CN116614303A - Encryption method for network and information security - Google Patents

Encryption method for network and information security Download PDF

Info

Publication number
CN116614303A
CN116614303A CN202310744837.6A CN202310744837A CN116614303A CN 116614303 A CN116614303 A CN 116614303A CN 202310744837 A CN202310744837 A CN 202310744837A CN 116614303 A CN116614303 A CN 116614303A
Authority
CN
China
Prior art keywords
key
encryption
ciphertext
signature
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310744837.6A
Other languages
Chinese (zh)
Inventor
房秀文
马俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengtian Technology Co ltd
Original Assignee
Zhengtian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengtian Technology Co ltd filed Critical Zhengtian Technology Co ltd
Priority to CN202310744837.6A priority Critical patent/CN116614303A/en
Publication of CN116614303A publication Critical patent/CN116614303A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of network security, and discloses a network and information security encryption method, which comprises the following steps: s1, performing DES encryption on a message digest through a session key; s2, generating a public key and a private key through an RAS; s3, authenticating the session key through fingerprints, and carrying out RAS encryption on the session key through the public key; and S4, sending the signature and the ciphertext to a receiver. The invention carries out the mixed encryption mode of the message by the symmetric encryption algorithm DES and the asymmetric encryption algorithm RAS, and carries out the identity authentication by fingerprints in the encryption process, has the functions of digital signature and authentication, can check the correctness of the signature and the secret key, ensures the integrity and the authenticity of the transmitted data, and ensures that the data is not easy to be tampered; and the encrypted key ciphertext is also stored in the file, so that the key safety is ensured, the key is not required to be independently transmitted, the risk of secret leakage of the key is reduced, and the safety of file transmission is improved.

Description

Encryption method for network and information security
Technical Field
The invention relates to the technical field of network security, in particular to an encryption method for network and information security.
Background
With the development of the information age, computer networks have become an information exchange tool that is most important in our daily lives, but are revealed when information is transferred in the network, so that network security is increasingly receiving attention from enterprises and individuals. Encryption algorithm is one of important means for protecting information security; among them, DES (Data Encryption Standard) is a fast symmetric encryption algorithm, and is widely used in the field of commercial encryption. But the key length is shorter, and the key is easy to be threatened by attack means such as violent cracking, differential attack and the like; RSA (Ron Rivest, adi Shamir, leonard Adleman) is an asymmetric key encryption algorithm with higher security; but the encryption and decryption process takes a long time due to its slow speed. Due to the continuous evolution of encryption algorithms and the continuous improvement of encryption technologies, a single encryption algorithm often cannot completely meet the security requirements of cryptography. Thus, hybrid encryption algorithms have evolved.
The Chinese patent discloses a key management method and system (bulletin number CN 108092761B) based on RSA and 3DES, the technology of the patent is greatly improved in safety compared with the traditional single encryption protection of base64 and 3DES, the RSA is only used for guaranteeing the distribution of 3DES secret key pairs, the encryption and decryption of service data are processed by the 3DES algorithm, the encryption and decryption efficiency of the service request is furthest improved, but the integrity and the authenticity of the transmission data cannot be guaranteed, so that the data can be tampered and cannot be easily found.
Disclosure of Invention
The invention aims to provide a network and information security encryption method to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
an encryption method for network and information security, which is based on a secure transmission system for encrypting, decrypting and transmitting information, is characterized by comprising the following steps:
s1, firstly calculating a message to be transmitted through a Hash function to generate a message abstract with a fixed length; generating a 64-bit random number serving as a session key through a symmetric encryption algorithm DES, and performing DES encryption on the message digest to obtain a ciphertext;
s2, generating a public key and a private key through an asymmetric encryption algorithm RAS, and disclosing the public key and keeping the private key secret;
s3, authenticating the session key to an identity authentication center through the fingerprint, and performing RAS encryption on the session key after fingerprint authentication through the public key to obtain a signature;
s4, the sender combines the signature and the ciphertext and sends the signature and the ciphertext to the receiver; after receiving the signature and the ciphertext, the receiver can decrypt the signature and the ciphertext by using the private key.
As still further aspects of the invention: in the step S1, the DES encryption method is as follows:
s11, initially replacing IP, namely firstly dividing a plaintext into bit strings with the same length as 64 bits, and then replacing the bit strings by the initially replacing IP; obtaining a new bit string with 64 bits and equal length;
s12, dividing the new bit string into a left half and a right half, and 32 bits each;
s13, carrying out 16 iterations on the new bit string through an encryption function; the result obtained after iteration is subjected to inverse initial substitution IP -1 And re-scrambling the new bit string, and obtaining an output result which is 64-bit ciphertext.
As still further aspects of the invention: in the step S2, the identity authentication method is as follows: registering the fingerprint in a sample database in advance, setting a corresponding identification code, inputting a fingerprint image and inputting the identification code during comparison, extracting a fingerprint sample from the database by the system according to the identification code, preprocessing the fingerprint image, and comparing the fingerprint image with the characteristics of the input fingerprint to obtain a fingerprint comparison result; and when the two results are consistent, the identity authentication is completed.
As still further aspects of the invention: in the step S3, the RAS encryption method is as follows:
s21, arbitrarily selecting two different large prime numbers p and q, and calculating a product n=p×q; randomly selecting an encryption key K e So that K is e Is compatible with (p-1), (q-1), K e As public key, and let n and K e Public, wherein p and q are discarded and are not known to anyone;
s23, calculating decryption key K by reusing Euclid algorithm d So that it meets K d *e=1(mod(p-1)*(q-1));K d As a private key and in secret;
s24, encrypting the plaintext Q into ciphertext C, wherein,encryption is completed.
As still further aspects of the invention: the secure transmission system comprises a system management module, a key management module, a hybrid encryption and decryption module and a file transmission module;
the system management module is used for user login authentication, based on user role access, a user can call out the authority of the user according to the role information owned by the user when logging in, and the operation beyond the authority of the user is forbidden forcedly according to the authority.
As still further aspects of the invention: the key management module comprises a key generation unit, a key preservation unit, a key modification unit, a key inquiry unit and a key release unit.
As still further aspects of the invention: the mixed encryption and decryption module comprises a mixed encryption unit and a mixed decryption unit, and the file transmission module comprises a file sending unit and a file receiving unit; the file sending unit is used for receiving the connection request of the client, receiving the information of the client and the sent encrypted file, and sending a receiving result and response information to the client; the file receiving unit is used for applying for connecting to the server, sending a file transmission request to the server and processing a receiving result sent back by the server.
Compared with the prior art, the invention has the beneficial effects that:
the invention carries out the mixed encryption mode of the message by the symmetric encryption algorithm DES and the asymmetric encryption algorithm RAS, and carries out the identity authentication by fingerprints in the encryption process, has the functions of digital signature and authentication, can check the correctness of the signature and the secret key, ensures the integrity and the authenticity of the transmitted data, and ensures that the data is not easy to be tampered; and the encrypted key ciphertext is also stored in the file, so that the key safety is ensured, the key is not required to be independently transmitted, the risk of secret leakage of the key is reduced, and the safety of file transmission is improved.
Detailed Description
In the embodiment of the invention, a network and information security encryption method is used for encrypting, decrypting and transmitting information based on a security transmission system and comprises the following steps:
s1, calculating a message X to be sent through a Hash function to generate a message abstract Hash (X) with a fixed length; then generating a 64-bit random number as a session key K through a symmetric encryption algorithm DES h Performing DES encryption on the message digest Hash (X) to obtain a ciphertext DES (X);
s2, generating a public key K through an asymmetric encryption algorithm RAS e And a private key K d And public key K e Public, but keep private key secret K d
S3, the session key K is further processed through fingerprints h Authentication is performed to the identity authentication center, and then public key K is used for authentication d Session key K after fingerprint authentication h RAS encryption is carried out to obtain a signature (Hash (X), K);
s4, the sender combines the signature (Hash (X), K) and the ciphertext DES (X) and then sends the signature (Hash (X), K) and the ciphertext DES (X) to the receiver; after the receiver receives the signature (Hash (X), K) and ciphertext DES (X), the receiver uses the private key K d Decryption may be performed.
Preferably, in step S1, the DES encryption method is as follows:
s11, initially replacing IP, firstly dividing a plaintext into bit strings m with 64 bits and equal length i Then the bit string m is subjected to initial substitution IP i Transposition is carried out; obtaining a new bit string m with 64 bits and equal length j
S12, new bit string m j Is divided into left and right halves, the left half is called L j The right half is called R j 32 bits each;
s13, the new bit string m is subjected to encryption function f j Is performed for 16 iterations; the result obtained after iteration is subjected to inverse initial substitution IP -1 New bit string m j Re-scrambling, and obtaining an output result which is 64-bit ciphertext; realizing the key K by means of an encryption function f j For R j-1 As a result of encryption of 32-bit data set f (R j-1 ,K j ) And f (R) j-1 ,K j ) And L is equal to j Modulo-2 addition, again yielding a 32 bitData sets of (2)Then use->R as second encryption iteration j By R j-1 L as an iteration of the second encryption j Ending the first encryption iteration process; the second to 16 th encryption iterations use the subkey K respectively 2 ,…,K 16 The process is the same as the first encryption iteration.
Preferably, in step S2, the method of identity authentication is as follows: registering the fingerprint in a sample database in advance, setting a corresponding identification code, inputting a fingerprint image and inputting the identification code during comparison, extracting a fingerprint sample from the database by the system according to the identification code, preprocessing the fingerprint image, and comparing the fingerprint image with the characteristics of the input fingerprint to obtain a fingerprint comparison result; and when the two results are consistent, the identity authentication is completed.
Preferably, in the step S3, the method for encrypting and decrypting the RAS is as follows:
s21, arbitrarily selecting two different large prime numbers p and q, and calculating a product n=p×q; randomly selecting an encryption key K e So that K is e Is compatible with (p-1), (q-1), K e As public key, and let n and K e Public, wherein p and q are discarded and are not known to anyone;
s23, calculating decryption key K by reusing Euclid algorithm d So that it meets K d *e=1(mod(p-1)*(q-1));K d As a private key and in secret;
s24, encrypting the plaintext Q into ciphertext C, wherein,finishing encryption; if the ciphertext C is decrypted into plaintext Q, wherein ++>Decryption is completed, and p and q are discarded, so that the decryption cannot be performed according to n and qK e To calculate K d The method comprises the steps of carrying out a first treatment on the surface of the Thus, anyone can encrypt the plaintext, but only the authorized user (i.e. knows K d ) The ciphertext may be decrypted.
Preferably, the secure transmission system comprises a system management module, a key management module, a hybrid encryption and decryption module and a file transmission module;
the system management module is used for user login authentication, based on user role access, a user can call out the authority of the user according to the role information owned by the user when logging in, and the operation beyond the authority of the user is forbidden forcedly according to the authority; for example, the administrator can perform operations of adding a user, deleting a user, modifying a password, and resetting a password, whereas the general user can perform only operations of modifying a password.
Preferably, the key management module includes a key generation unit, a key saving unit, a key modification unit, a key inquiry unit, and a key issuing unit.
Preferably, the hybrid encryption and decryption module comprises a hybrid encryption unit and a hybrid decryption unit, and the file transmission module comprises a file sending unit and a file receiving unit; the file sending unit is used for receiving the connection request of the client, receiving the information of the client and the sent encrypted file, and sending a receiving result and response information to the client; the file receiving unit is used for applying for connecting to the server, sending a file transmission request to the server and processing a receiving result sent back by the server.
To better illustrate the technical effects of the present invention, an explanation is given by way of example:
for example, the first company needs to send a bidding document X to the second company of bidding units through an electronic network, so as to prevent the document from being intercepted by a competitor, thereby enabling the competitor to obtain own base price and losing competitiveness, and therefore, the document needs to be encrypted;
project manager Zhang Mou of company a selects bidding document X to be transmitted from computer, then calculates bidding document X to be transmitted through Hash function to generate message abstract Hash (X) with fixed length; then generating a 6 by symmetric encryption algorithm DES4-bit random number as session key K h And the session key K h Storing the data into a memory of a computer; then pass through the session key K h Performing DES encryption on the message digest Hash (X) to obtain a ciphertext DES (X);
then Zhang Mou generates a public key K by the asymmetric encryption algorithm RAS e And a private key K d And public key K e Public, but keep private key secret K d The method comprises the steps of carrying out a first treatment on the surface of the Next, zhang Mou registers its own fingerprint in the authentication center, and uses its own fingerprint to store the session key K h Authenticating the identity authentication center, and passing through the public key K after authentication is completed d Session key K after fingerprint authentication h RAS encryption is carried out to obtain a signature (Hash (X), K);
next, zhang Mou sends the signature (Hash (X), K) to company b together with the ciphertext DES (X); after the signature (Hash (X), K) and ciphertext DES (X) are received by company b Li Mou, the private key K in the RAS pair is encrypted using an asymmetric encryption algorithm d Decrypting the signature (Hash (X), K) to obtain the original session key K h The method comprises the steps of carrying out a first treatment on the surface of the Reuse of session key K h The ciphertext DES (X) is decrypted, and the ciphertext DES (X) can be restored into the original data for review.
When the signature (Hash (X), K) and the ciphertext DES (X) are stolen by Wang Mou of a third party company in the communication transmission process, wang Mou, in order to enable the third party company to be unable to bid, the ciphertext DES (X) is modified to DES (X ') so as to improve the bid probability of the third party company, the signature (Hash (X), K) is modified to be (Hash (X'), and when Li Mou of the fourth party company receives the signature (Hash (X '), K') and DES (X '), the bidding document X can be tampered by comparing the message abstract Hash (X) with the Hash (X');
when the company Wang Mou of the company C impersonates Zhang Mou of the company A, the company B is signed (Hash (X '), K') by Li Mou, and as the company A Wang Mou cannot obtain the fingerprint of the company A Zhang Mou, the identity authentication cannot be passed, the RAS encryption cannot be carried out, and thus the signature cannot be successful;
in order to obtain improper benefits, li Mou of company b wants to tamper the bidding document X with X 'and tamper the message digest Hash (X) with Hash (X'), but Li Mou of company b cannot obtain decrypted (Hash (X '), K'), so Li Mou of company b cannot be fraudulent by tampering with the bidding document X;
when company b Li Mou holds the decrypted signature (Hash (X), K), after company a has bid, the previous bid is considered too low to acknowledge the previous bid file X, nor is it able to repudiate the transmitted message X.
The present invention is not limited to the above-mentioned embodiments, and any person skilled in the art, based on the technical solution of the present invention and the inventive concept thereof, can be replaced or changed equally within the scope of the present invention.

Claims (7)

1. An encryption method for network and information security, which is based on a secure transmission system for encrypting, decrypting and transmitting information, is characterized by comprising the following steps:
s1, firstly calculating a message to be transmitted through a Hash function to generate a message abstract with a fixed length; generating a 64-bit random number serving as a session key through a symmetric encryption algorithm DES, and performing DES encryption on the message digest to obtain a ciphertext;
s2, generating a public key and a private key through an asymmetric encryption algorithm RAS, and disclosing the public key and keeping the private key secret;
s3, authenticating the session key to an identity authentication center through the fingerprint, and performing RAS encryption on the session key after fingerprint authentication through the public key to obtain a signature;
s4, the sender combines the signature and the ciphertext and sends the signature and the ciphertext to the receiver; after receiving the signature and the ciphertext, the receiver can decrypt the signature and the ciphertext by using the private key.
2. The encryption method for network and information security according to claim 1, wherein in the step S1, the DES encryption method is as follows:
s11, initially replacing IP, namely firstly dividing a plaintext into bit strings with the same length as 64 bits, and then replacing the bit strings by the initially replacing IP; obtaining a new bit string with 64 bits and equal length;
s12, dividing the new bit string into a left half and a right half, and 32 bits each;
s13, carrying out 16 iterations on the new bit string through an encryption function; the result obtained after iteration is subjected to inverse initial substitution IP -1 And re-scrambling the new bit string, and obtaining an output result which is 64-bit ciphertext.
3. The method for encrypting network and information security according to claim 1, wherein in said step S2, the method for authenticating identity is as follows: registering the fingerprint in a sample database in advance, setting a corresponding identification code, inputting a fingerprint image and inputting the identification code during comparison, extracting a fingerprint sample from the database by the system according to the identification code, preprocessing the fingerprint image, and comparing the fingerprint image with the characteristics of the input fingerprint to obtain a fingerprint comparison result; and when the two results are consistent, the identity authentication is completed.
4. The encryption method for network and information security according to claim 1, wherein in the step S3, the RAS encryption method is as follows:
s21, arbitrarily selecting two different large prime numbers p and q, and calculating a product n=p×q; randomly selecting an encryption key K e So that K is e Is compatible with (p-1), (q-1), K e As public key, and let n and K e Public, wherein p and q are discarded and are not known to anyone;
s23, calculating decryption key K by reusing Euclid algorithm d So that it meets K d *e=1(mod(p-1)*(q-1));K d As a private key and in secret;
s24, encrypting the plaintext Q into ciphertext C, wherein,encryption is completed.
5. The network and information security encryption method according to claim 1, wherein the secure transmission system comprises a system management module, a key management module, a hybrid encryption and decryption module and a file transmission module;
the system management module is used for user login authentication, based on user role access, a user can call out the authority of the user according to the role information owned by the user when logging in, and the operation beyond the authority of the user is forbidden forcedly according to the authority.
6. The encryption method according to claim 5, wherein the key management module comprises a key generation unit, a key storage unit, a key modification unit, a key inquiry unit, and a key distribution unit.
7. The encryption method for network and information security according to claim 5, wherein the hybrid encryption/decryption module comprises a hybrid encryption unit and a hybrid decryption unit, and the file transmission module comprises a file sending unit and a file receiving unit; the file sending unit is used for receiving the connection request of the client, receiving the information of the client and the sent encrypted file, and sending a receiving result and response information to the client; the file receiving unit is used for applying for connecting to the server, sending a file transmission request to the server and processing a receiving result sent back by the server.
CN202310744837.6A 2023-06-21 2023-06-21 Encryption method for network and information security Pending CN116614303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310744837.6A CN116614303A (en) 2023-06-21 2023-06-21 Encryption method for network and information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310744837.6A CN116614303A (en) 2023-06-21 2023-06-21 Encryption method for network and information security

Publications (1)

Publication Number Publication Date
CN116614303A true CN116614303A (en) 2023-08-18

Family

ID=87685474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310744837.6A Pending CN116614303A (en) 2023-06-21 2023-06-21 Encryption method for network and information security

Country Status (1)

Country Link
CN (1) CN116614303A (en)

Similar Documents

Publication Publication Date Title
JP3560439B2 (en) Device for performing encryption key recovery
US6125185A (en) System and method for encryption key generation
US5535276A (en) Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
CN101064595B (en) Computer network safe input authentication system and method
US20170244687A1 (en) Techniques for confidential delivery of random data over a network
US7149311B2 (en) Methods and apparatus for providing networked cryptographic devices resilient to capture
US20060195402A1 (en) Secure data transmission using undiscoverable or black data
US11870891B2 (en) Certificateless public key encryption using pairings
CN114024710A (en) Data transmission method, device, system and equipment
EP0755598A1 (en) Computer network cryptographic key distribution system
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN111080299B (en) Anti-repudiation method for transaction information, client and server
EP1079565A2 (en) Method of securely establishing a secure communication link via an unsecured communication network
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
Darwish et al. A model to authenticate requests for online banking transactions
US20220038267A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
CN110048852B (en) Quantum communication service station digital signcryption method and system based on asymmetric key pool
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
CN116614303A (en) Encryption method for network and information security
CN112822015A (en) Information transmission method and related device
RU2819174C1 (en) Method of determining source of data packets in telecommunication networks
CN114374519B (en) Data transmission method, system and equipment
US11962691B1 (en) Systems, methods, and media for generating and using a multi-signature token for electronic communication validation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination