| During the operation of Parking Intelligent Services Platform(PISP),there will be continuous data transmitting between the various roles,particularly between the customer and car park attendants,and between all nodes within the platform.At this time,if the information is not confidentially protected,it will cause the user’s personal information,payment data and account passwords to be exposed to the open Internet space.Malicious intermediaries can steal private information through technical means,resulting in user property loss and information theft.To ensure the safe and smooth operation of the platform,the security of communication data is an important technical issue that must be considered.In order to protect the security of information in communication of the platform,the most reliable and feasible method is to apply modern cryptography technology to encrypt and decrypt the information to avoid the communication data being transmitted on the network in the form of plain text,from the user logging on to the platform,accessing the server,until obtaining the corresponding service,and successfully paying the serving fees.In the current field of cryptography,encryption systems can mainly be divided into two types: symmetric cryptography and public key cryptography,because their mathematical principles and calculation processes are different.In the area of single key cryptography,the AES system has a simple design structure,agile and light operation,low implementation difficulty,fast running speed,and small storage space occupation.Furthermore,it has a strong ability to resist man-in-the-middle attacks,so it is the most widespread.Among those many public key cryptographic algorithms,ECC can obtain stronger encryption strength with a shorter key.With the current cracking method,the amount of calculation is an exponential level,which has performed better in several aspects in comparison with other asymmetric cryptographic algorithms.Since both symmetric cryptography and public key cryptography have their own advantages and limitations,they can be used in fusion to achieve the effect of maximizing strengths and avoiding weaknesses.This article mainly focuses on the AES algorithm and ECC algorithm from two different cryptosystems,analyzes the theories and operating procedures,and summarize their respective characteristics.Combining the merits on the encryption speed of the AES algorithm and the difficulty of the ECC algorithm to crack,a brand-new hybrid cipher mechanism that merges the AES algorithm and the ECC algorithm is proposed.Specifically,the message data is symmetrically encrypted with the AES method,and afterwards the AES key is encrypted with the ECC method and ultimately combined into a ciphertext.In this way,the superiority of the AES system and the ECC system are incorporated into a hybrid cryptographic mechanism.Not only will it not cause a significant drop in data transmission speed,it can also achieve the confidential delivery of the information content during whole network transmission journey.The hybrid cryptographic mechanism described in the article can be practically employed to the encrypted communication program of the PISP to provide a guarantee for the encryption of the message data between the roles of the platform.In the research of this article,we mainly try to find out the hidden weaknesses in communication security of PISP through the dissecting and analyzing its information exchanging architecture.Secondly,we analyze the theories,pros and cons of several pop major cryptographic algorithms to find their respective main superiorities and operating methods,merge and implement these links,and combine them into a hybrid encryption mechanism,which is applied to PISP.Based on the technologies,the security of network data transmission is guaranteed,and not to reduce the computing efficiency at the same time.Finally,this article verifies the advantages of the hybrid encryption mechanism through several sets of comparative experiments.Ultimately,in order to verify the advantages of the hybrid encryption mechanism from a quantitative perspective,this article conducts several sets of comparative experiments in terms of encryption and decryption computing efficiency and time complexity for different files.In these comparative experiments,the hybrid encryption mechanism used in this article is compared with several other more classic and widely used cryptographic algorithms,and data comparison is used to illustrate the efficiency of the hybrid encryption mechanism and the security of encryption. |