Charging pile communication system encryption/decryption method

An encryption, decryption, and communication system technology, which is applied in the field of message encryption and decryption of charging piles, can solve problems such as poor security, weak attack capabilities, and easy interception and cracking. The effect of poor differential attack capabilities

Inactive Publication Date: 2017-06-13
浙江晨泰科技股份有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing charging pile encryption algorithm mostly adopts the symmetrical SM4 encryption algorithm. After the identity authentication, the server directly sends the key to the charging pile, and it is easy to be intercepted and cracked during

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Charging pile communication system encryption/decryption method
  • Charging pile communication system encryption/decryption method
  • Charging pile communication system encryption/decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The invention discloses an encryption and decryption method for a charging pile communication system, which includes asymmetric encryption based on a transfer key and symmetric encryption for transferring real-time data. The symmetric encryption method is used to transfer real-time data; the asymmetric encryption method is used for information encryption and decryption. In, the public key and the private key pair are used, and the server sends the public key to the charging pile. The public key encrypts the information, and the charging pile saves the private key required for decryption and passes the private key. The key decrypts the information encrypted by the public key, the public key cannot infer the private key; the asymmetric encryption method uses the improved RSA algorithm to transfer the key.

[0021] The asymmetric encryption method uses a "public key" and a "private key" pair in the encryption and decryption of information. In the present invention, the server ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a charging pile communication system encryption/decryption method. The method comprises the following steps: base on an asymmetric encryption way for transmitting a key and a symmetric encryption way for transmitting real-time, the symmetric encryption way is used for transmitting real-time data; the asymmetric encryption way uses a public key and private key pair in the encryption and decryption of the information, a server-side issues the public key to the charging pile, wherein the public key is used for encrypting the information, the private key for decryption is saved in the charging pile, the private key is used for decrypting the information encrypted by the public key, and the public key cannot be used for speculating the private key; the asymmetric encryption way transmits the key by use of the improved RSL algorithm. By use of above mentioned technical scheme, the security of system information transmitting is effectively improved, and the technical scheme is good in difference fault attack resistance, safe and reliable, capable of fast decrypting ciphertext, and good in practicability.

Description

Technical field [0001] The invention relates to the technical field of message encryption and decryption of charging piles, in particular to an encryption and decryption method of a charging pile communication system. Background technique [0002] The encryption algorithm is the security guarantee for the fund settlement of the charging pile and is extremely important to guarantee the operation of the charging pile. [0003] Existing charging pile encryption algorithms mostly use the symmetric SM4 encryption algorithm. After the identity is authenticated, the server directly issues the key to the charging pile, which can be easily intercepted and cracked during the communication process. The SM4 encryption algorithm uses a byte-oriented random failure model, combined with the search and analysis attack technology, and only requires 32 incorrect ciphertexts to completely recover the SM4 128-bit seed key. The ability to resist differential failure attacks is weak, with poor security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L9/14
Inventor 项超林明光刘光
Owner 浙江晨泰科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products