CN109327482A - P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication - Google Patents
P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication Download PDFInfo
- Publication number
- CN109327482A CN109327482A CN201811549714.2A CN201811549714A CN109327482A CN 109327482 A CN109327482 A CN 109327482A CN 201811549714 A CN201811549714 A CN 201811549714A CN 109327482 A CN109327482 A CN 109327482A
- Authority
- CN
- China
- Prior art keywords
- node
- authentication
- temporary key
- content
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The data transfer mode for introducing the anti-fake and asymmetrical encryption of authentication is communicated the invention discloses P2P, this method includes introducing registration center ETCD to be registered, and starts all nodes, and registered in registration center ETCD;All nodes obtain the information on services of Correspondent Node by registration center ETCD;Communication connection is carried out between the node to succeed in registration;After or after establishing communication connection, the temporary key that will first carry out own node is generated for each authentication between node, and the node both sides for then establishing communication exchange temporary key and save, and encrypt respectively as encryption key to Content of communciation;Content of communciation is encrypted using other side's temporary key that communication saves is established, Correspondent Node receives the temporary key generated after the Content of communciation of encryption by itself and the Content of communciation of encryption is decrypted, and is read out to Content of communciation.Through the above scheme, invention achieves the purposes of safe transmission, have very high practical value and promotional value.
Description
Technical field
The invention belongs to block chain technical fields, and in particular to P2P communication introduces the anti-fake and asymmetrical encryption of authentication
Data transfer mode.
Background technique
With information-based high speed development, demand of the people to information security is also higher and higher, various hands of stealing secret information
Section constitutes miscellaneous security risk, also promotes the high speed development of information security technology.Traditional single data protection
Whole information security solution is had developed into, is prevented by the conventional information that firewall, intrusion detection and antivirus software form
The development of watch box system is the protecting information safety system of diversification, and traditional simple external network protection has also extended to Intranet peace
Entirely, Host Security etc..In the development of last decade, protecting information safety from simple to complex, from single to comprehensive, occurs
The leaping of matter.And it is communicated between the node of EOS block chain there is frequent at present, but either block data or number of deals
According to all plaintext is communicated, and without carrying out authentication, this is very big safety for network communication
Hidden danger, therefore how to realize verifying, the encrypted transmission of file and the decryption of file that identity is realized during transmitting file
Read the problem of encrypted content is those skilled in the art's urgent need to resolve.
Summary of the invention
The transmission side data for introducing the anti-fake and asymmetrical encryption of authentication is communicated the purpose of the present invention is to provide P2P
Formula mainly solves the problems, such as that there are security risks by plaintext transmission between block chain node existing in the prior art.
To achieve the goals above, The technical solution adopted by the invention is as follows:
P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, includes the following steps:
1) it introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;
2) all nodes obtain the information on services of Correspondent Node by registration center ETCD;
3) communication connection is carried out between the node to succeed in registration, while authentication is carried out according to registration center ETCD,
Realize that the identity of node is anti-fake;
4) each authentication will first carry out facing for own node after or after establishing communication connection between node
When key generate, then establish communication node both sides exchange temporary key simultaneously save, come respectively as encryption key to communication
Content is encrypted;
5) Content of communciation is encrypted using the other side's temporary key for establishing communication preservation, Correspondent Node receives encryption
Content of communciation after the temporary key that is generated by itself Content of communciation of encryption is decrypted, and Content of communciation is read
It takes.
Further, communication connection is carried out in the step 3 and need to meet the IP that node is connected according to Correspondent Node, to note
Volume center carries out authentication inquiry, and only query result can just continue subsequent operation by the connection of verifying, otherwise
It is considered non-nodal connection, disconnects the connection.
Preferably, the node both sides for communication being established in the step 4 include local node and peer node.
Specifically, the temporary key in the step 5 is only upper effective in this connection currently having built up, and works as connection
After disconnection, the temporary key needs in reconnect are regenerated, and current temporary key cancels.
Compared with prior art, the invention has the following advantages:
(1) node both sides of the present invention by registration after carry out authentication, to realize that identity is anti-fake, at the same local node and
Communication is established between peer node to generate temporary key later and swap, and when being communicated, uses facing for Correspondent Node
When key-pair file encrypted, after Correspondent Node receives encryption communication content, by itself generate temporary key to encryption
Content of communciation be decrypted, realization encryption communication content is read out, by introduce authentication it is anti-fake and it is asymmetrical add
It is close to be transmitted, it is effectively protected the safety of transferring content.
(2) temporary key of the invention is only upper effective in this connection currently having built up, after connecting disconnection, weight
Temporary key needs in new connection regenerate, and current temporary key cancels, using being similar to disposable temporary key,
It can be stolen to avoid temporary key and cause unsafe condition.
Detailed description of the invention
Fig. 1 is system structure diagram of the invention.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples, and embodiments of the present invention include but is not limited to
The following example.
Embodiment
As shown in Figure 1, P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, including as follows
Step:
It introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;All sections
Point obtains the information on services of Correspondent Node by registration center ETCD;Communication connection is carried out between the node to succeed in registration, is carried out
Communication connection needs to meet the IP that node is connected according to Correspondent Node, carries out authentication inquiry to registration center, only inquires
As a result subsequent operation can just be continued by the connection of verifying, is otherwise taken as non-nodal connection, disconnects the connection, simultaneously
Authentication is carried out according to registration center ETCD, realizes that the identity of node is anti-fake;After each authentication passes through between node
Or after establishing communication connection, the temporary key that will first carry out own node is generated, node both sides (this for then establishing communication
Ground node and peer node) it exchanges temporary key and saves, Content of communciation is encrypted respectively as encryption key;It uses
It establishes other side's temporary key that communication saves to encrypt Content of communciation, Correspondent Node leads to after receiving the Content of communciation of encryption
The Content of communciation of encryption is decrypted in the temporary key for crossing itself generation, and is read out to Content of communciation, wherein interim close
Key is only upper effective in this connection currently having built up, and after connecting disconnection, the temporary key in reconnect needs weight
Newly-generated, current temporary key cancels.
Principle is that the temporary key used in current connection is saved (example according to communication corresponding relationship by local node A
Map<peer node B ip_port is such as used, temporary key>is decrypted), the temporary key is then passed through into displacement cipher mode
(to some numerical value modulus after being added the ASC value of each character of peer node title, using last modulus value as key string
Cyclic shift value) carry out simple encryption, be then sent to peer node B.Peer node B is receiving local node A transmission
After simple temporary key, simply decrypted according to nodename, then according to communicate corresponding relationship saved (for example, by using
The ip_port of map peer node A encrypts temporary key string >).So far, the authentication between node and asymmetrical encryption key
It is ready, posterior nodal point both sides the data of oneself can be subjected to encryption transmission with the temporary key that Correspondent Node provides,
Realization communicates.
Specifically, after local node A and peer node B point establish communication, the temporary key that local node A is generated is
The temporary key that Akey, peer node B are generated is Bkey, after then local node A and peer node B is exchanged with each other temporary key
It is communicated, the Content of communciation that local node A is sent to peer node B is sent after being encrypted with temporary key Bkey, opposite end
The temporary key Bkey generated after the encrypted content that Node-B receiver occurs to local node A with itself solves encrypted content
Close reading;Similarly, the Content of communciation that peer node B is sent to local node A is sent to local node A after being encrypted with Akey, this
Ground node A decrypts the content of peer node B encryption with temporary key Akey, resettles communication again after communicating and disconnecting, temporarily
Key A key must will be regenerated and be exchanged by local node A and peer node B with Bkey, then could continue to communicate,
Wherein, temporary key Akey is used for identity when encrypting for encryption temporary key string, when local node A is used in peer node B
Identity when the peer node B encrypted content sent is decrypted is decryption temporary key string.
Above-described embodiment is merely a preferred embodiment of the present invention, and it is not intended to limit the protection scope of the present invention, as long as using
Design principle of the invention, and the non-creative variation worked and made is carried out on this basis, it should belong to of the invention
Within protection scope.
Claims (4)
1.P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, which is characterized in that including walking as follows
It is rapid:
1) it introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;
2) all nodes obtain the information on services of Correspondent Node by registration center ETCD;
3) communication connection is carried out between the node to succeed in registration, while authentication is carried out according to registration center ETCD, is realized
The identity of node is anti-fake;
4) each authentication will first carry out the interim close of own node after or after establishing communication connection between node
Key generates, and the node both sides for then establishing communication exchange temporary key and save, and comes respectively as encryption key to Content of communciation
It is encrypted;
5) Content of communciation is encrypted using the other side's temporary key for establishing communication preservation, Correspondent Node receives the logical of encryption
The Content of communciation of encryption is decrypted in the temporary key generated after news content by itself, and is read out to Content of communciation.
2. P2P communication according to claim 1 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication,
Be characterized in that, in the step 3 carry out communication connection need to meet the IP that node connect according to Correspondent Node, arrive registration center into
Row authentication inquiry, only query result can just continue subsequent operation by the connection of verifying, otherwise be considered as right and wrong
Node connection, disconnects the connection.
3. P2P communication according to claim 2 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication,
It is characterized in that, the node both sides that communication is established in the step 4 include local node and peer node.
4. P2P communication according to claim 3 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication,
It is characterized in that, the temporary key in the step 5 is only upper effective in this connection currently having built up, when connection disconnects
Afterwards, the temporary key needs in reconnect regenerate, and current temporary key cancels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811549714.2A CN109327482A (en) | 2018-12-18 | 2018-12-18 | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811549714.2A CN109327482A (en) | 2018-12-18 | 2018-12-18 | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109327482A true CN109327482A (en) | 2019-02-12 |
Family
ID=65256987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811549714.2A Pending CN109327482A (en) | 2018-12-18 | 2018-12-18 | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109327482A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113055392A (en) * | 2021-03-26 | 2021-06-29 | 浙江工商大学 | Block chain-based unified identity authentication method |
CN114169878A (en) * | 2021-10-18 | 2022-03-11 | 中标慧安信息技术股份有限公司 | Prepayment management method and system based on edge calculation |
CN115695442A (en) * | 2022-10-31 | 2023-02-03 | 安徽高山科技有限公司 | Electronic contract safe transmission method and device based on P2P technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155031A (en) * | 2006-09-29 | 2008-04-02 | 珠海金山软件股份有限公司 | Device and control method for central authorization control in P2P file transfer |
CN101515947A (en) * | 2009-02-17 | 2009-08-26 | 浙江大学 | Method and system for the quick-speed and safe distribution of file based on P2P |
CN103427998A (en) * | 2013-08-20 | 2013-12-04 | 航天恒星科技有限公司 | Internet data distribution oriented identity authentication and data encryption method |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN106878318A (en) * | 2017-03-03 | 2017-06-20 | 钱德君 | A kind of block chain real time polling cloud system |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
-
2018
- 2018-12-18 CN CN201811549714.2A patent/CN109327482A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155031A (en) * | 2006-09-29 | 2008-04-02 | 珠海金山软件股份有限公司 | Device and control method for central authorization control in P2P file transfer |
CN101515947A (en) * | 2009-02-17 | 2009-08-26 | 浙江大学 | Method and system for the quick-speed and safe distribution of file based on P2P |
CN103427998A (en) * | 2013-08-20 | 2013-12-04 | 航天恒星科技有限公司 | Internet data distribution oriented identity authentication and data encryption method |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN106878318A (en) * | 2017-03-03 | 2017-06-20 | 钱德君 | A kind of block chain real time polling cloud system |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113055392A (en) * | 2021-03-26 | 2021-06-29 | 浙江工商大学 | Block chain-based unified identity authentication method |
CN114169878A (en) * | 2021-10-18 | 2022-03-11 | 中标慧安信息技术股份有限公司 | Prepayment management method and system based on edge calculation |
CN114169878B (en) * | 2021-10-18 | 2022-09-20 | 中标慧安信息技术股份有限公司 | Prepayment management method and system based on edge calculation |
CN115695442A (en) * | 2022-10-31 | 2023-02-03 | 安徽高山科技有限公司 | Electronic contract safe transmission method and device based on P2P technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fang et al. | Security for 5G mobile wireless networks | |
Long et al. | An evolutionary pathway for the quantum internet relying on secure classical repeaters | |
CN107453868B (en) | A kind of safe and efficient quantum key method of servicing | |
JP4707992B2 (en) | Encrypted communication system | |
CN105357218B (en) | A kind of router and its encipher-decipher method having hardware enciphering and deciphering function | |
KR100479260B1 (en) | Method for cryptographing wireless data and apparatus thereof | |
CN110225016A (en) | A kind of data hiding transmission method based on block chain network | |
Ataei Nezhad et al. | An authentication-based secure data aggregation method in internet of things | |
CN107708112A (en) | A kind of encryption method suitable for MQTT SN agreements | |
CN107104977B (en) | Block chain data secure transmission method based on SCTP | |
CN109327482A (en) | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication | |
CN201830272U (en) | Network encryption machine based on quantum keys | |
CN101523797A (en) | Cryptographic key management in communication networks | |
CN110234111A (en) | A kind of two-factor authentication key agreement protocol suitable for multiple gateway wireless sensor network | |
CN113596135B (en) | Block chain system, data processing method and equipment thereof and storage medium | |
MY130611A (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
CN109104428A (en) | Internet of things data quantum encrypted transmission equipment and transmission method | |
CN105792190A (en) | Data encryption, decryption and transmission method in communication system | |
CN110366175A (en) | Safe consultation method, terminal device and the network equipment | |
KR101284155B1 (en) | authentication process using of one time password | |
CN109995512A (en) | A kind of mobile security application method based on quantum key distribution network | |
CN114844730A (en) | Network system constructed based on trusted tunnel technology | |
CN211352206U (en) | IPSec VPN cryptographic machine based on quantum key distribution | |
Kumar et al. | Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks | |
CN103905389B (en) | Relay equipment-based security association, data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190212 |