Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for encryption and decryption

An encryption method and encryption algorithm technology, applied in the field of digital anti-counterfeiting, can solve the problems of low security of encryption and decryption methods

Active Publication Date: 2012-11-14
SHANGHAI TECHSUN ANTI COUNTERFEITING TECH HLDG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an encryption and decryption method, device and system to solve the problem of low security of encryption and decryption methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for encryption and decryption
  • Method, device and system for encryption and decryption
  • Method, device and system for encryption and decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] The process flow of the encryption method disclosed in Embodiment 1 of the present invention is as follows figure 2 shown, including:

[0096] Step S21, obtaining the N-digit original code, and setting a C-digit check code for the N-digit original code;

[0097] Step S22, according to the verification code, select the corresponding encryption algorithm from the pre-established encryption algorithm group to encrypt the N-bit original code;

[0098] Step S23: Select a corresponding encryption algorithm according to the encrypted N-digit number to encrypt the verification code.

[0099] Step S24, the encrypted N-digit number and the C-digit check code are formed into an N+C-digit number, and one of the N+C-digit numbers is arbitrarily selected as a selection code, and one of them is selected from a pre-established matrix group according to the selection code. The corresponding N+C-1 order matrix;

[0100] Step S25, multiplying the remaining N+C-1 digits in the above st...

Embodiment 2

[0105] The process flow of the encryption method disclosed in this embodiment is as follows: image 3 shown, including:

[0106] Step S31, obtaining the N-digit original code, and setting a C-digit check code for the N-digit original code;

[0107] Step S32, select the a-th original code disorder algorithm from the pre-established original code disorder algorithm group according to the first a digits of the check code, and perform random sequence on the N-bit original code;

[0108] Step S33: Select the b-th symmetric encryption algorithm from the pre-established symmetric encryption algorithm group according to the remaining b digits of the check code, and perform a symmetric encryption algorithm on the original code after the disorder.

[0109] Here, the N-bit original code is encrypted twice by using the value of the check code, and different encryption methods are selected, and any number of encryption algorithms can be selected according to the actual situation to encryp...

Embodiment 3

[0120] The specific implementation of each step in the further disclosed encryption method of this embodiment, first establishes an encryption algorithm group in advance, which includes: 10 sets of check code encryption algorithms, 10 sets of symmetric encryption algorithms and 10 sets of out-of-sequence algorithms, pre-set Values ​​from 0 to 9 correspond to 10 sets of out-of-sequence algorithms L0 to L9, 20 to 29 correspond to 10 sets of symmetric encryption algorithms S0 to S9, and 0 to 9 correspond to 10 sets of checksum encryption algorithms C0 to C9.

[0121] The algorithm in this embodiment has been processed by modulo 10, that is, the step of adding modulo 10 after the algorithm, and converting the encrypted ciphertext into a decimal number. After verification, each set of symmetric encryption algorithms is mainly a combination of an out-of-sequence algorithm and three symmetric encryption algorithms. In this embodiment, the three encryption methods are hill encryption, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a device and a system for encryption and decryption. The method comprises the following steps of: acquiring an N-bit true code, and setting a C-bit check code, wherein N and C are positive integers; selecting a corresponding encryption algorithm from a pre-established encryption algorithm group to encrypt the true code according to a numerical value of the check code; and selecting a preset encryption algorithm to encrypt the C-bit check code according to an encrypted N-bit digital code. In the method, the device and the system, disclosed bythe embodiment of the invention, for encryption and decryption, a plurality of groups of encryption and decryption algorithms are preset, specific encryption and decryption algorithms are determined according to the check code of cipher texts, and a password selection encryption algorithm obtained through encryption is used for encrypting the check code to realize double-encryption, so the difficulty for cracking the cipher texts is improved, even the encryption algorithm of one of the cipher texts is cracked, the other cipher texts are very difficult to be analogized, and the safety of the encryption process is improved.

Description

technical field [0001] The invention relates to the field of digital anti-counterfeiting, in particular to an encryption and decryption method, device and system. Background technique [0002] At present, counterfeit and shoddy goods disrupt the normal operation of enterprises and damage the interests of enterprises and consumers. In order to protect the enterprise market and protect the legitimate rights and interests of consumers, enterprises usually take digital anti-counterfeiting as a preventive measure. When consumers buy products with digital anti-counterfeiting labels, they only need to make a phone call or go to the Internet and input the code on the products to know the authenticity of the products, thus breaking through the traditional anti-counterfeiting products that are easy to be counterfeited in batches and consumers Limitations that are not easy to identify, safeguard the legitimate rights and interests of consumers and protect the normal and legal economic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/28
Inventor 徐良衡徐良刚陈德秋王宗国周立雄吴超
Owner SHANGHAI TECHSUN ANTI COUNTERFEITING TECH HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products