CN109327482A - P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication - Google Patents

P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication Download PDF

Info

Publication number
CN109327482A
CN109327482A CN201811549714.2A CN201811549714A CN109327482A CN 109327482 A CN109327482 A CN 109327482A CN 201811549714 A CN201811549714 A CN 201811549714A CN 109327482 A CN109327482 A CN 109327482A
Authority
CN
China
Prior art keywords
node
authentication
temporary key
content
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811549714.2A
Other languages
Chinese (zh)
Inventor
陈纪周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Medicine Chain Group Co Ltd
Original Assignee
Shaanxi Medicine Chain Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Medicine Chain Group Co Ltd filed Critical Shaanxi Medicine Chain Group Co Ltd
Priority to CN201811549714.2A priority Critical patent/CN109327482A/en
Publication of CN109327482A publication Critical patent/CN109327482A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The data transfer mode for introducing the anti-fake and asymmetrical encryption of authentication is communicated the invention discloses P2P, this method includes introducing registration center ETCD to be registered, and starts all nodes, and registered in registration center ETCD;All nodes obtain the information on services of Correspondent Node by registration center ETCD;Communication connection is carried out between the node to succeed in registration;After or after establishing communication connection, the temporary key that will first carry out own node is generated for each authentication between node, and the node both sides for then establishing communication exchange temporary key and save, and encrypt respectively as encryption key to Content of communciation;Content of communciation is encrypted using other side's temporary key that communication saves is established, Correspondent Node receives the temporary key generated after the Content of communciation of encryption by itself and the Content of communciation of encryption is decrypted, and is read out to Content of communciation.Through the above scheme, invention achieves the purposes of safe transmission, have very high practical value and promotional value.

Description

P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
Technical field
The invention belongs to block chain technical fields, and in particular to P2P communication introduces the anti-fake and asymmetrical encryption of authentication Data transfer mode.
Background technique
With information-based high speed development, demand of the people to information security is also higher and higher, various hands of stealing secret information Section constitutes miscellaneous security risk, also promotes the high speed development of information security technology.Traditional single data protection Whole information security solution is had developed into, is prevented by the conventional information that firewall, intrusion detection and antivirus software form The development of watch box system is the protecting information safety system of diversification, and traditional simple external network protection has also extended to Intranet peace Entirely, Host Security etc..In the development of last decade, protecting information safety from simple to complex, from single to comprehensive, occurs The leaping of matter.And it is communicated between the node of EOS block chain there is frequent at present, but either block data or number of deals According to all plaintext is communicated, and without carrying out authentication, this is very big safety for network communication Hidden danger, therefore how to realize verifying, the encrypted transmission of file and the decryption of file that identity is realized during transmitting file Read the problem of encrypted content is those skilled in the art's urgent need to resolve.
Summary of the invention
The transmission side data for introducing the anti-fake and asymmetrical encryption of authentication is communicated the purpose of the present invention is to provide P2P Formula mainly solves the problems, such as that there are security risks by plaintext transmission between block chain node existing in the prior art.
To achieve the goals above, The technical solution adopted by the invention is as follows:
P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, includes the following steps:
1) it introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;
2) all nodes obtain the information on services of Correspondent Node by registration center ETCD;
3) communication connection is carried out between the node to succeed in registration, while authentication is carried out according to registration center ETCD, Realize that the identity of node is anti-fake;
4) each authentication will first carry out facing for own node after or after establishing communication connection between node When key generate, then establish communication node both sides exchange temporary key simultaneously save, come respectively as encryption key to communication Content is encrypted;
5) Content of communciation is encrypted using the other side's temporary key for establishing communication preservation, Correspondent Node receives encryption Content of communciation after the temporary key that is generated by itself Content of communciation of encryption is decrypted, and Content of communciation is read It takes.
Further, communication connection is carried out in the step 3 and need to meet the IP that node is connected according to Correspondent Node, to note Volume center carries out authentication inquiry, and only query result can just continue subsequent operation by the connection of verifying, otherwise It is considered non-nodal connection, disconnects the connection.
Preferably, the node both sides for communication being established in the step 4 include local node and peer node.
Specifically, the temporary key in the step 5 is only upper effective in this connection currently having built up, and works as connection After disconnection, the temporary key needs in reconnect are regenerated, and current temporary key cancels.
Compared with prior art, the invention has the following advantages:
(1) node both sides of the present invention by registration after carry out authentication, to realize that identity is anti-fake, at the same local node and Communication is established between peer node to generate temporary key later and swap, and when being communicated, uses facing for Correspondent Node When key-pair file encrypted, after Correspondent Node receives encryption communication content, by itself generate temporary key to encryption Content of communciation be decrypted, realization encryption communication content is read out, by introduce authentication it is anti-fake and it is asymmetrical add It is close to be transmitted, it is effectively protected the safety of transferring content.
(2) temporary key of the invention is only upper effective in this connection currently having built up, after connecting disconnection, weight Temporary key needs in new connection regenerate, and current temporary key cancels, using being similar to disposable temporary key, It can be stolen to avoid temporary key and cause unsafe condition.
Detailed description of the invention
Fig. 1 is system structure diagram of the invention.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples, and embodiments of the present invention include but is not limited to The following example.
Embodiment
As shown in Figure 1, P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, including as follows Step:
It introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;All sections Point obtains the information on services of Correspondent Node by registration center ETCD;Communication connection is carried out between the node to succeed in registration, is carried out Communication connection needs to meet the IP that node is connected according to Correspondent Node, carries out authentication inquiry to registration center, only inquires As a result subsequent operation can just be continued by the connection of verifying, is otherwise taken as non-nodal connection, disconnects the connection, simultaneously Authentication is carried out according to registration center ETCD, realizes that the identity of node is anti-fake;After each authentication passes through between node Or after establishing communication connection, the temporary key that will first carry out own node is generated, node both sides (this for then establishing communication Ground node and peer node) it exchanges temporary key and saves, Content of communciation is encrypted respectively as encryption key;It uses It establishes other side's temporary key that communication saves to encrypt Content of communciation, Correspondent Node leads to after receiving the Content of communciation of encryption The Content of communciation of encryption is decrypted in the temporary key for crossing itself generation, and is read out to Content of communciation, wherein interim close Key is only upper effective in this connection currently having built up, and after connecting disconnection, the temporary key in reconnect needs weight Newly-generated, current temporary key cancels.
Principle is that the temporary key used in current connection is saved (example according to communication corresponding relationship by local node A Map<peer node B ip_port is such as used, temporary key>is decrypted), the temporary key is then passed through into displacement cipher mode (to some numerical value modulus after being added the ASC value of each character of peer node title, using last modulus value as key string Cyclic shift value) carry out simple encryption, be then sent to peer node B.Peer node B is receiving local node A transmission After simple temporary key, simply decrypted according to nodename, then according to communicate corresponding relationship saved (for example, by using The ip_port of map peer node A encrypts temporary key string >).So far, the authentication between node and asymmetrical encryption key It is ready, posterior nodal point both sides the data of oneself can be subjected to encryption transmission with the temporary key that Correspondent Node provides, Realization communicates.
Specifically, after local node A and peer node B point establish communication, the temporary key that local node A is generated is The temporary key that Akey, peer node B are generated is Bkey, after then local node A and peer node B is exchanged with each other temporary key It is communicated, the Content of communciation that local node A is sent to peer node B is sent after being encrypted with temporary key Bkey, opposite end The temporary key Bkey generated after the encrypted content that Node-B receiver occurs to local node A with itself solves encrypted content Close reading;Similarly, the Content of communciation that peer node B is sent to local node A is sent to local node A after being encrypted with Akey, this Ground node A decrypts the content of peer node B encryption with temporary key Akey, resettles communication again after communicating and disconnecting, temporarily Key A key must will be regenerated and be exchanged by local node A and peer node B with Bkey, then could continue to communicate, Wherein, temporary key Akey is used for identity when encrypting for encryption temporary key string, when local node A is used in peer node B Identity when the peer node B encrypted content sent is decrypted is decryption temporary key string.
Above-described embodiment is merely a preferred embodiment of the present invention, and it is not intended to limit the protection scope of the present invention, as long as using Design principle of the invention, and the non-creative variation worked and made is carried out on this basis, it should belong to of the invention Within protection scope.

Claims (4)

1.P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, which is characterized in that including walking as follows It is rapid:
1) it introduces registration center ETCD to be registered, starts all nodes, and registered in registration center ETCD;
2) all nodes obtain the information on services of Correspondent Node by registration center ETCD;
3) communication connection is carried out between the node to succeed in registration, while authentication is carried out according to registration center ETCD, is realized The identity of node is anti-fake;
4) each authentication will first carry out the interim close of own node after or after establishing communication connection between node Key generates, and the node both sides for then establishing communication exchange temporary key and save, and comes respectively as encryption key to Content of communciation It is encrypted;
5) Content of communciation is encrypted using the other side's temporary key for establishing communication preservation, Correspondent Node receives the logical of encryption The Content of communciation of encryption is decrypted in the temporary key generated after news content by itself, and is read out to Content of communciation.
2. P2P communication according to claim 1 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, Be characterized in that, in the step 3 carry out communication connection need to meet the IP that node connect according to Correspondent Node, arrive registration center into Row authentication inquiry, only query result can just continue subsequent operation by the connection of verifying, otherwise be considered as right and wrong Node connection, disconnects the connection.
3. P2P communication according to claim 2 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, It is characterized in that, the node both sides that communication is established in the step 4 include local node and peer node.
4. P2P communication according to claim 3 introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication, It is characterized in that, the temporary key in the step 5 is only upper effective in this connection currently having built up, when connection disconnects Afterwards, the temporary key needs in reconnect regenerate, and current temporary key cancels.
CN201811549714.2A 2018-12-18 2018-12-18 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication Pending CN109327482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811549714.2A CN109327482A (en) 2018-12-18 2018-12-18 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811549714.2A CN109327482A (en) 2018-12-18 2018-12-18 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication

Publications (1)

Publication Number Publication Date
CN109327482A true CN109327482A (en) 2019-02-12

Family

ID=65256987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811549714.2A Pending CN109327482A (en) 2018-12-18 2018-12-18 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication

Country Status (1)

Country Link
CN (1) CN109327482A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055392A (en) * 2021-03-26 2021-06-29 浙江工商大学 Block chain-based unified identity authentication method
CN114169878A (en) * 2021-10-18 2022-03-11 中标慧安信息技术股份有限公司 Prepayment management method and system based on edge calculation
CN115695442A (en) * 2022-10-31 2023-02-03 安徽高山科技有限公司 Electronic contract safe transmission method and device based on P2P technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155031A (en) * 2006-09-29 2008-04-02 珠海金山软件股份有限公司 Device and control method for central authorization control in P2P file transfer
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155031A (en) * 2006-09-29 2008-04-02 珠海金山软件股份有限公司 Device and control method for central authorization control in P2P file transfer
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055392A (en) * 2021-03-26 2021-06-29 浙江工商大学 Block chain-based unified identity authentication method
CN114169878A (en) * 2021-10-18 2022-03-11 中标慧安信息技术股份有限公司 Prepayment management method and system based on edge calculation
CN114169878B (en) * 2021-10-18 2022-09-20 中标慧安信息技术股份有限公司 Prepayment management method and system based on edge calculation
CN115695442A (en) * 2022-10-31 2023-02-03 安徽高山科技有限公司 Electronic contract safe transmission method and device based on P2P technology

Similar Documents

Publication Publication Date Title
Fang et al. Security for 5G mobile wireless networks
Long et al. An evolutionary pathway for the quantum internet relying on secure classical repeaters
CN107453868B (en) A kind of safe and efficient quantum key method of servicing
JP4707992B2 (en) Encrypted communication system
CN105357218B (en) A kind of router and its encipher-decipher method having hardware enciphering and deciphering function
KR100479260B1 (en) Method for cryptographing wireless data and apparatus thereof
CN110225016A (en) A kind of data hiding transmission method based on block chain network
Ataei Nezhad et al. An authentication-based secure data aggregation method in internet of things
CN107708112A (en) A kind of encryption method suitable for MQTT SN agreements
CN107104977B (en) Block chain data secure transmission method based on SCTP
CN109327482A (en) P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
CN201830272U (en) Network encryption machine based on quantum keys
CN101523797A (en) Cryptographic key management in communication networks
CN110234111A (en) A kind of two-factor authentication key agreement protocol suitable for multiple gateway wireless sensor network
CN113596135B (en) Block chain system, data processing method and equipment thereof and storage medium
MY130611A (en) Methods and arrangements for secure linking of entity authentication and ciphering key generation
CN109104428A (en) Internet of things data quantum encrypted transmission equipment and transmission method
CN105792190A (en) Data encryption, decryption and transmission method in communication system
CN110366175A (en) Safe consultation method, terminal device and the network equipment
KR101284155B1 (en) authentication process using of one time password
CN109995512A (en) A kind of mobile security application method based on quantum key distribution network
CN114844730A (en) Network system constructed based on trusted tunnel technology
CN211352206U (en) IPSec VPN cryptographic machine based on quantum key distribution
Kumar et al. Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks
CN103905389B (en) Relay equipment-based security association, data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212