CN109845184A - A kind of data ciphering method and device of instant messaging - Google Patents
A kind of data ciphering method and device of instant messaging Download PDFInfo
- Publication number
- CN109845184A CN109845184A CN201880002437.5A CN201880002437A CN109845184A CN 109845184 A CN109845184 A CN 109845184A CN 201880002437 A CN201880002437 A CN 201880002437A CN 109845184 A CN109845184 A CN 109845184A
- Authority
- CN
- China
- Prior art keywords
- password
- client
- group
- calculated
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application discloses a kind of data ciphering method of instant messaging and devices, which comprises the first client generates a random number, is combined random number and group's password to obtain code data source;Code data source is carried out using hash algorithm information password is calculated;Communication data is encrypted using information password.By the above-mentioned means, the application can be improved the safety of the communication information.
Description
Technical field
This application involves network communication technology fields, more particularly to the data ciphering method and dress of a kind of instant messaging
It sets.
Background technique
With the development of network communication technology, instant messaging is increasingly becoming the exchange way of both sides, and multi-party friendship
The information platform of stream.When being exchanged by instant communication mode, in order to ensure information security, need to add information
It is close.Present inventor has found in current group chat communication, encryption technology is close by taking in long-term R&D process
The mode of code symmetric cryptography carries out safeguard protection to the communication information between client, and this password saves on the server,
When having new client to be added this group, server gives password ' sharing ' to the user.It is this so that group communication is completely dependent on
In group's password, and group's password is distributed in each client and server background, and communication security risk notch is obvious, once service
Device is cracked, and the safety of whole system is just disintegrated.Therefore, it is necessary to a kind of not only safety, but also efficient encryption technique scheme to come
Solve information communication issue.
Summary of the invention
The application is mainly solving the technical problems that provide the data ciphering method and device of a kind of instant messaging, Neng Gouti
The safety of the high communication information.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of data of instant messaging
Encryption method, wherein the described method includes: the first client generates a random number, random number and group's password are combined
Obtain code data source;Code data source is carried out using hash algorithm information password is calculated;Using information password to logical
Letter data is encrypted.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of data of instant messaging
Encryption device, wherein described device includes processor, processor for generating a random number, by random number and group's password into
Row combination obtains code data source;Processor is also used to carry out information is calculated to code data source using hash algorithm close
Code;Processor is also used to encrypt communication data using information password.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of number of instant messaging
According to encryption device, wherein described device includes: generation module, and for generating a random number, random number and group's password are carried out
Combination obtains code data source;Information password is calculated for carrying out using hash algorithm to code data source in computing module;
Encrypting module, for being encrypted using information password to communication data.
In order to solve the above technical problems, another technical solution that the application uses is: providing a kind of with store function
Device, wherein described device is stored with program, and described program is performed the data encryption side for realizing above-mentioned instant messaging
Method.
The beneficial effect of the application is: being in contrast to the prior art, the application provides a kind of data of instant messaging
Encryption method, for this method by the way that random number is added to password when information is encrypted, the information for issuing each all can be different
Password encrypted, improve the front and back of every information to cryptosecurity.
Detailed description of the invention
Fig. 1 is the flow diagram of the data ciphering method first embodiment of the application instant messaging;
Fig. 2 is the flow diagram of the data ciphering method second embodiment of the application instant messaging;
Fig. 3 is the flow diagram of the data ciphering method third embodiment of the application instant messaging;
Fig. 4 is the flow diagram of the 4th embodiment of data ciphering method of the application instant messaging;
Fig. 5 is the structural schematic diagram of the data encryption device first embodiment of the application instant messaging;
Fig. 6 is the structural schematic diagram of the data encryption device second embodiment of the application instant messaging;
Fig. 7 is the structural schematic diagram for the device first embodiment that the application has store function.
Specific embodiment
It is right as follows in conjunction with drawings and embodiments to keep the purpose, technical solution and effect of the application clearer, clear
The application is further described.
The application provides a kind of data ciphering method of instant messaging, at least applies in the encryption of group chat information, by changing
Become the transfer mode of group's password and the cipher mode of group's information, the safety of Lai Tigao group chat communication.
Wherein, the application utilizes the graceful Key Exchange Protocol (Diffie-of diffie-hellman when carrying out group's password transmission
Hellman key Exchange, hereinafter DH agreement), so that communicating pair is first determined one " arranging key ", then uses again
This key encrypts the information for carrying group's password as symmetric key in subsequent communication.In this way,
It can be avoided the online arranging key bring disclosure risk of both sides, improve the safety of password transmission.
Wherein, in one embodiment, the application provides the transmission method of a population password.Referring to Fig. 1, Fig. 1 is this
Apply for the flow diagram of the data ciphering method first embodiment of instant messaging.In this embodiment, it needs close to group
Code is transmitted, and is encrypted in transitive group password to group's password.
Specifically, the first client creates a group, and generating a password at random when creating group is group's password.Example
Such as, one 64 random ciphers can be generated at random as group's password.
First client invites the second client that group chat is added, and when inviting the second client to carry out group chat, needs group
Password is sent to the second client.
Wherein, the first client is equipped with public key A and private key A for encryption;Second client is equipped with the public affairs for encryption
Key B and private key B.Specifically, the first client, the second client intercourse public key A and public key B by server;First visitor
Family end using private key A and public key B carries out that DH password is calculated by DH agreement, using the DH password as symmetric cryptography to taking
Information with group's password encrypts, and the encrypted information for carrying group's password is then sent to the second client.
Second client using private key B and public key A carries out that DH password is calculated by DH agreement, wherein the second client
Hold the DH password calculated identical as the password that the first client is calculated.Group's password encryption uses symmetric cryptography again
Mode, therefore, the second client can use the DH password and the information for carrying group's password are decrypted, and obtain group's password.
In this way, both sides can be made without linking up in advance, one is can determine in unsafe network and " negotiate
Key " can be avoided the online arranging key bring disclosure risk of both sides.Meanwhile the DH password calculated includes oneself
Two parameters of private key and the public key of other side;Accordingly even when by hacker attack, hacker only knows public key A and public key B, because not knowing
The private key of either side can be improved the safety of information so DH password can not be calculated.
Referring to Fig. 2, Fig. 2 is the flow diagram of the data ciphering method second embodiment of the application instant messaging.
In this embodiment, the first client passes through ECDH algorithm (Elliptic Curves Diffie- using private key A and public key B
Hellman, ECDH) calculate DH password.Wherein ECDH algorithm is ECC (Elliptic Curves Cryptography, ellipse
Curve encryption) algorithm and DH combined use, be a kind of cipher key agreement algorithm, for key consult.
Then hash algorithm is recycled to carry out the character string that predetermined figure is calculated to DH password;For example, can use
SHA512 algorithm be calculated a string of 512 character strings to DH password.First 256 of character string are taken to be used as information password
Information is encrypted, latter 128 of character string is taken to be used as cryptographic Hash (IV vector).Wherein in the way of symmetric cryptography to taking
Information with group's password encrypts, and obtains encrypted group's password and sends.Specifically, by carry group's password information with
And the cryptographic Hash of the information is encrypted as initial data;So that data receiver can use cryptographic Hash and check the complete of information
Whole property.Symmetric encipherment algorithm includes DES (Data Encryption Standard), AES (Advanced Encryption
Standard), IDEA (International Data Encryption Algorithm) etc..
Wherein, in another embodiment, the application can also utilize asymmetric encryption when carrying out group's password transmission
Mode is transmitted, to improve the safety of information transmitting.In this embodiment, the first client utilizes the second client
Public key B encrypts group's password, and the second client is sent to after encryption, at this point, the second client using oneself private key B into
Row decryption, obtains group's password.Transmitting carrying out password in the way of asymmetric encryption, improves the safety of one-way transmission
Property.This is because the public key of different clients is different, corresponding private key is also different, and therefore, each client can only be downloaded logical
Cross group's password that oneself private key can be decrypted.
Group members are after obtaining group's password, so that it may be encrypted with this group password to information in group chat.But every
If information is only with the same password encryption, once password, which is compromised all information all, can become transparent, therefore password is needed
Increase randomness to ensure that every information is that have individual Crypted password.Based on this, the application provides a kind of encryption of information
Raw information password is exported new information password by adding some random data in the password of each information by method,
Improve the confidentiality of raw information password.Specifically, referring to Fig. 3, Fig. 3 is the data ciphering method of the application instant messaging
The flow diagram of three embodiments.In this embodiment, this method comprises the following steps:
S301: the first client generates a random number, is combined random number and group's password to obtain code data source.
