CN115412247A - Random key synchronization method, platform, equipment and storage medium based on timestamp - Google Patents

Random key synchronization method, platform, equipment and storage medium based on timestamp Download PDF

Info

Publication number
CN115412247A
CN115412247A CN202211359012.4A CN202211359012A CN115412247A CN 115412247 A CN115412247 A CN 115412247A CN 202211359012 A CN202211359012 A CN 202211359012A CN 115412247 A CN115412247 A CN 115412247A
Authority
CN
China
Prior art keywords
key
user
field information
timestamp
binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211359012.4A
Other languages
Chinese (zh)
Inventor
刘磊
王谨旗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongan Yunke Technology Development Shandong Co ltd
Shandong Agriculture and Engineering University
Original Assignee
Zhongan Yunke Technology Development Shandong Co ltd
Shandong Agriculture and Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongan Yunke Technology Development Shandong Co ltd, Shandong Agriculture and Engineering University filed Critical Zhongan Yunke Technology Development Shandong Co ltd
Priority to CN202211359012.4A priority Critical patent/CN115412247A/en
Publication of CN115412247A publication Critical patent/CN115412247A/en
Priority to CN202310147278.0A priority patent/CN116488796A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application provides a random key synchronization method, a random key synchronization platform, random key synchronization equipment and a random key synchronization storage medium based on timestamps, and relates to the technical field of secret communication, wherein a first user acquires a first key and sends the first key to a second user; after receiving the first key, the second user generates encrypted field information and insertion position information according to the timestamp of the received first key; inserting the encrypted field information into the first key according to the insertion position information to obtain a second key, and sending the timestamp to the first user; and the first user updates the first key according to the agreed key updating mode and the timestamp to obtain the key the same as that of the second user side. The receiving time of the first key is random, and according to an agreed key synchronization mode, the first user can finish the key updating synchronization with the second user by using the time stamp after obtaining the time stamp. Even if the first key is stolen by a third party in the transmission process, the data encrypted by the second key at the later stage cannot be decrypted, so that the security of data transmission is improved.

Description

Random key synchronization method, platform, equipment and storage medium based on timestamp
Technical Field
The present application relates to the field of secure communication technologies, and in particular, to a method, a platform, a device, and a storage medium for synchronizing a random key based on a timestamp.
Background
When data remote transmission is performed in the field of data communication, a secret key generally needs to be agreed in advance to ensure the security of data transmission. When data transmission is carried out, a data sender encrypts data through an appointed secret key and then sends the data. And after the data transmission is finished, the appointed key is generally destroyed, and the data is re-scheduled when the data is transmitted again.
Because of the importance of the secret key in encrypted data transmission, the key synchronization is an important link for ensuring the data transmission safety in the field of data communication, and the key can be safely synchronized, which is the key for normally using the secret key for encryption and decryption. In the technical field of key synchronization, the mechanism of key security synchronization is relatively perfect, and in order to ensure key synchronization, a caller sends an agreed key to a receiver through a secure channel after encrypting data by using the agreed key, so that a data receiver can decrypt the encrypted key smoothly.
However, since the agreed key needs to be transmitted through the key transmission channel, if the agreed key is stolen by a third party in the transmission process, the risk of disclosure exists. Once the data sender encrypts and sends the data by using the agreed key, the security in the data transmission process cannot be ensured.
Disclosure of Invention
In view of this, the present application provides a random key synchronization method, a random key synchronization platform, a random key synchronization device, and a random key synchronization storage medium based on a timestamp, so as to solve the problem that in the prior art, a key is stolen during a transmission process, which results in that security of data encryption transmission cannot be ensured.
In a first aspect, an embodiment of the present application provides a random key synchronization method based on a timestamp, including:
a first user acquires a first secret key and sends the first secret key to a second user, wherein the first user and the second user are any two users for appointed data transmission;
after the second user receives the first key, generating encryption field information and insertion position information according to a timestamp of receiving the first key;
inserting the encrypted field information into the first key according to the insertion position information to obtain a second key, and sending the timestamp to the first user;
and the first user updates the first key according to an agreed key updating mode and the timestamp to obtain a second key the same as that of the second user side.
In a possible implementation manner, after receiving the first key, the second user generates encryption field information and insertion location information according to a timestamp of receiving the first key, including:
performing data splitting on the timestamp to obtain first time data and second time data;
respectively carrying out binary coding on the first time data and the second time data to obtain a first binary character string and a second binary character string;
and obtaining the encrypted field information and the insertion position information according to the first binary character string and the second binary character string.
In one possible implementation manner, obtaining the encryption field information and the insertion location information according to the first binary string and the second binary string includes:
coding the first binary character string according to a preset coding mode to obtain the encrypted field information;
addressing the first key data according to the second binary character to obtain an insertion address.
In one possible implementation, obtaining the encryption field information and the insertion location information according to the first binary string and the second binary string includes:
encoding the first binary character string or the second binary character string according to a preset encoding mode to obtain the encrypted field information;
and addressing the first key data according to the binary string and the second binary string respectively to obtain a first insertion address and a second insertion address, wherein the first insertion address and the second insertion address are used for inserting the same encryption field information.
In one possible implementation manner, the obtaining the encryption field information and the insertion location information according to the first binary string and the second binary string includes:
coding the first binary character string and the second binary character string according to a preset coding mode to respectively obtain first encryption field information and second encryption field information;
and addressing the first key data through the first binary string and the second binary string to obtain a first insertion address and a second insertion address, wherein the first insertion address is used for inserting the first encryption field information, and the second insertion address is used for inserting the second encryption field information.
In a possible implementation manner, inserting the encrypted field information into the first key according to the insertion location information to obtain a second key, including:
after the insertion address of the encrypted field information in the first key is determined, splitting the first key by taking the insertion address as a splitting point;
and then splicing the split first key by using the encryption field information to obtain the second key.
In a possible implementation manner, inserting the encrypted field information into the first key according to the insertion location information to obtain a second key, including:
after the insertion address of the encrypted field information in the first key is determined, splitting the first key by taking the insertion address as a splitting point to obtain a first key segment and a second key segment;
determining key data of the same length as the encrypted field information from the end of the second key segment;
replacing the key data with the encrypted field information to obtain a third key segment;
and splicing the first key section and the third key section to obtain the second key.
In a second aspect, an embodiment of the present application provides a random key synchronization platform based on timestamps, including:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for a first user to obtain a first secret key and send the first secret key to a second user, and the first user and the second user are any two users for appointed data transmission;
the key information generating module is used for generating encrypted field information and inserting position information according to a timestamp of receiving the first key after the second user receives the first key;
the key data processing module is used for inserting the encrypted field information into the first key according to the insertion position information to obtain a second key and sending the timestamp to the first user;
and the key information synchronization module is used for updating the first key by the first user according to an agreed key updating mode and the timestamp to obtain a second key which is the same as that of the second user side.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a processor;
a memory;
and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed by the processor, cause the electronic device to perform the method of any of the possible implementations of the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method described in any possible implementation manner of the first aspect.
In the embodiment of the application, after the first user transmits the first key to the second user performing data interaction, the receiving time is random, and according to the key synchronization mode agreed by both users, the second user only needs to send the timestamp to the first user, and the first user can complete the key update synchronization with the second user by using the timestamp. Therefore, even if the first key is stolen by a third party in the transmission process, the data encrypted by the second key at the later stage cannot be decrypted, and the security of data transmission is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a random key synchronization method based on a timestamp according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating a determination manner of encrypted field information and an insertion position according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another encrypted field information and insertion position determination method provided in this embodiment of the present application
Fig. 4 is a schematic diagram of another determination method for encrypted field information and insertion position according to an embodiment of the present application
Fig. 5 is a key updating method according to an embodiment of the present disclosure;
fig. 6 is another key updating method provided in the embodiment of the present application;
FIG. 7 is a block diagram of a random key synchronization platform based on timestamps according to an embodiment of the present application;
fig. 8 is a schematic view of an electronic device according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solution of the present application, the following detailed description is made with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Fig. 1 is a schematic flowchart of a random key synchronization method based on a timestamp according to an embodiment of the present application, and referring to fig. 1, the random key synchronization method based on the timestamp includes:
s101, the first user acquires a first key and sends the first key to the second user.
In this embodiment, the first user and the second user are both parties of appointed data transmission, one is a data sending party, and the other is a data receiving party. The most initial first key may be initiated by any user and the first key may be randomly generated using a crypto engine or randomly selected from a pool of public keys as a spare key.
Although the first key initially sent by the two parties is not used as the final key finally used for encrypting and decrypting the data, the first user and the second user still establish an encryption channel before the first key is sent, and during the process that the first key is transmitted through the encryption channel, the security of the encryption channel is verified, so that the security of the data transmitted through the encryption channel at the later stage is improved.
And S102, after receiving the first key, the second user generates encryption field information and insertion position information according to the timestamp of the first key.
And after the second user receives the first key, the system records the time stamp of the first key, wherein the time stamp is mainly used for recording the time when the first key is received. The system time is generally accurate to milliseconds, and for convenience of description, milliseconds and seconds are discarded in the embodiment, and the timestamp is accurate to minutes.
After the system obtains the timestamp of the received first key, the timestamp is split according to time and minutes, and first time data and second time data are obtained. In this embodiment, a 24-hour timing manner is adopted, for example, if the time for receiving the first key is 20 minutes and 35 minutes, the first time data is 20, and the second time data is 35.
After the first time data and the second time data are obtained, binary coding is respectively carried out on the first time data and the second time data to obtain a first binary character string and a second binary character string. Then the first binary string in this embodiment is: 010100, the second binary string is: 100011.
in this embodiment, a first binary string and a second binary string are obtained, and the encrypted field information and the insertion location information are obtained according to the first binary string and the second binary string. When the obtained binary character string is used as the encrypted field information, the obtained binary character string is generally not used directly, but the binary character string is encoded by adopting a preset encoding mode, and the encoded data obtained after encoding is used as the encrypted field information.
The encoding method in this embodiment may be various, for example, base64 is the most common binary data encoding and decoding technique. The base64 codes binary data by adopting 64 characters, for the binary data of n bytes, dividing each continuous 6 bits in corresponding 8 x n bits into 1 part, wherein the value of each part is between 0 and 63, corresponding the value to 1 AscII character, and splicing all the AscII characters corresponding to the parts to obtain the base64 code of the binary data. Generally, the base64 encoded data of 3 bytes binary data has a length of 4 bytes, and after a binary file is converted into a base64 encoded file, the file length is increased by about 33%. That is, the binary data length and complexity of base64 encoding are increased. Of course, the base64 may be used as one encoding method in the embodiment of the present application, but is not limited to the above encoding method, and other encoding methods may also be used to encode the binary string, so as to improve the length and complexity of the finally obtained encrypted field information.
In an exemplary embodiment, the first binary string is first encoded according to a preset encoding mode to obtain the encrypted field information, and then the first key data is addressed according to the second binary string to obtain the insertion address. Taking the above as an example, referring to fig. 2, the length of the first key is 100 bits, the binary string is 100011, the addressing location is 35 bits, and the insertion address is after the 35 bits in the first key.
In an exemplary embodiment, in this embodiment, the first binary string or the second binary string may be selected as the binary string for obtaining the encrypted field information, and the first binary string or the second binary string is encoded according to a preset encoding method to obtain the encrypted field information. Then, the first key data is addressed according to the first binary string and the second binary string, respectively, to obtain an insertion address.
As shown in fig. 3, the length of the first key is still selected to be 100 bits, the first binary string is 010100, and the second binary string is 100011. After addressing, the 20 th bit and the 35 th bit are respectively, the 20 th bit in the first key is followed by the first insertion address, and the 35 th bit is followed by the second insertion address.
In this embodiment, the first binary string and the second binary string are simultaneously used as binary strings for acquiring encrypted field information, and the first binary string and the second binary string are encoded according to a preset encoding method to acquire first encrypted field information and second encrypted field information, respectively. And then addressing the first key data according to the first binary character string and the second binary character string respectively to obtain a first insertion address and a second insertion address, wherein the first insertion address is used for inserting the first encryption field information, and the second insertion address is used for inserting the second encryption field information.
As shown in fig. 4, the length of the first key is still selected to be 100 bits, the first binary string is 010100, and the second binary string is 100011. After addressing, the 20 th bit and the 35 th bit are respectively carried out, the 20 th bit in the first key is taken as a first insertion address, and the 35 th bit is taken as a second insertion address. The first insertion address is used as the insertion position of the first encryption field information, and the second insertion address is used as the insertion position of the second encryption field information.
The above-mentioned obtaining of the encrypted field information and the obtaining of the insertion address are all several possible implementation manners, and other combination forms may also be adopted, for example, the first binary character string and the second binary character string are merged to be used as the character string for determining the encrypted field information. Moreover, if a plurality of insertion addresses need to be obtained, the binary strings may be combined to obtain different strings, or when the timestamp starts to be determined, the binary strings are retained to the second or millisecond, and then the timestamp is split in units of one time, one minute, one second, and one millisecond, which is not described in detail in this embodiment.
S103, inserting the encrypted field information into the first key according to the insertion position information to obtain a second key, and sending the timestamp to the first user.
After the encrypted field information and the insertion position information are determined according to the timestamp of the received first key in S102, the encrypted field information and the first key further need to be fused to update the first key.
According to the embodiment, after the insertion address of the encrypted field information in the first key is determined, the first key is split by taking the insertion address as a splitting point. And then splicing the split first key by using the encryption field information to obtain the second key.
As shown in fig. 5, the first key is split into an a key segment and a B key segment by using the insertion address as a splitting point, the encrypted field information is placed between the a key segment and the B key segment, so that the field end of the encrypted field information is adjacent to the tail of the a key segment, and the field tail of the encrypted field information is adjacent to the end of the B key segment, and then the a key segment, the encrypted field, and the B key segment are spliced in the above order to obtain the second key.
In the above embodiment, the second key is obviously longer than the first key, and the first key is updated mainly by increasing the field information. The increase in the length of the second key increases the burden of data transmission if savings in communication transmission resources are considered. Based on the above situation, the present application also proposes another key update method.
In an exemplary embodiment, after determining the insertion address of the encrypted field information in the first key, the first key is also split using the insertion address as a splitting point to obtain the first key segment and the second key segment. In order to obtain a second key with the same length as the first key, the embodiment determines key data with the same length as the encrypted field information from the end of the second key segment; replacing the key data with the encrypted field information to obtain a third key segment; and splicing the first key section and the third key section to obtain the second key.
As shown in fig. 6, the first key is split into a first key segment a and a second key segment B by using the insertion address as a splitting point, and then a key data area C having a length of bytes equal to the encrypted field information is determined from the end of the second key segment B according to the length of bytes of the encrypted field information. And then replacing the key data area C in the second key segment B with the encryption field information D to update the second key segment B, obtaining a brand-new third key segment E, and splicing the first key segment A and the third key segment E to obtain a second key finally used for data encryption transmission.
The above-mentioned manner of updating the first key to the second key is only an illustrative example, and other manners may also be adopted, for example, the length of the second key is reduced on the premise of ensuring the security of the key length. It is only necessary to determine that the length of the byte is greater than the key data area C larger than the encrypted field information in the above embodiment, and then replace it. Moreover, based on the multiple encryption field information and the multiple insertion addresses of different embodiments in S102, there are multiple key updating manners, which are not specifically described.
S104, the first user updates the first key according to the agreed key updating mode and the timestamp to obtain a second key which is the same as the second user side.
The first user may set a receipt timestamp receipt when sending the first key to the second user, and the way in which both parties update the first key according to the timestamp is a priori. Therefore, after the second user completes receiving the first key, the first user receives the receipt of the timestamp at the first time, and at this time, the first user completes updating the first key according to the second agreed updating mode, so as to obtain a second key which is completely the same as that of the second user side. The second key is a brand new key locally generated at the first user side and the second user side respectively, so that the keys can be synchronized without being sent by any party, the risk that the keys are stolen by a third party user is reduced, and the security during subsequent data encryption transmission is improved.
Corresponding to the above embodiments, the embodiments of the present application further provide a random key synchronization platform based on timestamps.
Referring to fig. 7, the random key synchronization platform 20 based on time stamp in the present embodiment includes:
a sending module 201, configured to obtain a first key by a first user and send the first key to a second user, where the first user and the second user are any two users that agree on data transmission.
A key information generating module 202, configured to generate, after the second user receives the first key, encrypted field information and insertion location information according to a timestamp of receiving the first key.
And the key data processing module 203 is configured to insert the encrypted field information into the first key according to the insertion location information to obtain a second key, and send the timestamp to the first user.
And a key information synchronization module 204, configured to update the first key according to the timestamp to obtain a second key that is the same as the second key on the second user side.
It should be noted that, for specific contents related to the embodiments of the present application, reference may be made to the description of the embodiments of the method above, and for brevity, detailed descriptions are omitted here.
Corresponding to the embodiment, the embodiment of the application also provides the electronic equipment.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 8, the electronic device 300 may include: a processor 301, a memory 302, and a communication unit 303. The components communicate via one or more buses, and those skilled in the art will appreciate that the electronic device configurations shown in the figures are not meant to limit embodiments of the present application, and may be bus-type configurations, star-type configurations, or include more or fewer components than those shown, or some components may be combined, or different arrangements of components may be used.
The communication unit 303 is configured to establish a communication channel, so that the electronic device can communicate with other devices.
The processor 301, which is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and/or processes data by operating or executing software programs and/or modules stored in the memory 302 and calling data stored in the memory. The processor may be composed of Integrated Circuits (ICs), for example, a single packaged IC, or a plurality of packaged ICs connected to the same or different functions. For example, the processor 301 may include only a Central Processing Unit (CPU). In the embodiments of the present application, the CPU may be a single arithmetic core or may include multiple arithmetic cores.
A memory 302 for storing instructions executed by the processor 301, the memory 302 may be implemented by any type of volatile or non-volatile storage device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The execution instructions in the memory 302, when executed by the processor 301, enable the electronic device 300 to perform some or all of the steps in the above-described method embodiments.
Corresponding to the above embodiments, the present application further provides a computer-readable storage medium, where the computer-readable storage medium may store a program, and when the program runs, the apparatus in which the computer-readable storage medium is located may be controlled to perform some or all of the steps in the above method embodiments. In a specific implementation, the computer-readable storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
Corresponding to the above embodiments, the present application also provides a computer program product, which contains executable instructions, and when the executable instructions are executed on a computer, the computer is caused to execute some or all of the steps in the above method embodiments.
In the embodiments of the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, and means that there may be three relationships, for example, a and/or B, and may mean that a exists alone, a and B exist simultaneously, and B exists alone. Wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" and the like, refer to any combination of these items, including any combination of singular or plural items. For example, at least one of a, b, and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, any function, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered by the protection scope of the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A random key synchronization method based on time stamp, comprising:
a first user acquires a first secret key and sends the first secret key to a second user, wherein the first user and the second user are any two users for appointed data transmission;
after the second user receives the first key, generating encryption field information and insertion position information according to a timestamp of the first key;
inserting the encrypted field information into the first key according to the insertion position information to obtain a second key, and sending the timestamp to the first user;
and the first user updates the first key according to an agreed key updating mode and the timestamp to obtain a second key the same as that of the second user side.
2. The timestamp based random key synchronization method of claim 1, wherein the second user, after receiving the first key, generates encryption field information and insertion location information according to the timestamp of the first key, including:
performing data splitting on the timestamp to obtain first time data and second time data;
binary coding is carried out on the first time data and the second time data respectively to obtain a first binary character string and a second binary character string;
and obtaining the encrypted field information and the insertion position information according to the first binary character string and the second binary character string.
3. The timestamp based random key synchronization method of claim 2, wherein obtaining the encryption field information and insertion location information from the first binary string and the second binary string comprises:
coding the first binary character string according to a preset coding mode to obtain the encrypted field information;
addressing the first key data according to the second binary character to obtain an insertion address.
4. The timestamp based random key synchronization method of claim 2, wherein obtaining the encryption field information and insertion location information from the first binary string and the second binary string comprises:
encoding the first binary character string or the second binary character string according to a preset encoding mode to obtain the encrypted field information;
and addressing the first key data according to the binary character string and the second binary character string respectively to obtain a first insertion address and a second insertion address, wherein the first insertion address and the second insertion address are used for inserting the same encrypted field information.
5. The method of time stamp-based random key synchronization of claim 2, wherein said obtaining said encryption field information and insertion location information from said first binary string and said second binary string comprises:
coding the first binary character string and the second binary character string according to a preset coding mode to respectively obtain first encryption field information and second encryption field information;
and addressing the first key data through the first binary string and the second binary string to obtain a first insertion address and a second insertion address, wherein the first insertion address is used for inserting the first encryption field information, and the second insertion address is used for inserting the second encryption field information.
6. The timestamp based random key synchronization method of any of claims 3-5, wherein inserting the encryption field information into the first key according to the insertion location information to obtain a second key comprises:
after the insertion address of the encrypted field information in the first key is determined, splitting the first key by taking the insertion address as a splitting point;
and then splicing the split first key by using the encrypted field information to obtain the second key.
7. The timestamp based random key synchronization method of any of claims 3-5, wherein inserting the encryption field information into the first key according to the insertion location information to obtain a second key comprises:
after the insertion address of the encrypted field information in the first key is determined, splitting the first key by taking the insertion address as a splitting point to obtain a first key segment and a second key segment;
determining key data of the same length as the encryption field information from the end of the second key segment;
replacing the key data with the encrypted field information to obtain a third key segment;
and splicing the first key section and the third key section to obtain the second key.
8. A random key synchronization platform based on timestamps, comprising:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for a first user to obtain a first secret key and send the first secret key to a second user, and the first user and the second user are any two users for appointed data transmission;
the key information generating module is used for generating encrypted field information and inserting position information according to a timestamp of receiving the first key after the second user receives the first key;
the key data processing module is used for inserting the encrypted field information into the first key according to the insertion position information to obtain a second key and sending the timestamp to the first user;
and the key information synchronization module is used for updating the first key by the first user according to the timestamp to obtain a second key which is the same as the second user side.
9. An electronic device, comprising:
a processor;
a memory;
and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed by the processor, cause the electronic device to perform the method of any of claims 1 to 7.
10. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method of any one of claims 1-7.
CN202211359012.4A 2022-11-02 2022-11-02 Random key synchronization method, platform, equipment and storage medium based on timestamp Withdrawn CN115412247A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211359012.4A CN115412247A (en) 2022-11-02 2022-11-02 Random key synchronization method, platform, equipment and storage medium based on timestamp
CN202310147278.0A CN116488796A (en) 2022-11-02 2023-02-22 Random key synchronization method, platform, equipment and storage medium based on time stamp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211359012.4A CN115412247A (en) 2022-11-02 2022-11-02 Random key synchronization method, platform, equipment and storage medium based on timestamp

Publications (1)

Publication Number Publication Date
CN115412247A true CN115412247A (en) 2022-11-29

Family

ID=84169180

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202211359012.4A Withdrawn CN115412247A (en) 2022-11-02 2022-11-02 Random key synchronization method, platform, equipment and storage medium based on timestamp
CN202310147278.0A Pending CN116488796A (en) 2022-11-02 2023-02-22 Random key synchronization method, platform, equipment and storage medium based on time stamp

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202310147278.0A Pending CN116488796A (en) 2022-11-02 2023-02-22 Random key synchronization method, platform, equipment and storage medium based on time stamp

Country Status (1)

Country Link
CN (2) CN115412247A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090022319A1 (en) * 2007-07-19 2009-01-22 Mark Shahaf Method and apparatus for securing data and communication
CN102325320A (en) * 2011-09-14 2012-01-18 北京握奇数据系统有限公司 A kind of wireless security communication means and system
US20140314231A1 (en) * 2013-04-18 2014-10-23 RISOFTDEV, Inc. System and Methods For Encrypting Data
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device
CN106941404A (en) * 2017-04-25 2017-07-11 中国联合网络通信集团有限公司 Cryptographic key protection method and device
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic
WO2018076289A1 (en) * 2016-10-28 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
CN108155987A (en) * 2017-12-22 2018-06-12 中国联合网络通信集团有限公司 Group message sending method, method of reseptance and its system and communicating terminal
CN108712363A (en) * 2018-03-22 2018-10-26 新华三信息安全技术有限公司 A kind of daily record encipher-decipher method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090022319A1 (en) * 2007-07-19 2009-01-22 Mark Shahaf Method and apparatus for securing data and communication
CN102325320A (en) * 2011-09-14 2012-01-18 北京握奇数据系统有限公司 A kind of wireless security communication means and system
US20140314231A1 (en) * 2013-04-18 2014-10-23 RISOFTDEV, Inc. System and Methods For Encrypting Data
WO2018076289A1 (en) * 2016-10-28 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device
CN106941404A (en) * 2017-04-25 2017-07-11 中国联合网络通信集团有限公司 Cryptographic key protection method and device
CN107171791A (en) * 2017-05-24 2017-09-15 舒翔 A kind of data encryption/decryption method and encrypting and deciphering system based on biological characteristic
CN108155987A (en) * 2017-12-22 2018-06-12 中国联合网络通信集团有限公司 Group message sending method, method of reseptance and its system and communicating terminal
CN108712363A (en) * 2018-03-22 2018-10-26 新华三信息安全技术有限公司 A kind of daily record encipher-decipher method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黎妹红; 齐小晨; 吴倩倩: "基于动态密钥的智能电网无线通信数据加密传输方案", 《信息网络安全》 *

Also Published As

Publication number Publication date
CN116488796A (en) 2023-07-25

Similar Documents

Publication Publication Date Title
EP1775879A2 (en) Method and Apparatus for Securely Transmitting and Receiving Data in Peer-to-Peer Manner
CN109936552B (en) Key authentication method, server and system
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN112291201B (en) Service request transmission method and device and electronic equipment
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN112468297B (en) Key backup method and device based on block chain
US20160211977A1 (en) Information processing device and information processing method
CN110891062A (en) Password changing method, server and storage medium
US7031469B2 (en) Optimized enveloping via key reuse
CN104135531A (en) Method and device of upgrading Web software
CN101808100B (en) Method and system for solving replay of remote update of information safety device
CN117201120A (en) Information encryption method, device, computer equipment and storage medium
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN115412247A (en) Random key synchronization method, platform, equipment and storage medium based on timestamp
US8897440B2 (en) Cryptographic system of symmetric-key encryption using large permutation vector keys
JP2011193161A (en) System and method for encryption control
CN112468289A (en) Key generation method
JPH09200197A (en) Synchronization stream ciphering device and decoder applied to the device
CN111523128A (en) Information protection method, system, electronic device and medium
CN112333699B (en) Internet of things communication protocol encryption method, equipment and storage medium
CN112350920A (en) Instant communication system based on block chain
CN115296852B (en) Data encryption and decryption methods, devices and data encryption and decryption system
CN112966305B (en) Block chain based information transfer method and device, electronic equipment and storage medium
CN114650175B (en) Verification method and device
CN112866202B (en) Device authorization management method, system thereof, communication device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20221129

WW01 Invention patent application withdrawn after publication