Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method based on DES

An encryption method and a technology for encrypting files, which are applied in the direction of encryption devices with shift registers/memory, etc., can solve the problems of consuming system resources, excessive computing time, and unsuitable system resources, so as to protect copyrights, increase the difficulty of cracking, The effect of fast decryption speed

Inactive Publication Date: 2010-05-12
FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, the DES algorithm is mostly used to encrypt the entire file, and it takes a lot of computing time and consumes a lot of system resources to decrypt the file. It is not suitable for applications with tight system resources, such as multimedia player boxes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method based on DES
  • Encryption method based on DES
  • Encryption method based on DES

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Embodiment 1: KTV music storehouse left alignment, XOR encryption

[0017] This application example is a KBox play box built on the basis of the AMLogic 7228 chip. In order to protect the intellectual property rights of the KTV music library on the play box, the above encryption method is applied. In the following, only the encryption and decryption of the Rmvb file will be described in detail, and it is assumed that the logical operation set is only XOR and far calculation, and the encryption is left-aligned.

[0018] Such as figure 1 Shown is the encryption schematic diagram of the Rmvb file, where the Flag field is a user-defined flag segment, the type is a string of length 5, and it is assumed to be "UGOOD"; the data type of Len_C and Len_P is int.

[0019] Encryption process of Rmvb file:

[0020] Step 1, randomly obtain a section of plaintext logical operands from the unencrypted rmvb video file, assuming P (setting length as x);

[0021] Step 2. Divide the rmv...

Embodiment 2

[0024] Embodiment two, KTV's music storehouse right alignment, XOR encryption

[0025] The method is the same as above, the difference is that the right alignment method is adopted in the process of segment encryption. Such as figure 2 As shown, it is the encryption principle diagram of the Rmvb file, where the Flag field is a user-defined flag segment, the type is a string with a length of 5, and it is assumed to be "MTEST"; the data type of Len_C and Len_P is int.

[0026] Encryption process of Rmvb file:

[0027] Step 1, randomly obtain a section of plaintext logical operands from the unencrypted rmvb video file, assuming P (setting length as x);

[0028] Step 2, divide the rmvb file into small sections with a fixed length (assuming that the length is y), y≥x, and the length of the last section is z, and it can be seen that z must be less than or equal to y;

[0029] Step 3, P performs XOR operation of x bits with the right half of each subsection of the rmvb file (exce...

Embodiment 3

[0031] Embodiment 3, left-aligned, same-or-encrypted application package

[0032] At the end of the software development, an application package that can be used directly is generated, assuming the name is KBOX.img. We use the encryption method of the present invention to encrypt to protect our application package. Such as image 3 Shown is the schematic diagram of the encryption of the application package.

[0033] Among them, the Flag field is a user-defined flag segment, the type is a character string with a length of 5, and it is assumed to be "TLAST"; the data type of Len_C and Len_P is int.

[0034] The encryption process of KBOX.img:

[0035] Step 1. Obtain a section of plaintext logical operand randomly from the unencrypted KBOX.img, assuming it is P (set the length as x);

[0036] Step 2. Divide KBOX.img into segments with a fixed length (let the length be y), y≥x, and the length of the last segment is z. It can be seen that z must be less than or equal to y;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An encryption method based on DES comprises the following steps: randomly obtaining a character string with the length being x and used for logical operation from a file to be encrypted; dividing the file to be encrypted into sections with the length of being y, wherein y is more than and equal to x, the length of the final section is set as z, and z is less than or equal to y; conducting left alignment and right alignment on the subsections and the character string, and conducting logical operation with the character string so as to generate the encryption file, when the subsections and the character string are in the left alignment, conducting the logical operation with x bit on the left haft part, and when the subsections and the character string are in the right alignment, conducting the logical operation with x bit on the right half part, and if z is more than or equal to x, conducting the logical operation with x bit on the final small section, or conducting the logical operation with z bit; and by the DES algorithm, encrypting the character string to obtain encrypted logic element, and then appending the content and the length of the logic element, the length of the character string, and user-defined mark sections behind the encryption file. The method has the advantages that the rapid for decryption is quick, the requirement of playing when conducting decryption is met, and the encryption scheme is flexible.

Description

【Technical field】 [0001] The present invention relates to an encryption method, in particular to an encryption method based on DES. 【Background technique】 [0002] The DES algorithm is a widely used encryption technology today, and its security and stability are relatively high, and it is a symmetric encryption algorithm, that is, a lossless encryption algorithm, which can completely restore the original file, so it can be used to encrypt some important documents, multimedia files, etc. However, at present, the DES algorithm is mostly used to encrypt the entire file, which requires more computing time and consumes a lot of system resources to decrypt the file, and is not suitable for applications with tight system resources, such as multimedia player boxes. 【Content of invention】 [0003] The technical problem to be solved by the present invention is to provide a DES-based encryption method that can meet the requirement of decryption while playing and has a fast decryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 邹应双陈风陈铮
Owner FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products