Multi-encryption based data transmission method

A data transmission method and data transmission technology, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve data confidentiality, integrity and authenticity cannot be guaranteed, and encryption is not used

Active Publication Date: 2018-10-19
CHONGQING JIAOTONG UNIVERSITY
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the sending end and the receiving end in the vehicle network start data transmission after identity verification. Generally, encryption is not used during data transmission, or only one encryption method is used to encrypt all the data that needs to be transmitted, and the data is kept confidential. integrity, integrity and authenticity are not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-encryption based data transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0075] Such as figure 1 As shown, the present application discloses a data transmission method based on multiple encryption, and data transmission is performed after the sending end and the receiving end complete identity authentication, and the data transmission includes the following steps:

[0076] S101. The sending end generates a random number plaintext for data transmission;

[0077] S102. The sending end performs hash calculation on the data packet header, the plaintext data, and the plaintext of the data transmission random number to obtain a first data transmission hash value;

[0078] S103. The sending end uses the sending end signature private key to sign the first data transmission hash value to obtain the first data transmission hash value signature...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a multi-encryption based data transmission method. Compared with the prior art, the present application uses triple-hybrid encryption. When data is transmitted each time, plaintext data is encrypted by an asymmetric encryption method, and the data transmission random number plaintext is encrypted by a symmetric encryption method. A signature is added to the transmitted data. Once the signature is found to be inconsistent, it can be inferred that there is an illegal attacker, and random numbers generated each time are different from each other, and are doped inan encrypted message, so the attacker is difficult to determine the specific ciphertext length and a location of the specific encrypted message, and cracking and reuse cannot be achieved, thereby effectively resisting replay attacks and ensuring the confidentiality and authenticity of the data transmission. In addition, the present application also uses the hash value contrast method to ensure the integrity of the transmitted data.

Description

technical field [0001] The invention relates to the technical field of data transmission, in particular to a data transmission method based on multiple encryption. Background technique [0002] With the development of intelligent transportation, the scale of my country's Internet of Vehicles users is also increasing year by year, and the industry penetration rate will rise from 2% in 2010 to 10% in 2017, and will enter a stage of accelerated growth after breaking through 10%. It is estimated that by 2020, the number of users will exceed 50 million. The requirements for communication between vehicles are getting higher and higher, and there is an urgent need for wide application of wireless communication networks with low power consumption, fast transmission, and wide range. On this basis, communication security has also become very important. . [0003] In the prior art, the sending end and the receiving end in the vehicle network start data transmission after identity ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L9/3247H04L63/0428H04L63/0823H04L63/0876
Inventor 米波韦天成黄大荣潘虹阳邓真平林梦婷赵玲
Owner CHONGQING JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products