Ethernet data encryption and decryption processing method based on national cryptographic algorithm

A technology of data encryption processing and national secret algorithm, which is applied to digital transmission systems and key distribution, can solve problems such as dependence on foreign technology and products, insufficient security control, and unfavorable network security environment, so as to achieve controllable industry security and get rid of The effect of over-reliance on foreign technology and products

Inactive Publication Date: 2019-11-01
KUNGAO XINXIN MICROELECTRONICS (JIANGSU) CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, MACSec adopts encryption and decryption algorithms dominated by countries such as Europe and the United States. It does not have enough control over industry security and relies too much on foreign technology and products, which is not conducive to the establishment of an independent and controllable network security environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ethernet data encryption and decryption processing method based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] The embodiment of the present invention discloses a method for encrypting and decrypting Ethernet data based on the national secret algorithm, which replaces the encryption and decryption algorithm used in the system of MACSec and / or 802.1X with the national secret algorithm; protects the symmetric password in the key exchange The algorithm adopts SM2 national secret or higher-level asymmetric algorithm to ensure that the symmetric password is not illega...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Ethernet data encryption and decryption processing method based on a national cryptographic algorithm. An encryption and decryption algorithm used in a system in MACSec and/or 802.1 X is replaced with the national cryptographic algorithm; an SM2 national cipher or higher-level asymmetric algorithm is adopted as an algorithm for protecting the symmetric cipher in key interaction so as to ensure that the symmetric cipher is not illegally acquired in the transmission process, and an SM4 or SM9 or higher-level national cipher encryption and decryption algorithm is adopted as an encryption and decryption algorithm in data transmission so as to ensure that sensitive data is not illegally read. Compared with an encryption and decryption algorithm dominated by European and American countries, the method is controllable in industry security, gets rid of excessive dependence on foreign technologies and products, and provides an effective solution for constructing an autonomous controllable network security environment.

Description

technical field [0001] The invention relates to the technical field of communication security, and more specifically relates to a method for encrypting and decrypting Ethernet data based on a national secret algorithm. Background technique [0002] With the rapid development of network communication technology, its application field has gradually penetrated into all aspects of social life, and affects and changes people's production and life style. However, while the computer network facilitates people's lives, it also brings some problems, such as data security. Data leakage can occur anywhere on the network, such as data being intercepted by unauthorized sniffing links. [0003] A typical method of protecting information is to encrypt data when it is transmitted in the network. In case the data is intercepted by an unauthorized sniffing link, the encrypted data can ensure that the data cannot be read. At the same time, data must also be authorized to ensure integrity. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L1/00H04L29/06
CPCH04L1/004H04L9/0825H04L63/0227
Inventor 徐凌云
Owner KUNGAO XINXIN MICROELECTRONICS (JIANGSU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products