E-mail data security protection method based on hybrid encryption

An e-mail and mixed encryption technology, which is applied in the fields of information communication and information security, can solve the problems of low confidentiality, information integrity inspection, time-consuming encryption and large memory resources, etc., to achieve enhanced security and less resource occupation , the effect of high confidentiality

Active Publication Date: 2022-04-22
杭州安司源科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Including cyber attacks by criminals causing information leakage and malicious tampering and destroying the authenticity of information, etc., causing a lot of privacy and indirect property losses to network users
[0003] Modern data encryption methods mainly include symmetric encryption and asymmetric encryption. The former has fast encryption speed but relatively low confidentiality, while the latter has higher security but consumes more time and memory resources for encryption.
However, existing e-mail encryption methods seldom involve the verification of information integrity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following in conjunction with specific embodiments, a further detailed description of the present invention. It should be understood that the description of this section is for the purpose of explaining the contents of the present invention only, and the application of the present invention is not limited thereto.

[0022] E-mail data security methods based on hybrid encryption, including data encryption methods for e-mail communication between terminals and data encryption methods for communication between terminals and servers.

[0023] The data encryption methods for email communication between terminals are as follows:

[0024] The server generates a pair of public and private keys for asymmetric encryption, each with the server's public key K f-pub and the server private key K f-pri , the server public key K f-pub Issued to the client, saved by it;

[0025] The client generates a pair of public and private keys for asymmetric encryption, each with the client's publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hybrid encryption-based email data security protection method. Existing data encryption methods either have relatively low confidentiality, or have relatively large memory resources. The present invention includes a data encryption method for electronic mail communication between terminals and a data encryption method for communication between a terminal and a server. The server generates a pair of public and private keys for asymmetric encryption, and sends the server public key to the client for storage; the client generates a pair of public and private keys for asymmetric encryption, and uploads the client public key to On the server side; the server sets up the client public key library, and saves each client public key and the registration ID as the identification in the client public key library; the client sets the key stream generator, and generates a symmetric key by setting the number of registers. key. The invention combines symmetric encryption and asymmetric encryption methods, integrates the advantages of high speed of symmetric encryption mechanism and higher security of asymmetric encryption, occupies less resources and has high confidentiality.

Description

Technical field [0001] The present invention belongs to the field of information and communication technology, specifically the field of information security, relates to a method of protecting e-mail data based on hybrid encryption. Background [0002] With the development of network technology, the function of the network is becoming more and more powerful, and the field of network application involves all aspects of people's work, study and life. In terms of network communication, e-mail has been widely used with its real-time convenience characteristics, and the forms of information applied are also diverse. As the use of e-mail is getting larger and more extensive, its security is also being more threatened and challenged. Including the network attacks of criminals caused by information leakage and malicious tampering with the authenticity of information, etc., causing a lot of privacy and indirect property losses to network users. [0003] Modern data encryption methods mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L51/42H04L9/40H04L9/06H04L9/08
CPCH04L63/0442H04L63/0435H04L9/0643H04L9/0861H04L51/42
Inventor 徐欣王德富陈木市姜显扬
Owner 杭州安司源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products