Data transmission method and system based on hybrid encryption algorithm
A data transmission method and technology of a data transmission system are applied in the field of encrypted transmission, which can solve the problems of low encryption speed and encryption key management difficulty, and achieve the effect of ensuring security and resisting replay attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] A data transmission method based on a hybrid encryption algorithm of the present invention is based on a hybrid encryption algorithm obtained by mixing a symmetric encryption algorithm AES and an asymmetric encryption algorithm RSA, and performs end-to-end data transmission between a client and a server.
[0056] as attached figure 1 As shown, the data transmission method includes the following steps:
[0057] S100. Perform bidirectional authentication on the client and the server based on the digital certificate of the server itself, and establish a communication channel between the client and the server after verifying that the server is legal;
[0058] S200, the client randomly generates an RSA key pair, and encrypts and sends the RSA key pair to the server through a digital certificate;
[0059] S300, one of the client and the server is used as the sender, and the other is used as the receiver. The sender randomly generates the AES key and the random number plainte...
Embodiment 2
[0084] A data transmission system based on a hybrid encryption algorithm of the present invention includes a client and a server, the client is configured with an authentication request module, an RSA key sending module, a hybrid encryption module, and a hybrid decryption module, and the server is configured with an authentication response module , RSA key receiving module, mixed encryption module and mixed decryption module.
[0085] Wherein, the authentication request module cooperates with the authentication response module to perform two-way authentication on the client and the server based on the server's own digital certificate, and establish a communication channel between the client and the server after verifying that the server is legal.
[0086] In this embodiment, the authentication request module is used to initiate an authentication request and an identity verification request to the server; correspondingly, the authentication response module corresponds to the aut...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com