CN114584298A - Quantum security SSL protocol application method and system - Google Patents
Quantum security SSL protocol application method and system Download PDFInfo
- Publication number
- CN114584298A CN114584298A CN202210200526.9A CN202210200526A CN114584298A CN 114584298 A CN114584298 A CN 114584298A CN 202210200526 A CN202210200526 A CN 202210200526A CN 114584298 A CN114584298 A CN 114584298A
- Authority
- CN
- China
- Prior art keywords
- server
- key
- client
- random number
- preset random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000005540 biological transmission Effects 0.000 claims abstract description 9
- 230000008569 process Effects 0.000 claims description 13
- 238000002347 injection Methods 0.000 claims description 8
- 239000007924 injection Substances 0.000 claims description 8
- 238000007796 conventional method Methods 0.000 abstract description 2
- 230000004927 fusion Effects 0.000 abstract 1
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a quantum security SSL protocol application method and a system, wherein the quantum security SSL protocol application method comprises the steps of distributing a CA certificate for a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate; generating a first key factor using a handshake protocol; generating a second key factor based on a preset random number; carrying out security enhancement on the two key factors to obtain an encryption key; and establishing quantum secure SSL connection by adopting an encryption key and performing secure data transmission. A quantum security SSL protocol application system comprises a client and a server. Compared with the conventional method for combining the QKD network and the SSL protocol, the method realizes the close fusion of the quantum key and the SSL protocol through a safe, efficient and flexible method, and has good application prospect.
Description
Technical Field
The invention relates to the technical field of quantum keys and SSL protocols, in particular to a quantum security SSL protocol application method and system.
Background
The SSL protocol is widely applied to the fields of electronic government affairs, financial systems and the like, but the asymmetric cryptographic algorithm adopted by the SSL protocol cannot resist quantum computing attack, and the security strength of the symmetrical cryptographic algorithm adopted by the SSL protocol has certain vulnerability under the quantum computing attack, so that the improvement of the security of the SSL protocol has very important significance. At present, the quantum key is an important technical direction to improve the security of the SSL protocol, but since the quantum key distribution (QKD for short) network is a hardware infrastructure independent of the internet, the problem of seamless adaptation between the two is the key of the QKD scale application.
Disclosure of Invention
In order to solve the problems of the key distribution and service technology in the background technology, the invention provides a quantum security SSL protocol application method, which comprises an initialization process and a key negotiation process, wherein the initialization process comprises the steps of distributing a CA certificate by a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate; in the key agreement process, the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
Further, the method further comprises: and updating the CA certificate and the preset random number of the client in an off-line or on-line mode.
Further, the method further comprises: and encrypting and storing the preset random number.
The invention also provides a quantum security SSL protocol application system, which comprises a client and a server, wherein the server is used for distributing the CA certificate and the preset random number for the newly accessed client and creating the association identification list of the preset random number and the CA certificate; the server and the client adopt SSL handshake protocol to carry out identity authentication and negotiation encryption algorithm, and the encryption algorithm is adopted to generate a first key factor; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
Further, the above system further comprises: and the quantum key service device is used for distributing quantum key related parameters for the client and/or the server or distributing a shared quantum key for the client and the server.
On the basis of the conventional SSL protocol, the invention introduces the quantum secure key factor through a safe, efficient and flexible method, and is used for improving the security of the SSL protocol. Compared with the conventional method for combining the QKD network and the SSL protocol, the method has higher safety, efficiency and flexibility and good application prospect.
Drawings
Fig. 1 is a schematic diagram of a quantum secure SSL protocol application method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a quantum secure SSL protocol application system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in detail below with reference to the accompanying drawings and specific embodiments.
To facilitate an understanding of the innovations of the present invention, the following description of the related art background is provided: in general, the SSL protocol includes a recording protocol and a handshake protocol, where the SSL recording protocol provides basic functions such as data encapsulation, compression, and encryption for a higher layer protocol; the SSL recording protocol is used for identity authentication, encryption algorithm negotiation, encryption key exchange and the like of the two communication parties. The quantum key is introduced in the handshake protocol process of the SSL protocol, and the quantum key is utilized to carry out security enhancement on the encryption key negotiated in the handshake protocol without changing the integral framework of the SSL protocol. In addition, in a specific embodiment, a network connection is also required between the client or application terminal executing the SSL protocol and the server. Therefore, the present invention does not limit and specifically describe the SSL protocol, and the related art may refer to the SSL protocol related art standard or literature.
