Check patentability & draft patents in minutes with Patsnap Eureka AI!

Encryption method for preventing replay attacks

An encryption method and anti-replay technology, which is applied in the field of network security, can solve problems such as difficulty in finding a balance between security and operation, maintenance, performance, and inability to perfectly defend against replay attacks, so as to increase the anti-replay attack function, The effect of reducing the burden

Active Publication Date: 2017-05-31
COMMUNICATION UNIVERSITY OF CHINA
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it is difficult to find a balance between security and maintenance costs. Security requires complex maintenance, and simple maintenance lacks security.
[0030] There are many researches on the current anti-replay attack methods and replay attacks, but they all have their own defects. It is difficult to find a balance between security, operation and maintenance, and it cannot perfectly defend against replay attacks.
If the above three methods are used alone to defend against replay attacks, they all have their own defects; although the joint use strengthens security, it is difficult to take into account the performance of all aspects
Although their security is sufficient in general environments, they cannot meet the requirements for occasions with strict security requirements. At this time, we need a system that can perfectly defend against replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for preventing replay attacks
  • Encryption method for preventing replay attacks
  • Encryption method for preventing replay attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0076] The present invention is based on the CTR encryption mode of the AES encryption system, and the security is guaranteed on the basis of the encryption system. like figure 1 Shown is a schematic flow chart according to an embodiment of the present invention, as figure 1 As shown, a new plaintext message is first composed of the plaintext message to be sent and the random value generated by the random v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method for preventing replay attacks. The method comprises the following steps: a transmitting end sets a current timestamp and an effective time period with the timestamp as the reference, and separately encrypts and sends plaintext and a corresponding randomly generated first random number within the effective time period, wherein the encrypted plaintext and the encrypted first random number are kept invariable within the effective time period with the timestamp as the reference; a receiving end receives and decrypts the encrypted plaintext and the corresponding first random number within the time period, wherein within the effective time period with the timestamp as the reference, all stored first random numbers are compared with the decrypted first random numbers within the effective time period one by one, if the first random numbers are all different, the encrypted plaintext and the corresponding first random number are stored, the decrypted first random number is stored, and the valid period of the decrypted first random number is recorded; and otherwise, the decrypted first random number is deleted, and the valid period of the decrypted first random number is recorded. By adoption of the encryption method provided by the invention, the replay attacks can be defended.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an encryption method for preventing replay attacks. Background technique [0002] The first electronic computer appeared in the world in 1946, and ARPANET, the prototype of the Internet, has also appeared for decades. Electronic computers and the Internet have undergone considerable development and have spread all over the world with a large number of users, websites and other applications. With the development of the Internet, network security issues are becoming more and more serious. Intrusion and anti-intrusion, network attacks and defense measures are intensifying, and the security of the Internet is constantly being tested. Information security includes computer security and network security, and network security includes many aspects: [0003] 1. Content protection: mainly through encryption technology to prevent unauthorized access; [0004] 2. Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L9/088H04L63/06H04L63/067H04L63/1441H04L63/1491
Inventor 杨成张楠吴晓雨朱亚平
Owner COMMUNICATION UNIVERSITY OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More