Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

VPN system based on dynamic encryption algorithm

A symmetric encryption algorithm and dynamic technology, applied in the field of information security, can solve problems such as slow speed, increased VPN system expenditure, and high price, and achieve the effect of enhancing the ability of the encryption system

Active Publication Date: 2007-05-30
北京中电数安科技有限责任公司
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the establishment of symmetric encryption algorithms used in international VPN products is fixed, and the security of the symmetric encryption system is improved mainly by changing the symmetric key. Such as: data packet key, network key, session key, tunnel key, etc., and encrypt keys by layer-by-layer superposition of multiple keys to realize the exchange of various keys. However, multiple encryption Layer-by-layer superposition of keys also increases the expenditure of the VPN system and reduces the efficiency of the VPN; at the same time, some types of key management require manual intervention and update, resulting in heavy workload and high cost of encryption system maintenance; therefore, tunnels produced at home and abroad There are many types and brands of VPN products, most of which have the following weaknesses: slow speed, high price, poor security, and insufficient ability to resist group attacks. At the same time, there are also low efficiency of the VPN system and various key distribution management costs High, difficult daily system maintenance and other issues, these have directly affected the application and popularization of VPN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN system based on dynamic encryption algorithm
  • VPN system based on dynamic encryption algorithm
  • VPN system based on dynamic encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The VPN system implementation steps based on dynamic encryption algorithm are illustrated below in conjunction with accompanying drawings:

[0043] Figure 1: A structural diagram illustrating the selection algorithm for L×N matrix elements composed of random numbers and time stamps, where: L=89, N=16,

[0044] 1. Establish the "encryption element seed" matrix of the symmetric encryption algorithm and its selection rules for the elements of the matrix

[0045] (1) Take the timestamp as a 7-digit decimal number, set: timestamp: ymdh where: y represents "year" as a 1-digit number, m represents "month" as a 2-digit number, d represents "day" as a 2-digit number, h stands for "hour" with 2 digits,

[0046] (2) Take the random number as 16 hexadecimal numbers, set: random number: S1, S2, S3, S4, S5, S6, S7, S8, S9, S10, S11, S12, S13, S14, S15, S16,

[0047] (3) Taking the grouping algorithm SMS4 disclosed by the state in early 2006 as an example, to establish the "encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to VPN system based on dynamic code formula, which uses keys, chips and network technique and designs one set of dynamic symmetric code formula to make each formula with different virtual special networks in each data coding, wherein, each code system only adopts one symmetric code keys such as network keys, pack keys and channel keys through establishing code formula to generate formula and symmetric key generation formula.

Description

Technical field: [0001] The invention relates to the field of information security. It uses passwords, chips and network technology to realize a virtual private network (VPN). The invention can encrypt and decrypt plaintext data in real time to protect the transmission security of data files. It is suitable for governments, enterprises, military, Various networks of banks, securities, insurance and other units. Background technique: [0002] At present, the establishment of symmetric encryption algorithms used in VPN products in the world is fixed, and the security of the symmetric encryption system is improved mainly by changing the symmetric key. Such as: data package key, network key, session key, tunnel key, etc., and encrypt keys by layer-by-layer superposition of multiple keys to realize the exchange of various keys. However, multiple encryption The layered superposition of keys also increases the expenditure of the VPN system and reduces the efficiency of the VPN; at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/46H04L9/28H04L9/32H04L29/06
Inventor 胡祥义
Owner 北京中电数安科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products