期刊文献+

Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1

Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
下载PDF
导出
摘要 Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability.
作者 Youhai Shao Yong Wang Yun Yang Xiang Wang Youhai Shao;Yong Wang;Yun Yang;Xiang Wang(College of Science, Shanghai University of Electric Power, Shanghai, China;State Grid Shanghai Municipal Power Company, Shanghai, China)
出处 《Journal of Computer and Communications》 2022年第1期42-56,共15页 电脑和通信(英文)
关键词 Secret Algorithm SM2 Communication Protocol Hybrid Encryption Security Protection Secret Algorithm SM2 Communication Protocol Hybrid Encryption Security Protection
  • 相关文献

参考文献13

二级参考文献103

共引文献176

同被引文献22

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部