CN115776390A - MQTT protocol identity authentication and data encryption method based on state password - Google Patents

MQTT protocol identity authentication and data encryption method based on state password Download PDF

Info

Publication number
CN115776390A
CN115776390A CN202211378487.8A CN202211378487A CN115776390A CN 115776390 A CN115776390 A CN 115776390A CN 202211378487 A CN202211378487 A CN 202211378487A CN 115776390 A CN115776390 A CN 115776390A
Authority
CN
China
Prior art keywords
topic
key
mqtt
client
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211378487.8A
Other languages
Chinese (zh)
Other versions
CN115776390B (en
Inventor
刘泽超
梁涛
孙若尘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN202211378487.8A priority Critical patent/CN115776390B/en
Publication of CN115776390A publication Critical patent/CN115776390A/en
Application granted granted Critical
Publication of CN115776390B publication Critical patent/CN115776390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention belongs to the technical field of MQTT protocols, and particularly relates to a state-secret-based MQTT protocol identity authentication and data encryption method. The invention uses SM2 algorithm to carry out digital signature on the cipher texts of the secret keys K1, username and password in the MQTT protocol, thereby not only achieving the effect of identity authentication, but also ensuring the authenticity and non-repudiation of data; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.

Description

MQTT protocol identity authentication and data encryption method based on state password
Technical Field
The invention belongs to the technical field of MQTT protocols, and particularly relates to a state-secret-based MQTT protocol identity authentication and data encryption method.
Background
With the rapid development of the internet of things technology, the security problem of the internet of things also faces a serious challenge. The MQTT is an internet of things transmission protocol based on a publish/subscribe mode under the ISO standard, and is suitable for IoT scenes with low power consumption and limited network bandwidth due to the characteristics of light weight, simplicity, openness and easiness in implementation. In view of the fact that the traditional MQTT protocol lacks of a sufficient safety protection mechanism, the effective MQTT protocol protection measure is provided with great significance.
The national cryptographic algorithm is a cryptographic algorithm standard and an application specification thereof which are recognized and published by the national cryptographic administration, and is a set of data encryption processing series algorithms which are independently developed in the cryptographic core field of China. Cryptographic algorithms have been promulgated as: symmetric encryption algorithms (SM 1, SM 4), asymmetric encryption algorithms (SM 2, SM 9), hash cipher algorithms (SM 3), and the like. At present, the autonomous controllable cryptographic algorithm is vigorously popularized by China, and the popularization of the cryptographic algorithm has important significance for improving the network information safety and autonomous controllable level of China.
The MQTT (message queue telemetry transport) protocol is a message transport protocol based on a proxy publish/subscribe mode, and belongs to an application layer protocol above a TCP/IP protocol. The system is widely used in the aspects of intelligent medical treatment, intelligent home, power equipment monitoring and the like. The MQTT protocol has three roles: the system comprises a subscription end, a publishing end and an MQTT Broker, wherein the subscription end and the publishing end are collectively called as clients, and the MQTT Broker is a proxy server. The subscription end sends a subscription theme to the MQTT Broker; the issuing end issues the theme content to the MQTT Broker; the MQTT Broker is responsible for forwarding messages. Because the data in the MQTT protocol is transmitted in the plaintext all the time in the transmission process, the data security cannot be guaranteed. Therefore, the invention utilizes SM2 algorithm, SM3 algorithm and SM4 algorithm to add the functions of identity authentication and data encryption to the MQTT protocol, thereby solving the safety problem of the MQTT protocol.
Disclosure of Invention
The invention aims to provide an MQTT protocol identity authentication and data encryption method based on a national password.
An MQTT protocol identity authentication and data encryption method based on state encryption is characterized in that in an identity authentication stage, a client is connected with an MQTT Broker before a CONNECT data packet is sent;
client side has its private key SK c Randomly selecting 16 bytes from the data to form a group of numbers K1, and passing through a certificate public key PK of MQTT Broker s Encrypting the K1 to generate C1; sending the client certificate and the C1 to an MQTT Broker;
