Nothing Special   »   [go: up one dir, main page]

CN109274663A - Communication means based on SM2 dynamic key exchange and SM4 data encryption - Google Patents

Communication means based on SM2 dynamic key exchange and SM4 data encryption Download PDF

Info

Publication number
CN109274663A
CN109274663A CN201811040653.7A CN201811040653A CN109274663A CN 109274663 A CN109274663 A CN 109274663A CN 201811040653 A CN201811040653 A CN 201811040653A CN 109274663 A CN109274663 A CN 109274663A
Authority
CN
China
Prior art keywords
data
key
responder
originating end
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811040653.7A
Other languages
Chinese (zh)
Inventor
张磊
戴智华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Morebeck Semiconductor Technology Co Ltd
Original Assignee
Xi'an Morebeck Semiconductor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Morebeck Semiconductor Technology Co Ltd filed Critical Xi'an Morebeck Semiconductor Technology Co Ltd
Priority to CN201811040653.7A priority Critical patent/CN109274663A/en
Publication of CN109274663A publication Critical patent/CN109274663A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption comprising following steps: S1, handshake request stage;S2, authentication phase;S3: handshake phase is completed;S4: data encryption;S5: data deciphering.Data encryption of the present invention uses national secret algorithm, meet the policy that country promotes national secret algorithm, key length reaches national password commercialization requirement, the discrimination mark of other side is also calculated in shared key in SM2 cipher key agreement algorithm, it can be configured simultaneously to whether the data of transmission encrypt, it is ensured that the integrality of the data of transmission and whether be tampered.

Description

Communication means based on SM2 dynamic key exchange and SM4 data encryption
Technical field
The present invention relates to safe technique in network in correspondence fields, more particularly to a kind of SM2 dynamic key that is based on to exchange and SM4 number According to the communication means of encryption.
Background technique
In the communication transmission field of data, in order to guarantee the safety of data, usual transmitting terminal can to the data of transmission into Row encryption, data are decrypted in receiving end.In the prior art, the algorithm being commonly used is divided into two kinds i.e. symmetric cryptography and calculates Method, rivest, shamir, adelman.
Symmetric cryptography refers to that encryption and decryption use the Encryption Algorithm of same key.It requires originating end and recipient in safety Before communication, a key is decided through consultation.The safety of symmetry algorithm depends on key, and leakage key means that anyone is ok To the message decryption that they send or receive, so the confidentiality of key is most important to the safety of communication.
Rivest, shamir, adelman needs two keys: public-key cryptography (public key) and private cipher key (private key).Public-key cryptography and private cipher key are a pair, if encrypted with public-key cryptography to data, only with corresponding privately owned close Key could be decrypted;If encrypted with private cipher key pair data, could only be decrypted with corresponding public-key cryptography.
However in the prior art, encryption communication method is there are following technical problem, 1, data encryption do not use state close Algorithm does not meet country data security requirements (promoting national secret algorithm policy with country to run counter to);2, key safety coefficient is inadequate, holds Easily it is cracked;3, RSA Algorithm itself can not take precautions against man-in-the-middle attack, and the digital authenticating that needs to arrange in pairs or groups uses;4, data transmission procedure Whether encryption is unable to flexible configuration;5, it can not determine whether former data are altered.
Therefore, it is necessary to provide a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption, solve Above-mentioned defect existing in the prior art.
Summary of the invention
In order to solve the above technical problems, the present invention provide it is a kind of logical based on the exchange of SM2 dynamic key and SM4 data encryption Letter method.
A kind of communication means based on SM2 dynamic key exchange and SM4 data encryption provided by the invention, including following step It is rapid:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication by SM2 algorithm progress key agreement, and show that negotiation is close Key;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is sent after receiving end message to originating end Handle arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, using treated, arranging key passes through SM4 algorithm to originating end It is set as 1 to message encryption to be sent processing, and by the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, uses SM4 decipherment algorithm pair Data are decrypted.
Further, the S2 authentication phase the following steps are included:
(1) first round authenticates: generating random number from originating end initial data
ra∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), send result to responder, responder generated from initial data with Machine number rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughCalculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet Curvilinear equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA| |ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then sending out Origin or beginning calculatesThen calculate elliptical curve point Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1|| y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1 ||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at The key is set to arranging key by function.
Further, the S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key is that treated is close by arranging key Key, and be stored in the len and data of communication structure;
1 is set by the flag of communication agency.
Further, the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is that will assist Key after quotient's key handling;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, verifying sends information Whether change is had.
Compared with the relevant technologies, the invention has the following advantages:
(1) data encryption uses national secret algorithm, meets the policy that country promotes national secret algorithm;
(2) key length reaches national password commercialization requirement;
(3) the discrimination mark of other side is also calculated in shared key in SM2 cipher key agreement algorithm;
(4) it can be configured to whether the data of transmission encrypt;
(5) it can guarantee the integrality of the data of transmission and whether be tampered.
Detailed description of the invention
Fig. 1 is the flow diagram of authentication phase of the present invention.
Specific embodiment
Below in conjunction with drawings and embodiments, the invention will be further described.
Communication means based on SM2 dynamic key exchange and SM4 data encryption of the invention, comprising the following steps:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication by SM2 algorithm progress key agreement, and show that negotiation is close Key;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is sent after receiving end message to originating end Handle arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, using treated, arranging key passes through SM4 algorithm to originating end It is set as 1 to message encryption to be sent processing, and by the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, uses SM4 decipherment algorithm pair Data are decrypted.
As shown in Figure 1, the S2 authentication phase the following steps are included:
(1) first round authenticates: generating random number from originating end initial data
ra∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), send result to responder, responder generated from initial data with Machine number rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughCalculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet Curvilinear equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA| |ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then initiating End calculatesThen calculate elliptical curve point Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1|| y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1 ||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at The key is set to arranging key by function.
Wherein, the S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key is that treated is close by arranging key Key, and be stored in the len and data of communication structure;
1 is set by the flag of communication agency.
Wherein, the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is that will assist Key after quotient's key handling;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, verifying sends information Whether change is had.
For example:
Originating end thinks transmission message, and " hello, China." responder is given, following steps need to be passed through:
Originating end and responder, which are established, to be communicated to connect;
Originating end and responder negotiate both sides shared key Ks, and carry out processing to Ks and form K, to be used for SM4 Encryption;
Using SM4 algorithm to message encryption is sent, cryptographic Hash is calculated, fill communication structure and other information is set;
Originating end sends communication structure data;Recipient receives communication structure data;Recipient parses communication structure data; Checking that flag is indicated whether is 1;Data is decrypted using SM4 algorithm;It is breathed out using data of the hash algorithm to decryption Whether uncommon operation, obtains cryptographic Hash, and consistent compared with hashData;
If cryptographic Hash is equal, then it represents that the data received are correct, and ciphertext data should be " hello, China."
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (4)

1. a kind of communication means based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that the following steps are included:
S1, handshake request stage:
Originating end initial request messages, responder are receiveed the response after receiving request message to originating end transmission;
S2, authentication phase:
Originating end and responder complete both sides' authentication, and obtain arranging key by SM2 algorithm progress key agreement;
S3: handshake phase is completed:
Originating end sends processing arranging key message and end message, and responder is handled after receiving end message to originating end transmission Arranging key message and end message;
S4: data encryption:
After originating end, responder all receive end message, originating end using treated, treated by SM4 algorithm by arranging key Message encryption processing is sent, and sets 1 for the flag of communication structure, indicates that data are encrypted;
S5: data deciphering:
Responder parses the data of receiving, if the flag of communication structure is 1, using SM4 decipherment algorithm to data It is decrypted.
2. the communication means as described in claim 1 based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that: The S2 authentication phase the following steps are included:
(1) first round authenticates: random number r is generated from originating end initial dataa∈ [1, n-1];
Carry out calculating RA=[rA] G=(x1,y1), responder is sent result to, responder generates random number from initial data rB∈ [1, n-1], then carries out calculating RB=[rB] G=(x2,y2), then pass throughMeter Calculate curvilinear equation
(2) second wheel verifyings: if the R of originating endAIt is unsatisfactory for curvilinear equation tB, then negotiate to fail;If the R of originating endAMeet curve Equation tB, then responder calculatesThen calculate elliptical curve pointJudge whether V is 0, negotiates to fail if 0;If It is not 0, then calculates KB=KDF (xv||yv||ZA||ZB, klen), while calculating SB=Hash (OxO2 | | yv||Hash(xv||ZA| |ZB||x1||y1||x2||y2));Then by RB、SBIt is sent to originating end;
(3) third round is verified: originating end calculatesThen calculate curvilinear equationJudge RBWhether curvilinear equation t is metA, if not satisfied, then negotiating to fail;If satisfied, then sending out Origin or beginning calculatesThen calculate elliptical curve point Judge whether U is 0, negotiates to fail if 0;If not 0, then calculate KA=KDF (xU||yU||ZA||ZB, klen), it counts simultaneously Calculate S1=Hash (OxO2 | | yU||Hash(xU||ZA||ZB||x1||y1||x2||y2)), judge S1With SBIt is whether equal, if not phase Deng then protocol failure stops;If equal, originating end calculates SA=Hash (OxO3 | | yU||Hash(xU||ZA||ZB||x1|| y1||x2||y2)), and by SAIt is sent to responder;Responder calculates S2=Hash (OxO3 | | yv||Hash(xv||ZA||ZB||x1 ||y1||x2||y2)), and judge S2With SAWhether equal, if unequal, protocol failure stops;If equal key confirmation at The key is set to arranging key by function.
3. the communication means as described in claim 1 based on SM2 dynamic key exchange and SM4 data encryption, it is characterised in that: The S4 data encryption step is as follows:
Data to be sent are subjected to Hash processing, and are stored into the hashData of communication structure;
Data to be sent are encrypted by SM4 Encryption Algorithm, key be by arranging key treated key, and It is stored in the len and data of communication structure;
1 is set by the flag of communication agency.
4. the communication means a method according to any one of claims 1-3 based on SM2 dynamic key exchange and SM4 data encryption, special Sign is: the S5 data decryption step includes:
The data received are subjected to processing parsing, check whether the flag of communication structure is 1;
If the flag of communication structure is 1, it is decrypted by data of the SM4 decipherment algorithm to data, key is close for that will negotiate Key treated key;
Hash processing is carried out to the data of decryption, and is compared with the hashData of communication structure, whether verifying sends information There is change.
CN201811040653.7A 2018-09-07 2018-09-07 Communication means based on SM2 dynamic key exchange and SM4 data encryption Withdrawn CN109274663A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811040653.7A CN109274663A (en) 2018-09-07 2018-09-07 Communication means based on SM2 dynamic key exchange and SM4 data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811040653.7A CN109274663A (en) 2018-09-07 2018-09-07 Communication means based on SM2 dynamic key exchange and SM4 data encryption

Publications (1)

Publication Number Publication Date
CN109274663A true CN109274663A (en) 2019-01-25

Family

ID=65187839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811040653.7A Withdrawn CN109274663A (en) 2018-09-07 2018-09-07 Communication means based on SM2 dynamic key exchange and SM4 data encryption

Country Status (1)

Country Link
CN (1) CN109274663A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310203A (en) * 2020-02-10 2020-06-19 广东工业大学 Electronic medical record hybrid encryption method based on SM2 and SM4
CN112713997A (en) * 2020-12-28 2021-04-27 北京握奇数据股份有限公司 Key agreement method and system
CN113572607A (en) * 2021-08-11 2021-10-29 太原理工大学 Secure communication method adopting unbalanced SM2 key exchange algorithm
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466020A (en) * 2007-12-17 2009-06-24 上海爱信诺航芯电子科技有限公司 Decipher processing method for digital content format
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN104618108A (en) * 2014-12-30 2015-05-13 北京奇虎科技有限公司 Safety communication system
CN105337955A (en) * 2015-09-22 2016-02-17 电子科技大学 Domestic, safe and controllable virtual desktop management control system
CN106209360A (en) * 2016-07-22 2016-12-07 安徽皖通邮电股份有限公司 A kind of authentication identifying method of wildcard based on the close algorithm of state
CN107026859A (en) * 2017-03-31 2017-08-08 西安电子科技大学 A kind of safe transmission method of privacy cloud medical data
CN107493169A (en) * 2017-09-26 2017-12-19 安徽皖通邮电股份有限公司 A kind of authentication identifying method based on quantum key and national secret algorithm

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466020A (en) * 2007-12-17 2009-06-24 上海爱信诺航芯电子科技有限公司 Decipher processing method for digital content format
CN103067170A (en) * 2012-12-14 2013-04-24 深圳国微技术有限公司 Encrypting file system, encrypting method and deciphering method based on EXT2 file system
CN104618108A (en) * 2014-12-30 2015-05-13 北京奇虎科技有限公司 Safety communication system
CN105337955A (en) * 2015-09-22 2016-02-17 电子科技大学 Domestic, safe and controllable virtual desktop management control system
CN106209360A (en) * 2016-07-22 2016-12-07 安徽皖通邮电股份有限公司 A kind of authentication identifying method of wildcard based on the close algorithm of state
CN107026859A (en) * 2017-03-31 2017-08-08 西安电子科技大学 A kind of safe transmission method of privacy cloud medical data
CN107493169A (en) * 2017-09-26 2017-12-19 安徽皖通邮电股份有限公司 A kind of authentication identifying method based on quantum key and national secret algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国国家标准化管理委员会等: "信息安全技术 SM2椭圆曲线公钥密码算法 第三部分:密钥交换协议", 《中华人民共和国国家标准》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310203A (en) * 2020-02-10 2020-06-19 广东工业大学 Electronic medical record hybrid encryption method based on SM2 and SM4
CN111310203B (en) * 2020-02-10 2023-02-03 广东工业大学 SM2 and SM 4-based electronic medical record hybrid encryption method
CN112713997A (en) * 2020-12-28 2021-04-27 北京握奇数据股份有限公司 Key agreement method and system
CN112713997B (en) * 2020-12-28 2022-04-22 北京握奇数据股份有限公司 Key agreement method and system
CN113572607A (en) * 2021-08-11 2021-10-29 太原理工大学 Secure communication method adopting unbalanced SM2 key exchange algorithm
CN113572607B (en) * 2021-08-11 2024-07-02 太原理工大学 Secure communication method adopting unbalanced SM2 key exchange algorithm
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium

Similar Documents

Publication Publication Date Title
CN103338215B (en) The method setting up TLS passage based on the close algorithm of state
CN112887338B (en) Identity authentication method and system based on IBC identification password
CN110535868A (en) Data transmission method and system based on Hybrid Encryption algorithm
CN108650227A (en) Handshake method based on datagram secure transfer protocol and system
CN108683688A (en) A method of information transmission security is realized based on Digital Envelope Technology
CN108768930A (en) A kind of encrypted transmission method of data
CN109274663A (en) Communication means based on SM2 dynamic key exchange and SM4 data encryption
US11870891B2 (en) Certificateless public key encryption using pairings
EP1905186A2 (en) Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks
CN107294937A (en) Data transmission method, client and server based on network service
CN104935553B (en) Unified identity authentication platform and authentication method
CN111756529B (en) Quantum session key distribution method and system
CN102387152A (en) Preset-key-based symmetric encryption communication method
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN108683647A (en) A kind of data transmission method based on multi-enciphering
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN110048849A (en) A kind of session cipher negotiating method of multilayer protection
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
CN102111273A (en) Pre-sharing-based secure data transmission method for electric load management system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN111817846A (en) Lightweight key negotiation communication protocol
CN114650173A (en) Encryption communication method and system
CN116886288A (en) Quantum session key distribution method and device
CN113572607A (en) Secure communication method adopting unbalanced SM2 key exchange algorithm
WO2020115266A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190125