Method of secure communication based on commercial cipher algorithm

A technology for secure communication and encrypted communication, applied in key distribution, can solve problems such as imperfect C/S application support, and achieve the effect of preventing eavesdropping and ensuring security

Active Publication Date: 2014-11-19
北京华电天益信息科技有限公司
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the SSL protocol is based on a web browser, it can well support B / S applications, but the support for C / S applications is not perfect
Moreover, the key negotiation in the current SSL protocol uses the open source RSA algorithm and MD5 algorithm, and data encryption can only support international common algorithms such as AES, DES, and BF
It does not support my country's domestic commercial encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of secure communication based on commercial cipher algorithm
  • Method of secure communication based on commercial cipher algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solution of the present invention will be further explained below in conjunction with the accompanying drawings.

[0025] Such as figure 1 As shown, a secure communication method based on a business secret algorithm includes the following steps:

[0026] Step 10: The client and the server establish an initial connection;

[0027] Step 20: The client sends a session key negotiation request, and the server accepts the session key negotiation request, then executes step 30, if the server does not accept the session key negotiation request, the process ends, and re-executes step 10;

[0028] Step 30: The client and the server perform session key negotiation, if the session key negotiation is successful, execute step 40, if the session key negotiation fails, the process ends, and re-execute step 10;

[0029] Among them, such as figure 2 As shown, session key negotiation includes the following steps:

[0030] Step 301: the client generates a random number r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of secure communication based on a commercial cipher algorithm. The method comprises the following steps: step 10, initializing connection between a client and a server is established; step 20, the client sends a session key negotiation request; step 30, the client and the server carry out session key negotiation; step 40, the client sends client device information for identity authentication; and step 50, the client and the server communicate in an encrypted way. According to the method of secure communication based on a commercial cipher encryption and decryption technology, key negotiation of a key exchange algorithm, a data encryption algorithm and a data integrity check algorithm is adopted to enable the client and the server to carry out bidirectional authentication and determine the session key, and a secure channel is established to prevent data eavesdropping, tampering and destruction and replay attack insertion in the data transmission process and ensure the security of data transmission. The method of the invention does not rely on a network access mode, can be implemented on any basic network, and can realize end-to-end security protection.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a secure communication method based on a business secret algorithm. Background technique [0002] At present, the network is facing various threats, including leakage of confidential data, destruction of data integrity, identity masquerading and denial of service, etc. In response to these threats, some secure communication protocols have emerged as the times require. For example, the SSL protocol (Secure Socket Layer) was developed by Netscape to ensure the security of data transmission on the Internet, using data encryption technology to ensure that data will not be intercepted and eavesdropped during transmission on the network . It has been widely used for identity authentication and encrypted data transmission between web browsers and servers. [0003] Since the SSL protocol is based on a Web browser, it can well support B / S applications, but the support for C / S app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 吴克河陈飞崔文超
Owner 北京华电天益信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products