MQTT Broker byPersonal key SK s Decrypting C1 to obtain client information, using SK s Signing C1 to generate sigma 1; let C1'= C1, send C1' and σ 1 to the client;
the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1; after signature verification passes, the client uses SK c Signing C1', generating sigma 2, and sending C1' and sigma 2 to MQTT Broker;
comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is completely the same, obtaining a public key PK of a client certificate c Verifying the signature sigma 2; returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker;
the client firstly encrypts the username and password to generate C up (ii) a Then passes through the self private key SK c To C up Signature to generate sigma up And C is up And σ up Putting the data into a CONNECT data packet and sending the data packet to MQTT Broker;
after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up (ii) a Decrypting ciphertext C after signature verification is passed up And obtaining the username and password, and returning the CONNACK to the client after the identity authentication is passed.
Further, the client generates C1, sigma 2 and sigma through SM2 algorithm up Generation of C by SM4 algorithm up
Further, in the key component acquisition stage, the Client sends the Client ID Subscribing Topic to MQTT Broker; MQTT Broker checks whether there is locally the same Topic; if there is no local identical Topic, generate Key Topic Then encrypt Key by K1 Topic Generating a ciphertext C KeyTopic And C is KeyTopic Sending the data to a client; if the same topoc exists locally, key is encrypted directly through K1 Topic Generating a ciphertext C KeyTopic And sent to the client.
Further, the MQTT Broker generating Key by SM3 algorithm Topic ,Key Topic =H(Topic||K1||SK s ) Generating a ciphertext C by an SM4 algorithm KeyTopic ,C KeyTopic =E K1 (KeyTopic)。
Further, in a data transmission stage, a subscriber terminal sends a SUBSCRIBE data packet to an MQTT Broker to SUBSCRIBE theme content;
the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) The first 16 bytes of the hash value are used as a data encryption Key to encrypt the content corresponding to Topic to generate a ciphertext C mess (ii) a The content in the PUBLISH data packet sent by the publishing terminal to the MQTT Broker is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ));
The subscriber terminal calculates H (C) after receiving the PUBLISH data packet forwarded by the MQTT Broker mess ||R||Key Topic ) It is then compared with H (C) received in PUBLISH packet mess ||R||Key Topic ) Comparing; if the two are the same, H (R | | | Topic | | | Key) is calculated Topic ) And the first 16 bytes are taken as a decryption Key Key to decrypt the message C mess Thus, the message plaintext is obtained.
Further, the issuing end calculates H (R | | | Topic | | | Key) through SM3 algorithm Topic ) Generating a ciphertext C by an SM4 algorithm mess (ii) a The subscriber end calculates H (C) by SM3 algorithm mess ||R||Key Topic ) And H (R | | | Topic | | | Key) Topic )。
The invention has the beneficial effects that:
the invention uses SM2 algorithm to carry out digital signature on cipher texts of secret keys K1, username and password in the MQTT protocol, thereby not only achieving the effect of identity authentication, but also ensuring the authenticity and non-repudiation of data; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.
Drawings
FIG. 1 is a flow chart of the present invention.
FIG. 2 is a timing diagram of authentication according to the present invention.
FIG. 3 is a timing diagram illustrating key component acquisition and data transmission in the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention aims to solve the data security problem of the MQTT protocol and adds the identity authentication and data encryption functions of the MQTT protocol. In the traditional MQTT protocol, the MQTT Broker only carries out identity authentication on a publisher/subscriber through a username and a password, but both the username and the password are transmitted in a clear text and are easily illegally acquired by an attacker. In addition, all interactive data in the MQTT protocol are transmitted in the clear text, so that the safety is low. Aiming at the problems, the invention provides an MQTT protocol identity authentication and data encryption method based on a national cryptographic algorithm.
The invention is divided into three stages: the method comprises an identity authentication stage, a key component acquisition stage and a data transmission stage. The method comprises the following specific steps:
1. and (5) identity authentication phase. Before sending the message, the identity authentication function is added to ensure that a publishing terminal and a subscribing terminal which are accessed to the MQTT Broker are trustable.
1) Before the connection data packet is sent, the publishing terminal and the subscribing terminal (hereinafter referred to as the client terminal) are connected with the MQTT Broker.
Step 1: client side has SK as private key c Randomly selecting 16 bytes from the data to form a group of numbers K1, and passing through a certificate public key PK of MQTT Broker s And encrypting the K1 (SM 2 algorithm) to generate C1, and sending the client certificate and the C1 to the MQTT Broker.
Step 2: MQTT Broker passes through self private key SK s And C1 is decrypted to obtain the client information. Using SK s Signature generation σ 1 is performed on C1 (SM 2 algorithm), C1'= C1 is made, and C1' and σ 1 are transmitted to the client.
And 3, step 3: the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1, verifying the signatureAfter the certificate is passed, the client uses SK c Signature generation sigma 2 is carried out on C1 '(SM 2 algorithm), and C1' and sigma 2 are sent to MQTT Broker.
And 4, step 4: comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is completely the same, obtaining a public key PK of a client certificate c And verifying the signature sigma 2, and returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker.
2) Sending CONNECT packets
And 5: the client first encrypts the username and password (SM 4 algorithm), namely C up =E K1 (username&password)), and then by its own private key SK c To C up Signature Generation σ up (SM 2 Algorithm) to convert C up And σ up Putting the obtained product into a CONNECT data packet and sending the obtained product to MQTT Broker;
and 6: after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up Decrypting the ciphertext C after the signature verification passes up The obtained username and password, namely the username&password=D K1 (C up ). And after the identity authentication is passed, the CONNACK is returned to the client.
2. A key component acquisition phase. Because the MQTT Broker in the MQTT protocol only plays a role of forwarding the message without decrypting the message, the key component acquisition stage enables the issuer and the subscriber to acquire the same key component for assembling the same SM4 symmetric key.
And 7: before the SUBSCRIBE data packet and the PUBLISH data packet are sent, the Client sends the Client ID And subscribing to Topic to MQTT Broker.
And step 8: MQTT Broker checks whether the same Topic exists locally, and if not, calculates Key Topic =H(Topic||K1||SK s ) (SM 3 Algorithm), then Key is encrypted by K1 Topic (SM 4 Algorithm) to generate ciphertext C KeyTopic =E K1 (KeyTopic) reaction of C KeyTopic And sending the data to the client. If yes, directly encrypt Key through K1 Topic (SM 4 Algorithm) to generate ciphertext C KeyTopic And sent to the client.
And step 9: the subscriber receives the cipher text C KeyTopic And decrypt, i.e. Key Topic =D K1 (C KeyTopic )。
3. And (5) a data transmission stage.
Step 10: and the subscriber terminal sends a SUBSCRIBE data packet to the MQTT Broker and SUBSCRIBEs the subject content.
Step 11: the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) (SM 3 Algorithm) for encrypting the content of the corresponding Topic to generate a ciphertext C by using the first 16 bytes of the hash value as a data encryption Key mess (SM 4 Algorithm), the content in the PUBLISH data packet sent to MQTT Broker by the issuing terminal is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ))。
Step 12: the subscriber terminal calculates H (C) after receiving the PUBLISH data packet forwarded by the MQTT Broker mess ||R||Key Topic ) (SM 3 Algorithm) which is compared with H (C) received in the PUBLISH packet mess ||R||Key Topic ) By contrast, if the two are the same, then H (R | | | Topic | | Key) is calculated Topic ) (SM 3 Algorithm) and takes the first 16 bytes as a decryption Key to decrypt the message C mess . Thereby obtaining the message plaintext.
Compared with the prior art, the invention has the beneficial effects that: the SM2 algorithm is used for digitally signing the cipher texts of the keys K1, the username and the password in the MQTT protocol, so that the effect of identity authentication is achieved, and the authenticity and the non-repudiation of data are ensured; key data such as username, password and theme message in the MQTT protocol are encrypted by using SM4 algorithm, so that the confidentiality of the data is increased, and the problem of data leakage is solved; the SM3 algorithm is used for ensuring the integrity of the subject message in the MQTT protocol and preventing data from being illegally tampered.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A MQTT protocol identity authentication and data encryption method based on state encryption is characterized in that: in the identity authentication stage, before the CONNECT data packet is sent, the client is connected with the MQTT Broker;
client side has its private key SK c Randomly selecting 16 bytes from the data to form a group number K1, and passing through a certificate public key PK of MQTT Broker s Encrypting the K1 to generate C1; sending the client certificate and the C1 to an MQTT Broker;
MQTT Broker passes through self private key SK s Decrypting C1 to obtain client information, using SK s Signing C1 to generate sigma 1; let C1'= C1, send C1' and σ 1 to the client;
the client compares the received C1' with the local C1, and if the comparison result is identical, the PK is used s Verifying the signature sigma 1; after signature verification passes, the client uses SK c Signing C1', generating sigma 2, and sending C1' and sigma 2 to MQTT Broker;
comparing the received C1' with the local C1 by the MQTT Broker, and if the comparison result is identical, passing a client certificate public key PK c Verifying the signature sigma 2; returning a verification result after the signature verification is passed, wherein K1 is an SM4 symmetric key between the client and the MQTT Broker;
the client side firstly encrypts the username and password to generate C up (ii) a Then passes through the self private key SK c To C up Signature to generate sigma up And C is up And σ up Putting the obtained product into a CONNECT data packet and sending the obtained product to MQTT Broker;
after receiving the CONNECT data packet, the MQTT Broker firstly passes through a public key PK of a client certificate c Verifying signature sigma up (ii) a Decrypting ciphertext C after signature verification is passed up And obtaining the username and password, and returning the CONNACK to the client after the identity authentication is passed.
2. According to claim 1The MQTT protocol identity authentication and data encryption method based on the state password is characterized in that: the client generates C1, sigma 2 and sigma through SM2 algorithm up Generating C by SM4 algorithm up
3. The MQTT protocol identity authentication and data encryption method based on the national password of claim 1, wherein the method comprises the following steps: in the key component acquisition stage, the Client sends a Client ID Subscribing Topic to MQTT Broker; MQTT Broker checks whether there is locally the same Topic; if there is no local identical Topic, generate Key Topic Then encrypt Key via K1 Topic Generating a ciphertext C KeyTopic And C is KeyTopic Sending the data to a client; if the same Topic exists locally, key is encrypted directly through K1 Topic Generating a ciphertext C KeyTopic And sent to the client.
4. The MQTT protocol identity authentication and data encryption method based on the national password according to claim 3, characterized in that: the MQTT Broker generates Key through SM3 algorithm Topic ,Key Topic =H(Topic||K1||SK s ) Generating a ciphertext C by an SM4 algorithm KeyTopic ,C KeyTopic =E K1 (KeyTopic)。
5. The MQTT protocol identity authentication and data encryption method based on the national password as claimed in claim 1, characterized in that: in the data transmission stage, a subscription end sends a SUBSCRIBE data packet to an MQTT Broker to SUBSCRIBE theme content;
the issuing end generates a random number R of 16 bytes and calculates H (R | | | Topic | | Key) Topic ) The first 16 bytes of the hash value are used as a data encryption Key to encrypt the content corresponding to Topic to generate a ciphertext C mess (ii) a The content in the PUBLISH data packet sent by the publishing terminal to the MQTT Broker is PUBLISH (Topic, C) mess +R+H(C mess ||R||Key Topic ));
The subscriber receives MQTT BrokerPost-calculation of H (C) in PUBLISH data packet mess ||R||Key Topic ) It is then compared with H (C) received in PUBLISH packet mess ||R||Key Topic ) Comparing; if the two are the same, then H (R | | | Topic | | | Key) is calculated Topic ) And the first 16 bytes are taken as a decryption Key Key to decrypt the message C mess Thus, the message plaintext is obtained.
6. The MQTT protocol identity authentication and data encryption method based on the national password as claimed in claim 5, wherein the MQTT protocol identity authentication and data encryption method comprises the following steps: the issuing end calculates H (R | | | Topic | | Key) through SM3 algorithm Topic ) Generating a ciphertext C by an SM4 algorithm mess (ii) a The subscriber end calculates H (C) by SM3 algorithm mess ||R||Key Topic ) And H (R | | Topic | | Key) Topic )。
CN202211378487.8A 2022-11-04 2022-11-04 MQTT protocol identity authentication and data encryption method based on national secret Active CN115776390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211378487.8A CN115776390B (en) 2022-11-04 2022-11-04 MQTT protocol identity authentication and data encryption method based on national secret

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211378487.8A CN115776390B (en) 2022-11-04 2022-11-04 MQTT protocol identity authentication and data encryption method based on national secret

Publications (2)

Publication Number Publication Date
CN115776390A true CN115776390A (en) 2023-03-10
CN115776390B CN115776390B (en) 2024-04-09

Family

ID=85388788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211378487.8A Active CN115776390B (en) 2022-11-04 2022-11-04 MQTT protocol identity authentication and data encryption method based on national secret

Country Status (1)

Country Link
CN (1) CN115776390B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118540167A (en) * 2024-07-26 2024-08-23 中国交通信息科技集团有限公司 IPK-based MQTT protocol identity authentication method and data transmission method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107708112A (en) * 2017-11-02 2018-02-16 重庆邮电大学 A kind of encryption method suitable for MQTT SN agreements
WO2018112327A1 (en) * 2016-12-15 2018-06-21 Convida Wireless, Llc Methods of concurrency control for block transfer in coap publish-subscribe architecture
US20190174208A1 (en) * 2017-12-05 2019-06-06 The Government of the United States of America, as represented by the Secretary of Homeland Security Systems and Methods for Integrating First Responder Technologies
CN113098863A (en) * 2021-03-31 2021-07-09 郑州信大捷安信息技术股份有限公司 TLS + MQTT protocol-based Internet of things double-authentication method and system
CN113612797A (en) * 2021-08-23 2021-11-05 金陵科技学院 Kerberos identity authentication protocol improvement method based on state cryptographic algorithm
CN114553548A (en) * 2022-02-24 2022-05-27 北京百度网讯科技有限公司 Communication method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018112327A1 (en) * 2016-12-15 2018-06-21 Convida Wireless, Llc Methods of concurrency control for block transfer in coap publish-subscribe architecture
CN107708112A (en) * 2017-11-02 2018-02-16 重庆邮电大学 A kind of encryption method suitable for MQTT SN agreements
US20190174208A1 (en) * 2017-12-05 2019-06-06 The Government of the United States of America, as represented by the Secretary of Homeland Security Systems and Methods for Integrating First Responder Technologies
CN113098863A (en) * 2021-03-31 2021-07-09 郑州信大捷安信息技术股份有限公司 TLS + MQTT protocol-based Internet of things double-authentication method and system
CN113612797A (en) * 2021-08-23 2021-11-05 金陵科技学院 Kerberos identity authentication protocol improvement method based on state cryptographic algorithm
CN114553548A (en) * 2022-02-24 2022-05-27 北京百度网讯科技有限公司 Communication method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JAIDIP KOTAK: ""A comparative analysis on security of MQTT brokers"", 《IEEE》, 30 June 2020 (2020-06-30) *
郝志强等: ""工业领域网络流量安全分析关键技术研究"", 《工业信息安全》, 18 March 2022 (2022-03-18) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118540167A (en) * 2024-07-26 2024-08-23 中国交通信息科技集团有限公司 IPK-based MQTT protocol identity authentication method and data transmission method

Also Published As

Publication number Publication date
CN115776390B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
US7581100B2 (en) Key generation method for communication session encryption and authentication system
US7299356B2 (en) Key conversion method for communication session encryption and authentication system
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
US7263619B1 (en) Method and system for encrypting electronic message using secure ad hoc encryption key
Jager et al. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
US12010216B2 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
CN112637136A (en) Encrypted communication method and system
CN104168267A (en) Identity authentication method for accessing SIP security video monitoring system
Hwang et al. Two attacks on Neuman—Stubblebine authentication protocols
EP3476078A1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN106549858B (en) Instant messaging encryption method based on identification password
CN101958907A (en) Method, system and device for transmitting key
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
WO2010025638A1 (en) Method, equipment and system of peer to peer live broadcast stream transfer
Mishra et al. A pairing-free identity based authentication framework for cloud computing
CN112332986B (en) Private encryption communication method and system based on authority control
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN115776390B (en) MQTT protocol identity authentication and data encryption method based on national secret
CN111049649A (en) Zero-interaction key negotiation security enhancement protocol based on identification password
CN114338648A (en) SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm
CN116760530A (en) Lightweight authentication key negotiation method for electric power Internet of things terminal
Yao et al. Post Quantum KEM authentication in SPDM for secure session establishment
CN114928503A (en) Method for realizing secure channel and data transmission method
JPH0981523A (en) Authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant