Long repeating data encryption and transmission method and system

A technology for encrypted transmission and long data, which is applied in digital transmission systems, transmission systems, and key distribution, and can solve problems such as low encryption algorithm security, complex key distribution process, and slow encryption and decryption speed

Inactive Publication Date: 2017-02-22
BEIHAI HESI TECH
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the data encryption transmission technology, the RSA algorithm and the data encryption standard (DES) algorithm have been widely used. Among the above encryption algorithms, although the RSA algorithm is simple in form and strong in confidentiality, its encryption and decryption speed is relatively slow. If the RSA algorithm is used to encrypt and decrypt the entire message, the efficiency ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long repeating data encryption and transmission method and system
  • Long repeating data encryption and transmission method and system
  • Long repeating data encryption and transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, a system for repeated encrypted transmission of long data is composed of a server 1 and at least one client 2, and the server 1 and the client 2 perform network communication based on the TCP protocol to realize mutual data transmission. All the embodiments provided by the present invention are also applicable to network communication based on the UDP protocol. Since the UDP protocol does not have the concept of a server and a client, when performing network communication based on the UDP protocol, the login party and the logged-in party are respectively virtual clients. Client and server, to achieve the same role as the client and server based on TCP protocol communication.

[0032] Such as figure 2 As shown, a method for repeated encrypted transmission of long data, the implementation process is as follows:

[0033] (1) The client dynamically generates an RSA key pair, which includes an RSA public key and its corresponding RSA private key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a long repeating data encryption and transmission method and a long repeating data encryption and transmission system, and belongs to the field of data encryption. The method comprises the following steps: a server receives and detects a login message from a client, wherein the login message comprises a user name, a password, a timestamp and a RSA public key of the client; the server dynamically generates a data encryption algorithm data encryption standard (DES) secret key, encrypts the DES secret key by using the RSA public key dynamically generated by the client, and thus generates a RSA encrypted ciphertext; the client decrypts the received RSA encrypted ciphertext and acquires the DES secret key; the client empties RSA secret key pairs; a message transmitted between the server and the client is compressed by using a RLE algorithm, and the compressed message is encrypted by using the DES secret key; and the client/server decrypts the received message by using the DES secret key, and decompresses the decrypted message by using the RLE algorithm.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a method and system for encrypted transmission of repeated long data. Background technique [0002] With the rapid development of computer communication technology, more and more important information will be transmitted through the network. Therefore, how to ensure the security of communication data transmission in the network has become one of the network security issues that people focus on. , and information security technology using encryption as a means has become the core research point of network security. [0003] In the data encryption transmission technology, the RSA algorithm and the data encryption standard (DES) algorithm have been widely used. Among the above encryption algorithms, although the RSA algorithm is simple in form and strong in confidentiality, its encryption and decryption speed is relatively slow. If the RSA algorithm is used to encrypt and decrypt the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L63/0428H04L9/0822H04L9/3249H04L63/083
Inventor 贺灿炎
Owner BEIHAI HESI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products