Multicast data enciphered transmission method

A data encryption and data decryption technology, which is applied in the usage of multiple keys/algorithms, etc., can solve problems such as security risks, group key maintenance and complex management, and achieve security assurance, simple joining procedures, and simplified key management Effect

Inactive Publication Date: 2010-02-03
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The group key method is a relatively complicated issue for the maintenance and management of the group key, especially if everyone shares a group key, there is a greater security risk for the security of passwords and information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast data enciphered transmission method
  • Multicast data enciphered transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1: Encrypted transmission applied to real-time data of stock trading

[0035] In stock trading, in order to ensure the security of data, the real-time data of stock trading must be encrypted by the stock trading center, and then transmitted to the stock trading points (a total of N) distributed all over the country through the network, and output after decryption at each trading point The real-time data in plain text is sent to each display terminal, that is, the real-time data is encrypted and transmitted through multicast. At present, this method of encrypted transmission adopts the group key method, that is, the stock exchange center distributes a group key to each trading point, and the sender and receiver of the data use this group key and a group key. A cryptographic algorithm performs encryption and decryption, and the group key is changed periodically. In this encrypted transmission, group members and any party who knows the group key can modify the ...

Embodiment 2

[0065] Embodiment 2: Applied to the real-time encrypted transmission of audio and video data of the multimedia conference system

[0066]Multimedia conferencing systems are most widely used in e-government affairs. In order to ensure that the content of the conference, that is, the audio and video data, is not known to unauthorized persons during the transmission process, the audio and video data transmitted in the conference is usually encrypted for transmission. Most of the methods used are group encryption. key network multicast method, that is, the conference center uses the group key agreed in advance, and adopts a block cipher algorithm such as 3DES or AES, etc., to encrypt the audio and video data of the conference content, and send them out through the network; each branch venue uses the same The group key is decrypted, and the corresponding audio and video plaintext information is displayed on the terminal. The potential safety hazards in this group key multicast mode...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a method for ciphered transmission of multicast data including a ciphering method to multicast data at the sending end of multicast source data and a deciphering method for deciphering multicast data at the receiving end, in which, when sending multicast data each time, the sender selects a cryptographic key randomly to cipher the information, yet the key is not told to the receiver, when deciphering, the receiver must utilizes its private key and the cryptographic key sent to the sender to get the key ciphering the multicast data then to decipher it to resume the data cleartext.

Description

technical field [0001] The invention relates to the technical field of information security in network communication, in particular to a method for encrypted transmission of multicast data in a multicast network architecture. Background technique [0002] With the continuous development of network communication technology, the bottleneck of network speed has shifted from network bandwidth to the ability of hosts and routing nodes to process information; and network security is a complicated process. To crack, it is necessary to improve the computer's ability to process information, so as to speed up the speed of network transmission of information. [0003] Most of the data transmitted by the network uses a common encryption algorithm, which has high efficiency and low cost; the key of this algorithm must be quite reliable, and irrelevant personnel have no way of knowing the key. Therefore, this Keys are sometimes called session keys. The transmission of the session key sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14
Inventor 李拥军齐德昱唐跃文庞雄文
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products