CN113965382A - Tamper-proof method for bidding supervision list data encryption algorithm - Google Patents

Tamper-proof method for bidding supervision list data encryption algorithm Download PDF

Info

Publication number
CN113965382A
CN113965382A CN202111229369.6A CN202111229369A CN113965382A CN 113965382 A CN113965382 A CN 113965382A CN 202111229369 A CN202111229369 A CN 202111229369A CN 113965382 A CN113965382 A CN 113965382A
Authority
CN
China
Prior art keywords
data
key
file
supervision list
bidding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111229369.6A
Other languages
Chinese (zh)
Inventor
皮景创
李滢
徐宝华
朱玉瑾
刘昆
徐波
朱焕军
王建中
王文凤
王瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Mingsheng Hengzhuo Technology Co Ltd
Materials Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
Anhui Mingsheng Hengzhuo Technology Co Ltd
Materials Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Mingsheng Hengzhuo Technology Co Ltd, Materials Branch of State Grid Anhui Electric Power Co Ltd filed Critical Anhui Mingsheng Hengzhuo Technology Co Ltd
Priority to CN202111229369.6A priority Critical patent/CN113965382A/en
Publication of CN113965382A publication Critical patent/CN113965382A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Abstract

The invention provides a tamper-proofing method for a bidding supervision list data encryption algorithm, which comprises the following steps: step 1: the sending end stores and encrypts bid inviting supervision list data to be sent; step 2: uploading the data file to be sent encrypted in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and then carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm; and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file; and 4, step 4: decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered; the invention can conveniently encrypt the data and avoid interception and tampering of the data in the transmission process.

Description

Tamper-proof method for bidding supervision list data encryption algorithm
Technical Field
The invention relates to the technical field of data transmission, in particular to a tamper-proof method for a bidding supervision list data encryption algorithm.
Background
Data encryption is a long-history technology, which means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption is realized by recovering the ciphertext into plaintext through a decryption algorithm and a decryption key. The core of the method is cryptography, and data encryption is still the most reliable method for protecting information by a computer system. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
With the development of science and technology, computer technology is increasingly developed, and at present, computers are widely applied to various data transmission, and the processes from remote communication between people to computer examination or data transmission can be carried out with the assistance of computers. Therefore, the security of the computer in data transmission plays an important role in the data transmission. At present, along with the development and popularization of information technology, illegal actions such as data interception and tampering by lawbreakers by using high-tech means are clustered, specialized, scaled and spread, and in addition, the probability of data interception and tampering in the transmission process is increased due to the increasing importance of various data transmission. In general, the problem of data transmission is becoming more serious at present, the possibility that confidential data transmission between people and between enterprises is tampered is higher and higher, and the security is low even in the transmission of bidding supervision list data.
Disclosure of Invention
Aiming at the technical problems, the invention provides a tamper-proof method for the data encryption algorithm of the bidding supervision list, which can conveniently encrypt data and avoid interception and tampering of the data in the transmission process.
In order to achieve the purpose, the invention provides the following technical scheme: a tamper-proofing method for a bidding supervision list data encryption algorithm comprises the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
step 2: uploading the encrypted data file to be sent obtained in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
and 4, step 4: and decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered.
Preferably, the step 1 specifically includes:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
The step S1 includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
Preferably, the twice encrypted transmission includes:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into a binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
Preferably, the decrypting in the step 4 includes:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
The invention has the beneficial effects that: the data transmission method has the advantages that the data of the bidding supervision list are encrypted and transmitted, so that the phenomenon that the data are intercepted and tampered in the process of being sent to the receiving end from the sending end is avoided, the transmitted data are secondarily encrypted in the process of data transmission, and the received data are judged whether to be tampered after the receiving end receives the data, so that the protection of data transmission is improved, the probability that the data are tampered in the transmission process is reduced, even if the data are tampered in the transmission process, the receiving end can rapidly send an abnormal warning to remind a worker that the data are abnormal, so that the worker can rapidly find that the data are tampered, and can resend the original file.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention without limiting the invention in which:
fig. 1 is a schematic diagram of a simple structure of a tamper-proofing method for data encryption algorithm of a bidding supervision list according to the present invention.
Detailed Description
In order to make the technical means, the original characteristics, the achieved purposes and the effects of the invention easily understood, the invention is further described below with reference to the specific embodiments and the attached drawings, but the following embodiments are only the preferred embodiments of the invention, and not all embodiments are provided. Based on the embodiments in the implementation, other embodiments obtained by those skilled in the art without any creative efforts belong to the protection scope of the present invention.
Referring to fig. 1, a method for preventing tampering of a data encryption algorithm of a bidding supervision list includes the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
the step 1 specifically comprises the following steps:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
Step S1 further includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
Step 2: uploading the data file to be sent encrypted in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and then carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
the secondary encrypted transmission comprises:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
The method comprises the steps of encrypting data for transmission for the second time in the process of transmitting the data to be transmitted from a transmitting end to a receiving end, avoiding data from being tampered in the transmission process, checking the data after the data are received, checking whether the data are intercepted and tampered, and sending an abnormal warning to remind a worker that the data are intercepted and tampered in the transmission process and the data need to be retransmitted after the data are tampered.
And 4, step 4: the method comprises the steps of decrypting data downloaded by a receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered, so that the receiving end can conveniently detect the data received from the sending end, the situation that the data is tampered is avoided, when the data is found to be tampered, the abnormal warning can be sent, a worker can be reminded that the data is tampered in the transmission process, the worker can conveniently retransmit the data, the worker is prevented from working by using the tampered data, and loss is avoided.
The decryption in step 4 comprises:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (5)