Fig. 1 shows a schematic diagram of an embodiment of a quantum secure SSL protocol application method of the present invention, which includes an initialization process 101 and a key agreement process 102, where the initialization process 101 includes a new access client distributing a CA certificate, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate (the association identifier includes, but is not limited to, ID identifiers of a server and the client or/and CA certificate identifiers, and identification information of the preset random number, which is not specifically limited by the present invention); the key agreement process 102: the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm (the encryption algorithm and the variant versions thereof are very many, but the functions in the embodiment of the invention are substantially equivalent, so the invention does not specifically limit the encryption algorithm adopted in the embodiment), and the encryption algorithm is adopted to generate a first key factor; the client and the server generate a second key factor based on a preset random number; the client and the server respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client and the server establish SSL connection by using the encryption key and perform safe data transmission. The implementation method of the initialization process 101 includes, but is not limited to, distributing a CA certificate for a new access client by a third-party server or the server, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate.
In a possible embodiment, on the basis of the above embodiment, the method further comprises updating the CA certificate and the preset random number of the client in an off-line or on-line manner.
In a possible embodiment, on the basis of any of the above embodiments, the method further includes performing encrypted storage on the preset random number.
Fig. 2 shows a schematic diagram of an embodiment of a quantum secure SSL application system of the present invention, the system includes a client 201 and a server 202, where the server 202 is configured to distribute a CA certificate and a preset random number for a new access client 201, and create an association identifier list of the preset random number and the CA certificate; the server 202 and the client 201 adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client 201 and the server 202 generate a second key factor based on a preset random number; the client 201 and the server 202 respectively perform security enhancement on the first key factor and the second key factor to obtain an encryption key; the client 201 and the server 202 establish an SSL connection using the encryption key and perform secure data transmission. The implementation method of the initialization process 101 includes, but is not limited to, the third-party server or the server 202 distributing a CA certificate for the new access client, injecting a preset random number, and creating an association identifier between the preset random number and the CA certificate.
In a possible embodiment, a quantum key service device is further included on the basis of the above embodiment, and is configured to distribute quantum key-related parameters to the client and/or the server, or distribute a shared quantum key to the client and the server. The quantum key association parameter includes, but is not limited to, an exclusive or value of a key packet in the preset random number of the client and a key packet or a quantum key of the server, and an exclusive or value of a quantum key of the client and a quantum key of the server.
In any of the above embodiments, the identity authentication includes, but is not limited to, any of the following methods: a method of presetting random numbers is adopted (including but not limited to that two communication parties carry out identity authentication by comparing Hash values of preset random numbers or certain random data, namely, the two communication parties respectively calculate the Hash values of corresponding data, if the two are completely consistent, the identity authentication is passed, otherwise, the identity authentication is not passed, or, a certain random data in the preset random numbers is used for encrypting a message for identity authentication, namely, one party encrypts a message, the other party decrypts to obtain a target message, the identity authentication is passed, otherwise, the identity authentication is not passed); a method of combining a CA certificate with a preset random number is adopted (including but not limited to, a sender encrypts a message by using the preset random number or one of the groups and carries out digital signature, then encrypts the message by using a public key of a receiver, the receiver firstly decrypts the message, then verifies the signature, then decrypts the message by using the preset random number or one of the groups, and if the decrypted message is consistent with the sent message, the identity authentication is passed); the method comprises the steps of adopting an anti-quantum-computation identity authentication algorithm (the invention does not specifically limit the adopted anti-quantum-computation identity authentication algorithm), and adopting a method of combining the anti-quantum-computation identity authentication algorithm with a preset random number (including but not limited to the steps that a sender encrypts a message by using the preset random number or one of the groups and carries out digital signature, then, the public key of a receiver is used for encryption, the receiver firstly decrypts, then, verifies the signature, then, decrypts by using the preset random number or one of the groups, and if the decrypted message is consistent with the sent message, the identity authentication is passed).
In any of the above embodiments, the generating the second key factor based on the preset random number includes any one of the following methods: encrypting and sending a key packet in the preset random numbers to the server side through a third-party server (including but not limited to, the third-party server or a quantum key service platform calculating an exclusive or value of a key packet in the preset random numbers and a quantum key packet in the server side and sending the exclusive or value to the server side, the server side calculating an exclusive or value of a corresponding quantum key packet and the exclusive or value and obtaining a key packet in the preset random numbers), and the server side using the key packet as a second key factor; the server selects a key group from the preset random numbers as a second key factor (i.e., in a possible scenario, the server stores the preset random numbers of the client in advance); the server side arranges the preset random number into a plurality of key groups in the same way as the client side (that is, in a possible embodiment scenario, the server side stores the preset random number of the client side in advance), and selects one key group as the second key factor. In a possible embodiment, the method further includes repeating the above steps to obtain a plurality of second key factors, and finally using the result of security enhancement on the plurality of second key factors as a final second key factor.
In any of the above embodiments, the injecting the preset random number includes any one or more of the following manners: the off-line injection is carried out by a third-party server, the off-line injection is carried out by the server side, and the encryption on-line injection is carried out by the third-party server or the server side. Wherein, the offline injection includes but is not limited to: sending a certain number of random number sequences or data or key packets to the client device through the local data transmission interface and creating a corresponding association identifier list; encryption on-line injection: a number of random number sequences or data or key packets are encrypted and sent to the client device and a corresponding list of associated identities is created.
In any of the above embodiments, the preset random number includes, but is not limited to, any of the following: a certain number of random number sequences or data, and a certain number of quantum key groupings (i.e., a certain number of random number sequences or data are arranged into a plurality of key groupings, and the plurality of key groupings are used as preset random numbers).
In any of the above embodiments, the privacy enhancement comprises any one of: exclusive-or operation, Hash operation, cryptographic operation using symmetric cryptographic algorithm.
In a possible embodiment, the service end in the foregoing embodiment includes but is not limited to: the system comprises a first server and a second server, wherein the first server distributes a CA certificate for a client, the second server injects a preset random number for the client, and the first server or the second server creates an associated identifier of the preset random number and the CA certificate.
It should be understood that, in any of the above embodiments, the "data" protected by the "secure data transmission" includes, but is not limited to, any one or more of the following: text, picture, voice, video, and binary data files.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus (or system), or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
While the invention has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the invention. Accordingly, the specification and figures are merely exemplary of the invention as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A quantum secure SSL protocol application method is characterized by comprising the following steps:
an initialization process: distributing a CA certificate for a newly accessed client, injecting a preset random number, and creating an associated identifier of the preset random number and the CA certificate;
and (3) key negotiation process: the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively carry out security enhancement on the first key factor and the second key factor to obtain an encryption key; and the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
2. The quantum secure SSL protocol application method of claim 1, comprising: and updating the CA certificate and the preset random number of the client in an off-line or on-line mode.
3. The quantum secure SSL protocol application method according to claim 1 or 2, comprising: and encrypting and storing the preset random number.
4. The quantum secure SSL protocol application method of claim 1, wherein the identity authentication comprises any one of the following methods: the method adopts a method of presetting random numbers, a method of combining CA certificates with the preset random numbers, an identity authentication algorithm of anti-quantum computation, and a method of combining the identity authentication algorithm of anti-quantum computation with the preset random numbers.
5. The quantum secure SSL protocol application method of claim 1, wherein the generating of the second key factor based on the preset random number comprises any one of the following methods: encrypting a key packet in the preset random number by a third-party server and sending the key packet to the server, wherein the server takes the key packet as a second key factor; the server side selects a key group from the preset random number as a second key factor; the server side and the client side adopt the same method to arrange the preset random numbers into a plurality of key groups, and one key group is selected from the key groups to serve as a second key factor.
6. The method of claim 1, wherein the security enhancement comprises any of: exclusive-or operation, Hash operation, cryptographic operation using symmetric cryptographic algorithm.
7. The method for applying the quantum secure SSL protocol according to claim 1, wherein the injecting the preset random number comprises any one or more of the following ways: the off-line injection is carried out by a third-party server, the off-line injection is carried out by the server side, and the encryption on-line injection is carried out by the third-party server or the server side.
8. A quantum security SSL protocol application system comprises a client and a server, and is characterized in that the server distributes a CA certificate and a preset random number for a newly accessed client, and creates an associated identification list of the preset random number and the CA certificate; the server and the client adopt an SSL handshake protocol to perform identity authentication and negotiate an encryption algorithm, and a first key factor is generated by adopting the encryption algorithm; the client and the server generate a second key factor based on a preset random number; the client and the server respectively carry out security enhancement on the first key factor and the second key factor to obtain an encryption key; and the client and the server establish SSL connection by using the encryption key and perform safe data transmission.
9. The SSL application system according to claim 8, comprising a quantum key service device for distributing quantum key associated parameters to the client and/or the server, or distributing a shared quantum key to the client and the server.
10. The SSL application system according to claim 8, wherein the server comprises: the system comprises a first server and a second server, wherein the first server distributes a CA certificate for a client, the second server injects a preset random number for the client, and the first server or the second server creates an associated identifier of the preset random number and the CA certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210200526.9A CN114584298A (en) | 2022-03-03 | 2022-03-03 | Quantum security SSL protocol application method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210200526.9A CN114584298A (en) | 2022-03-03 | 2022-03-03 | Quantum security SSL protocol application method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114584298A true CN114584298A (en) | 2022-06-03 |
Family
ID=81775563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210200526.9A Withdrawn CN114584298A (en) | 2022-03-03 | 2022-03-03 | Quantum security SSL protocol application method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114584298A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109309570A (en) * | 2018-10-15 | 2019-02-05 | 北京天融信网络安全技术有限公司 | Quantum key method used in SSL VPN and relevant device and storage medium |
CN110572265A (en) * | 2019-10-24 | 2019-12-13 | 国网山东省电力公司信息通信公司 | terminal security access gateway method, device and system based on quantum communication |
CN111756528A (en) * | 2019-03-28 | 2020-10-09 | 广东国盾量子科技有限公司 | Quantum session key distribution method and device and communication architecture |
KR20210045285A (en) * | 2019-10-16 | 2021-04-26 | 고태영 | Quantum Entropy Management and Distribution System |
CN113489586A (en) * | 2021-07-26 | 2021-10-08 | 河南国科量子通信网络有限公司 | VPN network system compatible with quantum key negotiation |
CN114024689A (en) * | 2022-01-05 | 2022-02-08 | 华中科技大学 | E-mail receiving and sending method and system based on post quantum and identity |
-
2022
- 2022-03-03 CN CN202210200526.9A patent/CN114584298A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109309570A (en) * | 2018-10-15 | 2019-02-05 | 北京天融信网络安全技术有限公司 | Quantum key method used in SSL VPN and relevant device and storage medium |
CN111756528A (en) * | 2019-03-28 | 2020-10-09 | 广东国盾量子科技有限公司 | Quantum session key distribution method and device and communication architecture |
KR20210045285A (en) * | 2019-10-16 | 2021-04-26 | 고태영 | Quantum Entropy Management and Distribution System |
CN110572265A (en) * | 2019-10-24 | 2019-12-13 | 国网山东省电力公司信息通信公司 | terminal security access gateway method, device and system based on quantum communication |
CN113489586A (en) * | 2021-07-26 | 2021-10-08 | 河南国科量子通信网络有限公司 | VPN network system compatible with quantum key negotiation |
CN114024689A (en) * | 2022-01-05 | 2022-02-08 | 华中科技大学 | E-mail receiving and sending method and system based on post quantum and identity |
Non-Patent Citations (1)
Title |
---|
舒晓飞;蒋念平;: "基于SSLVPN的密钥分配的安全性分析", 电子科技, no. 02 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230283457A1 (en) | Methods and apparatus for quantum-resistant network communication | |
CN110380852B (en) | Bidirectional authentication method and communication system | |
US7120797B2 (en) | Methods for authenticating potential members invited to join a group | |
CN106789042B (en) | Authentication key negotiation method for user in IBC domain to access resources in PKI domain | |
CN106878016A (en) | Data is activation, method of reseptance and device | |
CN113612605A (en) | Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology | |
CN110048849B (en) | Multi-layer protection session key negotiation method | |
CN113079022B (en) | Secure transmission method and system based on SM2 key negotiation mechanism | |
CN112087428B (en) | Anti-quantum computing identity authentication system and method based on digital certificate | |
CN109547413B (en) | Access control method of convertible data cloud storage with data source authentication | |
CN110493272B (en) | Communication method and communication system using multiple keys | |
CN107635227A (en) | A kind of group message encryption method and device | |
CN114285571A (en) | Method, gateway device and system for using quantum key in IPSec protocol | |
JP2020532177A (en) | Computer-implemented systems and methods for advanced data security, high-speed encryption, and transmission | |
CN117278330B (en) | Lightweight networking and secure communication method for electric power Internet of things equipment network | |
CN118381608B (en) | Noise protocol implementation method and device based on out-of-band quantum key | |
CN116232578A (en) | Multi-party collaborative signature system, method and equipment integrating quantum key distribution | |
CN118018187B (en) | Agent re-encryption method based on SM9 cooperative algorithm | |
CN111049649A (en) | Zero-interaction key negotiation security enhancement protocol based on identification password | |
CN114338648A (en) | SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm | |
CN114268441B (en) | Quantum security application method, client device, server device and system | |
KR100456624B1 (en) | Authentication and key agreement scheme for mobile network | |
CN116318654A (en) | SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution | |
CN113839786B (en) | Key distribution method and system based on SM9 key algorithm | |
CN112054905B (en) | Secure communication method and system of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220603 |
|
WW01 | Invention patent application withdrawn after publication |