Database data encryption system and method thereof

A data encryption and database technology, applied in the field of information security, can solve problems such as invisible binary data, and achieve the effect of protecting security

Inactive Publication Date: 2009-11-04
北京联合智华微电子科技有限公司
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2) After the ASK code is encrypted, it cannot be either non-displayable binary data or displayable ASK code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database data encryption system and method thereof
  • Database data encryption system and method thereof
  • Database data encryption system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0251] Embodiment 1: 8-bit unit code operation, 8-bit binary data is obtained after encryption

[0252] Given a key and data as follows:

[0253] Byte order [7][6][5][4][3][2][1][0]

[0254] Key variable key: 08 07 06 05 04 03 02 01

[0255] Given data:

[0256] Data length Data variable data

[0257] byte=1 01

[0258] byte=2 02 01

[0259] byte=3 03 02 01

[0260] byte=4 04 03 02 01

[0261] byte=8 08 07 06 05 04 03 02 01

[0262] in

[0263] byte: field length, byte=1, 2, 3, 4, 8 five kinds

[0264] i : operation of the i-th circle

[0265] key : the given key variable

[0266] data: plaintext data to be encrypted

[0267] Step S11, from the given key key, use the modulo Q nonlinear feedback shift register 1 to perform feedback operation to obtain 18 groups of derived keys keyb;

[0268] [7] [6] [5] [4] [3] [2] [1] [0]

[0269] Set the given key key: 08 07 06 05 04 03 02 01

[0270] Then derive the key keyb[0]: 4C A4 7F 5D 08 18 94 B7

[027...

Embodiment 2

[0446] Embodiment two: 7 unit codes (7-bit) operation, the sign bit of each byte is reserved first, the binary code of 7-bit can still obtain the binary code of 7-bit after being encrypted, then the symbol of keeping Bits are restored to each byte, making it an 8-bit ASK code.

[0447] Given a key and data as follows:

[0448] [7][6][5][4][3][2][1][0]

[0449] Given key key: 08 07 06 05 04 03 02 01

[0450] Given data data:

[0451] byte=1 01

[0452] byte=2 02 01

[0453] byte=3 03 02 01

[0454] byte=4 04 03 02 01

[0455] byte=8 08 07 06 05 04 03 02 01

[0456] in

[0457] byte: packet length, byte=1, 2, 3, 4, 8 five kinds

[0458] i : operation of the i-th circle

[0459] key: given key

[0460] Step S21, using the modulo Q nonlinear feedback shift register 1 to perform a feedback operation from the original key key to obtain 18 groups of derived keys keyb;

[0461] [7][6][5][4][...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database data encryption system and a method thereof. The system comprises a model Q nonlinear feedback shift register, a permutation table replacement module, a substitution transforming module and an operation module; wherein, the model Q nonlinear feedback shift register is used for nonlinear feedback by taking the specified key as initial value, the feedback value is replaced and converted by the preset substitution list to continuously generate derived keys with 18 states, and the generated derived keys are applied in encryption and decryption operation of all block ciphers; the permutation table replacement module is used for transforming by taking byte as unit; the substitution transforming module is used for replacing by taking byte as unit; the operation module is used for expanding or centralizing the data in a database according to the byte for lateral accumulating; under the indication of the derived keys which are replaced and transformed by the model Q nonlinear feedback shift register, replacement and substitution operation can be carried out, so that encryption and decryption of the data in the database can be completed. The invention can effectively protect the safety of the data in the database.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a database data encryption system and method. Background technique [0002] Generally, there are two different cases of data encryption, one is the encryption of communication data, and the other is the encryption of stored data, and the stored data is usually encrypted by using a database. Serial ciphers can only be used to encrypt communication data, not to encrypt stored data, because different files in the database must be encrypted with different keys, and keys are secret variables that are difficult to handle. The stored data in is generally encrypted with a block cipher. [0003] Block cipher is also called "block cipher" (bloc cipher), a block cipher is transformed into a block cipher under the action of a block cipher. He broke through the traditional operation mode of sequence cipher (ie, stream cipher: stream cipher), and no longer performs encryption op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/24G06F21/60
Inventor 南相浩
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products