CN115174152B - Group test authentication encryption method, verification decryption method and communication method - Google Patents

Group test authentication encryption method, verification decryption method and communication method Download PDF

Info

Publication number
CN115174152B
CN115174152B CN202210644608.2A CN202210644608A CN115174152B CN 115174152 B CN115174152 B CN 115174152B CN 202210644608 A CN202210644608 A CN 202210644608A CN 115174152 B CN115174152 B CN 115174152B
Authority
CN
China
Prior art keywords
authentication code
message authentication
intermediate value
group test
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210644608.2A
Other languages
Chinese (zh)
Other versions
CN115174152A (en
Inventor
王鹏
刘刚
陈愈潮
胡磊
郭婷婷
毛淑平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN202210644608.2A priority Critical patent/CN115174152B/en
Publication of CN115174152A publication Critical patent/CN115174152A/en
Application granted granted Critical
Publication of CN115174152B publication Critical patent/CN115174152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

The invention discloses a group test authentication encryption method, a verification decryption method and a communication method, which relate to the field of information security, and are used for solving the problem of data expansion of a traditional authentication encryption scheme.

Description

Group test authentication encryption method, verification decryption method and communication method
Technical Field
The invention relates to the field of information security, in particular to a group test authentication encryption method, a group test verification decryption method and a communication method.
Background
Authentication encryption (Authenticated Encryption) is a cryptographic scheme that provides both encryption and authentication functions. Encryption ensures confidentiality of data, namely plain text information cannot be revealed, authentication ensures integrity of the data, namely transmitted data is ensured not to be tampered by adversaries, and information sources can be confirmed. The encryption algorithm of the authentication encryption scheme is input into a secret key, an initial vector, associated data and a plaintext, wherein the associated data is data which does not need to be encrypted and transmitted and only needs to be guaranteed not to be tampered, and the plaintext is data which needs to be encrypted and transmitted and is output into a ciphertext and a message authentication code; the input of the decryption algorithm is a secret key, an initial vector, associated data, a ciphertext and an authentication code, the decryption algorithm regenerates the message authentication code, compares the message authentication code with the received message authentication code, judges whether the ciphertext is effective or not, and generates and outputs a corresponding plaintext if the ciphertext is consistent with the received message authentication code.
The Group Testing (Group Testing) method originates from blood sample Testing during the second combat phase-how to quickly find an infected person from a large number of blood samples with as few tests as possible. Group tests are classified into adaptive and non-adaptive, the adaptive group test is generally a multi-step group test, and the latter group policy depends on the previous detection result; the non-adaptive group test only needs one step to perform a plurality of tests, and the tests can be performed simultaneously, so that the invention is more beneficial to application in practical problems, and therefore, the invention uses the non-adaptive group test. This approach is generally characterized by a group test matrix.
During data transmission, a user may generate a large number of short messages, such as adding, deleting, changing, withdrawing and the like during editing of an online document, each operation can be regarded as a short message, and during communication with a server, an initial vector and an authentication code generated during authentication encryption processing of the messages bring about a large number of data expansion, so that the efficiency of network transmission is greatly affected.
A plurality of short messages are combined into a long message and then are processed by an authentication encryption algorithm, so that the data expansion of an authentication code can be reduced to a great extent, but when decryption verification fails, the problem of which short message is out cannot be determined, and retransmission of all messages is caused. If the location of the message error can be detected with as little data expansion as possible, the amount of network data transmission will be greatly reduced.
In view of this, how to reduce data expansion and detect the location of error messages at the same time in authentication encryption is a technical problem that needs to be solved at present.
Disclosure of Invention
The invention aims at solving the problem of data expansion of the traditional authentication encryption scheme, combines the authentication encryption scheme with a group test method, provides a group test authentication encryption method applied to a transmitting end, a corresponding group test verification decryption method applied to a receiving end, and a communication method comprising group test authentication encryption and group test verification decryption, and can effectively reduce the data transmission amount when the authentication encryption scheme is used for secret communication, and has strong practicability.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the invention provides a group test authentication encryption method, which is applied to a transmitting end and comprises the following steps:
encrypting a group of message pairs consisting of plaintext and associated data by using an encryption algorithm of an authentication encryption scheme to generate ciphertext and a corresponding first initial message authentication code;
Generating an intermediate value by using a group test matrix according to the first initial message authentication code;
Encrypting the intermediate value to generate a first final message authentication code; and sending the initial vector, the associated data, the ciphertext and the first final message authentication code of the encryption algorithm to a receiving end.
The beneficial effects of the technical scheme are as follows: the general group test authentication encryption method is provided, and the number of the final message authentication codes is far smaller than the number of the messages, so that the data expansion can be effectively prevented, and the data transmission quantity during communication is reduced. For example, in an industrial control system, a large amount of data needs to be frequently transmitted, and the method can be used for carrying out group test on authentication encryption data to be transmitted by a transmitting end, so that the communication efficiency can be effectively improved.
Further, the generating ciphertext and the corresponding message authentication code specifically includes: and the sending end and the receiving end share a group of keys K 1, and encrypt the plaintext and the associated data by calling an encryption algorithm of the authentication encryption scheme according to the initial vector to generate a ciphertext and a corresponding first initial message authentication code.
Further, the generating the intermediate value specifically includes: and dividing the first initial message authentication code into a plurality of groups according to the group test matrix, and performing exclusive or on the values in each group to generate an intermediate value.
The beneficial effects of the steps are as follows: the group test matrix can effectively reduce the number of message authentication codes generated when encrypting mass data and reduce the data transmission quantity during communication.
Further, the generating the final message authentication code specifically includes: and the sending end and the receiving end share another group of secret keys K 2, and the first final message authentication code is obtained by calling an adjustable block cipher to encrypt the intermediate value according to the intermediate value.
The beneficial effects of the steps are as follows: the message authentication code is generated by using the adjustable block cipher, so that the method has higher security and is simple and universal.
Further, the authentication encryption scheme adopts a CCM algorithm.
The invention also provides a group test verification decryption method, which is applied to a receiving end and comprises the following steps:
Receiving an initial vector, associated data, ciphertext and a first final message authentication code sent by a sending end, decrypting the ciphertext by using a decryption algorithm of the same authentication encryption scheme, and generating a plaintext and a corresponding second initial message authentication code;
generating an intermediate value by using a group test matrix according to the second initial message authentication code;
Encrypting the intermediate value, generating a second final message authentication code, comparing the received first final message authentication code, determining the position of an invalid ciphertext according to a group test method, and outputting the rest corresponding plaintext.
The beneficial effects of the technical scheme are as follows: a general group test verification decryption method for detecting the location of an error message while reducing the amount of data transmission at the time of communication is provided. The purpose of checking the validity of the ciphertext can be achieved by transmitting a small number of message authentication codes. And if the calculated message authentication code is legal, indicating that the data received by the receiving end is not tampered, otherwise, indicating that the data is tampered.
Further, the generating the plaintext and the corresponding second initial message authentication code specifically includes: and the receiving end and the transmitting end share a group of keys K 1, and the received ciphertext is decrypted by calling a decryption algorithm of an authentication encryption scheme according to the received initial vector and the associated data to generate a plaintext and a corresponding second initial message authentication code.
Further, the generating the intermediate value specifically includes: and dividing the second initial message authentication code into a plurality of groups according to the group test matrix, and performing exclusive or on the values in each group to generate an intermediate value.
Further, the generating the second final message authentication code specifically includes: and the receiving end shares another group of secret keys K 2 with the sending end, and the second final message authentication code is obtained by calling an adjustable block cipher to encrypt the intermediate value according to the intermediate value.
The invention also provides a communication method comprising group test authentication encryption and group test verification decryption, which comprises the following steps:
the transmitting end encrypts a group of message pairs consisting of plaintext and associated data by using an encryption algorithm of an authentication encryption scheme to generate ciphertext and a corresponding first initial message authentication code; generating an intermediate value by using a group test matrix according to the first initial message authentication code; encrypting the intermediate value to generate a first final message authentication code; transmitting the initial vector, associated data, ciphertext and the first final message authentication code of the encryption algorithm to a receiving end;
The receiving end receives the initial vector, the associated data, the ciphertext and the first final message authentication code which are sent by the sending end, decrypts the ciphertext by using a decryption algorithm of the same authentication encryption scheme, and generates a plaintext and a corresponding second initial message authentication code; generating an intermediate value by using a group test matrix according to the second initial message authentication code; encrypting the intermediate value, generating a second final message authentication code, comparing the received first final message authentication code, determining the position of an invalid ciphertext according to a group test method, and outputting the rest corresponding plaintext.
Drawings
Fig. 1 is a flow chart of a group test authentication encryption method according to embodiment 1 of the present invention;
fig. 2 is a schematic diagram of a group test authentication encryption method according to embodiment 1 of the present invention;
Fig. 3 is a flowchart of a group test verification decryption method according to embodiment 3 of the present invention;
fig. 4 is a schematic diagram of a group test verification decryption method according to embodiment 3 of the present invention.
Detailed Description
In order to make the above features and advantages of the present invention more comprehensible, embodiments accompanied with figures are described in detail below.
Example 1
As a specific embodiment of the present invention, a group test authentication encryption method applied to a transmitting end is disclosed, as shown in fig. 1, including the following steps:
S1, a transmitting end and a receiving end share a group of keys K 1, m groups of messages (A i,Pi) are encrypted according to an initial vector N, i=1, 2, … and m are encrypted, ciphertext and corresponding first initial message authentication codes (C i,Si) are generated, i=1, 2, … and m, wherein associated data A i is data to be transmitted in a plaintext form, and P i is plaintext to be encrypted;
S2, generating intermediate values X j, j=1, 2, … and t by using a group test matrix according to the first initial message authentication code;
S3, sharing another group of secret keys K 2 with the receiving end, and generating a first final message authentication code T= (T 1,T2,…,Tt) according to the intermediate value X j, j=1, 2, … and T, wherein T is less than or equal to m; and (N, (A 1,C1),…,(Am,Cm),(T1,T2,…,Tt)) is transmitted to the receiving end.
Compared with the prior art, the embodiment provides a universal group test authentication encryption method, which is used for reducing the data transmission quantity during communication, in particular to reducing the quantity of initial vectors N and message authentication codes S. Fig. 2 shows a schematic diagram of a group test authentication encryption method according to embodiment 1 of the present invention.
Example 2
Optimizing on the basis of embodiment 1, step S1 further comprises:
S11. the transmitting end shares the secret key K 1 with the receiving end, encrypts m groups of messages (a i,Pi), i=1, 2, …, m, and generates a ciphertext and a corresponding first initial message authentication code (C i,Si), i=1, 2, …, m, by the following formula:
ε(K1,N||i,Ai,Pi)=(Ci,Si),i=1,…,m
Where ε is the encryption algorithm that authenticates the encryption scheme, it generates ciphertext C= (C 1,C2,…,Cm) and the corresponding first initial message authentication code S= (S 1,S2,…,Sm). N I is used as an initial vector actually used in encryption.
Preferably, the authentication encryption scheme may be a CCM algorithm.
The step S2 further includes:
S21, dividing the obtained first initial message authentication codes S i, i=1, 2, … and m into t groups through a group test matrix Q j×i, and performing exclusive OR on S i in each group to generate an intermediate value X j, j=1, 2, … and t, wherein t is less than or equal to m;
illustratively, when t= 9,m =15, the group test matrix may be selected as:
Each row of the matrix Q 9×15 represents the packet information of the intermediate value, and if a ji =1, the j-th packet includes S i, whereas a ji =0 represents that the j-th packet does not include S i. Finally, the 15 message authentication codes S i can be divided into 9 groups, and the values of the groups are xored to obtain X j, j=1, 2, …,9. The error detection capability of the group test matrix is determined by the maximum value of d in the property that the group test matrix is bit-wise or contains no other columns for any no more than d columns. The error detection capability of the matrix Q 9×15 is 1, which means that if 1 ciphertext data is tampered with in transmission, the error position can be found accurately, and if more than 1, the error position cannot be found accurately.
The step S3 further includes:
s31. the transmitting end shares the secret key K 2 with the receiving end, and according to the obtained X j, j=1, 2, …, T, the first final message authentication code t= (T 1,T2,…,Tt), T is less than or equal to m, is obtained by the following formula:
wherein F is an adjustable block cipher and the handle is j.
Example 3
As a specific embodiment of the present invention, a group test verification decryption method applied to a receiving end is disclosed, as shown in fig. 3, including the following steps:
S4, the receiving end receives data (N ', (A', C '), T') sent by the sending end, and initializes P * = T and sets And the secret key K 1 is shared with the transmitting end, the ciphertext C ' is decrypted according to the initial vector N ' and the associated data A ', and a plaintext and a corresponding second initial message authentication code/> aregenerated
S5, according to the calculated second initial message authentication codeGenerating intermediate values/>, using a group test matrixj=1,2,…,t;
S6, the receiving end shares a secret key K 2 with the transmitting end, and the intermediate value is compared with the secret key K 2 J=1, 2, …, t encryption, generating a second final message authentication code/>Judging each component/>, according to the group test method, of the T * And whether each component T 'j of said T' is consistent, if so, will participate in the generation/>Message sequence numbers corresponding to all message authentication codes S j from the collection/>Removing the waste; traversing the set/>Will/>And setting the output to be inverted T and finally outputting P *.
When in implementation, if the second final message authentication code T * is the same as the first final message authentication code T' received by the receiving end, it indicates that the data received by the receiving end is not tampered; if the message authentication codes are different, the data is tampered. Fig. 4 is a schematic diagram of a group test verification decryption method according to embodiment 3 of the present invention.
Example 4
Optimizing on the basis of embodiment 3, step S4 further includes:
S41, a receiving end and a transmitting end share a secret key K 1, the ciphertext C' is decrypted, and a plaintext and a corresponding second initial message authentication code are obtained through the following formula
Wherein the method comprises the steps ofFor authenticating the decryption algorithm of the encryption scheme,/>The algorithm outputs the plaintext and the corresponding second initial message authentication code/>
The step S5 further includes:
S51, the obtained second initial message authentication code is processed through the following group test matrix Q t×m Dividing into t groups, and dividing/>, of each groupExclusive or is performed to generate an intermediate value/>J=1, 2, …, t, where t is less than or equal to m;
The step S6 further includes:
S61, sharing a secret key K 2 with the transmitting end according to the obtained J=1, 2, …, t, the second final message authentication code/>, is obtained by the following formulat≤m:
Wherein F is an adjustable block cipher and the handle is j.
S62, judging each component of the T * according to the group test methodAnd whether each component T 'j of said T' is consistent, if so, will participate in the generation/>The message sequence numbers corresponding to all the second initial message authentication codes S j are from the set/>Removing the waste; traversing the set/>Will/>And setting the output to be inverted T and finally outputting P *.
Example 5
As a specific embodiment of the present invention, a communication method including group test authentication encryption and group test authentication decryption is disclosed, specifically consisting of a group test authentication encryption method applied to a transmitting end and a group test authentication decryption method applied to a receiving end, the group test authentication encryption method being the same as that disclosed in the above-described embodiment 1, and the group test authentication decryption method being the same as that disclosed in the above-described embodiment 3.
Example 6
The optimization was performed on the basis of example 5, and the group test authentication encryption method was the same as that disclosed in example 2 above, and the group test authentication decryption method was the same as that disclosed in example 4 above.
The steps described in the embodiments of the present invention may be performed by a computer program to instruct related hardware, and the program may be stored in a computer readable storage medium. Among them, random Access Memory (RAM), read Only Memory (ROM), optical discs, magnetic disks, and the like may be used as media for storing programs.
It should be noted that, in describing the technical solution of the present invention, the definitions of "initial", "final", "first" and "second" are used in the names, specifically, "first initial message authentication code", "first final message authentication code", "second initial message authentication code" and "second final message authentication code", which are only for convenience of distinguishing and expression, but are not used for redefining the meaning thereof, and the original meaning of the "message authentication code" is not changed.
Although the present invention has been described with reference to the above embodiments, it should be understood that the invention is not limited thereto, and that modifications and equivalents may be made thereto by those skilled in the art, which modifications and equivalents are intended to be included within the scope of the present invention as defined by the appended claims.

Claims (4)

1. The group test authentication encryption method is applied to a transmitting end and is characterized by comprising the following steps:
Encrypting a group of message pairs consisting of plaintext and associated data by using an encryption algorithm of an authentication encryption scheme to generate ciphertext and a corresponding first initial message authentication code; the generating ciphertext and the corresponding first initial message authentication code specifically comprises: the sending end and the receiving end share a group of secret keys Encrypting the plaintext and the associated data by calling an encryption algorithm of the authentication encryption scheme according to the initial vector to generate ciphertext and a corresponding first initial message authentication code;
Generating an intermediate value by using a group test matrix according to the first initial message authentication code; the generating the intermediate value specifically includes: dividing the first initial message authentication code into a plurality of groups according to the group test matrix, and performing exclusive or on values in each group to generate an intermediate value;
Encrypting the intermediate value to generate a first final message authentication code; the generating the first final message authentication code specifically includes: the sending end and the receiving end share another group of secret keys According to the intermediate value, encrypting the intermediate value by calling an adjustable block cipher to obtain the first final message authentication code;
and sending the initial vector, the associated data, the ciphertext and the first final message authentication code of the encryption algorithm to a receiving end.
2. The method of group test authentication encryption as claimed in claim 1, wherein the authentication encryption scheme is CCM algorithm.
3. The group test verification decryption method is applied to a receiving end and is characterized by comprising the following steps:
receiving an initial vector, associated data, ciphertext and a first final message authentication code sent by a sending end, decrypting the ciphertext by using a decryption algorithm of the same authentication encryption scheme, and generating a plaintext and a corresponding second initial message authentication code; the generating the plaintext and the corresponding second initial message authentication code specifically includes: the receiving end shares a group of secret keys with the transmitting end Decrypting the received ciphertext by calling a decryption algorithm of an authentication encryption scheme according to the received initial vector and associated data to generate a plaintext and a corresponding second initial message authentication code;
generating an intermediate value by using a group test matrix according to the second initial message authentication code; the generating the intermediate value specifically includes: dividing the second initial message authentication code into a plurality of groups according to the group test matrix, and performing exclusive or on the values in each group to generate an intermediate value;
Encrypting the intermediate value, generating a second final message authentication code, comparing the received first final message authentication code, determining the position of an invalid ciphertext according to a group test method, and outputting the rest of corresponding plaintext; the generating the second final message authentication code specifically includes: the receiving end shares another group of secret keys with the transmitting end And according to the intermediate value, encrypting the intermediate value by calling an adjustable block cipher to obtain the second final message authentication code.
4. A communication method including the group test authentication encryption method of claim 1 and the group test verification decryption method of claim 3, comprising the steps of:
the transmitting end encrypts a group of message pairs consisting of plaintext and associated data by using an encryption algorithm of an authentication encryption scheme to generate ciphertext and a corresponding first initial message authentication code; generating an intermediate value by using a group test matrix according to the first initial message authentication code; encrypting the intermediate value to generate a first final message authentication code; transmitting the initial vector, associated data, ciphertext and the first final message authentication code of the encryption algorithm to a receiving end;
The receiving end receives the initial vector, the associated data, the ciphertext and the first final message authentication code which are sent by the sending end, decrypts the ciphertext by using a decryption algorithm of the same authentication encryption scheme, and generates a plaintext and a corresponding second initial message authentication code; generating an intermediate value by using a group test matrix according to the second initial message authentication code; encrypting the intermediate value, generating a second final message authentication code, comparing the received first final message authentication code, determining the position of an invalid ciphertext according to a group test method, and outputting the rest corresponding plaintext.
CN202210644608.2A 2022-06-08 2022-06-08 Group test authentication encryption method, verification decryption method and communication method Active CN115174152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210644608.2A CN115174152B (en) 2022-06-08 2022-06-08 Group test authentication encryption method, verification decryption method and communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210644608.2A CN115174152B (en) 2022-06-08 2022-06-08 Group test authentication encryption method, verification decryption method and communication method

Publications (2)

Publication Number Publication Date
CN115174152A CN115174152A (en) 2022-10-11
CN115174152B true CN115174152B (en) 2024-06-18

Family

ID=83484955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210644608.2A Active CN115174152B (en) 2022-06-08 2022-06-08 Group test authentication encryption method, verification decryption method and communication method

Country Status (1)

Country Link
CN (1) CN115174152B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095070A (en) * 2015-04-03 2015-11-25 中国科学院信息工程研究所 Method and system for obtaining QQ group data base on test assembly of browser
CN111935166A (en) * 2020-08-18 2020-11-13 杭州萤石软件有限公司 Communication authentication method, system, electronic device, server, and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999060749A1 (en) * 1998-05-18 1999-11-25 Mitsubishi Materials Corporation Information sharing system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095070A (en) * 2015-04-03 2015-11-25 中国科学院信息工程研究所 Method and system for obtaining QQ group data base on test assembly of browser
CN111935166A (en) * 2020-08-18 2020-11-13 杭州萤石软件有限公司 Communication authentication method, system, electronic device, server, and storage medium

Also Published As

Publication number Publication date
CN115174152A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
EP3563512B1 (en) Equivocation augmentation dynamic secrecy system
US8433066B2 (en) Method for generating an encryption/decryption key
KR20050027254A (en) Efficient encryption and authentication for data processing systems
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
EP3694143A2 (en) Enabling access to data
KR101608815B1 (en) Method and system for providing service encryption in closed type network
US7779272B2 (en) Hardware cryptographic engine and encryption method
CN114443718A (en) Data query method and system
US20090010433A1 (en) Schryption method and device
Ahmad et al. Distributed text-to-image encryption algorithm
CN115174152B (en) Group test authentication encryption method, verification decryption method and communication method
Kumar et al. Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
Al-Attab et al. Lightweight effective encryption algorithm for securing data in cloud computing
Handoko et al. A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang
Mishra et al. Understanding the Aspect of Cryptography and Internet Security: A Practical Approach
CN115277267B (en) Document security encryption and decryption method
Mao et al. Methodical use of cryptographic transformations in authentication protocols
CN112751858B (en) Data encryption communication terminal method, device, terminal, server and storage medium
Aguila et al. Implementation of a Secured Student Record Management using Modified RC6 and OTP Algorithms.
Sohana et al. Agent command manipulation system using two keys encryption model
Sailaja et al. Enhancement of Security for Cloud Based IoT Using XHE Scheme
Sholikhatin et al. Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security
Gayathri et al. Study: Cryptography for information security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant