CN109845184A - A kind of data ciphering method and device of instant messaging - Google Patents

A kind of data ciphering method and device of instant messaging Download PDF

Info

Publication number
CN109845184A
CN109845184A CN201880002437.5A CN201880002437A CN109845184A CN 109845184 A CN109845184 A CN 109845184A CN 201880002437 A CN201880002437 A CN 201880002437A CN 109845184 A CN109845184 A CN 109845184A
Authority
CN
China
Prior art keywords
password
client
group
calculated
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880002437.5A
Other languages
Chinese (zh)
Inventor
袁振南
林正显
陈国豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
District Chain Tong Network Co Ltd
Original Assignee
District Chain Tong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by District Chain Tong Network Co Ltd filed Critical District Chain Tong Network Co Ltd
Publication of CN109845184A publication Critical patent/CN109845184A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application discloses a kind of data ciphering method of instant messaging and devices, which comprises the first client generates a random number, is combined random number and group's password to obtain code data source;Code data source is carried out using hash algorithm information password is calculated;Communication data is encrypted using information password.By the above-mentioned means, the application can be improved the safety of the communication information.

Description

A kind of data ciphering method and device of instant messaging
Technical field
This application involves network communication technology fields, more particularly to the data ciphering method and dress of a kind of instant messaging It sets.
Background technique
With the development of network communication technology, instant messaging is increasingly becoming the exchange way of both sides, and multi-party friendship The information platform of stream.When being exchanged by instant communication mode, in order to ensure information security, need to add information It is close.Present inventor has found in current group chat communication, encryption technology is close by taking in long-term R&D process The mode of code symmetric cryptography carries out safeguard protection to the communication information between client, and this password saves on the server, When having new client to be added this group, server gives password ' sharing ' to the user.It is this so that group communication is completely dependent on In group's password, and group's password is distributed in each client and server background, and communication security risk notch is obvious, once service Device is cracked, and the safety of whole system is just disintegrated.Therefore, it is necessary to a kind of not only safety, but also efficient encryption technique scheme to come Solve information communication issue.
Summary of the invention
The application is mainly solving the technical problems that provide the data ciphering method and device of a kind of instant messaging, Neng Gouti The safety of the high communication information.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of data of instant messaging Encryption method, wherein the described method includes: the first client generates a random number, random number and group's password are combined Obtain code data source;Code data source is carried out using hash algorithm information password is calculated;Using information password to logical Letter data is encrypted.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of data of instant messaging Encryption device, wherein described device includes processor, processor for generating a random number, by random number and group's password into Row combination obtains code data source;Processor is also used to carry out information is calculated to code data source using hash algorithm close Code;Processor is also used to encrypt communication data using information password.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of number of instant messaging According to encryption device, wherein described device includes: generation module, and for generating a random number, random number and group's password are carried out Combination obtains code data source;Information password is calculated for carrying out using hash algorithm to code data source in computing module; Encrypting module, for being encrypted using information password to communication data.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of with store function Device, wherein described device is stored with program, and described program is performed the data encryption side for realizing above-mentioned instant messaging Method.
The beneficial effect of the application is: being in contrast to the prior art, the application provides a kind of data of instant messaging Encryption method, for this method by the way that random number is added to password when information is encrypted, the information for issuing each all can be different Password encrypted, improve the front and back of every information to cryptosecurity.
Detailed description of the invention
Fig. 1 is the flow diagram of the data ciphering method first embodiment of the application instant messaging;
Fig. 2 is the flow diagram of the data ciphering method second embodiment of the application instant messaging;
Fig. 3 is the flow diagram of the data ciphering method third embodiment of the application instant messaging;
Fig. 4 is the flow diagram of the 4th embodiment of data ciphering method of the application instant messaging;
Fig. 5 is the structural schematic diagram of the data encryption device first embodiment of the application instant messaging;
Fig. 6 is the structural schematic diagram of the data encryption device second embodiment of the application instant messaging;
Fig. 7 is the structural schematic diagram for the device first embodiment that the application has store function.
Specific embodiment
It is right as follows in conjunction with drawings and embodiments to keep the purpose, technical solution and effect of the application clearer, clear The application is further described.
The application provides a kind of data ciphering method of instant messaging, at least applies in the encryption of group chat information, by changing Become the transfer mode of group's password and the cipher mode of group's information, the safety of Lai Tigao group chat communication.
Wherein, the application utilizes the graceful Key Exchange Protocol (Diffie-of diffie-hellman when carrying out group's password transmission Hellman key Exchange, hereinafter DH agreement), so that communicating pair is first determined one " arranging key ", then uses again This key encrypts the information for carrying group's password as symmetric key in subsequent communication.In this way, It can be avoided the online arranging key bring disclosure risk of both sides, improve the safety of password transmission.
Wherein, in one embodiment, the application provides the transmission method of a population password.Referring to Fig. 1, Fig. 1 is this Apply for the flow diagram of the data ciphering method first embodiment of instant messaging.In this embodiment, it needs close to group Code is transmitted, and is encrypted in transitive group password to group's password.
Specifically, the first client creates a group, and generating a password at random when creating group is group's password.Example Such as, one 64 random ciphers can be generated at random as group's password.
First client invites the second client that group chat is added, and when inviting the second client to carry out group chat, needs group Password is sent to the second client.
Wherein, the first client is equipped with public key A and private key A for encryption;Second client is equipped with the public affairs for encryption Key B and private key B.Specifically, the first client, the second client intercourse public key A and public key B by server;First visitor Family end using private key A and public key B carries out that DH password is calculated by DH agreement, using the DH password as symmetric cryptography to taking Information with group's password encrypts, and the encrypted information for carrying group's password is then sent to the second client.
Second client using private key B and public key A carries out that DH password is calculated by DH agreement, wherein the second client Hold the DH password calculated identical as the password that the first client is calculated.Group's password encryption uses symmetric cryptography again Mode, therefore, the second client can use the DH password and the information for carrying group's password are decrypted, and obtain group's password.
In this way, both sides can be made without linking up in advance, one is can determine in unsafe network and " negotiate Key " can be avoided the online arranging key bring disclosure risk of both sides.Meanwhile the DH password calculated includes oneself Two parameters of private key and the public key of other side;Accordingly even when by hacker attack, hacker only knows public key A and public key B, because not knowing The private key of either side can be improved the safety of information so DH password can not be calculated.
Referring to Fig. 2, Fig. 2 is the flow diagram of the data ciphering method second embodiment of the application instant messaging. In this embodiment, the first client passes through ECDH algorithm (Elliptic Curves Diffie- using private key A and public key B Hellman, ECDH) calculate DH password.Wherein ECDH algorithm is ECC (Elliptic Curves Cryptography, ellipse Curve encryption) algorithm and DH combined use, be a kind of cipher key agreement algorithm, for key consult.
Then hash algorithm is recycled to carry out the character string that predetermined figure is calculated to DH password;For example, can use SHA512 algorithm be calculated a string of 512 character strings to DH password.First 256 of character string are taken to be used as information password Information is encrypted, latter 128 of character string is taken to be used as cryptographic Hash (IV vector).Wherein in the way of symmetric cryptography to taking Information with group's password encrypts, and obtains encrypted group's password and sends.Specifically, by carry group's password information with And the cryptographic Hash of the information is encrypted as initial data;So that data receiver can use cryptographic Hash and check the complete of information Whole property.Symmetric encipherment algorithm includes DES (Data Encryption Standard), AES (Advanced Encryption Standard), IDEA (International Data Encryption Algorithm) etc..
Wherein, in another embodiment, the application can also utilize asymmetric encryption when carrying out group's password transmission Mode is transmitted, to improve the safety of information transmitting.In this embodiment, the first client utilizes the second client Public key B encrypts group's password, and the second client is sent to after encryption, at this point, the second client using oneself private key B into Row decryption, obtains group's password.Transmitting carrying out password in the way of asymmetric encryption, improves the safety of one-way transmission Property.This is because the public key of different clients is different, corresponding private key is also different, and therefore, each client can only be downloaded logical Cross group's password that oneself private key can be decrypted.
Group members are after obtaining group's password, so that it may be encrypted with this group password to information in group chat.But every If information is only with the same password encryption, once password, which is compromised all information all, can become transparent, therefore password is needed Increase randomness to ensure that every information is that have individual Crypted password.Based on this, the application provides a kind of encryption of information Raw information password is exported new information password by adding some random data in the password of each information by method, Improve the confidentiality of raw information password.Specifically, referring to Fig. 3, Fig. 3 is the data ciphering method of the application instant messaging The flow diagram of three embodiments.In this embodiment, this method comprises the following steps:
S301: the first client generates a random number, is combined random number and group's password to obtain code data source.
Wherein, random number is the data of predetermined figure, and different information correspondences are that random number is different.Group's password is first What client was invited to obtain into group, or while establishing group generate at random, specific acquisition modes please refer to above embodiment Description, details are not described herein.
S302: code data source is carried out using hash algorithm information password is calculated.
Wherein, code data source is encrypted using hash algorithm, with safer protection password.Specifically, it is breathed out The fixed abstract (digest) of a segment length can be obtained after uncommon encryption, and the corresponding abstract of each file is unique , so abstract is also referred to as file fingerprint, can be used for carrying out safe preservation to password.Even if in addition, any file is modified One character, its fingerprint can also become entirely different, so file fingerprint can be used to judge the integrality of file.
S303: communication data is encrypted using information password.
Wherein, communication data is encrypted in the way of symmetric cryptography, to improve encryption/decryption speed, is also convenient for password Management adapts to group encryption chat.
Referring to Fig. 4, Fig. 4 is the flow diagram of the 4th embodiment of data ciphering method of the application instant messaging. In this embodiment, the first client generates 512 passwords as random number, by this when sending information at random Random number and public group's password form the independent code data source of the information.
Code data source is carried out using hash algorithm information password is calculated.Such as using SHA512 algorithm to password Information source is calculated, and one 512 character strings are obtained, and first 256 of the character string is taken to be used as AES password, rear 128 works For IV vector, AES encryption is carried out using the cryptographic Hash of the information and information to be sent as initial data.Encrypted data have Two parts composition, the random number that the first half (head) of information is 512, the latter half (body) of information are the letter of encryption Breath.
Then private key signature is used, then encryption information is issued into server, other members are sent to by server.
Other group members when receiving information, are verified using the public signature key of sender first, after being proved to be successful, use phase The chain Key production information password answered, and decrypted with information password.Before decryption, raw information can also be verified using cryptographic Hash Integrality, then recycle information password information is decrypted.
Under this group of cipher modes, since server does not save client password, so safety rests in client In hand, while the information that client each issues all can have different passwords to be encrypted, and improve the front and back of every information To cryptosecurity.
The application also provides a kind of data encryption device of instant messaging, referring to Fig. 5, Fig. 5 is the application instant messaging Data encryption device first embodiment structural schematic diagram.In this embodiment, encryption device 50 includes processor 501, processor 501 is combined random number and group's password to obtain code data source for generating a random number;It recycles Hash algorithm carries out code data source information password is calculated;Finally communication data is encrypted using information password.
Wherein, in one embodiment, one information of the every transmission of client, processor 501 generate at random one it is different Random number.
Wherein, in one embodiment, processor 501 is specifically used for counting code data source using SHA512 algorithm Calculation obtains one 512 character strings, and first 256 of character string is taken to be used as information password.
