File encryption transmission method combining identity authentication and dynamic key

A dynamic key and file encryption technology, which is applied in transmission systems, digital transmission systems, usage of multiple keys/algorithms, etc., can solve problems such as key exchange troubles, exchange keys cannot be directly transmitted publicly, etc., and achieve key Easy exchange and fewer keys

Pending Publication Date: 2021-09-03
浙江保融科技股份有限公司
7 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0005] Key exchange is troublesome: the exchange key cannot be directly transmitted publicly...
View more

Abstract

The invention discloses a file encryption transmission method combining identity authentication and a dynamic key. A file sender dynamically generates a symmetric encryption algorithm and a key, encrypts the file content by using the generated symmetric encryption algorithm and the key, encrypts the symmetric encryption algorithm and the key by using a public key of a receiver, and encrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using a private key of the sender. The file receiver carries out decryption by using the public key of the sender to obtain the symmetric encryption algorithm encrypted by the public key of the receiver and the key information, decrypts the symmetric encryption algorithm encrypted by the public key of the receiver and the key information by using the private key of the receiver to obtain the symmetric encryption algorithm and the key, and decrypts the file content by using the symmetric encryption algorithm and the key to obtain the original data of the file. According to the invention, few keys are needed, and the keys are convenient to exchange.

Application Domain

Key distribution for secure communicationMultiple keys/algorithms usage

Technology Topic

EngineeringCommon key +5

Image

  • File encryption transmission method combining identity authentication and dynamic key
  • File encryption transmission method combining identity authentication and dynamic key

Examples

  • Experimental program(1)

Example Embodiment

[0032] The present invention will be further described below with reference to the accompanying drawings and examples.
[0033] like figure 1 , figure 2 As shown, a file encryption transmission method that combines identity authentication and dynamic keys, encrypts the file content with the symmetric encryption algorithm and the encryption key. The specific implementation steps are as follows:
[0034] sender:
[0035] Step (1) Random Select the symmetric encryption algorithm in the selected symmetric encryption algorithm list.
[0036] Step (2) Generate a random symmetric encryption key based on the selected symmetric encryption algorithm.
[0037] Step (3) Encrypt the contents of the file content, and the symmetric encryption key is encrypted, and the file content ciphertext is generated.
[0038] Step (4) Sign the file content ciphertice with the sender private key to generate signature information.
[0039] Step (5) Connect the symmetric encryption algorithm and the symmetric encryption key to generate encrypted information I.
[0040] Step (6) Encrypt the encrypted information I by the receiver key key to generate the encryption information II that the receiver can decrypt.
[0041] Step (7) Sign Information and Receive Decipient Encryption Information II as file header information I.
[0042] Step (8) Encrypt the file header information I with the sender private key to generate encrypted file header information II.
[0043] Step (9) Generate an encrypted file with the encrypted file header II and the encrypted file content and send it to the recipient.
[0044] receiver:
[0045] Step 1, after the receiver receives the encrypted file, obtain the contents of the file header information II and the encrypted file content after encryption.
[0046] Step 2, decrypt the encrypted file header II with the sender key, obtain the file header information I, and verify that the file header information I is issued by the sender.
[0047] Step 3, check the signature information and encrypted file content in the sender key and the file header information I, confirm that the encrypted file content is encrypted with the encrypted information I am using the file header information I.
[0048] Step 4, decrypt the encryption information II of the file header information I by the receiver private key to obtain encryption information I, an symmetric encryption algorithm, and symmetric encryption key; Thus the verification file is sent to the recipient.
[0049] Step 5. Use the symmetric encryption algorithm and the symmetric encryption key to decrypt the contents of the encrypted file to obtain a copy of the file.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products