Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure communication method based on combined encryption

A secure communication and encrypted technology, which is applied in the field of secure communication based on combined encryption, can solve problems such as transmission content leakage, attacker interception, signature verification leakage, etc., and achieve the effect of ensuring data information security

Active Publication Date: 2021-08-10
HARBIN INST OF TECH +1
View PDF26 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The RSA algorithm is a commonly used asymmetric encryption algorithm, which can be used for encryption and digital signature at the same time. During the transmission process to the other party, there is a danger of being intercepted by the attacker, which will lead to the leakage of signature verification and may also cause the transmission content to be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method based on combined encryption
  • Secure communication method based on combined encryption
  • Secure communication method based on combined encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] This embodiment proposes a secure communication method based on combined encryption, in which a sender sends data to a receiver in unicast mode. In the unicast mode, the sender and the receiver first negotiate to establish a security key, and then the sender encrypts the public key in the generated RSA key pair according to the security key and sends it to the receiver for receiving The party uses the sender's public key to decrypt the data sent by the sender, or to perform signature verification on the data sent by the sender.

[0063] like figure 2 As shown, in unicast mode, step S10 includes:

[0064] (1) The sender randomly selects a prime number P and an integer E, and generates a first random number X smaller than the prime number P A , based on the calculation of the first preset algorithm to obtain the first result Y A , the prime number P, the integer E and the first result Y A Send to the server, where the first preset algorithm is Y A =E^X A modP, P is...

Embodiment 2

[0072] This embodiment proposes a secure communication method based on combined encryption, in which the sender sends data to multiple receivers in broadcast mode. In broadcast mode, a sender needs to broadcast the data to be transmitted to multiple receivers. First, the sender negotiates with multiple receivers to establish a security key. Then, if the amount of data to be transmitted is large, the security key will be used. The transmission data is symmetrically encrypted and then broadcast to multiple receivers. If the amount of data to be transmitted is small, RSA encryption is performed on the data to be transmitted. Specifically, the RSA public key is first encrypted with a security key, and then broadcast to multiple receivers. For the receiver to use the sender's RSA public key to decrypt the data it sent.

[0073] In broadcast mode, step S10 includes:

[0074] Step 1. The sender randomly selects a prime number P i and an integer Ei to generate a third random number ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure communication method based on combined encryption. The method comprises the following steps that 1, a sender negotiates with a receiver based on a preset key exchange algorithm to establish a secure key; 2, the sender determines an RSA key pair of the sender, wherein the RSA key pair comprises a first public key and a first private key; 3, the sender uses the security key as a symmetric key, encrypts the first public key by using a preset symmetric encryption algorithm, and sends the encrypted first public key to the receiver; 4, the receiver determines an RSA key pair of the receiver, the key pair comprises a second public key and a second private key, the second public key is encrypted, and the encrypted second public key is sent to the sender; 5, the sender uses the RSA key pair to carry out RSA encryption on the to-be-transmitted data and then sends the to-be-transmitted data to the receiver. According to the method, the secure transmission of the RSA public key can be realized.

Description

technical field [0001] The invention belongs to the technical field of secure communication, and relates to a secure communication method based on combined encryption. Background technique [0002] Nowadays, with the increasing importance of industrial field communication, the communication security of various fieldbus-based communication methods is becoming more and more important. In order to avoid various communication threats that may be received, a method that can ensure communication security is designed. extremely important. For the Modbus / TCP communication method, there are defects such as that the corresponding instructions and addresses are transmitted in plain text, so attackers can easily intercept and tamper with the data information, thereby causing communication failures and endangering communication security. Therefore, in order to ensure the transmission security of data information during communication, it is necessary to perform encryption and decryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00H04L29/06H04L9/32
CPCH04L9/0822H04L9/002H04L63/061H04L63/045H04L9/3247H04L63/12
Inventor 田立坤佟为明王学森金显吉何军军初旭佟春天
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products