Supercharge Your Innovation With Domain-Expert AI Agents!

Key synchronization method and system

A key synchronization and time synchronization technology, applied in the field of communication, can solve the problems of increasing the encryption and decryption process, increasing risks, etc., to achieve the effect of resisting interception and decoding, efficient and correct encryption and decryption operations, and efficient transmission

Pending Publication Date: 2022-07-15
CHINA ELECTRONICS TECH GRP NO 7 RES INST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then re-encrypt with the key corresponding to the serial number of the receiving end, which not only increases the encryption and decryption process, but also increases the risk of plaintext transmission on the network side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key synchronization method and system
  • Key synchronization method and system
  • Key synchronization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] like image 3 As shown, a key synchronization method, the method includes the following steps:

[0063] S1: The sender reads the local time and adds N to the unencrypted data bit The bit time synchronization information is used as the key synchronization code, and forms a data frame with the unencrypted data;

[0064] S2: Encrypt the unencrypted data with the corresponding key according to the key synchronization code; bit Bit key synchronization code performs key interception operation; in a specific embodiment, described key interception operation refers to N bit bit key synchronization code truncating its N low Bit key synchronization code.

[0065] S3: The encrypted data and the truncated key synchronization code are formed into the air interface data of the sender;

[0066] S4: the receiver receives the air interface data, and uses the local time synchronization information to restore the truncated key synchronization code in the air interface data to the same...

Embodiment 2

[0100] A system of key synchronization method, the sending end is used to add N in unencrypted data bit The bit time synchronization information is used as the key synchronization code, and forms a data frame with the unencrypted data; according to the key synchronization code, the encryption module uses the corresponding key to encrypt the unencrypted data; bit The key synchronization code of bits performs the key interception operation, and the encrypted data and the truncated key synchronization code are formed into the air interface data of the sender;

[0101] The receiving end uses the local time synchronization information to restore the truncated key synchronization code to the same complete key synchronization code as the sender; according to the key synchronization code algorithm, the decryption module uses the corresponding key to encrypt the encrypted data. data is decrypted. In a specific embodiment,

[0102] The encrypted data frame sent by the sender to the en...

Embodiment 3

[0120] A computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the method steps implemented are as follows:

[0121] S1: Sender adds N to unencrypted data bit The bit time synchronization information is used as the key synchronization code, and forms a data frame with the unencrypted data;

[0122] S2: Encrypt unencrypted data according to the key synchronization code; bit The key synchronization code is used to perform the key interception operation;

[0123] S3: The encrypted data and the truncated key synchronization code are formed into the air interface data of the sender;

[0124] S4: the receiver receives the air interface data, and uses the local time synchronization information to restore the truncated key synchronization code in the air interface data to the same key synchronization code as the sender;

[0125] S5: The receiver decrypts the encrypted data according to the key synchronizati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key synchronization method and system, and the method comprises the following steps: S1, a sender adds Nbit time synchronization information in unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data; s2, encrypting the unencrypted data according to the key synchronization code; carrying out key interception operation on the key synchronization code of the Nbit bit; s3, the encrypted data and the truncated key synchronization code form air interface data of the sender; s4, the receiver receives the air interface data, and recovers the truncated key synchronization code in the air interface data to be the same key synchronization code as the sender by using local time synchronization information; and S5, the receiver decrypts the encrypted data according to a key synchronization code algorithm. According to the invention, decryption serial number transmission in a truncation mode is provided for a receiving party and a transmitting party on a narrowband channel, so that efficient transmission and correct encryption and decryption operation of data are realized.

Description

technical field [0001] The present invention relates to the field of communication technologies, and more particularly, to a key synchronization method and a system thereof. Background technique [0002] Generally speaking, the encryption and decryption in communication (hereinafter referred to as cryptography) use such as figure 1 shown process. According to whether the encryption key and decryption key are the same, cryptographic techniques are divided into symmetric cryptography and public key cryptography. The symmetric cipher with the same encryption key and decryption key has a fast processing speed, but it needs to solve the problem of key distribution; although the public key cipher with different encryption key and decryption key does not need to distribute the key, it cannot resist the man-in-the-middle attack and the processing is complicated. In order to give full play to the advantages of the two cryptographic techniques, a hybrid cryptographic system is often...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/12
CPCH04L9/12H04L9/0861H04L9/088
Inventor 肖文奎徐子龙郑澍鹏朱庆谢小华
Owner CHINA ELECTRONICS TECH GRP NO 7 RES INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More