Method of secure communication based on commercial cipher algorithm
A technology for secure communication and encrypted communication, applied in key distribution, can solve problems such as imperfect C/S application support, and achieve the effect of preventing eavesdropping and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0024] The technical solution of the present invention will be further explained below in conjunction with the drawings.
[0025] Such as figure 1 As shown, a secure communication method based on commercial secret algorithm includes the following steps:
[0026] Step 10: The client and the server establish an initial connection;
[0027] Step 20: The client sends a session key negotiation request, and the server accepts the session key negotiation request, and then performs step 30. If the server does not accept the session key negotiation request, the process ends and step 10 is performed again;
[0028] Step 30: The client and the server negotiate a session key. If the session key negotiation succeeds, then step 40 is executed. If the session key negotiation fails, the process ends, and step 10 is executed again;
[0029] Among them, such as figure 2 As shown, the session key negotiation includes the following steps:
[0030] Step 301: The client generates a random number r1, set A=E...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap