File encryption transmission method combining identity authentication and dynamic key

A dynamic key and file encryption technology, which is applied in transmission systems, digital transmission systems, usage of multiple keys/algorithms, etc., can solve problems such as key exchange troubles, exchange keys cannot be directly transmitted publicly, etc., and achieve key Easy exchange and fewer keys

Pending Publication Date: 2021-09-03
浙江保融科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Key exchange is troublesome: the exchange key cannot be directly transmitted publicly, it must be transmitted point-to-point, and must be transmitted in an additional secure way

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption transmission method combining identity authentication and dynamic key
  • File encryption transmission method combining identity authentication and dynamic key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with drawings and embodiments.

[0033] Such as figure 1 , figure 2 As shown, a file encryption transmission method that combines identity authentication and dynamic keys uses a symmetric encryption algorithm and an encryption key to encrypt and decrypt file content. The specific implementation steps are as follows:

[0034] sender:

[0035] Step (1) Randomly select a symmetric encryption algorithm from the list of selectable symmetric encryption algorithms.

[0036] Step (2) Generate a random symmetric encryption key according to the selected symmetric encryption algorithm.

[0037] Step (3) Encrypt the plaintext of the file content with a symmetric encryption algorithm and a symmetric encryption key to generate a ciphertext of the file content.

[0038] Step (4) Use the sender's private key to sign the ciphertext of the file content to generate signature information.

[0039] Step (5) Connect ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file encryption transmission method combining identity authentication and a dynamic key. A file sender dynamically generates a symmetric encryption algorithm and a key, encrypts the file content by using the generated symmetric encryption algorithm and the key, encrypts the symmetric encryption algorithm and the key by using a public key of a receiver, and encrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using a private key of the sender. The file receiver carries out decryption by using the public key of the sender to obtain the symmetric encryption algorithm encrypted by the public key of the receiver and the key information, decrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using the private key of the receiver to obtain the symmetric encryption algorithm and the key, and decrypts the file content by using the symmetric encryption algorithm and the key to obtain the original data of the file. According to the invention, few keys are needed, and the keys are convenient to exchange.

Description

technical field [0001] The invention provides a file encryption transmission method combining identity authentication and a dynamic key for secure file transmission between point-to-point. Background technique [0002] In the file interaction between the sender and the receiver, in order to prevent the data in the file from being leaked, the file data needs to be encrypted. The current method is to use a symmetric encryption algorithm, the sender and the receiver agree on a key, the sender encrypts the original data in the file using the encryption algorithm and the agreed key, and then sends the encrypted file to the receiver; the receiver After receiving the file, use the encryption algorithm and the agreed key to decrypt to obtain the original data. [0003] This method has the following disadvantages: [0004] More keys: If there are N points, two files need to be transferred between each other, and a key needs to be generated and maintained for each two points, and at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/14
CPCH04L63/045H04L67/06H04L9/0869H04L9/14
Inventor 蒋骥方汉林
Owner 浙江保融科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products