Method, apparatus and storage medium for implementing secure communication

文档序号:1967113 发布日期:2021-12-14 浏览:17次 中文

阅读说明:本技术 实现保密通信的方法、设备及存储介质 (Method, apparatus and storage medium for implementing secure communication ) 是由 赵凯 关红涛 张莹 于 2020-03-24 设计创作,主要内容包括:本文公开了一种实现保密通信的方法、设备及存储介质。所述实现保密通信的方法包括:对数据包的第一信息和第二信息分别加密生成加密报文;其中,加密后的第一信息所在区域为第一加密区域,加密后的第二信息所在区域为第二加密区域;所述第一信息用于供接收设备确定是否获取所述第二信息;发送所述加密报文。(A method, apparatus, and storage medium for implementing secure communications are disclosed. The method for realizing the secure communication comprises the following steps: respectively encrypting the first information and the second information of the data packet to generate an encrypted message; the area where the encrypted first information is located is a first encryption area, and the area where the encrypted second information is located is a second encryption area; the first information is used for the receiving equipment to determine whether to acquire the second information; and sending the encrypted message.)

A method of implementing secure communications, comprising:

respectively encrypting the first information and the second information of the data packet to generate an encrypted message; the area where the encrypted first information is located is a first encryption area, and the area where the encrypted second information is located is a second encryption area; the first information is used for the receiving equipment to determine whether to acquire the second information;

and sending the encrypted message.

The method of claim 1, wherein:

the first information and the second information of the data packet are respectively encrypted to generate an encrypted message, and the method comprises the following steps: and encrypting the first information of the data packet by adopting a hardware encryption mode.

The method of claim 1 or 2, wherein:

the first information comprises any one or any combination of the following information: receiving a device identifier, sending a device identifier, and a message control word;

the second information includes data information corresponding to the message control word.

The method of claim 2, wherein:

and the first information and the second information are encrypted by adopting different encryption modes.

A method of implementing secure communications, comprising:

receiving an encrypted message; the encrypted message is generated by respectively encrypting first information and second information of an original data packet, the area where the encrypted first information is located is a first encryption area, and the area where the encrypted second information is located is a second encryption area;

and decrypting the first encryption area of the encrypted message, and determining whether to acquire the second information according to the first information after successfully decrypting to acquire the first information.

The method of claim 5, wherein:

the first information comprises any one or any combination of the following information: receiving a device identifier, sending a device identifier, and a message control word;

the second information includes data information corresponding to the message control word.

The method of claim 5 or 6, wherein:

the receiving of the encrypted message comprises: receiving all encrypted messages; alternatively, a first encryption region of an encrypted message is received.

The method of claim 7, wherein: the receiving of the encrypted message comprises receiving all the encrypted messages; the determining whether to acquire the second information according to the first information includes:

when the encrypted message is determined to be a legal message according to the first information, decrypting a second encrypted area of the received encrypted message to acquire the second information; and when the encrypted message is determined to be not a legal message according to the first information, the second encrypted area of the encrypted message is not decrypted.

The method of claim 7, wherein: the receiving of the encrypted message comprises a first encryption area for receiving the encrypted message; the determining whether to acquire the second information according to the first information includes:

when the encrypted message is determined to be a legal message according to the first information, receiving the rest part of the encrypted message except the first encrypted area, and decrypting the second encrypted area to obtain the second information; and when the encrypted message is determined not to be a legal message according to the first information, not receiving the rest part of the encrypted message except the first encrypted region.

The method of claim 7, wherein receiving the encrypted message comprises receiving a first encrypted portion of the encrypted message, and wherein decrypting the first encrypted portion of the encrypted message comprises: and continuing to receive the rest part of the encrypted message.

The method of claim 10, wherein:

the determining whether to acquire the second information according to the first information includes:

when the encrypted message is determined to be a legal message according to the first information, judging whether a second encrypted area of the encrypted message is received or not, and if the second encrypted area of the encrypted message is received, decrypting the second encrypted area of the encrypted message to obtain the second information; if the second information is not received, continuing to receive the second encryption area of the encrypted message, and decrypting the second encryption area of the encrypted message to obtain the second information;

when the encrypted message is determined to be not a legal message according to the first information, judging whether a second encrypted area of the encrypted message is received or not, and if the second encrypted area of the encrypted message is received, not decrypting the second encrypted area of the encrypted message; and if the encrypted message is not received, the encrypted message is not continuously received.

The method of claim 5, wherein:

decrypting a first encrypted region of the encrypted message, comprising: and carrying out hardware decryption on the first encryption area of the encrypted message.

The method of claim 12, wherein:

and performing hardware decryption on a first encryption area of the encrypted message, wherein the hardware decryption comprises the following steps: and hardware decryption is carried out on the first encryption area of the encrypted message by adopting a single chip microcomputer containing an Advanced Encryption Standard (AES) hardware accelerator.

An apparatus for enabling secure communications, comprising: a communication module, a memory and a processor, the communication module being connected to the processor, the memory storing a computer program which, when executed by the processor, performs the steps of the method of performing secure communications of any of claims 1-4 or 5-13.

A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method of carrying out a secure communication according to any one of the preceding claims 1 to 4 or 5 to 13.

27页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:确认车辆的电子控制单元

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!