Network communication encryption method based on contents

A technology of network communication and encryption method, which is applied in the field of network data security transmission, which can solve the problems of insufficient security, extra transmission key, long ciphertext, etc., and achieve high security effect

Active Publication Date: 2014-07-02
XIAMEN YAXON NETWORKS CO LTD
View PDF10 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to overcome the disadvantages in the prior art that an additional transmission key is required for symmetric encryption communication and is easy to be intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below through specific embodiments.

[0026] A content-based network communication encryption method. Eight symmetric encryption algorithms and the minimum number of bytes N required for the key of each symmetric encryption algorithm are set at the sender, and numbered ①, ②, ③, ④, ⑤, ⑥ , ⑦, ⑧; 8 symmetric decryption algorithms that are the same as the sender's symmetric encryption algorithm and the minimum number of bytes N required for the key of each decryption algorithm are correspondingly set at the receiving end, and numbered ①, ②, ③, ④, ⑤, ⑥, ⑦, ⑧, the number of the same algorithm is consistent with the sender, and then the steps are as follows:

[0027] 1) The sender takes the number of the first byte of the data to be sent this time as the encryption algorithm factor, then divides the encryption algorithm factor by 8 and takes the remainder, and adds 1 to the remainder to get the encryption algorithm number used in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network communication encryption method based on contents. Symmetrical encryption algorithms are respectively arranged at a sending end and a receiving end, and then steps are listed as follows: 1) the sending end confirms an encryption algorithm factor according to the contents in the current data to be sent, then the minimum number of bytes N needed by a secret key of the current encryption algorithm and a corresponding algorithm is selected according to the encryption algorithm factor, and then the current encryption secret key is obtained via calculation; 2) the sending end uses the current encryption algorithm and the current encryption secret key to encrypt the current data to be sent to obtain the current encryption data so that the current communication cipher is generated and sent; and 3) the receiving end receives the current communication cipher to obtain the corresponding decryption algorithm factor and data to be decrypted, and corresponding decryption is performed so that the current communication plaintext is generated. The adopted encryption algorithm number and the adopted secret key are selected according to the contents of the data to be sent via calculation without transmission of extra secret key information so that the method is simple and rapid and high in security.

Description

technical field [0001] The invention relates to the field of network data security transmission, in particular to a content-based network communication encryption method. Background technique [0002] There are many commonly used encryption communication methods, which can be roughly divided into two categories according to the type of key, symmetric encryption (private key encryption) communication and asymmetric encryption (public key encryption) communication. [0003] In symmetric encrypted communication, the same key is used for encryption and decryption, that is, the encryption key can also be used as the decryption key. Symmetric encrypted communication is simple and fast to use, but the disadvantages are also obvious. Additional key information needs to be transmitted, which is easy to be hacked. Intercept in the middle, and decrypt the data. [0004] Asymmetric encrypted communication requires two keys, a public key and a private key. The public key and the private...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L29/06
Inventor 韩震华洪志新林国欣张皓余建成
Owner XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products