Wherein, random number is the data of predetermined figure, and different information correspondences are that random number is different.Group's password is first
What client was invited to obtain into group, or while establishing group generate at random, specific acquisition modes please refer to above embodiment
Description, details are not described herein.
S302: code data source is carried out using hash algorithm information password is calculated.
Wherein, code data source is encrypted using hash algorithm, with safer protection password.Specifically, it is breathed out
The fixed abstract (digest) of a segment length can be obtained after uncommon encryption, and the corresponding abstract of each file is unique
, so abstract is also referred to as file fingerprint, can be used for carrying out safe preservation to password.Even if in addition, any file is modified
One character, its fingerprint can also become entirely different, so file fingerprint can be used to judge the integrality of file.
S303: communication data is encrypted using information password.
Wherein, communication data is encrypted in the way of symmetric cryptography, to improve encryption/decryption speed, is also convenient for password
Management adapts to group encryption chat.
Referring to Fig. 4, Fig. 4 is the flow diagram of the 4th embodiment of data ciphering method of the application instant messaging.
In this embodiment, the first client generates 512 passwords as random number, by this when sending information at random
Random number and public group's password form the independent code data source of the information.
Code data source is carried out using hash algorithm information password is calculated.Such as using SHA512 algorithm to password
Information source is calculated, and one 512 character strings are obtained, and first 256 of the character string is taken to be used as AES password, rear 128 works
For IV vector, AES encryption is carried out using the cryptographic Hash of the information and information to be sent as initial data.Encrypted data have
Two parts composition, the random number that the first half (head) of information is 512, the latter half (body) of information are the letter of encryption
Breath.
Then private key signature is used, then encryption information is issued into server, other members are sent to by server.
Other group members when receiving information, are verified using the public signature key of sender first, after being proved to be successful, use phase
The chain Key production information password answered, and decrypted with information password.Before decryption, raw information can also be verified using cryptographic Hash
Integrality, then recycle information password information is decrypted.
Under this group of cipher modes, since server does not save client password, so safety rests in client
In hand, while the information that client each issues all can have different passwords to be encrypted, and improve the front and back of every information
To cryptosecurity.
The application also provides a kind of data encryption device of instant messaging, referring to Fig. 5, Fig. 5 is the application instant messaging
Data encryption device first embodiment structural schematic diagram.In this embodiment, encryption device 50 includes processor
501, processor 501 is combined random number and group's password to obtain code data source for generating a random number;It recycles
Hash algorithm carries out code data source information password is calculated;Finally communication data is encrypted using information password.
Wherein, in one embodiment, one information of the every transmission of client, processor 501 generate at random one it is different
Random number.
Wherein, in one embodiment, processor 501 is specifically used for counting code data source using SHA512 algorithm
Calculation obtains one 512 character strings, and first 256 of character string is taken to be used as information password.
Wherein, in one embodiment, processor 501 is also used to receive by group's password of DH password encryption, wherein DH is close
Code is what the second client was calculated using the graceful Key Exchange Protocol of diffie-hellman;Processor 501 is also used to utilize diffie-
DH password is calculated in Herman Key Exchange Protocol, and encrypted group's password is decrypted using DH password, obtains group
Password.
Wherein, in one embodiment, processor 501 is also used to establish group, and generates a predetermined figure at random
Then DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in group's password, and using the DH password to the group
Password is encrypted.
Wherein, DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman includes: the first client for utilizing
The public key of second client and the private key of the first client carry out that DH password is calculated;Second client is used to utilize first
The public key of client and the private key of the second client carry out that DH password is calculated;Wherein, the first client, the second client
The DH password being calculated is identical.
More than, the data encryption device of instant messaging is used to execute the data ciphering method of above-mentioned instant messaging, to information
Data are encrypted, and have corresponding beneficial effect, and detailed process please refers to the description of above embodiment, no longer superfluous herein
It states.Wherein the device can be the self-contained unit independently of client, be also possible to a certain module or certain in client
Manage unit.
Referring to Fig. 6, Fig. 6 is the structural schematic diagram of the data encryption device second embodiment of the application instant messaging.
In this embodiment, encryption device 60 is a certain processing module of client, specifically includes generation module 601, computing module
602 and encrypting module 603, generation module 601 with group's password is combined to obtain close for generating a random number, by random number
Code data source;Computing module 602 is for carrying out code data source using hash algorithm information password is calculated;Encrypting module
603 for encrypting communication data using information password.
Wherein, in one embodiment, generation module is specifically used in one information of every transmission, random to generate one not
Same random number.
Wherein, in one embodiment, encryption device further includes receiving module and deciphering module, and receiving module is for receiving
By group's password of DH password encryption, wherein DH password is that the second client is calculated using the graceful Key Exchange Protocol of diffie-hellman
It arrives;Deciphering module is used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and using DH password to encryption
Group's password afterwards is decrypted, and obtains group's password.The data encryption device of instant messaging is used to execute the number of above-mentioned instant messaging
According to encryption method, information data is encrypted, and there is corresponding beneficial effect, detailed process please refers to above embodiment
Description, details are not described herein.
The application also provides a kind of device with store function, referring to Fig. 7, Fig. 7 is that the application has store function
Device first embodiment structural schematic diagram.In this embodiment, storage device 70 is stored with program 701, program 701
It is performed the data ciphering method for realizing above-mentioned instant messaging.It is consistent in specific work process and above method embodiment, therefore
Details are not described herein, please refers to the explanation of the above corresponding method step in detail.Wherein the device with store function can be just
The formula storage medium of taking such as USB flash disk, CD, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as device (RAM, Random Access Memory), magnetic disk are also possible to terminal, clothes
Business device etc..
Above scheme, the application provide a kind of data ciphering method of instant messaging, under this group of cipher modes, due to clothes
Business device does not save client password, so safety rests in client hand, while the information that client each issues
There will be different passwords to be encrypted, improve the front and back of every information to cryptosecurity.
In several embodiments provided herein, it should be understood that disclosed system, device and method can
To realize by another way.For example, device embodiments described above are only schematical, for example, the mould
The division of block or unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple
Unit or assembly can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another
Point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, device or
The indirect coupling or communication connection of unit can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize present embodiment scheme according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the application can integrate in one processing unit, it can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units.It is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the application
The all or part of the steps of embodiment the method.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this
Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (18)
1. a kind of data ciphering method of instant messaging, wherein the described method includes:
First client generates a random number, is combined the random number and group's password to obtain code data source;
The code data source is carried out that information password is calculated using hash algorithm;
Communication data is encrypted using the information password.
2. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with
Machine number includes:
One information of the every transmission of first client then generates a different random number at random.
3. the data ciphering method of instant messaging according to claim 1, wherein described to utilize hash algorithm to described close
Code data source carries out that information password is calculated
The character string for be calculated to the code data source one 512 using SHA512 algorithm, takes the character string
First 256 be used as information password.
4. the data ciphering method of instant messaging according to claim 3, wherein take rear 128 works of the character string
It is described encryption is carried out to communication data using information password to include: for cryptographic Hash
It is encrypted using information data to be sent and the cryptographic Hash as communication data.
5. the data ciphering method of instant messaging according to claim 1, wherein described to utilize information password to communication number
Include: according to encryption is carried out
The communication data is encrypted in the way of symmetric cryptography, so that information receiving end utilizes the information password pair
The communication data is decrypted.
6. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with
Machine number, the random number and group's password are combined before obtaining code data source include:
First client is received by group's password of DH password encryption, wherein the DH password is that the second client utilizes enlightening
Phenanthrene-Herman Key Exchange Protocol is calculated;
DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in first client, and utilizes the DH password
Encrypted group's password is decrypted, group's password is obtained.
7. the data ciphering method of instant messaging according to claim 1, wherein first client generate one with
Machine number, the random number and group's password are combined before obtaining code data source include:
First client establishes group, and generates group's password at random;
DH password is calculated using the graceful Key Exchange Protocol of diffie-hellman in first client, and utilizes the DH password
Group's password is encrypted.
8. the data ciphering method of instant messaging according to claim 6 or 7, wherein described to utilize DH password to described
Group's password carries out encryption
The character string for be calculated to the DH password one 512 using SHA512 algorithm, before taking the character string
256 encrypt group's password as password.
9. the data ciphering method of instant messaging according to claim 6 or 7, wherein described graceful close using diffie-hellman
DH password is calculated in key exchange agreement
First client using the public key of the second client and the private key of the first client carries out that the DH password is calculated;
Second client using the public key of the first client and the private key of the second client carries out that the DH password is calculated;
Wherein, the DH password that first client, the second client are calculated is identical.
10. the data ciphering method of instant messaging according to claim 1, wherein the random number is one 512
Random number, group's password that group's password is one 64.
11. a kind of data encryption device of instant messaging, wherein described device includes processor, and the processor is for generating
One random number is combined the random number and group's password to obtain code data source;
The processor is also used to the code data source carry out that information password is calculated using hash algorithm;
The processor is also used to encrypt communication data using the information password.
12. the data encryption device of instant messaging according to claim 11, wherein the first client is every to send a letter
Breath, the processor generate a different random number at random.
13. the data encryption device of instant messaging according to claim 11, wherein the processor is specifically used for utilizing
SHA512 algorithm be calculated to the code data source one 512 character strings, takes first 256 of the character string
As information password.
14. the data encryption device of instant messaging according to claim 11, wherein the processor is also used to receive quilt
Group's password of DH password encryption, wherein the DH password is that the second client is calculated using the graceful Key Exchange Protocol of diffie-hellman
It obtains;
The processor is also used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and close using the DH
Encrypted group's password is decrypted in code, obtains group's password.
15. the data encryption device of instant messaging according to claim 11, wherein the processor is also used to establish group
Group, and group's password of a predetermined figure is generated at random;
The processor is also used to be calculated DH password using the graceful Key Exchange Protocol of diffie-hellman, and close using the DH
Code encrypts group's password.
16. the data encryption device of instant messaging according to claim 14 or 15, wherein described to utilize diffie-hellman
DH password is calculated in graceful Key Exchange Protocol
First client is for using the public key of the second client and the private key of the first client carrying out that the DH is calculated
Password;
Second client is for using the public key of the first client and the private key of the second client carrying out that the DH is calculated
Password;
Wherein, the DH password that first client, the second client are calculated is identical.
17. a kind of data encryption device of instant messaging, wherein described device includes:
Generation module is combined the random number and group's password to obtain code data source for generating a random number;
Computing module, for the code data source carrying out that information password is calculated using hash algorithm;
Encrypting module, for being encrypted using the information password to communication data.
18. a kind of device with store function, wherein described device is stored with program, and described program is performed realization power
Benefit requires the data ciphering method of 1 to 10 described in any item instant messagings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/103051 WO2020042023A1 (en) | 2018-08-29 | 2018-08-29 | Instant messaging data encryption method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109845184A true CN109845184A (en) | 2019-06-04 |
Family
ID=66883762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880002437.5A Pending CN109845184A (en) | 2018-08-29 | 2018-08-29 | A kind of data ciphering method and device of instant messaging |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109845184A (en) |
WO (1) | WO2020042023A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110690967A (en) * | 2019-12-11 | 2020-01-14 | 杭州字节信息技术有限公司 | Instant communication key establishment method independent of server security |
CN112671841A (en) * | 2020-12-10 | 2021-04-16 | 清研灵智信息咨询(北京)有限公司 | Data security management method and system based on micro-service technology architecture |
CN113938270A (en) * | 2021-12-17 | 2022-01-14 | 北京华云安信息技术有限公司 | Data encryption method and device capable of flexibly reducing complexity |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050149732A1 (en) * | 2004-01-07 | 2005-07-07 | Microsoft Corporation | Use of static Diffie-Hellman key with IPSec for authentication |
CN101790160A (en) * | 2009-01-23 | 2010-07-28 | 中兴通讯股份有限公司 | Method and device for safely consulting session key |
US20130152195A1 (en) * | 2011-12-12 | 2013-06-13 | Alcatel-Lucent Usa Inc. | Replay Attack Protection With Small State For Use In Secure Group Communication |
CN105610789A (en) * | 2015-12-18 | 2016-05-25 | 成都三零瑞通移动通信有限公司 | Data encryption method suitable for multi-user group chat instant communication |
CN105763331A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Data encryption method, device, data decryption method and device |
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN108090370A (en) * | 2018-01-10 | 2018-05-29 | 芯盾网安(北京)科技发展有限公司 | Instant messaging encryption method and system based on index |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080253562A1 (en) * | 2007-04-12 | 2008-10-16 | Nokia Corporation | Handshake procedure |
CN103260155B (en) * | 2013-05-15 | 2015-09-16 | 兰州交通大学 | The group message transfer approach that a kind of lightweight privacy strengthens |
CN105141635A (en) * | 2015-09-21 | 2015-12-09 | 北京元心科技有限公司 | Method and system for safe communication of group sending messages |
CN108155987A (en) * | 2017-12-22 | 2018-06-12 | 中国联合网络通信集团有限公司 | Group message sending method, method of reseptance and its system and communicating terminal |
-
2018
- 2018-08-29 CN CN201880002437.5A patent/CN109845184A/en active Pending
- 2018-08-29 WO PCT/CN2018/103051 patent/WO2020042023A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050149732A1 (en) * | 2004-01-07 | 2005-07-07 | Microsoft Corporation | Use of static Diffie-Hellman key with IPSec for authentication |
CN101790160A (en) * | 2009-01-23 | 2010-07-28 | 中兴通讯股份有限公司 | Method and device for safely consulting session key |
US20130152195A1 (en) * | 2011-12-12 | 2013-06-13 | Alcatel-Lucent Usa Inc. | Replay Attack Protection With Small State For Use In Secure Group Communication |
CN105763331A (en) * | 2014-12-19 | 2016-07-13 | 北大方正集团有限公司 | Data encryption method, device, data decryption method and device |
CN105610789A (en) * | 2015-12-18 | 2016-05-25 | 成都三零瑞通移动通信有限公司 | Data encryption method suitable for multi-user group chat instant communication |
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN108090370A (en) * | 2018-01-10 | 2018-05-29 | 芯盾网安(北京)科技发展有限公司 | Instant messaging encryption method and system based on index |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110690967A (en) * | 2019-12-11 | 2020-01-14 | 杭州字节信息技术有限公司 | Instant communication key establishment method independent of server security |
CN110690967B (en) * | 2019-12-11 | 2021-03-02 | 杭州字节信息技术有限公司 | Instant communication key establishment method independent of server security |
CN112671841A (en) * | 2020-12-10 | 2021-04-16 | 清研灵智信息咨询(北京)有限公司 | Data security management method and system based on micro-service technology architecture |
CN113938270A (en) * | 2021-12-17 | 2022-01-14 | 北京华云安信息技术有限公司 | Data encryption method and device capable of flexibly reducing complexity |
Also Published As
Publication number | Publication date |
---|---|
WO2020042023A1 (en) | 2020-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785019B2 (en) | Data transmission method and apparatus | |
CN103986583B (en) | A kind of dynamic encrypting method and its cryptographic communication system | |
CN108347404B (en) | Identity authentication method and device | |
CN108173644A (en) | Data transfer encryption method, device, storage medium, equipment and server | |
CN105610789B (en) | A kind of data ciphering method for chatting instant messaging suitable for more crowds | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN201830272U (en) | Network encryption machine based on quantum keys | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
US9130744B1 (en) | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |
CN106452750B (en) | A kind of quantum encryption communication method for mobile device | |
CN109543434A (en) | Block chain information encryption method, decryption method, storage method and device | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN111404664A (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN108206739A (en) | Key generation method and device | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN109845184A (en) | A kind of data ciphering method and device of instant messaging | |
CN102594551A (en) | Method for reliable statistics of privacy data on radio frequency identification (RFID) tag | |
CN111988299A (en) | Method for establishing trusted link between client and server | |
CN113507372A (en) | Bidirectional authentication method for interface request | |
CN106713349A (en) | Inter-group proxy re-encryption method capable of resisting selected ciphertext attack | |
CN109495244A (en) | Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys | |
CN110493124A (en) | Protect the encryption instantaneous communication system and communication means of data safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |