Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing secure transmission of data based on SM2-SM3-SM4 cryptographic algorithm

A SM2-SM3-SM4, secure transmission technology, applied in the field of secure data transmission based on the national secret SM2-SM3-SM4 algorithm, can solve the problems of difficult engineering application and high unit security strength, achieve resistance to attacks, improve computing Effects of volume and complexity

Pending Publication Date: 2021-10-29
深圳市证通云计算有限公司 +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The data basis of the SM2 algorithm is based on the discrete pair mathematical problem (ECDLP) on the elliptic curve, which is difficult to realize in engineering applications and has a high unit security intensity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure transmission of data based on SM2-SM3-SM4 cryptographic algorithm
  • Method for realizing secure transmission of data based on SM2-SM3-SM4 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] figure 1 It is a schematic flow diagram of a method for realizing secure data transmission based on the national secret SM2-SM3-SM4 algorithm provided by an embodiment of the present invention, as shown in figure 1 As shown, a method for realizing secure data transmission based on the national secret SM2-SM3-SM4 algorithm specifically...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing secure transmission of data based on a national cryptographic SM2-SM3-SM4 algorithm, which comprises the following steps of: adding the SM2-SM3-SM4 national cryptographic algorithm in a cipher.c cryptographic algorithm file in an OpenSSH (Open Secure Shell) source code, modifying the cipher.c cryptographic algorithm file in the OpenSSH source code, and generating a session key and a session ID (Identity); carrying out identity authentication on the OpenSSH client; establishing an encryption tunnel, the OpenSSH client and the OpenSSH server starting to communicate, and the integrity of data transmission between the OpenSSH client and the OpenSSH server being verified through a digest algorithm; and session data transmission between the OpenSSH client side and the OpenSSH server side being encrypted. According to the method, the source codes of the OpenSSH client side and the OpenSSH server side are modified, the adaptation of the SM2-SM3-SM4 cryptographic algorithm is increased, a safer mechanism is adopted, the information encryption calculation amount and complexity are improved, and an encryption communication tunnel is established, so that the attack on the block cipher algorithm can be effectively resisted when the OpenSSH client side accesses the OpenSSH server side.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for realizing secure data transmission based on the national secret SM2-SM3-SM4 algorithm. Background technique [0002] Since cloud computing was proposed in 2006, after years of research and development, cloud computing has formed a relatively complete ecosystem. From traditional heavy servers to distributed computing on the "cloud", it is becoming more and more convenient for users to access computing resources, and the computing speed will only increase. With the promotion of cloud computing technology in China, traditional industries such as government affairs systems, finance, education, and medical care are driven by policies and businesses, and the demand for cloud access is becoming increasingly strong. However, going to the cloud brings not only opportunities but also challenges. Business data such as government affairs, finance, and education are all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0485H04L63/045H04L63/123H04L69/163H04L63/08H04L63/168
Inventor 陈都唐卓马兴旺
Owner 深圳市证通云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products