Wherein, in one embodiment, processor 501 is also used to receive by group's password of DH password encryption, wherein DH is close Code is what the second client was calculated using the graceful Key Exchange Protocol of diffie-hellman;Processor 501 is also used to utilize diffie- DH password is calculated in Herman Key Exchange Protocol, and encrypted group's password is decrypted using DH password, obtains group Password.
Wherein, in one embodiment, processor 501 is also used to establish group, and generates a predetermined figure at random Then DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in group's password, and using the DH password to the group Password is encrypted.
Wherein, DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman includes: the first client for utilizing The public key of second client and the private key of the first client carry out that DH password is calculated;Second client is used to utilize first The public key of client and the private key of the second client carry out that DH password is calculated;Wherein, the first client, the second client The DH password being calculated is identical.
More than, the data encryption device of instant messaging is used to execute the data ciphering method of above-mentioned instant messaging, to information Data are encrypted, and have corresponding beneficial effect, and detailed process please refers to the description of above embodiment, no longer superfluous herein It states.Wherein the device can be the self-contained unit independently of client, be also possible to a certain module or certain in client Manage unit.
Referring to Fig. 6, Fig. 6 is the structural schematic diagram of the data encryption device second embodiment of the application instant messaging. In this embodiment, encryption device 60 is a certain processing module of client, specifically includes generation module 601, computing module 602 and encrypting module 603, generation module 601 with group's password is combined to obtain close for generating a random number, by random number Code data source;Computing module 602 is for carrying out code data source using hash algorithm information password is calculated;Encrypting module 603 for encrypting communication data using information password.
Wherein, in one embodiment, generation module is specifically used in one information of every transmission, random to generate one not Same random number.
Wherein, in one embodiment, encryption device further includes receiving module and deciphering module, and receiving module is for receiving By group's password of DH password encryption, wherein DH password is that the second client is calculated using the graceful Key Exchange Protocol of diffie-hellman It arrives;Deciphering module is used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and using DH password to encryption Group's password afterwards is decrypted, and obtains group's password.The data encryption device of instant messaging is used to execute the number of above-mentioned instant messaging According to encryption method, information data is encrypted, and there is corresponding beneficial effect, detailed process please refers to above embodiment Description, details are not described herein.
The application also provides a kind of device with store function, referring to Fig. 7, Fig. 7 is that the application has store function Device first embodiment structural schematic diagram.In this embodiment, storage device 70 is stored with program 701, program 701 It is performed the data ciphering method for realizing above-mentioned instant messaging.It is consistent in specific work process and above method embodiment, therefore Details are not described herein, please refers to the explanation of the above corresponding method step in detail.Wherein the device with store function can be just The formula storage medium of taking such as USB flash disk, CD, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as device (RAM, Random Access Memory), magnetic disk are also possible to terminal, clothes Business device etc..
Above scheme, the application provide a kind of data ciphering method of instant messaging, under this group of cipher modes, due to clothes Business device does not save client password, so safety rests in client hand, while the information that client each issues There will be different passwords to be encrypted, improve the front and back of every information to cryptosecurity.
In several embodiments provided herein, it should be understood that disclosed system, device and method can To realize by another way.For example, device embodiments described above are only schematical, for example, the mould The division of block or unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple Unit or assembly can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another Point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, device or The indirect coupling or communication connection of unit can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize present embodiment scheme according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the application can integrate in one processing unit, it can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the application The all or part of the steps of embodiment the method.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (18)

