Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hybrid encryption method for controlling system network security and system thereof

A technology of mixed encryption and encrypted value, which is applied in the field of password protection and information security, can solve the problem of insecure initial value of equipment, and achieve the effect of reducing operation cost and high security

Active Publication Date: 2020-07-28
江苏实达迪美数据处理有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with the CNN cryptographic algorithm is that the initial value shared between devices is not safe, so there are some loopholes in the actual application of the algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid encryption method for controlling system network security and system thereof
  • Hybrid encryption method for controlling system network security and system thereof
  • Hybrid encryption method for controlling system network security and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will now be described in further detail with reference to the accompanying drawings. These drawings are all simplified schematic diagrams, and only illustrate the basic structure of the present invention in a schematic manner, so they only show the structures related to the present invention.

[0060] Defense-in-depth strategies are driven concepts that combine multiple encryption types, such as the SM2-CNN cipher. Historical experience has proven that no network security password or system architecture is a fatal vulnerability for hackers to break into a system, so the primary goal of protecting information security is to make password cracking take longer than it takes to detect intrusions and initiate manual or automated defense countermeasures.

[0061] A key idea of ​​CNN cryptography is that without the correct initial values ​​and conditions in the CNN, the result cannot be decrypted into something valuable to an adversary actor. Due to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a hybrid encryption method for controlling system network security and a system thereof, and the method comprises the steps: generating a first group of initial values corresponding to a password through first equipment, and generating a second group of initial values corresponding to to-be-encrypted data; wherein the first group of initial values encrypts a password through a chaotic neural network, and the second group of initial values encrypts data through the chaotic neural network; and respectively encrypting the first group of initial values and the second groupof initial values through SM2, and sending all encrypted data to the second device.

Description

technical field [0001] The invention relates to the fields of password protection and information security. Background technique [0002] Computer networks and systems must have the ability to secure sensitive information to ensure the reliability and confidentiality of systems and networks. A common method of protecting sensitive information is encryption, and there are many types of cryptographic algorithms that are used in a variety of different situations. [0003] The SM2 elliptic curve public key cryptography algorithm (referred to as SM2) independently developed by my country, compared with the RSA algorithm, SM2 has the advantages of low energy consumption, low memory usage, and low time consumption. Compared with the ECC algorithm, SM2 uses a more secure Signature and key exchange mechanism. SM2 security is based on the elliptic curve discrete logarithm problem. The private key is used in conjunction with the public key. The public key is shared with the entity tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/14H04L9/00
CPCH04L9/001H04L9/14H04L9/3066
Inventor 林涵阳刘国辉张生生杨涛池生友
Owner 江苏实达迪美数据处理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products