A database data encryption system and method

A data encryption and database technology, which is applied in the field of information security, can solve the problems of invisible binary data and achieve the effect of protecting security

Inactive Publication Date: 2012-02-08
北京联合智华微电子科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2) After the ASK code is encrypted, it cannot be either non-displayable binary data or displayable ASK code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A database data encryption system and method
  • A database data encryption system and method
  • A database data encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0251] Embodiment 1: 8-bit unit code operation, 8-bit binary data is obtained after encryption

[0252] Given a key and data as follows:

[0253] Byte order [7][6][5][4][3][2][1][0]

[0254] Key variable key: 08 07 06 05 04 03 02 01

[0255] Given data:

[0256] Data length Data variable data

[0257] byte=1 01

[0258] byte=2 02 01

[0259] byte=3 03 02 01

[0260] byte=4 04 03 02 01

[0261] byte=8 08 07 06 05 04 03 02 01

[0262] in

[0263] byte: field length, byte=1, 2, 3, 4, 8 five kinds

[0264] i: operation of the i-th circle

[0265] key: given key variable

[0266] data: plaintext data to be encrypted

[0267] Step S11, from the given key key, use the modulo Q nonlinear feedback shift register 1 to perform feedback operation to obtain 18 groups of derived keys keyb;

[0268] [7][6][5][4][3][2][1][0]

[0269] Set the given key key: 08 07 06 05 04 03 02 01

[0270] Then derive the key keyb[0]: 4C A4 7F 5D 08 18 94 B7

[0271] [1]; 92 5F 60 D6 DC 38 9...

Embodiment 2

[0511] 8byte: 7 units 13 61 63 5A 61 3E 1C 6A are still expanded according to 7bit

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database data encryption system and method. The system includes: a modulo Q nonlinear feedback shift register, which is used to perform nonlinear feedback with a given key as an initial value, and its feedback value is replaced by a preset Substitution and transformation of the table, which continuously generates 18 states of derived keys, which are used in the encryption and decryption operations of each circle of the block cipher; the replacement table replacement module is used for transformation in units of bytes; the substitution transformation module is used for transformation in units of bytes Replacement; the operation module is used to expand or concentrate the data in the database by bytes, perform horizontal accumulation, and perform replacement and replacement under the instruction of the derived key transformed by the modulo Q nonlinear feedback shift register Operation to complete the encryption and decryption of database data. It can effectively protect the security of data in the database.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a database data encryption system and method. Background technique [0002] Generally, there are two different cases of data encryption, one is the encryption of communication data, and the other is the encryption of stored data, and the stored data is usually encrypted by using a database. Serial ciphers can only be used to encrypt communication data, not to encrypt stored data, because different files in the database must be encrypted with different keys, and keys are secret variables that are difficult to handle. The stored data in is generally encrypted with a block cipher. [0003] Block cipher is also called "block cipher" (bloc cipher), a block cipher is transformed into a block cipher under the action of a block cipher. He broke through the traditional operation mode of sequence cipher (ie, stream cipher: stream cipher), and no longer performs encryption op...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/24G06F21/60
Inventor 南相浩
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products