1. a kind of data ciphering method of instant messaging, wherein the described method includes:
First client generates a random number, is combined the random number and group's password to obtain code data source;
The code data source is carried out that information password is calculated using hash algorithm;
Communication data is encrypted using the information password.
2. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with Machine number includes:
One information of the every transmission of first client then generates a different random number at random.
3. the data ciphering method of instant messaging according to claim 1, wherein described to utilize hash algorithm to described close Code data source carries out that information password is calculated
The character string for be calculated to the code data source one 512 using SHA512 algorithm, takes the character string First 256 be used as information password.
4. the data ciphering method of instant messaging according to claim 3, wherein take rear 128 works of the character string It is described encryption is carried out to communication data using information password to include: for cryptographic Hash
It is encrypted using information data to be sent and the cryptographic Hash as communication data.
5. the data ciphering method of instant messaging according to claim 1, wherein described to utilize information password to communication number Include: according to encryption is carried out
The communication data is encrypted in the way of symmetric cryptography, so that information receiving end utilizes the information password pair The communication data is decrypted.
6. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with Machine number, the random number and group's password are combined before obtaining code data source include:
First client is received by group's password of DH password encryption, wherein the DH password is that the second client utilizes enlightening Phenanthrene-Herman Key Exchange Protocol is calculated;
DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in first client, and utilizes the DH password Encrypted group's password is decrypted, group's password is obtained.
7. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with Machine number, the random number and group's password are combined before obtaining code data source include:
First client establishes group, and generates group's password at random;
DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in first client, and utilizes the DH password Group's password is encrypted.
8. the data ciphering method of instant messaging according to claim 6 or 7, wherein described to utilize DH password to described Group's password carries out encryption
The character string for be calculated to the DH password one 512 using SHA512 algorithm, before taking the character string 256 encrypt group's password as password.
9. the data ciphering method of instant messaging according to claim 6 or 7, wherein described graceful close using diffie-hellman DH password is calculated in key exchange agreement
First client using the public key of the second client and the private key of the first client carries out that the DH password is calculated;
Second client using the public key of the first client and the private key of the second client carries out that the DH password is calculated;
Wherein, the DH password that first client, the second client are calculated is identical.
10. the data ciphering method of instant messaging according to claim 1, wherein the random number is one 512 Random number, group's password that group's password is one 64.
11. a kind of data encryption device of instant messaging, wherein described device includes processor, and the processor is for generating One random number is combined the random number and group's password to obtain code data source;
The processor is also used to the code data source carry out that information password is calculated using hash algorithm;
The processor is also used to encrypt communication data using the information password.
12. the data encryption device of instant messaging according to claim 11, wherein the first client is every to send a letter Breath, the processor generate a different random number at random.
13. the data encryption device of instant messaging according to claim 11, wherein the processor is specifically used for utilizing SHA512 algorithm be calculated to the code data source one 512 character strings, takes first 256 of the character string As information password.
14. the data encryption device of instant messaging according to claim 11, wherein the processor is also used to receive quilt Group's password of DH password encryption, wherein the DH password is that the second client is calculated using the graceful Key Exchange Protocol of diffie-hellman It obtains;
The processor is also used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and close using the DH Encrypted group's password is decrypted in code, obtains group's password.
15. the data encryption device of instant messaging according to claim 11, wherein the processor is also used to establish group Group, and group's password of a predetermined figure is generated at random;
The processor is also used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and close using the DH Code encrypts group's password.
16. the data encryption device of instant messaging according to claim 14 or 15, wherein described to utilize diffie-hellman DH password is calculated in graceful Key Exchange Protocol
First client is for using the public key of the second client and the private key of the first client carrying out that the DH is calculated Password;
Second client is for using the public key of the first client and the private key of the second client carrying out that the DH is calculated Password;
Wherein, the DH password that first client, the second client are calculated is identical.
17. a kind of data encryption device of instant messaging, wherein described device includes:
Generation module is combined the random number and group's password to obtain code data source for generating a random number;
Computing module, for the code data source carrying out that information password is calculated using hash algorithm;
Encrypting module, for being encrypted using the information password to communication data.
18. a kind of device with store function, wherein described device is stored with program, and described program is performed realization power Benefit requires the data ciphering method of 1 to 10 described in any item instant messagings.
CN201880002437.5A 2018-08-29 2018-08-29 A kind of data ciphering method and device of instant messaging Pending CN109845184A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/103051 WO2020042023A1 (en) 2018-08-29 2018-08-29 Instant messaging data encryption method and apparatus

