Database data encryption system and method thereof
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data encryption and database technology, applied in the field of information security, can solve problems such as invisible binary data, and achieve the effect of protecting security
Inactive Publication Date: 2009-11-04
北京联合智华微电子科技有限公司
View PDF0 Cites 10 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0011] 2) After the ASK code is encrypted, it cannot be either non-displayable binary data or displayable ASK code
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0251] Embodiment 1: 8-bit unit code operation, 8-bit binary data is obtained after encryption
[0252] Given a key and data as follows:
[0253] Byte order [7][6][5][4][3][2][1][0]
[0254] Key variable key: 08 07 06 05 04 03 02 01
[0255] Given data:
[0256] Data length Data variable data
[0257] byte=1 01
[0258] byte=2 02 01
[0259] byte=3 03 02 01
[0260] byte=4 04 03 02 01
[0261] byte=8 08 07 06 05 04 03 02 01
[0262] in
[0263] byte: field length, byte=1, 2, 3, 4, 8 five kinds
[0264] i : operation of the i-th circle
[0265] key : the given key variable
[0266] data: plaintext data to be encrypted
[0267] Step S11, from the given key key, use the modulo Q nonlinear feedback shift register 1 to perform feedback operation to obtain 18 groups of derived keys keyb;
[0268] [7] [6] [5] [4] [3] [2] [1] [0]
[0269] Set the given key key: 08 07 06 05 04 03 02 01
[0270] Then derive the key keyb[0]: 4C A4 7F 5D 08 18 94 B7
[027...
Embodiment 2
[0446] Embodiment two: 7 unit codes (7-bit) operation, the sign bit of each byte is reserved first, the binary code of 7-bit can still obtain the binary code of 7-bit after being encrypted, then the symbol of keeping Bits are restored to each byte, making it an 8-bit ASK code.
[0460] Step S21, using the modulo Q nonlinear feedback shift register 1 to perform a feedback operation from the original key key to obtain 18 groups of derived keys keyb;
[0461] [7][6][5][4][...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a database data encryption system and a method thereof. The system comprises a model Q nonlinear feedback shift register, a permutation table replacement module, a substitution transforming module and an operation module; wherein, the model Q nonlinear feedback shift register is used for nonlinear feedback by taking the specified key as initial value, the feedback value is replaced and converted by the preset substitution list to continuously generate derived keys with 18 states, and the generated derived keys are applied in encryption and decryption operation of all block ciphers; the permutation table replacement module is used for transforming by taking byte as unit; the substitution transforming module is used for replacing by taking byte as unit; the operation module is used for expanding or centralizing the data in a database according to the byte for lateral accumulating; under the indication of the derived keys which are replaced and transformed by the model Q nonlinear feedback shift register, replacement and substitution operation can be carried out, so that encryption and decryption of the data in the database can be completed. The invention can effectively protect the safety of the data in the database.
Description
technical field [0001] The invention relates to the technical field of information security, in particular to a database data encryption system and method. Background technique [0002] Generally, there are two different cases of data encryption, one is the encryption of communication data, and the other is the encryption of stored data, and the stored data is usually encrypted by using a database. Serial ciphers can only be used to encrypt communication data, not to encrypt stored data, because different files in the database must be encrypted with different keys, and keys are secret variables that are difficult to handle. The stored data in is generally encrypted with a block cipher. [0003] Block cipher is also called "block cipher" (bloc cipher), a block cipher is transformed into a block cipher under the action of a block cipher. He broke through the traditional operation mode of sequence cipher (ie, stream cipher: stream cipher), and no longer performs encryption op...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.