertext packet, and then sends the receiving end ciphertext packet to the data releasing end;
s103, the data issuing end decrypts the receiving end ciphertext packet through the issuing end public key to obtain a receiving end secret key;
s104, the data issuing end encrypts a private key of the issuing end through a receiving end secret key to obtain an issuing end ciphertext packet, and sends the issuing end ciphertext packet to the data receiving end;
s105, the data receiving end decrypts the ciphertext packet of the issuing end through the receiving end secret key to obtain a private key of the issuing end;
s2, data encryption process;
and S3, data decryption process.
Preferably, the data encryption process for preventing data from being decrypted includes the following steps:
s201, cutting data to be transmitted into first data and second data, and encrypting the first data and the second data through a key of a release end to obtain a first data encryption package and a second data encryption package;
s202, the data issuing end sends encryption requests of a first data encryption packet and a second data encryption packet to a cloud server, the cloud server carries out secondary encryption on the first data encryption packet and the second data encryption packet respectively by adopting an independent encryption and decryption algorithm, and two hash values matched with the first data encryption packet and the second data encryption packet, the first data encryption packet and the second data encryption packet after secondary encryption are obtained;
s203, the data issuing end sends the two hash values matched with the first data encryption packet and the second data encryption packet, and the first data encryption packet and the second data encryption packet which are subjected to secondary encryption to the data receiving end.
Preferably, the data decryption process for decrypting data includes:
s301, the data receiving end finds out an encryption and decryption algorithm corresponding to the two hash values respectively matched with the first data encryption packet and the second data encryption packet;
s302, the data receiving end decrypts the first data encryption packet and the second data encryption packet through a corresponding second encryption and decryption algorithm, and then the data receiving end decrypts the first data encryption packet and the second data encryption packet again by using the key of the issuing end of the data issuing end;
and S303, merging the decrypted first data and the decrypted second data to obtain the data.
Preferably, the encryption and decryption algorithm for the second encryption and decryption includes any one of a data encryption standard algorithm, a third data encryption standard algorithm, an advanced encryption standard algorithm, an RSA public key algorithm, a digital signature algorithm, an elliptic curve cryptography algorithm, a message digest algorithm, a secure hash algorithm, and an asymmetric ECC encryption algorithm.
The invention has the technical effects and advantages that: the data encryption transmission method for the block chain has the advantages that due to the arrangement of the receiving end ciphertext package, the issuing end ciphertext package, the data encryption package I and the data encryption package II, the receiving end secret key is encrypted through the issuing end public key to obtain the receiving end ciphertext package, then the data issuing end encrypts the issuing end private key through the receiving end secret key to obtain the issuing end ciphertext package, and further exchange of the issuing end secret key and the receiving end secret key is completed, so that the receiving end decrypts the data encryption package I and the data encryption package II through the issuing end secret key, the situation that the secret key is stolen in the transmission process is avoided, and the risk in the data transmission process is reduced;
benefiting from the arrangement of the first data encryption package, the second data encryption package and the cloud server, after the data divided into two parts are encrypted through the key at the release end, the first data encryption package and the second data encryption package are obtained, secondary encryption is carried out on the two data encryption packages through the cloud server, the two hash values obtained through encryption and the first data encryption package and the second data encryption package which are obtained through secondary encryption are received by the data receiving end and are decrypted, then the decrypted first data and the decrypted second data are combined, the data can be obtained, multiple encryption is not needed, the data can be obtained, the data transmission rate is greatly improved, and convenience is brought to users.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to avoid the situation that a secret key is stolen in the transmission process so as to reduce the risk in the data transmission process, the invention provides a data encryption transmission method for a block chain, which is carried out by the following steps:
s1, preparing before data encryption;
s101, a data issuing end generates an issuing end key and sends an issuing end public key in the issuing end key to a data receiving end;
s102, a data receiving end generates a receiving end secret key, encrypts the receiving end secret key through a public key of a releasing end to obtain a receiving end ciphertext packet, and then sends the receiving end ciphertext packet to the data releasing end;
s103, the data issuing end decrypts the receiving end ciphertext packet through the issuing end public key to obtain a receiving end secret key;
s104, the data issuing end encrypts a private key of the issuing end through a receiving end secret key to obtain an issuing end ciphertext packet, and sends the issuing end ciphertext packet to the data receiving end;
s105, the data receiving end decrypts the ciphertext packet of the issuing end through the receiving end secret key to obtain a private key of the issuing end;
s2, data encryption process;
s3, data decryption process;
the data transmission method comprises the steps of S101, S102, S103, S104 and S105, which are data pre-encryption preparation processes and are used for completing exchange of a release end secret key and a receiving end secret key between a data distribution end and a data receiving end, the data receiving end encrypts the receiving end secret key through a release end public key to obtain a receiving end cryptograph packet and sends the receiving end cryptograph packet to the data distribution end, the data distribution end decrypts the receiving end cryptograph packet through the release end public key to obtain a receiving end secret key, and then encrypts a release end private key through the receiving end secret key to obtain a release end cryptograph packet and sends the release end cryptograph packet to the data receiving end, so that exchange of the release end secret key and the receiving end secret key between the data distribution end and the data receiving end is completed, the situation that the secret key is stolen in the transmission process is effectively avoided, and the risk in the data transmission process is reduced.
In order to reduce the number of data encryption and improve the data transmission rate, the invention provides a data encryption transmission method for a block chain, and the data encryption flow for preventing data from being decrypted comprises the following steps:
s201, cutting data to be transmitted into first data and second data, and encrypting the first data and the second data through a key of a release end to obtain a first data encryption package and a second data encryption package;
s202, the data issuing end sends encryption requests of a first data encryption packet and a second data encryption packet to a cloud server, the cloud server carries out secondary encryption on the first data encryption packet and the second data encryption packet respectively by adopting an independent encryption and decryption algorithm, and two hash values matched with the first data encryption packet and the second data encryption packet, the first data encryption packet and the second data encryption packet after secondary encryption are obtained;
s203, the data issuing end sends the two hash values matched with the first data encryption packet and the second data encryption packet, and the first data encryption packet and the second data encryption packet which are subjected to secondary encryption to the data receiving end;
preferably, the data decryption process for decrypting data includes:
s301, the data receiving end finds out an encryption and decryption algorithm corresponding to the two hash values respectively matched with the first data encryption packet and the second data encryption packet;
s302, the data receiving end decrypts the first data encryption packet and the second data encryption packet through a corresponding second encryption and decryption algorithm, and then the data receiving end decrypts the first data encryption packet and the second data encryption packet again by using the key of the issuing end of the data issuing end;
and S303, merging the decrypted first data and the decrypted second data to obtain the data.
The encryption and decryption algorithm for the second encryption and decryption comprises any one of a data encryption standard algorithm, a third-time data encryption standard algorithm, an advanced encryption standard algorithm, an RSA public key algorithm, a digital signature algorithm, an elliptic curve cryptography algorithm, a message digest algorithm, a secure hash algorithm and an asymmetric ECC encryption algorithm.
The data encryption method comprises the steps of S201, S202 and S203, wherein the data issuing end is used for preventing data from being decrypted, the steps of S301, S302 and S303 are used for decrypting the data at the data receiving end, the data divided into two parts are encrypted through the key at the issuing end to obtain a first data encryption package and a second data encryption package, the first data encryption package and the second data encryption package are encrypted through the cloud server for the second time, the two hash values obtained through encryption and the first data encryption package and the second data encryption package which are encrypted for the second time are received by the data receiving end and are decrypted, the decrypted first data and the decrypted second data are combined to obtain the data, multiple encryption is not needed, the data can be obtained, the data transmission rate is greatly improved, and convenience is brought to users.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.
Claims (4)
1. A data encryption transmission method for a blockchain, the method comprising the steps of:
s1, preparing before data encryption;
s101, a data issuing end generates an issuing end key and sends an issuing end public key in the issuing end key to a data receiving end;
s102, a data receiving end generates a receiving end secret key, encrypts the receiving end secret key through a public key of a releasing end to obtain a receiving end ciphertext packet, and then sends the receiving end ciphertext packet to the data releasing end;
s103, the data issuing end decrypts the receiving end ciphertext packet through the issuing end public key to obtain a receiving end secret key;
s104, the data issuing end encrypts a private key of the issuing end through a receiving end secret key to obtain an issuing end ciphertext packet, and sends the issuing end ciphertext packet to the data receiving end;
s105, the data receiving end decrypts the ciphertext packet of the issuing end through the receiving end secret key to obtain a private key of the issuing end;
s2, data encryption process;
and S3, data decryption process.
2. The method for encrypted data transmission of the blockchain according to claim 1, wherein the data encryption process for preventing data from being decrypted comprises the following steps:
s201, cutting data to be transmitted into first data and second data, and encrypting the first data and the second data through a key of a release end to obtain a first data encryption package and a second data encryption package;
s202, the data issuing end sends encryption requests of a first data encryption packet and a second data encryption packet to a cloud server, the cloud server carries out secondary encryption on the first data encryption packet and the second data encryption packet respectively by adopting an independent encryption and decryption algorithm, and two hash values matched with the first data encryption packet and the second data encryption packet, the first data encryption packet and the second data encryption packet after secondary encryption are obtained;
s203, the data issuing end sends the two hash values matched with the first data encryption packet and the second data encryption packet, and the first data encryption packet and the second data encryption packet which are subjected to secondary encryption to the data receiving end.
3. The method according to claim 2, wherein the data decryption process for decrypting data comprises:
s301, the data receiving end finds out an encryption and decryption algorithm corresponding to the two hash values respectively matched with the first data encryption packet and the second data encryption packet;
s302, the data receiving end decrypts the first data encryption packet and the second data encryption packet through a corresponding second encryption and decryption algorithm, and then the data receiving end decrypts the first data encryption packet and the second data encryption packet again by using the key of the issuing end of the data issuing end;
and S303, merging the decrypted first data and the decrypted second data to obtain the data.
4. A data encryption transmission method for block chains according to claim 3, characterized in that: the encryption and decryption algorithm for the second encryption and decryption comprises any one of a data encryption standard algorithm, a third-time data encryption standard algorithm, an advanced encryption standard algorithm, an RSA public key algorithm, a digital signature algorithm, an elliptic curve cryptography algorithm, a message digest algorithm, a secure hash algorithm and an asymmetric ECC encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110735920.8A CN113472780A (en) | 2021-06-30 | 2021-06-30 | Data encryption transmission method for block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110735920.8A CN113472780A (en) | 2021-06-30 | 2021-06-30 | Data encryption transmission method for block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113472780A true CN113472780A (en) | 2021-10-01 |
Family
ID=77876403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110735920.8A Pending CN113472780A (en) | 2021-06-30 | 2021-06-30 | Data encryption transmission method for block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113472780A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640590A (en) * | 2009-05-26 | 2010-02-03 | 深圳市安捷信联科技有限公司 | Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof |
CN107040536A (en) * | 2017-04-10 | 2017-08-11 | 北京德威特继保自动化科技股份有限公司 | Data ciphering method, device and system |
US20180232526A1 (en) * | 2011-10-31 | 2018-08-16 | Seed Protocol, LLC | System and method for securely storing and sharing information |
CN108768930A (en) * | 2018-04-09 | 2018-11-06 | 华北水利水电大学 | A kind of encrypted transmission method of data |
CN109565440A (en) * | 2016-09-01 | 2019-04-02 | 日本电信电话株式会社 | Key exchange method, cipher key exchange system |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110120927A (en) * | 2018-02-05 | 2019-08-13 | 华为技术有限公司 | The method and apparatus that private key generates |
CN111030821A (en) * | 2019-08-27 | 2020-04-17 | 杭州云象网络技术有限公司 | Alliance chain encryption method based on bilinear mapping technology |
CN111371731A (en) * | 2018-12-26 | 2020-07-03 | 广州才捷信息科技有限公司 | Encryption transmission method based on block chain |
CN111988281A (en) * | 2020-07-27 | 2020-11-24 | 安徽科技学院 | Block chain encryption method based on quantum communication |
-
2021
- 2021-06-30 CN CN202110735920.8A patent/CN113472780A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101640590A (en) * | 2009-05-26 | 2010-02-03 | 深圳市安捷信联科技有限公司 | Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof |
US20180232526A1 (en) * | 2011-10-31 | 2018-08-16 | Seed Protocol, LLC | System and method for securely storing and sharing information |
CN109565440A (en) * | 2016-09-01 | 2019-04-02 | 日本电信电话株式会社 | Key exchange method, cipher key exchange system |
CN107040536A (en) * | 2017-04-10 | 2017-08-11 | 北京德威特继保自动化科技股份有限公司 | Data ciphering method, device and system |
CN110120927A (en) * | 2018-02-05 | 2019-08-13 | 华为技术有限公司 | The method and apparatus that private key generates |
CN108768930A (en) * | 2018-04-09 | 2018-11-06 | 华北水利水电大学 | A kind of encrypted transmission method of data |
CN111371731A (en) * | 2018-12-26 | 2020-07-03 | 广州才捷信息科技有限公司 | Encryption transmission method based on block chain |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN111030821A (en) * | 2019-08-27 | 2020-04-17 | 杭州云象网络技术有限公司 | Alliance chain encryption method based on bilinear mapping technology |
CN111988281A (en) * | 2020-07-27 | 2020-11-24 | 安徽科技学院 | Block chain encryption method based on quantum communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768930A (en) | A kind of encrypted transmission method of data | |
CN101115060B (en) | Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system | |
CN103684794A (en) | Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms | |
JPH08234658A (en) | Method for generation of encoding key | |
CN101340443A (en) | Session key negotiating method, system and server in communication network | |
CN103716157A (en) | Grouped multiple-key encryption method and grouped multiple-key encryption device | |
CN110889696A (en) | Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology | |
CN109586908A (en) | A kind of safe packet transmission method and its system | |
CN102469173A (en) | IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm | |
CN113872760A (en) | SM9 key infrastructure and security system | |
CN109039598A (en) | Data transfer encryption method, client and server-side | |
CN109040109B (en) | Data transaction method and system based on key management mechanism | |
CN102271043B (en) | Data transmission protection method | |
CN109857421A (en) | The encryption upgrade method and system of embedded device | |
CN112565285B (en) | Communication encryption method suitable for rail transit | |
CN107659405B (en) | The encrypting and decrypting method of data communication between a kind of substation boss station | |
CN101964039B (en) | Encryption protection method and system of copyright object | |
US20230153445A1 (en) | Enhanced security systems and methods using a hybrid security solution | |
CN113472780A (en) | Data encryption transmission method for block chain | |
CN113852466B (en) | User revocation method based on SM9 of China | |
CN206602532U (en) | A kind of system that communication is encrypted | |
CN109726583A (en) | Cloud data base encryption server system | |
CN104579645A (en) | Secret key updating method based on AES encryption system | |
CN113472539A (en) | Method for carrying out national encryption by using RDMA R _ Key | |
CN110365482B (en) | Data communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211001 |