Publications (1)

Publication Number Publication Date
CN109845184A true CN109845184A (en) 2019-06-04

Family

ID=66883762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880002437.5A Pending CN109845184A (en) 2018-08-29 2018-08-29 A kind of data ciphering method and device of instant messaging

Country Status (2)

Country Link
CN (1) CN109845184A (en)
WO (1) WO2020042023A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110690967A (en) * 2019-12-11 2020-01-14 杭州字节信息技术有限公司 Instant communication key establishment method independent of server security
CN112671841A (en) * 2020-12-10 2021-04-16 清研灵智信息咨询(北京)有限公司 Data security management method and system based on micro-service technology architecture
CN113938270A (en) * 2021-12-17 2022-01-14 北京华云安信息技术有限公司 Data encryption method and device capable of flexibly reducing complexity

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149732A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation Use of static Diffie-Hellman key with IPSec for authentication
CN101790160A (en) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 Method and device for safely consulting session key
US20130152195A1 (en) * 2011-12-12 2013-06-13 Alcatel-Lucent Usa Inc. Replay Attack Protection With Small State For Use In Secure Group Communication
CN105610789A (en) * 2015-12-18 2016-05-25 成都三零瑞通移动通信有限公司 Data encryption method suitable for multi-user group chat instant communication
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN108090370A (en) * 2018-01-10 2018-05-29 芯盾网安(北京)科技发展有限公司 Instant messaging encryption method and system based on index

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080253562A1 (en) * 2007-04-12 2008-10-16 Nokia Corporation Handshake procedure
CN103260155B (en) * 2013-05-15 2015-09-16 兰州交通大学 The group message transfer approach that a kind of lightweight privacy strengthens
CN105141635A (en) * 2015-09-21 2015-12-09 北京元心科技有限公司 Method and system for safe communication of group sending messages
CN108155987A (en) * 2017-12-22 2018-06-12 中国联合网络通信集团有限公司 Group message sending method, method of reseptance and its system and communicating terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149732A1 (en) * 2004-01-07 2005-07-07 Microsoft Corporation Use of static Diffie-Hellman key with IPSec for authentication
CN101790160A (en) * 2009-01-23 2010-07-28 中兴通讯股份有限公司 Method and device for safely consulting session key
US20130152195A1 (en) * 2011-12-12 2013-06-13 Alcatel-Lucent Usa Inc. Replay Attack Protection With Small State For Use In Secure Group Communication
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN105610789A (en) * 2015-12-18 2016-05-25 成都三零瑞通移动通信有限公司 Data encryption method suitable for multi-user group chat instant communication
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN108090370A (en) * 2018-01-10 2018-05-29 芯盾网安(北京)科技发展有限公司 Instant messaging encryption method and system based on index

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110690967A (en) * 2019-12-11 2020-01-14 杭州字节信息技术有限公司 Instant communication key establishment method independent of server security
CN110690967B (en) * 2019-12-11 2021-03-02 杭州字节信息技术有限公司 Instant communication key establishment method independent of server security
CN112671841A (en) * 2020-12-10 2021-04-16 清研灵智信息咨询(北京)有限公司 Data security management method and system based on micro-service technology architecture
CN113938270A (en) * 2021-12-17 2022-01-14 北京华云安信息技术有限公司 Data encryption method and device capable of flexibly reducing complexity

Also Published As

Publication number Publication date
WO2020042023A1 (en) 2020-03-05

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
CN103986583B (en) A kind of dynamic encrypting method and its cryptographic communication system
CN108347404B (en) Identity authentication method and device
CN108173644A (en) Data transfer encryption method, device, storage medium, equipment and server
CN105610789B (en) A kind of data ciphering method for chatting instant messaging suitable for more crowds
CN104253694A (en) Encrypting method for network data transmission
CN201830272U (en) Network encryption machine based on quantum keys
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
CN106452750B (en) A kind of quantum encryption communication method for mobile device
CN109543434A (en) Block chain information encryption method, decryption method, storage method and device
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN111914291A (en) Message processing method, device, equipment and storage medium
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN108206739A (en) Key generation method and device
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN109845184A (en) A kind of data ciphering method and device of instant messaging
CN102594551A (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN111988299A (en) Method for establishing trusted link between client and server
CN113507372A (en) Bidirectional authentication method for interface request
CN106713349A (en) Inter-group proxy re-encryption method capable of resisting selected ciphertext attack
CN109495244A (en) Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys
CN110493124A (en) Protect the encryption instantaneous communication system and communication means of data safety

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination