Method of secure communication based on commercial cipher algorithm

A technology for secure communication and encrypted communication, applied in key distribution, can solve problems such as imperfect C/S application support, and achieve the effect of preventing eavesdropping and ensuring security

Active Publication Date: 2014-11-19
北京华电天益信息科技有限公司
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the SSL protocol is based on a web browser, it can well support B/S applications, but the support for C/S applications is not perfect
Moreover, the key negotiation in the current SSL protocol uses the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of secure communication based on commercial cipher algorithm
  • Method of secure communication based on commercial cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] The technical solution of the present invention will be further explained below in conjunction with the drawings.

[0025] Such as figure 1 As shown, a secure communication method based on commercial secret algorithm includes the following steps:

[0026] Step 10: The client and the server establish an initial connection;

[0027] Step 20: The client sends a session key negotiation request, and the server accepts the session key negotiation request, and then performs step 30. If the server does not accept the session key negotiation request, the process ends and step 10 is performed again;

[0028] Step 30: The client and the server negotiate a session key. If the session key negotiation succeeds, then step 40 is executed. If the session key negotiation fails, the process ends, and step 10 is executed again;

[0029] Among them, such as figure 2 As shown, the session key negotiation includes the following steps:

[0030] Step 301: The client generates a random number r1, set A=E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of secure communication based on a commercial cipher algorithm. The method comprises the following steps: step 10, initializing connection between a client and a server is established; step 20, the client sends a session key negotiation request; step 30, the client and the server carry out session key negotiation; step 40, the client sends client device information for identity authentication; and step 50, the client and the server communicate in an encrypted way. According to the method of secure communication based on a commercial cipher encryption and decryption technology, key negotiation of a key exchange algorithm, a data encryption algorithm and a data integrity check algorithm is adopted to enable the client and the server to carry out bidirectional authentication and determine the session key, and a secure channel is established to prevent data eavesdropping, tampering and destruction and replay attack insertion in the data transmission process and ensure the security of data transmission. The method of the invention does not rely on a network access mode, can be implemented on any basic network, and can realize end-to-end security protection.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a secure communication method based on a business secret algorithm. Background technique [0002] At present, the network is facing various threats, including leakage of confidential data, destruction of data integrity, identity masquerading and denial of service, etc. In response to these threats, some secure communication protocols have emerged as the times require. For example, the SSL protocol (Secure Socket Layer) was developed by Netscape to ensure the security of data transmission on the Internet, using data encryption technology to ensure that data will not be intercepted and eavesdropped during transmission on the network . It has been widely used for identity authentication and encrypted data transmission between web browsers and servers. [0003] Since the SSL protocol is based on a Web browser, it can well support B / S applications, but the support for C / S app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 吴克河陈飞崔文超
Owner 北京华电天益信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products