Symmetric key dynamic generation method based on Internet of Things

A symmetric key and dynamic generation technology, applied in the field of encryption, can solve problems such as ciphertext cracking, and achieve the effects of ensuring security, preventing hijacking by middlemen, and achieving differentiation

Active Publication Date: 2022-02-08
四川启睿克科技有限公司
View PDF23 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method for dynamically generating a symmetric key based on the Internet of Things, which is u

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric key dynamic generation method based on Internet of Things
  • Symmetric key dynamic generation method based on Internet of Things
  • Symmetric key dynamic generation method based on Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] combined with figure 1 As shown, a method for dynamically generating a symmetric key based on the Internet of Things uses the generated byte array as a partial symmetric encryption key. The key is persistently stored in the cloud corresponding to the terminal SN and version number, and the terminal is prefabricated to save this part The symmetric key and version number, the other part of the key is randomly and dynamically generated, and the version number is attached to the ciphertext and transmitted through the network to the cloud or terminal. When using the key, the dynamic key is combined with the previous static key to form a complete key for decryption. The specific implementation plan and steps are as follows:

[0023] Step 1. The cloud randomly generates no less than 6 groups of byte arrays as partial keys. If a random character string is used as the key, the character string includes 0~9, a~z, A~Z and special characters. The range of converting these charac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symmetric key dynamic generation method based on the Internet of Things. According to the method, generated byte arrays are adopted as a part of symmetric encryption keys; the keys, terminal SNs and version numbers are correspondingly persistently stored in a cloud end; terminals prefabricate and store the part of symmetric encryption keys and the version numbers; the other part of keys are dynamically generated and transmitted to the cloud end or the terminals together with ciphertexts and the version numbers; and when the keys are used, the dynamic keys and the previous static keys are combined into complete keys for decryption. According to the method, key dynamic generation is combined with prefabricating a part of keys in advance, so that different keys of different terminals can be realized, the condition that other terminal ciphertexts can be obtained after one terminal key is cracked is prevented, and the safety of the ciphertexts is ensured.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a method for dynamically generating a symmetric key based on the Internet of Things. Background technique [0002] At present, many communications between the terminal and the server use symmetric encryption, and many symmetric encryption keys are plaintext string constants written directly in the terminal and cloud codes, and many of these keys remain unchanged for a long time, and all connected systems of a system Each terminal adopts a key. This kind of symmetric encryption security design is very simple, and the key is easy to crack. For example, in a man-in-the-middle attack, the key can be cracked by brute force, or the application of decompiled weak terminals (single-chip microcomputer, Internet of Things terminal, etc.) android application etc. In this way, once the key is leaked, all ciphertexts transmitted by terminals or applications connected to the cloud will be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/0435H04L63/06H04L9/0861Y02D30/50
Inventor 刘剑飞
Owner 四川启睿克科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products