Data element and coordinate algorithm-based method and device for encrypting mixed data

A technology of data encryption and data elements, applied in encryption devices with shift registers/memory, electrical digital data processing, special data processing applications, etc., can solve the problem of large packet length, high operation cost, and increased operation load and cost and other issues to achieve the effect of high safety, guaranteed safety, and reduced workload

Inactive Publication Date: 2010-04-07
广东宽提科技有限公司
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

RSA is the most widely studied public key algorithm. The security of RSA depends on the factorization of large numbers. Both the public key and the private key are functions of two large prime numbers (greater than 100 decimal digits); The feature of the key is that it is limited by the technology of prime number generation; the length of the block is too large, so that the operation cost is very high to ensure security, especially the speed is slow, which is several orders of magnitude slower t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data element and coordinate algorithm-based method and device for encrypting mixed data
  • Data element and coordinate algorithm-based method and device for encrypting mixed data
  • Data element and coordinate algorithm-based method and device for encrypting mixed data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] refer to Figures 1 to 7 , discloses a hybrid data encryption method based on data elements and coordinate algorithms of the present invention. The method comprises the following steps:

[0056] 1). Obtain the data to be encrypted through the data input module;

[0057]2). Data is divided into several data units, i.e. data segments; the division method includes: A. the data input stream is divided into data segments with the same fixed length unit (the length of the data segment is not limited, and can be determined according to actual needs ; Since the data part of the IP datagram of IPV4 is the longest 64KB, so it can refer to that each data segment is set to 64KB), and the remaining data less than one length unit is used as a separate data segment; B. define several Length levels (for example, 128KB, 64KB, 32KB, 12KB, 1KB, 512B, and 256B can be defined as 6-0 levels in sequence, and the definition method can be determined according to actual needs, and there is no ...

Embodiment 2

[0112] This embodiment discloses another technical solution of the present invention: a device for hybrid data encryption and decryption based on data elements and coordinate algorithms:

[0113] Such as Figure 8 As shown, the encryption device is composed of an encryption control module 10, a data input module 11, an encryption algorithm distribution module 12, an encryption algorithm database 13, an encryption module 14, a cache module 15, and a combination module 16; The control module 10 is connected, and under the centralized control of the encryption control module 10, the encryption based on the mixed algorithm of data units and coordinates is realized: during work, under the control of the encryption control module 10, the data input module 11 is responsible for obtaining the data that needs to be encrypted and performing The data unit is divided and stored, and the data unit is input into the encryption control module 10 in order; the encryption algorithm distributio...

Embodiment 3

[0117] refer to Figure 10 with Figure 11 , which is a further optimization of a device for encrypting or decrypting data based on a hybrid algorithm of data units and coordinates in the present invention. Compared with Example 2, the difference is that the encryption or decryption device also has a user private key input module; the user private key input module The module is responsible for collecting the key input by the user, and combining the key with the encrypted data to form new encrypted data after processing. When decrypting, the subsequent decryption operation is performed after the user's private key is verified first.

[0118] When implementing the method of encrypting or decrypting data with a hybrid algorithm based on data units and coordinates, the device of this embodiment can refer to Embodiment 1 for implementation, and at the same time, some steps need to be modified accordingly.

[0119] Compared with the inventive method in Embodiment 1, when the devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data encryption, and discloses a method and a device for encrypting by performing data element division on data, performing coordinate distribution on each data element and adopting different algorithms and keys. The device is characterized in that: the security guarantee of the data does not depend on the complexity of a certain encryption algorithm or the length of a key for encrypting any more. By introducing various custom simple algorithms which cannot be predicted outside and mixing various different encryption algorithms to encrypt the same document, the advantages of the algorithms are effectively integrated, the computational load and cost for encrypting are greatly reduced, and the method and the device have significant beneficial effects and technical progress.

Description

Technical field: [0001] The invention relates to the field of data encryption, more specifically, a method and device for dividing data into data elements, assigning coordinates to each data element, and adopting different algorithms for encryption. Background technique [0002] Data security is an important content of information technology and communication technology research, and it is also related to national security, corporate interests and personal property safety. In order to ensure data security, various methods and devices are being researched and designed all over the world, from ancient times to today. [0003] At present, there are many ways to process data through computers, including: DES encryption algorithm, RSA, 3DES, block encryption algorithm FEAL, IDEA algorithm, etc.; where the DES encryption algorithm uses a 56-bit key and an additional 8-bit parity Bit verification, which generates a block cipher with a block size of up to 64 bits. When encrypting, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06G06F17/30
Inventor 卢林发叶灿才
Owner 广东宽提科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products