Unlock instant, AI-driven research and patent intelligence for your innovation.

A key acquisition method and system

A key and key pair technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem of low data security and achieve the effect of high security

Active Publication Date: 2021-09-17
HANGZHOU HIKVISION DIGITAL TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the person who knows the key leaks the key and is obtained by a malicious eavesdropper, the data encrypted by the above data encryption method may be deciphered by a malicious eavesdropper, so the security of the data in the communication process is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key acquisition method and system
  • A key acquisition method and system
  • A key acquisition method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0241] As a specific implementation manner, when the first key includes m-byte data of the first part and m-byte data of the second part, the above step 2 is to use the first key to encrypt the first encryption result The step of decrypting to obtain the first data may include the following steps 2a to 2c:

[0242] Step 2a: Using the m bytes as a division unit, divide the first encryption result into data segments.

[0243] Specifically, before the above step 2a, it may also include: obtaining the total number of bytes N of the first encryption result, judging whether N is an integer multiple of m, if so, executing step 2a; if not, it means that the situation is abnormal, Just leave it alone.

[0244] Step 2b: Process each data segment obtained by dividing the first encryption result in the following manner:

[0245] A shift factor corresponding to each byte of data in the target data segment is determined from a first part of the first key, and a shift factor corresponding ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a key obtaining method and system. Wherein, the method applied to the first device specifically includes: receiving the first encrypted string sent by the second device, where the first encrypted string is: the encrypted string obtained after the second device encrypts the first key with the second key; The first key and the second key are keys determined by the second device; determine the third key, and encrypt the first encrypted string with the third key, obtain the second encrypted string, and send the second encrypted string To the second device; receiving the first information string sent by the second device, the first information string is: the information string obtained after the second device decrypts the second encrypted string with the second key; The key decrypts the first information string to obtain a second information string, and uses the second information string as a fourth key for the first device to encrypt and decrypt data. Applying the solution provided by the embodiment of the present application can improve the security of data in the communication process.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, to a method and system for obtaining a key. Background technique [0002] In a communication network, when sending data between device 1 and device 2, the data to be sent is often encrypted to improve the security of the device communication process. After the data is encrypted, even if a malicious eavesdropper intercepts the encrypted data, it is not easy to decrypt the original data from the encrypted data. [0003] In the prior art, when encrypting data, device 1 usually encrypts the data by using an encryption algorithm pre-agreed with device 2 , and sends the encrypted data to device 2 . After receiving the encrypted data sent by the device 1, the device 2 uses a decryption algorithm corresponding to the above encryption algorithm to decrypt the data to obtain the original data. Among them, when encrypting and decrypting data, it is necessary to use th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0861
Inventor 李长水程建康卫昌赵先林
Owner HANGZHOU HIKVISION DIGITAL TECH