Method for data security transmission and key exchange

A technology for key exchange and data security

Active Publication Date: 2014-03-05
北京信长城科技发展有限公司
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention solves the problem of leaking files due to the use of mobile storage devices to transfer data; and when transferring data through the Internet, online support from a third-party C

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for data security transmission and key exchange
  • Method for data security transmission and key exchange
  • Method for data security transmission and key exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] combine Figure 1 to Figure 4 Describe this embodiment mode, a method for secure data transmission and key exchange described in this embodiment mode, the implementation process of the method for secure data transmission and key exchange includes three parts: plaintext file encryption, decryption authorization, and ciphertext file decryption. The specific process is as follows:

[0032] Step 1, plaintext file encryption process, combined with figure 2 Further explanation:

[0033] First of all: user a wants to encrypt a file that needs to be encrypted, first read the plaintext file, and use the hardware symmetric encryption algorithm AES256 / DES / TDES / SM1 to encrypt the read plaintext file, the encrypted file called ciphertext data. Symmetric encryption ciphers are generated by a true random number generator.

[0034] Secondly, in order to preserve and securely transmit the symmetric password, use the a user public key to encrypt the symmetric encrypted password with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for data security transmission and key exchange and relates to the technical field of information security. The method solves the problems that in the prior art, due to the fact that a mobile storage device is used for transmitting data, a file is divulged; when the data are transmitted through the internet, online supporting by a third-party CA center is needed; when the data are transmitted through a special security hardware device, cost is high and compatibility is poor. The method comprises a cleartext file encryption process, a decryption authorization process and a ciphertext file decryption process. According to the method for data security transmission and key exchange, the technical scheme that a high-intensity symmetric encryption algorithm and an asymmetric cryptographic algorithm are combined is adopted, mark extraction can be conducted, a public key and private key pair is generated and extracted, a key file is synthesized into ciphertext data, and therefore a file can be formed. Meanwhile, a reversible process can also be achieved, wherein one file is divided into the key file and the ciphertext data, and therefore the method for data security transmission and key exchange is easy and convenient to operate and high in security level.

Description

technical field [0001] The invention relates to an encryption and decryption algorithm in the technical field of information security, and in particular to a data security transmission technology such as identity authentication, trusted authentication, and key exchange using a combined public key system of symmetric encryption and asymmetric encryption. Background technique [0002] With the development of digital technology, there are more and more digital products, such as film and television works, pictures, data files, software products and various documents, etc., and the demand for digital product transmission and exchange has also increased sharply. There are generally two types of methods for data transmission and exchange, one is through mobile storage devices, and the other is through the Internet. Among the data files transferred and exchanged, some data files are of high value and need to be kept strictly confidential. At present, the security method adopted in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 罗燕京
Owner 北京信长城科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products