CN113726752A - Encryption method for network security - Google Patents

Encryption method for network security Download PDF

Info

Publication number
CN113726752A
CN113726752A CN202110955629.1A CN202110955629A CN113726752A CN 113726752 A CN113726752 A CN 113726752A CN 202110955629 A CN202110955629 A CN 202110955629A CN 113726752 A CN113726752 A CN 113726752A
Authority
CN
China
Prior art keywords
encryption
key
rsa
network
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110955629.1A
Other languages
Chinese (zh)
Inventor
严聚卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110955629.1A priority Critical patent/CN113726752A/en
Publication of CN113726752A publication Critical patent/CN113726752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention provides an encryption method for network security, and relates to the technical field of network security. S1, area division: dividing the network according to different attributes and actions, encrypting a single area, and S2, protecting the network boundary: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented. The large environment of the whole network is divided into different small environments in an area, and each small environment boundary is protected, on one hand, the encryption degree can be improved, on the other hand, the encryption can be finely divided, the encryption is encrypted according to different levels and is more meticulous, the internal secret key can be ensured to be safer through RSA and SM encryption, the secret key is difficult to crack and infect by a general program, the secret key can be ensured to be in a relatively safe environment state in the transmission process, and after the secret key is received, the secret key is cracked through corresponding hardware and software, and comparison is carried out, so that the safety of a file is ensured.

Description

Encryption method for network security
Technical Field
The invention relates to the technical field of network security, in particular to an encryption method for network security.
Background
Network security refers to the protection of the hardware, software and data in the system of the network system, which is not destroyed, altered, and leaked due to accidental or malicious reasons, the system operates continuously, reliably and normally, the network service is not interrupted, the computer network and the system must have the ability to protect the security of sensitive information to ensure the reliability and confidentiality of the system and the network, a common method for protecting sensitive information is encryption, and many types of cryptographic algorithms can be used in various different situations at present.
In the existing technology for solving network security, there still exists a problem, different encryption security algorithms exist among various company departments, and are integrated in respective software modules before, so that there exist repeated development and quality difference to a great extent, the coupling degree with application software is very high, and the security degree is different, the existing common encryption transmission method has some drawbacks of different degrees, the existing common security gatekeeper is used for realizing the transportation of high and low security areas of data, and the security isolation gatekeeper, also known as a gatekeeper and a physical isolation gatekeeper, is used for realizing the security isolation among networks with different security levels and providing a software and hardware system with moderately controllable data exchange, but the security isolation gatekeeper has the defects of high cost, troublesome deployment and the like.
Therefore, there is a need for a method to perform information security real-time encryption and decryption under a defense-in-depth policy with minimal processing power to help protect the system from network attacks.
Disclosure of Invention
The invention aims to provide an encryption method for network security. And (4) passing.
In order to realize the problems of low satiety rate and slow growth, the invention provides the following technical scheme: an encryption method for network security, comprising the following steps:
step one, area division: the network is divided according to different attributes and actions, and the single area is encrypted.
Step two, network boundary protection: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented.
Step three, RSA transmission: and carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission.
Step four, safety intrusion detection: and the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process.
Step five, SM encryption: the RSA encrypted key is again encrypted with the SM algorithm.
Step six, algorithm analysis: and performing RSA analysis on the accessed key to ensure the correctness of the key.
Step seven, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
Further, a safe running environment is created for the terminal computer through a white list mechanism in the step one, and illegal processes and application programs in the safe running environment cannot pass safety check, so that viruses, trojans and malicious software are prevented from being outside the terminal running environment.
Furthermore, in the first step, the formed safe operation environment is finely divided according to the belonged property, the using direction, the confidentiality degree and the like, so that a plurality of independent unidirectional small environments are formed inside the safe operation environment, and the different small environments have a single initial value.
Further, in the second step, security protection is performed on a network boundary between small environments in the operating environment, so that series connection between the network and fusion and circulation of information at different levels are avoided, and logical isolation security protection is performed between the operating environment and the external internet through protection devices such as an industrial firewall and a gateway.
Further, in the third step, the small environment is selectively used according to the level of secrecy required, and the RSA public key cryptosystem is a cryptosystem that uses different encryption keys and decryption keys, and it is computationally infeasible to derive the decryption keys from the known encryption keys.
Further, the RSA principle in the fourth step is that it is relatively simple to seek two large prime numbers according to number theory, and factoring the product of the two large prime numbers is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection can be performed on the formed RSA key, so as to prevent attack of malicious codes and cause key leakage.
Further, the SM algorithm in the fifth step is a more advanced and safer algorithm, specifically, an elliptic curve public key cryptographic algorithm, the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and the chaotic noise vector is encrypted again by the elliptic curve public key cryptographic algorithm SM, which includes SM2, SM3, SM4, and the like.
Further, in the fifth step, an SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using hardware encryption equipment, for example, an encrypted file can only be decrypted by a specified smart key UKey.
Further, after the receiving device in the sixth step confirms that the decryption password is correct, the second group of initial values corresponding to the data are decrypted through the SM, the data are decrypted by the chaotic neural network through the decrypted second group of initial values, and after the SM algorithm is decrypted, the internal RSA algorithm is decrypted through the algorithm to obtain the internal secret key.
And further, the verification is carried out through the dynamic password in the seventh step, and after the authentication system is entered, the access party key and the income party key are compared to ensure the integrity of the keys.
The invention provides an encryption method for network security, which has the following beneficial effects: the large environment of the whole network is divided into different small environments in an area, and each small environment boundary is protected, on one hand, the encryption degree can be improved, on the other hand, the encryption can be finely divided, the encryption is encrypted according to different levels and is more meticulous, the internal secret key can be ensured to be safer through RSA and SM encryption, the secret key is difficult to crack and infect by a general program, the secret key can be ensured to be in a relatively safe environment state in the transmission process, and after the secret key is received, the secret key is cracked through corresponding hardware and software, and comparison is carried out, so that the safety of a file is ensured.
Drawings
Fig. 1 is a flowchart of an encryption method for network security according to the present invention.
Detailed Description
Referring to fig. 1, the present invention provides a technical solution: an encryption method for network security, comprising the following steps:
step one, area division: the network is divided according to different attributes and actions, and the single area is encrypted.
Step two, network boundary protection: and the boundaries between the networks after the division and encryption are protected safely, so that the network concatenation influence is prevented.
Step three, RSA transmission: and carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission.
Step four, safety intrusion detection: and the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process.
Step five, SM encryption: the RSA encrypted key is again encrypted with the SM algorithm.
Step six, algorithm analysis: and performing RSA analysis on the accessed key to ensure the correctness of the key.
Step seven, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
Specifically, a safe operation environment is created for the terminal computer through a white list mechanism in the step one, and illegal processes and application programs in the safe operation environment cannot pass safety inspection, so that viruses, trojans and malicious software are prevented from being outside the terminal operation environment.
Specifically, in the step one, the formed safe operation environment is finely divided according to the belonged property, the use direction, the confidentiality degree and the like, so that a plurality of independent unidirectional small environments are formed inside the safe operation environment, and different small environments have single initial values.
Specifically, in the second step, security protection is performed on the network boundary between the small environments in the operating environment, so that series connection between the network and fusion and circulation of information at different levels are avoided, and logical isolation security protection is performed between the operating environment and the external internet through protective equipment such as an industrial firewall and a gatekeeper.
Specifically, in step three, the microenvironment is selectively used according to the level of privacy required, and the RSA public key cryptosystem is a cryptosystem that uses different encryption keys and decryption keys, and the derivation of the decryption key from a known encryption key is computationally infeasible.
Specifically, the RSA principle in step four is that it is relatively simple to seek two large prime numbers according to number theory, and factorize the product of them is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection is performed on the formed RSA key, so as to prevent attack of malicious code, and thus cause key leakage.
Specifically, the SM algorithm in the fifth step is a more advanced and safer algorithm, specifically, an elliptic curve public key cryptographic algorithm, the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and the chaotic noise vector is encrypted again by the elliptic curve public key cryptographic algorithm SM, including SM2, SM3, SM4, and the like.
Specifically, in the fifth step, the SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using hardware encryption equipment, for example, the encrypted file can only be decrypted by the specified intelligent encryption key UKey.
Specifically, after the receiving device confirms that the decryption password is correct in the sixth step, the second group of initial values corresponding to the data are decrypted through the SM, the data are decrypted by the chaotic neural network through the decrypted second group of initial values, and after the SM algorithm is cracked, the internal RSA algorithm is cracked through the algorithm to obtain the internal secret key.
Specifically, the verification is performed through the dynamic password in the step seven, and after the authentication system is entered, the access party key and the income party key are compared to ensure the integrity of the keys.
The method of the examples was performed for detection analysis and compared to the prior art to yield the following data:
degree of encryption Difficulty of cracking
Examples Height of Is difficult to
Prior Art Bottom Is easier to be
According to the table data, when the embodiment is used, the double encryption of the RSA algorithm and the SM algorithm can ensure the safety of the internal key data and is not easy to crack, and the adaptive encryption network environment has one-way independence, so that the encryption safety factor is improved.
The invention provides an encryption method for network security, which comprises the following steps: step one, area division: dividing a network according to different attributes and actions, encrypting a single region, creating a safe operating environment for a terminal computer through a white list mechanism, wherein illegal processes and application programs in the safe operating environment cannot pass safety check to ensure that viruses, trojans and malicious software are blocked outside the terminal operating environment, finely dividing the formed safe operating environment according to the belonged property, the using direction, the required confidentiality and the like to form independent unidirectional multi-small environments in the safe operating environment, wherein different small environments have single initial values, different files have different encryption requirements and different encryption requirements, all the encryption requirements are different, placing all the encryptions in the same large environment easily causes data confusion, and possibly generating influences between data and data, so that the used safe environment is protected, opening up independent microenvironment, carrying out corresponding encryption to different files, can guarantee the independence between file and the file, simultaneously, improve the secret nature of encryption, step two, network boundary protection: the method comprises the steps of carrying out safety protection on boundaries between networks after division and encryption to prevent network tandem connection influence, carrying out safety protection on network boundaries between small environments in an operating environment to avoid series connection between the networks and fusion and circulation of information of different levels, carrying out logic isolation safety protection between the operating environment and the external Internet through protective equipment such as an industrial firewall, a gatekeeper and the like, carrying out logic isolation safety protection on encryption equipment through protective equipment such as a firewall, a gatekeeper and the like to avoid introducing an encryption program into safety risks in the using process, deploying safety protection equipment at the boundaries of the network and an office network in the encryption safety operating environment to avoid introducing the safety risks of the office network into the encryption safety operating environment, ensuring that the safety risks of the Internet are not introduced into the encryption safety operating environment of an industrial control network, carrying out safety region division and boundary protection on the internal small environments according to the level importance and the service requirements of regions, and step three, RSA transmission: the transmitted key is RSA encrypted and transmitted in one way, the microenvironment is selectively used according to the required security level, the RSA public key cryptosystem is a cryptosystem that uses different encryption and decryption keys, it is computationally infeasible to derive a decryption key from a known encryption key, the RSA algorithm is designed based on the large integer factorization mathematical puzzle (IFP), the mathematical principle is relatively simple, the implementation is relatively easy in engineering application, but the unit safety intensity is relatively low, the difficulty of factoring large integers determines the reliability of the RSA algorithm, and with the improvement of the computing speed of a computer and the development of distributed computing and the improvement of a factoring method, the key cracking of low-digit numbers is possible, the method is used for files with relative secret degrees and the like, and the method comprises the following steps of: the secret key after RSA encryption is detected and protected, bad programs are prevented from being added in the transmission process, the RSA principle is that two large prime numbers are found according to number theory and are simpler, factorization of the product of the two large prime numbers is extremely difficult, therefore, the product can be used as an encryption secret key in a public mode, further external strengthening protection is carried out on the RSA secret key formed by the product, attack of malicious codes is prevented, the secret key is leaked, files encrypted by the RSA are further protected, the corrosion of the malicious codes in the transmission process is mainly avoided, step five, SM encryption: the secret key encrypted by the RSA is encrypted again, the SM algorithm is a more advanced and safe algorithm, in particular to an elliptic curve public key cryptographic algorithm, the secret key encrypted by the RSA is transmitted to a first function to generate a chaotic noise vector, and is encrypted again by the elliptic curve public key cryptographic algorithm SM, the SM algorithm comprises SM2, SM3, SM4 and the like, an SM digital certificate is used for carrying out SM asymmetric encryption, the obtained secret key needs to be decrypted by hardware encryption equipment, for example, an encrypted file can only be decrypted by a specified intelligent cipher key UKey, the SM2 algorithm and the RSA algorithm belong to public key encryption algorithms, but the SM2 algorithm and the RSA algorithm are respectively based on different mathematical theory bases, compared with the RSA algorithm, the SM2 algorithm has the characteristics of strong attack resistance, less CPU occupation, less content use, low network consumption, high encryption speed and the like, the SM2 algorithm is independently developed and designed based on the ECC elliptic curve cryptographic theory, and the digital signature algorithm, The key exchange protocol and the public key encryption algorithm are different from international algorithms such as ECDSA, ECDH and the like in terms of digital signature and key exchange, but a safer mechanism is adopted, the calculation amount and complexity are improved, in terms of digital signature and key exchange, generation and verification of message authentication codes, generation and verification of random numbers and the like, an SM3 cryptographic hash algorithm and a random number generator approved by the State and Home encryption administration are used, the SM3 hash algorithm is an autonomously designed cryptographic hash algorithm, the security is higher than that of an MD5 algorithm (128 bits) and an SHA-1 algorithm (160 bits), a compression function of the SM3 algorithm has a similar structure with SHA-256, but the design is more complicated, the SM4 block cipher algorithm is an autonomously designed block symmetric cipher algorithm, has the same key length with the AES algorithm, is higher than that of a 3DES, in practical application, various attack methods aiming at the block cipher algorithm can be resisted, and the sixth step is algorithm analysis: performing RSA analysis on the accessed key to ensure the correctness of the key, after the receiving equipment confirms that the decrypted password is correct, decrypting a second group of initial values corresponding to the data through SM2, decrypting the data of the chaotic neural network by using the decrypted second group of initial values, and after the SM2 algorithm is cracked, cracking the internal RSA algorithm through the algorithm to obtain the internal key, and the seventh step of comparing and checking the messages: the access side and the receiving side are compared to ensure the integrity of encryption, the dynamic password is used for verification, after the dynamic password enters a verification system, the access side key and the receiving side key are compared to ensure the integrity of the keys, the two keys are compared to ensure the uniformity, and the safety factor is improved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. An encryption method for network security is characterized by comprising the following steps:
s1, area division: dividing the network according to different attributes and actions, and encrypting a single area;
s2, network boundary protection: the boundary between the networks after the division and encryption is protected safely, and the influence of network concatenation is prevented;
s3, RSA transmission: carrying out RSA encryption on the transmitted key and carrying out unidirectional transmission;
s4, security intrusion detection: the secret key encrypted by RSA is detected and protected, and bad programs are prevented from being added in the transmission process;
s5, SM encryption: carrying out SM algorithm encryption on the RSA encrypted key again;
s6, algorithm analysis: performing RSA analysis on the accessed secret key to ensure the correctness of the secret key;
s7, message comparison and verification: and the access party and the receiving party are compared to ensure the integrity of encryption.
2. The encryption method according to claim 1, wherein in step S1, a secure operating environment is created for the terminal computer through a white list mechanism, and illegal processes and applications in the secure operating environment cannot pass security check, so as to ensure that viruses, trojans and malware are blocked outside the terminal operating environment.
3. The encryption method according to claim 1, wherein in step S1, the formed secure operating environment is finely divided according to the property, the using direction, and the degree of secrecy required, so that a plurality of unidirectional small environments are formed inside the secure operating environment, and the different small environments have a single initial value.
4. The encryption method for network security according to claim 1, wherein in step S2, the network boundary between the small environments in the operating environment is secured to avoid concatenation between networks and fusion circulation of different levels of information, and the operating environment and the external internet are secured logically isolated by a pair of protective devices such as an industrial firewall and a gatekeeper.
5. The encryption method according to claim 1, wherein the selective use of the small environment according to the required security level in step S3 is a cryptosystem that uses different encryption and decryption keys, and the RSA public key cryptosystem is a cryptosystem in which it is computationally infeasible to derive the decryption key from a known encryption key.
6. The encryption method for network security according to claim 1, wherein the RSA principle in step S4 is that it is relatively simple to find two large prime numbers according to number theory, and factorize the product of them is extremely difficult, so that the product can be disclosed as an encryption key, and further external protection can be performed on the formed RSA key to prevent attack of malicious code, so as to cause key leakage.
7. The encryption method according to claim 1, wherein the SM algorithm in step S5 is a more advanced security algorithm, specifically an elliptic curve public key cryptography algorithm, and the RSA-encrypted key is transferred to the first function and generates a chaotic noise vector, and is encrypted again by the elliptic curve public key cryptography algorithm SM, which includes SM2, SM3, SM4, and so on.
8. The encryption method for network security according to claim 1, wherein in step S5, the SM digital certificate is used for SM asymmetric encryption, and the obtained key needs to be decrypted by using a hardware encryption device, for example, the encrypted file can only be decrypted by a specified key.
9. The encryption method for network security according to claim 1, wherein the receiving device decrypts the second set of initial values corresponding to the data through the SM after confirming that the decryption password is correct in step S6, decrypts the data of the chaotic neural network by using the decrypted second set of initial values, and obtains the internal key by decrypting the internal RSA algorithm through the algorithm after decrypting the SM algorithm.
10. The encryption method according to claim 1, wherein the authentication is performed by dynamic password in step S7, and after entering the authentication system, the access party key is compared with the income party key to ensure the integrity of the keys.
CN202110955629.1A 2021-08-19 2021-08-19 Encryption method for network security Pending CN113726752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110955629.1A CN113726752A (en) 2021-08-19 2021-08-19 Encryption method for network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110955629.1A CN113726752A (en) 2021-08-19 2021-08-19 Encryption method for network security

Publications (1)

Publication Number Publication Date
CN113726752A true CN113726752A (en) 2021-11-30

Family

ID=78676916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110955629.1A Pending CN113726752A (en) 2021-08-19 2021-08-19 Encryption method for network security

Country Status (1)

Country Link
CN (1) CN113726752A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580859A (en) * 2013-11-11 2014-02-12 国家电网公司 Asymmetric encryption method for intelligent electricity using interaction
CN103716166A (en) * 2013-12-27 2014-04-09 哈尔滨工业大学深圳研究生院 Self-adaptation hybrid encryption method and device and encryption communication system
CN105099672A (en) * 2015-08-04 2015-11-25 东南大学 Hybrid encryption method and device for realizing the same
CN108063751A (en) * 2017-10-20 2018-05-22 国网宁夏电力有限公司 A kind of public network safety access method for new energy power plant
US20200099508A1 (en) * 2016-12-21 2020-03-26 University Of Hawaii Hybrid encryption for cyber security of control systems
CN111464304A (en) * 2019-01-18 2020-07-28 江苏实达迪美数据处理有限公司 Hybrid encryption method and system for controlling system network security

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580859A (en) * 2013-11-11 2014-02-12 国家电网公司 Asymmetric encryption method for intelligent electricity using interaction
CN103716166A (en) * 2013-12-27 2014-04-09 哈尔滨工业大学深圳研究生院 Self-adaptation hybrid encryption method and device and encryption communication system
CN105099672A (en) * 2015-08-04 2015-11-25 东南大学 Hybrid encryption method and device for realizing the same
US20200099508A1 (en) * 2016-12-21 2020-03-26 University Of Hawaii Hybrid encryption for cyber security of control systems
CN108063751A (en) * 2017-10-20 2018-05-22 国网宁夏电力有限公司 A kind of public network safety access method for new energy power plant
CN111464304A (en) * 2019-01-18 2020-07-28 江苏实达迪美数据处理有限公司 Hybrid encryption method and system for controlling system network security

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
CN111448779B (en) System, device and method for hybrid secret sharing
CN108418691B (en) Dynamic network identity authentication method based on SGX
Zhang An overview and analysis of hybrid encryption: The combination of symmetric encryption and asymmetric encryption
CN101800738B (en) Realization system and method for safely visiting and storing intranet data by mobile equipment
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN111614621B (en) Internet of things communication method and system
Mathur et al. Solving security issues in mobile computing using cryptography techniques—A Survey
CN112737764A (en) Lightweight multi-user multi-data all-homomorphic data encryption packaging method
Agarwal et al. Authenticating cryptography over network in data
Akhmatovich et al. Improvement of a security enhanced one-time mutual authentication and key agreement scheme
US11784812B1 (en) Device, system, and method to facilitate secure data transmission, storage and key management
Susmitha et al. Hybrid Cryptography for Secure File Storage
CN116743470A (en) Service data encryption processing method and device
CN116436636A (en) Block chain slicing method based on secret handshake
Thapar et al. A study of data threats and the role of cryptography algorithms
Prakash et al. Data security in wired and wireless systems
CN113726752A (en) Encryption method for network security
Shahbazov NAVIGATING THE 5G SECURITY LANDSCAPE: REGULATIONS, TECHNOLOGIES, AND FUTURE CHALLENGES
Devi et al. Cyber attacks, security data detection, and critical loads in the power systems
Caytiles et al. ECC based authentication scheme for securing data contents over open wireless network systems
Nithya et al. An Analysis on Cryptographic Algorithms for Handling Network Security Threats
Wu et al. An identity-based integrity verification scheme for cloud storage in 5G environment
Mohammed et al. Advancing Cloud Image Security via AES Algorithm Enhancement Techniques
Hartl et al. Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211130