E-mail data security protection method based on hybrid encryption

An e-mail and mixed encryption technology, which is applied in the fields of information communication and information security, can solve problems such as low confidentiality, information leakage, and information integrity inspection, and achieve the effects of less resource occupation, enhanced security, and high confidentiality

Active Publication Date: 2020-04-21
杭州安司源科技有限公司
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Including cyber attacks by criminals causing information leakage and malicious tampering and destroying the authenticity of information, etc., causing a lot of privacy and indirect property losses to network users
[0003] Modern data encryption methods mainly include symmetric encryption and asymmetric encryption. The former has fast encryption speed but relatively low confidentiality, while the latter has higher security but consumes more time and memory resources for encryption.
However, existing e-mail encryption methods seldom involve the verification of information integrity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in combination with specific embodiments. It should be understood that the description in this part is only used to explain the content of the present invention, and the application of the present invention is not limited thereto.

[0022] The e-mail data security protection method based on hybrid encryption includes a data encryption method for e-mail communication between terminals, and a data encryption method for communication between terminals and servers.

[0023] The data encryption methods for e-mail communication between terminals are specifically:

[0024] The server generates a pair of public and private keys for asymmetric encryption, which are the server public key K f-pub and server private key K f-pri , the server public key K f-pub Send it to the client and save it;

[0025] The client generates a pair of public and private keys for asymmetric encryption, which are the client public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an e-mail data security protection method based on hybrid encryption. An existing data encryption method is relatively low in confidentiality or more in memory resources. Thepresent invention includes a data encryption method for e-mail communication between terminals and a data encryption method for communication between terminals and a server. The server generates a pair of public key and private key for asymmetric encryption, and issues the server public key to the client for storage. A client generates a pair of public and private keys for asymmetric encryption, and uploads the public key of the client to the server; the server sets a client public key library, and stores each client public key and the registration ID serving as the identifier in the client public key library; the client is provided with a key stream generator, and generates a symmetric key by setting the number of registers. A symmetric encryption method and an asymmetric encryption method are combined so thatthe advantages of high speed of a symmetric encryption mechanism and higher security of asymmetric encryption are integrated, the occupied resources are few, and the confidentiality is high.

Description

technical field [0001] The invention belongs to the field of information communication technology, in particular to the field of information security, and relates to a hybrid encryption-based email data security protection method. Background technique [0002] With the development of network technology, the function of the network is becoming more and more powerful, and the field of network application involves all aspects of people's work, study and life. In terms of network communication, e-mail has been widely used because of its real-time and convenient characteristics, and the information forms used are also various. While the application scale of e-mail is getting larger and wider, its security is also subject to more threats and challenges. Including criminals' network attacks causing information leakage and malicious tampering and destroying the authenticity of information, etc., causing a lot of privacy and indirect property losses to network users. [0003] Moder...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06H04L9/08H04L9/06
CPCH04L63/0442H04L63/0435H04L9/0643H04L9/0861H04L51/42
Inventor 徐欣王德富陈木市姜显扬
Owner 杭州安司源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products