Methods and devices for data encrypting and decrypting and communication system

A data encryption and data decryption technology, applied in the field of communication, can solve the problems of complex HMAC algorithm, inability to effectively apply multi-processors, and low efficiency of massive data, and achieve the effect of improving computing efficiency

Inactive Publication Date: 2009-12-02
HUAWEI TECH CO LTD
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Since HMAC is a secure hash algorithm, it can only perform HMAC calculation on the entire data plaintext and cannot effectively apply multiprocessors, so this scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and devices for data encrypting and decrypting and communication system
  • Methods and devices for data encrypting and decrypting and communication system
  • Methods and devices for data encrypting and decrypting and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] In the grouping algorithm under the counter mode (CTR), first construct a group of data sequences as counters, which are used to mark the grouping information of the plaintext, and after the data sequences are encrypted, a group of counter ciphertext streams are obtained, which are used to encrypt the plaintext. The counter mode is ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses methods and devices for data encrypting and decrypting and a communication system. The method for data encrypting comprises the following steps: segmenting data into segment data comprising at least two segments; encrypting the segment data in parallel to obtain the ciphertext of the segment data; adopting a linear algorithm to calculate all the segment data in parallel to obtain a message authentication code; and obtaining encrypted data according to the ciphertext and the message authentication code. The method for data decrypting comprises the following steps: segmenting data to be verified to obtain ciphertext segments and a message authentication code; decrypting all segment ciphertext to obtain decipher text and decipher text segments; adopting the linear algorithm to calculate all the decipher text in parallel to obtain a check code; and judging whether the data to be verified is right or not according to the check code and the message authentication code.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a data encryption and decryption method, device and communication system. Background technique [0002] Cryptographic technology is the core technology of information security. Cryptographic technology can ensure the confidentiality and integrity of data during transmission, and the confidentiality of data is guaranteed by encrypting data. Cryptographic algorithm is a mathematical function used for encryption and decryption. It can generally be divided into two types: symmetric algorithm and asymmetric algorithm; symmetric algorithm means that the encryption key can be calculated from the decryption key, and vice versa. In most In a symmetric encryption algorithm, the encryption key and the decryption key are the same. [0003] The block cipher algorithm is a kind of symmetric cipher algorithm. When encrypting, the data is first grouped, and then only one group is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/28
CPCH04L9/3242
Inventor 李光应孙伊朱贤刘昱赵元顶吴伟国
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products