Method for switching encryption safety data among peer-to-peer user nodes in P2P network

A P2P network and peer-to-peer user technology, which is applied in the direction of public keys for secure communication, user identity/authority verification, electrical components, etc., can solve the problem of identity being easily eavesdropped, without considering the security of data transmission, SSL/TLS and IKE security Defects and other problems, to achieve the effect of simple establishment process, less interaction times, and good security

Inactive Publication Date: 2011-06-29
NANJING UNIV OF INFORMATION SCI & TECH
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing encrypted communication methods such as SSL / TLS and IKE are too large and complex for P2P network transmission, and SSL / TLS and IKE themselves have security flaws, which are vulnerable to man-in-the-middle attacks
Specifically, SSL / TLS protocol certificates are completely transmitted in plain text, and the identity of each household node is easily eavesdropped. The nonce random number of IKE is also sent in plain text, which is easy to be intercepted by an intermediary. Therefore, a solution is urgently needed to protect end-to-end data transmission
[0005] At present, a practical method has been proposed for the authentication of P2P network user nodes. The authentication server issues digital certificates to users, and exchanges certificates during authentication to achieve authentication. However, the secure transmission of authenticated data is not considered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for switching encryption safety data among peer-to-peer user nodes in P2P network
  • Method for switching encryption safety data among peer-to-peer user nodes in P2P network
  • Method for switching encryption safety data among peer-to-peer user nodes in P2P network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Below in conjunction with accompanying drawing, the present invention will be further described.

[0031] For the convenience of understanding, a simple P2P network is taken as an example to illustrate the implementation method of the present invention. Such as figure 1 As shown, in this P2P network, there are two user nodes, user node A and user node B respectively, and an authentication server connected through the network. User nodes in the network will get their own certificates during the login process. Using this certificate, the public key algorithm can be used to realize the exchange of random numbers in an encrypted environment and establish encrypted and secure communication. refer to figure 2 , firstly, the process of obtaining the user node certificate is described.

[0032] A user node, assuming user node A, first downloads the public key of the authentication server from the authentication server, and then enters the user name and password to log in to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for switching encryption safety data among peer-to-peer user nodes in a P2P (peer-to-peer) network. Two arbitrary peer-to-peer user nodes in the network, namely, a user node A and a user node B, log in the network to obtain a public key certificate through an authentication server; the user node A has a self-provided random number NA and a random number NB sent from the user node B; the user node B has a self-provided random number NB and a random number NA sent from the user node A; and the encryption algorithm is applied to enable the user node A and the user node B to form an encryption channel for data encryption transmission. In the invention, safety communication can be set simply, the interaction frequency is low, and except the first-time certificate transmitting of explicit message, other information interaction is achieved under the condition of encrypted message, so that a better security is ensured.

Description

technical field [0001] The invention relates to an internet data exchange method, in particular to a safe encrypted communication method between peer user nodes in a P2P network. Background technique [0002] P2P (Peer to Peer, peer-to-peer) network is also called a peer-to-peer network. Compared with the S / C (server / client) mode that is common on the Internet today, each node in the network can freely join or exit the network. The relationship between nodes is equal, and resources can be better shared between nodes. P2P network has broad application prospects in direct communication between users, file exchange and distributed computing. [0003] However, the P2P network is a decentralized network, with convenient data exchange between nodes and frequent resource sharing. Each node can join or exit freely. Viruses and Trojan horses are easy to spread through the network, so user data encounters eavesdropping, Tampering, replay, man-in-the-middle and other attacks. In ord...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 李天目韩进
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products