CN113726752A - Encryption method for network security - Google Patents
Encryption method for network security Download PDFInfo
- Publication number
- CN113726752A CN113726752A CN202110955629.1A CN202110955629A CN113726752A CN 113726752 A CN113726752 A CN 113726752A CN 202110955629 A CN202110955629 A CN 202110955629A CN 113726752 A CN113726752 A CN 113726752A
- Authority
- CN
- China
- Prior art keywords
- encryption
- key
- rsa
- network
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 238000004422 calculation algorithm Methods 0.000 claims description 63
- 230000000739 chaotic effect Effects 0.000 claims description 10
- 238000004458 analytical method Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 5
- 230000008569 process Effects 0.000 claims description 5
- 241000700605 Viruses Species 0.000 claims description 4
- 238000013528 artificial neural network Methods 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims description 4
- 230000004927 fusion Effects 0.000 claims description 4
- 230000001681 protective effect Effects 0.000 claims description 4
- 238000002955 isolation Methods 0.000 description 8
- 238000005336 cracking Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000007797 corrosion Effects 0.000 description 1
- 238000005260 corrosion Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000036186 satiety Effects 0.000 description 1
- 235000019627 satiety Nutrition 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The invention provides an encryption method for network security, and relates to the technical field of network security. S1, area division: dividing the network according to different attributes and actions, encrypting a single area, and S2, protecting the network boundary: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented. The large environment of the whole network is divided into different small environments in an area, and each small environment boundary is protected, on one hand, the encryption degree can be improved, on the other hand, the encryption can be finely divided, the encryption is encrypted according to different levels and is more meticulous, the internal secret key can be ensured to be safer through RSA and SM encryption, the secret key is difficult to crack and infect by a general program, the secret key can be ensured to be in a relatively safe environment state in the transmission process, and after the secret key is received, the secret key is cracked through corresponding hardware and software, and comparison is carried out, so that the safety of a file is ensured.
Description
Technical Field
The invention relates to the technical field of network security, in particular to an encryption method for network security.
Background
Network security refers to the protection of the hardware, software and data in the system of the network system, which is not destroyed, altered, and leaked due to accidental or malicious reasons, the system operates continuously, reliably and normally, the network service is not interrupted, the computer network and the system must have the ability to protect the security of sensitive information to ensure the reliability and confidentiality of the system and the network, a common method for protecting sensitive information is encryption, and many types of cryptographic algorithms can be used in various different situations at present.
In the existing technology for solving network security, there still exists a problem, different encryption security algorithms exist among various company departments, and are integrated in respective software modules before, so that there exist repeated development and quality difference to a great extent, the coupling degree with application software is very high, and the security degree is different, the existing common encryption transmission method has some drawbacks of different degrees, the existing common security gatekeeper is used for realizing the transportation of high and low security areas of data, and the security isolation gatekeeper, also known as a gatekeeper and a physical isolation gatekeeper, is used for realizing the security isolation among networks with different security levels and providing a software and hardware system with moderately controllable data exchange, but the security isolation gatekeeper has the defects of high cost, troublesome deployment and the like.
Therefore, there is a need for a method to perform information security real-time encryption and decryption under a defense-in-depth policy with minimal processing power to help protect the system from network attacks.
Disclosure of Invention
The invention aims to provide an encryption method for network security. And (4) passing.
In order to realize the problems of low satiety rate and slow growth, the invention provides the following technical scheme: an encryption method for network security, comprising the following steps:
step one, area division: the network is divided according to different attributes and actions, and the single area is encrypted.
Step two, network boundary protection: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented.
Step three, RSA transmission: and carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission.
Step four, safety intrusion detection: and the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process.
Step five, SM encryption: the RSA encrypted key is again encrypted with the SM algorithm.
Step six, algorithm analysis: and performing RSA analysis on the accessed key to ensure the correctness of the key.
Step seven, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
Further, a safe running environment is created for the terminal computer through a white list mechanism in the step one, and illegal processes and application programs in the safe running environment cannot pass safety check, so that viruses, trojans and malicious software are prevented from being outside the terminal running environment.
Furthermore, in the first step, the formed safe operation environment is finely divided according to the belonged property, the using direction, the confidentiality degree and the like, so that a plurality of independent unidirectional small environments are formed inside the safe operation environment, and the different small environments have a single initial value.
Further, in the second step, security protection is performed on a network boundary between small environments in the operating environment, so that series connection between the network and fusion and circulation of information at different levels are avoided, and logical isolation security protection is performed between the operating environment and the external internet through protection devices such as an industrial firewall and a gateway.
Further, in the third step, the small environment is selectively used according to the level of secrecy required, and the RSA public key cryptosystem is a cryptosystem that uses different encryption keys and decryption keys, and it is computationally infeasible to derive the decryption keys from the known encryption keys.
Further, the RSA principle in the fourth step is that it is relatively simple to seek two large prime numbers according to number theory, and factoring the product of the two large prime numbers is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection can be performed on the formed RSA key, so as to prevent attack of malicious codes and cause key leakage.
Further, the SM algorithm in the fifth step is a more advanced and safer algorithm, specifically, an elliptic curve public key cryptographic algorithm, the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and the chaotic noise vector is encrypted again by the elliptic curve public key cryptographic algorithm SM, which includes SM2, SM3, SM4, and the like.
Further, in the fifth step, an SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using hardware encryption equipment, for example, an encrypted file can only be decrypted by a specified smart key UKey.
Further, after the receiving device in the sixth step confirms that the decryption password is correct, the second group of initial values corresponding to the data are decrypted through the SM, the data are decrypted by the chaotic neural network through the decrypted second group of initial values, and after the SM algorithm is decrypted, the internal RSA algorithm is decrypted through the algorithm to obtain the internal secret key.
And further, the verification is carried out through the dynamic password in the seventh step, and after the authentication system is entered, the access party key and the income party key are compared to ensure the integrity of the keys.
The invention provides an encryption method for network security, which has the following beneficial effects: the large environment of the whole network is divided into different small environments in an area, and each small environment boundary is protected, on one hand, the encryption degree can be improved, on the other hand, the encryption can be finely divided, the encryption is encrypted according to different levels and is more meticulous, the internal secret key can be ensured to be safer through RSA and SM encryption, the secret key is difficult to crack and infect by a general program, the secret key can be ensured to be in a relatively safe environment state in the transmission process, and after the secret key is received, the secret key is cracked through corresponding hardware and software, and comparison is carried out, so that the safety of a file is ensured.
Drawings
Fig. 1 is a flowchart of an encryption method for network security according to the present invention.
Detailed Description
Referring to fig. 1, the present invention provides a technical solution: an encryption method for network security, comprising the following steps:
step one, area division: the network is divided according to different attributes and actions, and the single area is encrypted.
Step two, network boundary protection: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented.
Step three, RSA transmission: and carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission.
Step four, safety intrusion detection: and the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process.
Step five, SM encryption: the RSA encrypted key is again encrypted with the SM algorithm.
Step six, algorithm analysis: and performing RSA analysis on the accessed key to ensure the correctness of the key.
Step seven, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
Specifically, a safe operation environment is created for the terminal computer through a white list mechanism in the step one, and illegal processes and application programs in the safe operation environment cannot pass safety inspection, so that viruses, trojans and malicious software are prevented from being outside the terminal operation environment.
Specifically, in the step one, the formed safe operation environment is finely divided according to the belonged property, the use direction, the confidentiality degree and the like, so that a plurality of independent unidirectional small environments are formed inside the safe operation environment, and different small environments have single initial values.
Specifically, in the second step, security protection is performed on the network boundary between the small environments in the operating environment, so that series connection between the network and fusion and circulation of information at different levels are avoided, and logical isolation security protection is performed between the operating environment and the external internet through protective equipment such as an industrial firewall and a gatekeeper.
Specifically, in step three, the microenvironment is selectively used according to the level of privacy required, and the RSA public key cryptosystem is a cryptosystem that uses different encryption keys and decryption keys, and the derivation of the decryption key from a known encryption key is computationally infeasible.
Specifically, the RSA principle in step four is that it is relatively simple to seek two large prime numbers according to number theory, and factorize the product of them is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection is performed on the formed RSA key, so as to prevent attack of malicious code, and thus cause key leakage.
Specifically, the SM algorithm in the fifth step is a more advanced and safer algorithm, specifically, an elliptic curve public key cryptographic algorithm, the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and the chaotic noise vector is encrypted again by the elliptic curve public key cryptographic algorithm SM, including SM2, SM3, SM4, and the like.
Specifically, in the fifth step, the SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using hardware encryption equipment, for example, the encrypted file can only be decrypted by the specified intelligent encryption key UKey.
Specifically, after the receiving device confirms that the decryption password is correct in the sixth step, the second group of initial values corresponding to the data are decrypted through the SM, the data are decrypted by the chaotic neural network through the decrypted second group of initial values, and after the SM algorithm is cracked, the internal RSA algorithm is cracked through the algorithm to obtain the internal secret key.
Specifically, the verification is performed through the dynamic password in the step seven, and after the authentication system is entered, the access party key and the income party key are compared to ensure the integrity of the keys.
The method of the examples was performed for detection analysis and compared to the prior art to yield the following data:
degree of encryption | Difficulty of cracking | |
Examples | Height of | Is difficult to |
Prior Art | Bottom | Is easier to be |
According to the table data, when the embodiment is used, the double encryption of the RSA algorithm and the SM algorithm can ensure the safety of the internal key data and is not easy to crack, and the adaptive encryption network environment has one-way independence, so that the encryption safety factor is improved.
The invention provides an encryption method for network security, which comprises the following steps: step one, area division: dividing a network according to different attributes and actions, encrypting a single region, creating a safe operating environment for a terminal computer through a white list mechanism, wherein illegal processes and application programs in the safe operating environment cannot pass safety check to ensure that viruses, trojans and malicious software are blocked outside the terminal operating environment, finely dividing the formed safe operating environment according to the belonged property, the using direction, the required confidentiality and the like to form independent unidirectional multi-small environments in the safe operating environment, wherein different small environments have single initial values, different files have different encryption requirements and different encryption requirements, all the encryption requirements are different, placing all the encryptions in the same large environment easily causes data confusion, and possibly generating influences between data and data, so that the used safe environment is protected, opening up independent microenvironment, carrying out corresponding encryption to different files, can guarantee the independence between file and the file, simultaneously, improve the secret nature of encryption, step two, network boundary protection: the method comprises the steps of carrying out safety protection on boundaries between networks after division and encryption to prevent network tandem connection influence, carrying out safety protection on network boundaries between small environments in an operating environment to avoid series connection between the networks and fusion and circulation of information of different levels, carrying out logic isolation safety protection between the operating environment and the external Internet through protective equipment such as an industrial firewall, a gatekeeper and the like, carrying out logic isolation safety protection on encryption equipment through protective equipment such as a firewall, a gatekeeper and the like to avoid introducing an encryption program into safety risks in the using process, deploying safety protection equipment at the boundaries of the network and an office network in the encryption safety operating environment to avoid introducing the safety risks of the office network into the encryption safety operating environment, ensuring that the safety risks of the Internet are not introduced into the encryption safety operating environment of an industrial control network, carrying out safety region division and boundary protection on the internal small environments according to the level importance and the service requirements of regions, and step three, RSA transmission: the transmitted key is RSA encrypted and transmitted in one way, the microenvironment is selectively used according to the required security level, the RSA public key cryptosystem is a cryptosystem that uses different encryption and decryption keys, it is computationally infeasible to derive a decryption key from a known encryption key, the RSA algorithm is designed based on the large integer factorization mathematical puzzle (IFP), the mathematical principle is relatively simple, the implementation is relatively easy in engineering application, but the unit safety intensity is relatively low, the difficulty of factoring large integers determines the reliability of the RSA algorithm, and with the improvement of the computing speed of a computer and the development of distributed computing and the improvement of a factoring method, the key cracking of low-digit numbers is possible, the method is used for files with relative secret degrees and the like, and the method comprises the following steps of: the secret key after RSA encryption is detected and protected, bad programs are prevented from being added in the transmission process, the RSA principle is that two large prime numbers are found according to number theory and are simpler, factorization of the product of the two large prime numbers is extremely difficult, therefore, the product can be used as an encryption secret key in a public mode, further external strengthening protection is carried out on the RSA secret key formed by the product, attack of malicious codes is prevented, the secret key is leaked, files encrypted by the RSA are further protected, the corrosion of the malicious codes in the transmission process is mainly avoided, step five, SM encryption: the secret key encrypted by the RSA is encrypted again, the SM algorithm is a more advanced and safe algorithm, in particular to an elliptic curve public key cryptographic algorithm, the secret key encrypted by the RSA is transmitted to a first function to generate a chaotic noise vector, and is encrypted again by the elliptic curve public key cryptographic algorithm SM, the SM algorithm comprises SM2, SM3, SM4 and the like, an SM digital certificate is used for carrying out SM asymmetric encryption, the obtained secret key needs to be decrypted by hardware encryption equipment, for example, an encrypted file can only be decrypted by a specified intelligent cipher key UKey, the SM2 algorithm and the RSA algorithm belong to public key encryption algorithms, but the SM2 algorithm and the RSA algorithm are respectively based on different mathematical theory bases, compared with the RSA algorithm, the SM2 algorithm has the characteristics of strong attack resistance, less CPU occupation, less content use, low network consumption, high encryption speed and the like, the SM2 algorithm is independently developed and designed based on the ECC elliptic curve cryptographic theory, and the digital signature algorithm, The key exchange protocol and the public key encryption algorithm are different from international algorithms such as ECDSA, ECDH and the like in terms of digital signature and key exchange, but a safer mechanism is adopted, the calculation amount and complexity are improved, in terms of digital signature and key exchange, generation and verification of message authentication codes, generation and verification of random numbers and the like, an SM3 cryptographic hash algorithm and a random number generator approved by the State and Home encryption administration are used, the SM3 hash algorithm is an autonomously designed cryptographic hash algorithm, the security is higher than that of an MD5 algorithm (128 bits) and an SHA-1 algorithm (160 bits), a compression function of the SM3 algorithm has a similar structure with SHA-256, but the design is more complicated, the SM4 block cipher algorithm is an autonomously designed block symmetric cipher algorithm, has the same key length with the AES algorithm, is higher than that of a 3DES, in practical application, various attack methods aiming at the block cipher algorithm can be resisted, and the sixth step is algorithm analysis: performing RSA analysis on the accessed key to ensure the correctness of the key, after the receiving equipment confirms that the decrypted password is correct, decrypting a second group of initial values corresponding to the data through SM2, decrypting the data of the chaotic neural network by using the decrypted second group of initial values, and after the SM2 algorithm is cracked, cracking the internal RSA algorithm through the algorithm to obtain the internal key, and the seventh step of comparing and checking the messages: the access side and the receiving side are compared to ensure the integrity of encryption, the dynamic password is used for verification, after the dynamic password enters a verification system, the access side key and the receiving side key are compared to ensure the integrity of the keys, the two keys are compared to ensure the uniformity, and the safety factor is improved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. An encryption method for network security is characterized by comprising the following steps:
s1, area division: dividing the network according to different attributes and actions, and encrypting a single area;
s2, network boundary protection: the boundary between the networks after the division and encryption is protected safely, and the influence of network concatenation is prevented;
s3, RSA transmission: carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission;
s4, security intrusion detection: the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process;
s5, SM encryption: carrying out SM algorithm encryption on the RSA encrypted key again;
s6, algorithm analysis: performing RSA analysis on the accessed secret key to ensure the correctness of the secret key;
s7, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
2. The encryption method according to claim 1, wherein in step S1, a secure operating environment is created for the terminal computer through a white list mechanism, and illegal processes and applications in the secure operating environment cannot pass security check, so as to ensure that viruses, trojans and malware are blocked outside the terminal operating environment.
3. The encryption method according to claim 1, wherein in step S1, the formed secure operating environment is finely divided according to the property, the using direction, and the degree of secrecy required, so that a plurality of unidirectional small environments are formed inside the secure operating environment, and the different small environments have a single initial value.
4. The encryption method for network security according to claim 1, wherein in step S2, the network boundary between the small environments in the operating environment is secured to avoid concatenation between networks and fusion circulation of different levels of information, and the operating environment and the external internet are secured logically isolated by a pair of protective devices such as an industrial firewall and a gatekeeper.
5. The encryption method according to claim 1, wherein the selective use of the small environment according to the required security level in step S3 is a cryptosystem that uses different encryption and decryption keys, and the RSA public key cryptosystem is a cryptosystem in which it is computationally infeasible to derive the decryption key from a known encryption key.
6. The encryption method for network security according to claim 1, wherein the RSA principle in step S4 is that it is relatively simple to find two large prime numbers according to number theory, and factorize the product of them is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection can be performed on the formed RSA key to prevent attack of malicious code, so as to cause key leakage.
7. The encryption method according to claim 1, wherein the SM algorithm in step S5 is a more advanced security algorithm, specifically an elliptic curve public key cryptography algorithm, and the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and is encrypted again by the elliptic curve public key cryptography algorithm SM, which includes SM2, SM3, SM4, and so on.
8. The encryption method for network security according to claim 1, wherein in step S5, the SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using a hardware encryption device, for example, the encrypted file can only be decrypted by a specified key.
9. The encryption method for network security according to claim 1, wherein the receiving device decrypts the second set of initial values corresponding to the data through the SM after confirming that the decryption password is correct in step S6, decrypts the data of the chaotic neural network by using the decrypted second set of initial values, and obtains the internal key by decrypting the internal RSA algorithm through the algorithm after decrypting the SM algorithm.
10. The encryption method according to claim 1, wherein the authentication is performed by dynamic password in step S7, and after entering the authentication system, the access party key is compared with the income party key to ensure the integrity of the keys.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110955629.1A CN113726752A (en) | 2021-08-19 | 2021-08-19 | Encryption method for network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110955629.1A CN113726752A (en) | 2021-08-19 | 2021-08-19 | Encryption method for network security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113726752A true CN113726752A (en) | 2021-11-30 |
Family
ID=78676916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110955629.1A Pending CN113726752A (en) | 2021-08-19 | 2021-08-19 | Encryption method for network security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113726752A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580859A (en) * | 2013-11-11 | 2014-02-12 | 国家电网公司 | Asymmetric encryption method for intelligent electricity using interaction |
CN103716166A (en) * | 2013-12-27 | 2014-04-09 | 哈尔滨工业大学深圳研究生院 | Self-adaptation hybrid encryption method and device and encryption communication system |
CN105099672A (en) * | 2015-08-04 | 2015-11-25 | 东南大学 | Hybrid encryption method and device for realizing the same |
CN108063751A (en) * | 2017-10-20 | 2018-05-22 | 国网宁夏电力有限公司 | A kind of public network safety access method for new energy power plant |
US20200099508A1 (en) * | 2016-12-21 | 2020-03-26 | University Of Hawaii | Hybrid encryption for cyber security of control systems |
CN111464304A (en) * | 2019-01-18 | 2020-07-28 | 江苏实达迪美数据处理有限公司 | Hybrid encryption method and system for controlling system network security |
-
2021
- 2021-08-19 CN CN202110955629.1A patent/CN113726752A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580859A (en) * | 2013-11-11 | 2014-02-12 | 国家电网公司 | Asymmetric encryption method for intelligent electricity using interaction |
CN103716166A (en) * | 2013-12-27 | 2014-04-09 | 哈尔滨工业大学深圳研究生院 | Self-adaptation hybrid encryption method and device and encryption communication system |
CN105099672A (en) * | 2015-08-04 | 2015-11-25 | 东南大学 | Hybrid encryption method and device for realizing the same |
US20200099508A1 (en) * | 2016-12-21 | 2020-03-26 | University Of Hawaii | Hybrid encryption for cyber security of control systems |
CN108063751A (en) * | 2017-10-20 | 2018-05-22 | 国网宁夏电力有限公司 | A kind of public network safety access method for new energy power plant |
CN111464304A (en) * | 2019-01-18 | 2020-07-28 | 江苏实达迪美数据处理有限公司 | Hybrid encryption method and system for controlling system network security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Security algorithms for cloud computing | |
CN111448779B (en) | System, device and method for hybrid secret sharing | |
CN108418691B (en) | Dynamic network identity authentication method based on SGX | |
Zhang | An overview and analysis of hybrid encryption: The combination of symmetric encryption and asymmetric encryption | |
CN101800738B (en) | Realization system and method for safely visiting and storing intranet data by mobile equipment | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN111614621B (en) | Internet of things communication method and system | |
Mathur et al. | Solving security issues in mobile computing using cryptography techniques—A Survey | |
CN112737764A (en) | Lightweight multi-user multi-data all-homomorphic data encryption packaging method | |
Agarwal et al. | Authenticating cryptography over network in data | |
Akhmatovich et al. | Improvement of a security enhanced one-time mutual authentication and key agreement scheme | |
US11784812B1 (en) | Device, system, and method to facilitate secure data transmission, storage and key management | |
Susmitha et al. | Hybrid Cryptography for Secure File Storage | |
CN116743470A (en) | Service data encryption processing method and device | |
CN116436636A (en) | Block chain slicing method based on secret handshake | |
Thapar et al. | A study of data threats and the role of cryptography algorithms | |
Prakash et al. | Data security in wired and wireless systems | |
CN113726752A (en) | Encryption method for network security | |
Shahbazov | NAVIGATING THE 5G SECURITY LANDSCAPE: REGULATIONS, TECHNOLOGIES, AND FUTURE CHALLENGES | |
Devi et al. | Cyber attacks, security data detection, and critical loads in the power systems | |
Caytiles et al. | ECC based authentication scheme for securing data contents over open wireless network systems | |
Nithya et al. | An Analysis on Cryptographic Algorithms for Handling Network Security Threats | |
Wu et al. | An identity-based integrity verification scheme for cloud storage in 5G environment | |
Mohammed et al. | Advancing Cloud Image Security via AES Algorithm Enhancement Techniques | |
Hartl et al. | Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211130 |