1. A tamper-proofing method for a bidding supervision list data encryption algorithm is characterized by comprising the following steps:
step 1: the method comprises the steps that a sending end stores and encrypts bidding supervision list data to be sent, firstly, a generated encrypted data header file and data to be sent are packaged and compressed to generate a zip file, and a preset data signature is added to the tail of the zip file;
step 2: uploading the encrypted data file to be sent obtained in the step 1 to a receiving end, carrying out secondary encryption in transmission, converting the data to be sent into binary file data, and carrying out encryption transmission on the binary file data based on an asymmetric encryption method of an RSA algorithm;
and step 3: the receiving end downloads the data file which is uploaded in the step 2 and is encrypted for the second time, downloads the uploaded encrypted data file and decrypts the encrypted data file for the second time, and saves the binary file as a zip file;
and 4, step 4: and decrypting the downloaded data of the receiving end, judging whether the downloaded data is tampered or not, and sending an abnormal warning if the downloaded data is tampered.
2. The method of claim 1, wherein the method further comprises: the step 1 specifically comprises:
s1: acquiring a preset first key and a preset second key, combining the bidding supervision list data, the first key and the second key according to a preset sequence, and encrypting by using the second key to generate a data header file;
s2: and packaging and compressing the data header file and the bidding supervision list data to generate a zip file, and writing a preset data signature into the tail of the zip file.
3. The method of claim 2, wherein the method further comprises: the step S1 includes:
s11: after acquiring a preset first key and a preset second key, calculating the length of the first key;
s12: combining the bidding supervision list, the first key and the length of the first key according to the length of the first key, the first key and the sequence of the bidding supervision list to be used as a plaintext character string;
s13: and after carrying out XOR operation on the plaintext character string and the second secret key, generating a ciphertext character string and taking the ciphertext character string as a data header file.
4. The method of claim 3, wherein the method further comprises: the secondary encrypted transmission comprises:
s21: a sending end randomly selects two unequal prime numbers p and q;
s22: calculating the product n of p and q in S21, wherein the value of n is converted into a binary number and the length of the binary number is the length of the key;
s23: calculating an euler function Φ (n) of n by Φ (n) ═ P-1 (q-1);
s24: the sending end randomly selects an integer e which is prime to n between 1 and n, and calculates a modular inverse element d of e to phi (n), wherein the modular inverse element d refers to the integer d, and the remainder of dividing e by phi (n) is 1;
s25: packaging n and e into a secondary encryption public key, packaging n and d into a secondary encryption private key, wherein the secondary encryption public key is (n, e), and the secondary encryption private key is (n, d);
s26: the sending end sends the secondary encryption public key to the receiving end, and the receiving end needs to encrypt through the secondary encryption public key when transmitting the data c;
s27: and after the sending end acquires the data c sent by the receiving end, decrypting the data c through a secondary encryption private key to obtain a zip file, wherein the remainder of dividing the power d of the c by the power n is m.
5. The method of claim 4, wherein the method further comprises: the decryption in step 4 includes:
s31: extracting the tail data signature of the zip file acquired in the step 3, judging whether the signature is consistent with the data signature in the step 1, if the signature is inconsistent with the data signature in the step 1, continuing to finish the abnormal warning, and if the signature is consistent with the data signature, executing the step S32;
s32: decompressing the zip file, acquiring a header file and a bidding supervision list data file, decrypting the header file by adopting a second key, and acquiring the bidding supervision list data, the first key and the length of the first key in the decrypted header file;
s33: judging whether the decrypted first key in the step S22 is consistent with the preset first key in the step S1, if so, executing the step S34, and if not, performing a side warning to end;
s34: reading the bidding supervision list data in the bidding supervision list data file, judging whether the bidding supervision list data is consistent with the bidding supervision list data in the decrypted data header file, if so, executing the step S25, otherwise, ending the abnormal warning;
s35: the receiving end reads and stores the bidding supervision list data file.
CN202111229369.6A 2021-10-21 2021-10-21 Tamper-proof method for bidding supervision list data encryption algorithm Pending CN113965382A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111229369.6A CN113965382A (en) 2021-10-21 2021-10-21 Tamper-proof method for bidding supervision list data encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111229369.6A CN113965382A (en) 2021-10-21 2021-10-21 Tamper-proof method for bidding supervision list data encryption algorithm

Publications (1)

Publication Number Publication Date
CN113965382A true CN113965382A (en) 2022-01-21

Family

ID=79465976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111229369.6A Pending CN113965382A (en) 2021-10-21 2021-10-21 Tamper-proof method for bidding supervision list data encryption algorithm

Country Status (1)

Country Link
CN (1) CN113965382A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116150796A (en) * 2023-04-18 2023-05-23 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN116346508A (en) * 2023-05-31 2023-06-27 深圳市东信时代信息技术有限公司 Information transmission method, device, equipment and medium based on fragment encryption storage

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
US20140281517A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. File backup with selective encryption
CN104539424A (en) * 2014-12-18 2015-04-22 广东讯飞启明科技发展有限公司 Tamper-proof examinee data transmission method
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method
CN112217806A (en) * 2020-09-23 2021-01-12 深圳杰微芯片科技有限公司 Data transmission encryption method, server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055580A (en) * 2009-11-06 2011-05-11 上海可鲁系统软件有限公司 Method for safely sending and receiving enterprise information in industrial internet and communication equipment
US20140281517A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. File backup with selective encryption
CN104539424A (en) * 2014-12-18 2015-04-22 广东讯飞启明科技发展有限公司 Tamper-proof examinee data transmission method
CN109450615A (en) * 2018-11-16 2019-03-08 重庆邮电大学 A kind of efficient OPC UA client and server data transfer encryption method
CN112217806A (en) * 2020-09-23 2021-01-12 深圳杰微芯片科技有限公司 Data transmission encryption method, server and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116150796A (en) * 2023-04-18 2023-05-23 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN116150796B (en) * 2023-04-18 2023-12-08 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system
CN116346508A (en) * 2023-05-31 2023-06-27 深圳市东信时代信息技术有限公司 Information transmission method, device, equipment and medium based on fragment encryption storage
CN116346508B (en) * 2023-05-31 2023-09-29 深圳市东信时代信息技术有限公司 Information transmission method, device, equipment and medium based on fragment encryption storage

Similar Documents

Publication Publication Date Title
US6289451B1 (en) System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
US9166793B2 (en) Efficient authentication for mobile and pervasive computing
US20130073850A1 (en) Hybrid encryption schemes
JP2002500388A (en) System and method for deriving an initialization vector suitable for secure communication
US10937339B2 (en) Digital cryptosystem with re-derivable hybrid keys
US11831764B2 (en) End-to-end double-ratchet encryption with epoch key exchange
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
US20030217263A1 (en) System and method for secure real-time digital transmission
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
CN113965382A (en) Tamper-proof method for bidding supervision list data encryption algorithm
CN111585759A (en) Efficient online-offline encryption method based on SM9 public key encryption algorithm
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN113890731A (en) Key management method, key management device, electronic equipment and storage medium
CN115632880A (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN112311554B (en) Strong authentication method and system based on quantum symmetric key
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
CN104735094A (en) Information separation based data security transmission system and method
CN102740246A (en) Method, system, and device for processing media message
EP2571192A1 (en) Hybrid encryption schemes
CN114499825A (en) Double-control key management method, system, encryption machine and storage medium
CN112149166B (en) Unconventional password protection method and intelligent bank machine
US8130945B2 (en) Encrypted cryptography system
KR100388059B1 (en) Data encryption system and its method using asymmetric key encryption algorithm
CN111212068A (en) Method for encrypting and decrypting characters by input method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination