CN115776390A - MQTT protocol identity authentication and data encryption method based on state password - Google Patents
MQTT protocol identity authentication and data encryption method based on state password Download PDFInfo
- Publication number
- CN115776390A CN115776390A CN202211378487.8A CN202211378487A CN115776390A CN 115776390 A CN115776390 A CN 115776390A CN 202211378487 A CN202211378487 A CN 202211378487A CN 115776390 A CN115776390 A CN 115776390A
- Authority
- CN
- China
- Prior art keywords
- topic
- key
- mqtt
- client
- identity authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 102100037651 AP-2 complex subunit sigma Human genes 0.000 claims description 11
- 101000806914 Homo sapiens AP-2 complex subunit sigma Proteins 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention belongs to the technical field of MQTT protocols, and particularly relates to a state-secret-based MQTT protocol identity authentication and data encryption method. The invention uses SM2 algorithm to carry out digital signature on the cipher texts of the secret keys K1, username and password in the MQTT protocol, thereby not only achieving the effect of identity authentication, but also ensuring the authenticity and non-repudiation of data; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.
Description
Technical Field
The invention belongs to the technical field of MQTT protocols, and particularly relates to a state-secret-based MQTT protocol identity authentication and data encryption method.
Background
With the rapid development of the internet of things technology, the security problem of the internet of things also faces a serious challenge. The MQTT is an internet of things transmission protocol based on a publish/subscribe mode under the ISO standard, and is suitable for IoT scenes with low power consumption and limited network bandwidth due to the characteristics of light weight, simplicity, openness and easiness in implementation. In view of the fact that the traditional MQTT protocol lacks of a sufficient safety protection mechanism, the effective MQTT protocol protection measure is provided with great significance.
The national cryptographic algorithm is a cryptographic algorithm standard and an application specification thereof which are recognized and published by the national cryptographic administration, and is a set of data encryption processing series algorithms which are independently developed in the cryptographic core field of China. Cryptographic algorithms have been promulgated as: symmetric encryption algorithms (SM 1, SM 4), asymmetric encryption algorithms (SM 2, SM 9), hash cipher algorithms (SM 3), and the like. At present, the autonomous controllable cryptographic algorithm is vigorously popularized by China, and the popularization of the cryptographic algorithm has important significance for improving the network information safety and autonomous controllable level of China.
The MQTT (message queue telemetry transport) protocol is a message transport protocol based on a proxy publish/subscribe mode, and belongs to an application layer protocol above a TCP/IP protocol. The system is widely used in the aspects of intelligent medical treatment, intelligent home, power equipment monitoring and the like. The MQTT protocol has three roles: the system comprises a subscription end, a publishing end and an MQTT Broker, wherein the subscription end and the publishing end are collectively called as clients, and the MQTT Broker is a proxy server. The subscription end sends a subscription theme to the MQTT Broker; the issuing end issues the theme content to the MQTT Broker; the MQTT Broker is responsible for forwarding messages. Because the data in the MQTT protocol is transmitted in the plaintext all the time in the transmission process, the data security cannot be guaranteed. Therefore, the invention utilizes SM2 algorithm, SM3 algorithm and SM4 algorithm to add the functions of identity authentication and data encryption to the MQTT protocol, thereby solving the safety problem of the MQTT protocol.
Disclosure of Invention
The invention aims to provide an MQTT protocol identity authentication and data encryption method based on a national password.
An MQTT protocol identity authentication and data encryption method based on state encryption is characterized in that in an identity authentication stage, a client is connected with an MQTT Broker before a CONNECT data packet is sent;
client side has its private key SK c Randomly selecting 16 bytes from the data to form a group of numbers K1, and passing through a certificate public key PK of MQTT Broker s Encrypting the K1 to generate C1; sending the client certificate and the C1 to an MQTT Broker;
MQTT Broker byPersonal key SK s Decrypting C1 to obtain client information, using SK s Signing C1 to generate sigma 1; let C1'= C1, send C1' and σ 1 to the client;
the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1; after signature verification passes, the client uses SK c Signing C1', generating sigma 2, and sending C1' and sigma 2 to MQTT Broker;
comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is completely the same, obtaining a public key PK of a client certificate c Verifying the signature sigma 2; returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker;
the client firstly encrypts the username and password to generate C up (ii) a Then passes through the self private key SK c To C up Signature to generate sigma up And C is up And σ up Putting the data into a CONNECT data packet and sending the data packet to MQTT Broker;
after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up (ii) a Decrypting ciphertext C after signature verification is passed up And obtaining the username and password, and returning the CONNACK to the client after the identity authentication is passed.
Further, the client generates C1, sigma 2 and sigma through SM2 algorithm up Generation of C by SM4 algorithm up 。
Further, in the key component acquisition stage, the Client sends the Client ID Subscribing Topic to MQTT Broker; MQTT Broker checks whether there is locally the same Topic; if there is no local identical Topic, generate Key Topic Then encrypt Key by K1 Topic Generating a ciphertext C KeyTopic And C is KeyTopic Sending the data to a client; if the same topoc exists locally, key is encrypted directly through K1 Topic Generating a ciphertext C KeyTopic And sent to the client.
Further, the MQTT Broker generating Key by SM3 algorithm Topic ,Key Topic =H(Topic||K1||SK s ) Generating a ciphertext C by an SM4 algorithm KeyTopic ,C KeyTopic =E K1 (KeyTopic)。
Further, in a data transmission stage, a subscriber terminal sends a SUBSCRIBE data packet to an MQTT Broker to SUBSCRIBE theme content;
the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) The first 16 bytes of the hash value are used as a data encryption Key to encrypt the content corresponding to Topic to generate a ciphertext C mess (ii) a The content in the PUBLISH data packet sent by the publishing terminal to the MQTT Broker is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ));
The subscriber terminal calculates H (C) after receiving the PUBLISH data packet forwarded by the MQTT Broker mess ||R||Key Topic ) It is then compared with H (C) received in PUBLISH packet mess ||R||Key Topic ) Comparing; if the two are the same, H (R | | | Topic | | | Key) is calculated Topic ) And the first 16 bytes are taken as a decryption Key Key to decrypt the message C mess Thus, the message plaintext is obtained.
Further, the issuing end calculates H (R | | | Topic | | | Key) through SM3 algorithm Topic ) Generating a ciphertext C by an SM4 algorithm mess (ii) a The subscriber end calculates H (C) by SM3 algorithm mess ||R||Key Topic ) And H (R | | | Topic | | | Key) Topic )。
The invention has the beneficial effects that:
the invention uses SM2 algorithm to carry out digital signature on cipher texts of secret keys K1, username and password in the MQTT protocol, thereby not only achieving the effect of identity authentication, but also ensuring the authenticity and non-repudiation of data; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.
Drawings
FIG. 1 is a flow chart of the present invention.
FIG. 2 is a timing diagram of authentication according to the present invention.
FIG. 3 is a timing diagram illustrating key component acquisition and data transmission in the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention aims to solve the data security problem of the MQTT protocol and adds the identity authentication and data encryption functions of the MQTT protocol. In the traditional MQTT protocol, the MQTT Broker only carries out identity authentication on a publisher/subscriber through a username and a password, but both the username and the password are transmitted in a clear text and are easily illegally acquired by an attacker. In addition, all interactive data in the MQTT protocol are transmitted in the clear text, so that the safety is low. Aiming at the problems, the invention provides an MQTT protocol identity authentication and data encryption method based on a national cryptographic algorithm.
The invention is divided into three stages: the method comprises an identity authentication stage, a key component acquisition stage and a data transmission stage. The method comprises the following specific steps:
1. and (5) identity authentication phase. Before sending the message, the identity authentication function is added to ensure that a publishing terminal and a subscribing terminal which are accessed to the MQTT Broker are trustable.
1) Before the connection data packet is sent, the publishing terminal and the subscribing terminal (hereinafter referred to as the client terminal) are connected with the MQTT Broker.
Step 1: client side has SK as private key c Randomly selecting 16 bytes from the data to form a group of numbers K1, and passing through a certificate public key PK of MQTT Broker s And encrypting the K1 (SM 2 algorithm) to generate C1, and sending the client certificate and the C1 to the MQTT Broker.
Step 2: MQTT Broker passes through self private key SK s And C1 is decrypted to obtain the client information. Using SK s Signature generation σ 1 is performed on C1 (SM 2 algorithm), C1'= C1 is made, and C1' and σ 1 are transmitted to the client.
And 3, step 3: the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1, verifying the signatureAfter the certificate is passed, the client uses SK c Signature generation sigma 2 is carried out on C1 '(SM 2 algorithm), and C1' and sigma 2 are sent to MQTT Broker.
And 4, step 4: comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is completely the same, obtaining a public key PK of a client certificate c And verifying the signature sigma 2, and returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker.
2) Sending CONNECT packets
And 5: the client first encrypts the username and password (SM 4 algorithm), namely C up =E K1 (username&password)), and then by its own private key SK c To C up Signature Generation σ up (SM 2 Algorithm) to convert C up And σ up Putting the obtained product into a CONNECT data packet and sending the obtained product to MQTT Broker;
and 6: after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up Decrypting the ciphertext C after the signature verification passes up The obtained username and password, namely the username&password=D K1 (C up ). And after the identity authentication is passed, the CONNACK is returned to the client.
2. A key component acquisition phase. Because the MQTT Broker in the MQTT protocol only plays a role of forwarding the message without decrypting the message, the key component acquisition stage enables the issuer and the subscriber to acquire the same key component for assembling the same SM4 symmetric key.
And 7: before the SUBSCRIBE data packet and the PUBLISH data packet are sent, the Client sends the Client ID And subscribing to Topic to MQTT Broker.
And step 8: MQTT Broker checks whether the same Topic exists locally, and if not, calculates Key Topic =H(Topic||K1||SK s ) (SM 3 Algorithm), then Key is encrypted by K1 Topic (SM 4 Algorithm) to generate ciphertext C KeyTopic =E K1 (KeyTopic) reaction of C KeyTopic And sending the data to the client. If yes, directly encrypt Key through K1 Topic (SM 4 Algorithm) to generate ciphertext C KeyTopic And sent to the client.
And step 9: the subscriber receives the cipher text C KeyTopic And decrypt, i.e. Key Topic =D K1 (C KeyTopic )。
3. And (5) a data transmission stage.
Step 10: and the subscriber terminal sends a SUBSCRIBE data packet to the MQTT Broker and SUBSCRIBEs the subject content.
Step 11: the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) (SM 3 Algorithm) for encrypting the content of the corresponding Topic to generate a ciphertext C by using the first 16 bytes of the hash value as a data encryption Key mess (SM 4 Algorithm), the content in the PUBLISH data packet sent to MQTT Broker by the issuing terminal is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ))。
Step 12: the subscriber terminal calculates H (C) after receiving the PUBLISH data packet forwarded by the MQTT Broker mess ||R||Key Topic ) (SM 3 Algorithm) which is compared with H (C) received in the PUBLISH packet mess ||R||Key Topic ) By contrast, if the two are the same, then H (R | | | Topic | | Key) is calculated Topic ) (SM 3 Algorithm) and takes the first 16 bytes as a decryption Key to decrypt the message C mess . Thereby obtaining the message plaintext.
Compared with the prior art, the invention has the beneficial effects that: the SM2 algorithm is used for digitally signing the cipher texts of the keys K1, the username and the password in the MQTT protocol, so that the effect of identity authentication is achieved, and the authenticity and the non-repudiation of data are ensured; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (6)
1. A MQTT protocol identity authentication and data encryption method based on state encryption is characterized in that: in the identity authentication stage, before the CONNECT data packet is sent, the client is connected with the MQTT Broker;
client side has its private key SK c Randomly selecting 16 bytes from the data to form a group number K1, and passing through a certificate public key PK of MQTT Broker s Encrypting the K1 to generate C1; sending the client certificate and the C1 to an MQTT Broker;
MQTT Broker passes through self private key SK s Decrypting C1 to obtain client information, using SK s Signing C1 to generate sigma 1; let C1'= C1, send C1' and σ 1 to the client;
the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1; after signature verification passes, the client uses SK c Signing C1', generating sigma 2, and sending C1' and sigma 2 to MQTT Broker;
comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is identical, passing a client certificate public key PK c Verifying the signature sigma 2; returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker;
the client side firstly encrypts the username and password to generate C up (ii) a Then passes through the self private key SK c To C up Signature to generate sigma up And C is up And σ up Putting the obtained product into a CONNECT data packet and sending the obtained product to MQTT Broker;
after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up (ii) a Decrypting ciphertext C after signature verification is passed up And obtaining the username and password, and returning the CONNACK to the client after the identity authentication is passed.
2. According to claim 1The MQTT protocol identity authentication and data encryption method based on the state password is characterized in that: the client generates C1, sigma 2 and sigma through SM2 algorithm up Generating C by SM4 algorithm up 。
3. The MQTT protocol identity authentication and data encryption method based on the national password of claim 1, wherein the method comprises the following steps: in the key component acquisition stage, the Client sends a Client ID Subscribing Topic to MQTT Broker; MQTT Broker checks whether there is locally the same Topic; if there is no local identical Topic, generate Key Topic Then encrypt Key via K1 Topic Generating a ciphertext C KeyTopic And C is KeyTopic Sending the data to a client; if the same Topic exists locally, key is encrypted directly through K1 Topic Generating a ciphertext C KeyTopic And sent to the client.
4. The MQTT protocol identity authentication and data encryption method based on the national password according to claim 3, characterized in that: the MQTT Broker generates Key through SM3 algorithm Topic ,Key Topic =H(Topic||K1||SK s ) Generating a ciphertext C by an SM4 algorithm KeyTopic ,C KeyTopic =E K1 (KeyTopic)。
5. The MQTT protocol identity authentication and data encryption method based on the national password as claimed in claim 1, characterized in that: in the data transmission stage, a subscription end sends a SUBSCRIBE data packet to an MQTT Broker to SUBSCRIBE theme content;
the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) The first 16 bytes of the hash value are used as a data encryption Key to encrypt the content corresponding to Topic to generate a ciphertext C mess (ii) a The content in the PUBLISH data packet sent by the publishing terminal to the MQTT Broker is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ));
The subscriber receives MQTT BrokerPost-calculation of H (C) in PUBLISH data packet mess ||R||Key Topic ) It is then compared with H (C) received in PUBLISH packet mess ||R||Key Topic ) Comparing; if the two are the same, then H (R | | | Topic | | | Key) is calculated Topic ) And the first 16 bytes are taken as a decryption Key Key to decrypt the message C mess Thus, the message plaintext is obtained.
6. The MQTT protocol identity authentication and data encryption method based on the national password as claimed in claim 5, wherein the MQTT protocol identity authentication and data encryption method comprises the following steps: the issuing end calculates H (R | | | Topic | | Key) through SM3 algorithm Topic ) Generating a ciphertext C by an SM4 algorithm mess (ii) a The subscriber end calculates H (C) by SM3 algorithm mess ||R||Key Topic ) And H (R | | Topic | | Key) Topic )。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211378487.8A CN115776390B (en) | 2022-11-04 | 2022-11-04 | MQTT protocol identity authentication and data encryption method based on national secret |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211378487.8A CN115776390B (en) | 2022-11-04 | 2022-11-04 | MQTT protocol identity authentication and data encryption method based on national secret |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115776390A true CN115776390A (en) | 2023-03-10 |
CN115776390B CN115776390B (en) | 2024-04-09 |
Family
ID=85388788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211378487.8A Active CN115776390B (en) | 2022-11-04 | 2022-11-04 | MQTT protocol identity authentication and data encryption method based on national secret |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115776390B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118540167A (en) * | 2024-07-26 | 2024-08-23 | 中国交通信息科技集团有限公司 | IPK-based MQTT protocol identity authentication method and data transmission method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107708112A (en) * | 2017-11-02 | 2018-02-16 | 重庆邮电大学 | A kind of encryption method suitable for MQTT SN agreements |
WO2018112327A1 (en) * | 2016-12-15 | 2018-06-21 | Convida Wireless, Llc | Methods of concurrency control for block transfer in coap publish-subscribe architecture |
US20190174208A1 (en) * | 2017-12-05 | 2019-06-06 | The Government of the United States of America, as represented by the Secretary of Homeland Security | Systems and Methods for Integrating First Responder Technologies |
CN113098863A (en) * | 2021-03-31 | 2021-07-09 | 郑州信大捷安信息技术股份有限公司 | TLS + MQTT protocol-based Internet of things double-authentication method and system |
CN113612797A (en) * | 2021-08-23 | 2021-11-05 | 金陵科技学院 | Kerberos identity authentication protocol improvement method based on state cryptographic algorithm |
CN114553548A (en) * | 2022-02-24 | 2022-05-27 | 北京百度网讯科技有限公司 | Communication method, device, equipment and storage medium |
-
2022
- 2022-11-04 CN CN202211378487.8A patent/CN115776390B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018112327A1 (en) * | 2016-12-15 | 2018-06-21 | Convida Wireless, Llc | Methods of concurrency control for block transfer in coap publish-subscribe architecture |
CN107708112A (en) * | 2017-11-02 | 2018-02-16 | 重庆邮电大学 | A kind of encryption method suitable for MQTT SN agreements |
US20190174208A1 (en) * | 2017-12-05 | 2019-06-06 | The Government of the United States of America, as represented by the Secretary of Homeland Security | Systems and Methods for Integrating First Responder Technologies |
CN113098863A (en) * | 2021-03-31 | 2021-07-09 | 郑州信大捷安信息技术股份有限公司 | TLS + MQTT protocol-based Internet of things double-authentication method and system |
CN113612797A (en) * | 2021-08-23 | 2021-11-05 | 金陵科技学院 | Kerberos identity authentication protocol improvement method based on state cryptographic algorithm |
CN114553548A (en) * | 2022-02-24 | 2022-05-27 | 北京百度网讯科技有限公司 | Communication method, device, equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
JAIDIP KOTAK: ""A comparative analysis on security of MQTT brokers"", 《IEEE》, 30 June 2020 (2020-06-30) * |
郝志强等: ""工业领域网络流量安全分析关键技术研究"", 《工业信息安全》, 18 March 2022 (2022-03-18) * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118540167A (en) * | 2024-07-26 | 2024-08-23 | 中国交通信息科技集团有限公司 | IPK-based MQTT protocol identity authentication method and data transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN115776390B (en) | 2024-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9008312B2 (en) | System and method of creating and sending broadcast and multicast data | |
US7581100B2 (en) | Key generation method for communication session encryption and authentication system | |
US7299356B2 (en) | Key conversion method for communication session encryption and authentication system | |
CN104158653B (en) | A kind of safety communicating method based on the close algorithm of business | |
US7263619B1 (en) | Method and system for encrypting electronic message using secure ad hoc encryption key | |
Jager et al. | One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. | |
US12010216B2 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
CN112637136A (en) | Encrypted communication method and system | |
CN104168267A (en) | Identity authentication method for accessing SIP security video monitoring system | |
Hwang et al. | Two attacks on Neuman—Stubblebine authentication protocols | |
EP3476078A1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
CN106549858B (en) | Instant messaging encryption method based on identification password | |
CN101958907A (en) | Method, system and device for transmitting key | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
WO2010025638A1 (en) | Method, equipment and system of peer to peer live broadcast stream transfer | |
Mishra et al. | A pairing-free identity based authentication framework for cloud computing | |
CN112332986B (en) | Private encryption communication method and system based on authority control | |
CN111049738B (en) | E-mail data security protection method based on hybrid encryption | |
CN115776390B (en) | MQTT protocol identity authentication and data encryption method based on national secret | |
CN111049649A (en) | Zero-interaction key negotiation security enhancement protocol based on identification password | |
CN114338648A (en) | SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm | |
CN116760530A (en) | Lightweight authentication key negotiation method for electric power Internet of things terminal | |
Yao et al. | Post Quantum KEM authentication in SPDM for secure session establishment | |
CN114928503A (en) | Method for realizing secure channel and data transmission method | |
JPH0981523A (en) | Authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |