Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption and decryption methods and devices

A data encryption and data technology, which is applied to encoding/decoding devices, usage of multiple keys/algorithms, and key distribution, can solve problems such as ciphertext cracking, and achieve the effect of improving security and perfect encryption

Active Publication Date: 2012-08-22
BIGKNOW (BEIJING) DATA TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a data encryption and decryption method and device, aiming to solve the problem that the security of the existing perfect encryption technology is completely dependent on the safe storage and transmission of the key, and the ciphertext may be cracked once the key is leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption methods and devices
  • Data encryption and decryption methods and devices
  • Data encryption and decryption methods and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] In the embodiment of the present invention, during encryption, the plaintext to be encrypted is randomly allocated with a stored encryption function, and the plaintext is encrypted with the allocated encryption function; during decryption, the decryption of the ciphertext to be decrypted is obtained by generating and indexing a random string according to the encryption function function to decrypt.

[0052] see figure 1 and Figure 9 , the embodiment of the present invention provides a kind of data encryption method, comprises the following steps:

[0053] Step S101: group the plaintext t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data encryption and decryption, in particular to data encryption and decryption methods and devices. The encryption method comprises the following steps of: grouping a cleartext to be encrypted; randomly assigning an encryption function for each cleartext data; encrypting each group of cleartext data by utilizing the encryption function; and rankingthe encrypted data according to the corresponding cleartext position to form a ciphertext. The encryption device comprises a grouping module, an encryption function random assigning module and an encryption processing module. The invention also provides a data decryption method and device. According to the invention, by randomly assigning the encryption function for the cleartext to be encrypted during encryption, and encrypting and ranking the cleartext data to form the ciphertext by utilizing the assigned encryption function, the security of the data storage is greatly improved, and the perfect encryption of data is realized.

Description

technical field [0001] The invention belongs to the technical field of data encryption and decryption, and in particular relates to a data encryption and decryption method and device. Background technique [0002] The data protected by the Perfect Secrecy system, no matter how many ciphertexts intercepted by the cryptanalyst, cannot be deciphered under the conditions of unlimited computing power and time. For details, see the literature Shannon, Claude (1949).Communication Theory of Secrecy Systems , Bell System Technical Journal 28(4):656-715. [0003] One-time pad (One-time-pad, referred to as OTP hereinafter) is exactly a typical realization thereof, and relevant content can refer to following document, U.S patent 1,310,719.SECRET SIGNALING SYSTEM, S N MolotkoV, "Quantum cryptography and V A Kotel 'nikov's one-time key and sampling theorems", PHYS-USP, 2006, 49(7), 750-761 and "Applied Cryptography" published by Machinery Industry Press on March 1, 2003, pages 6 and 12 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCG09C1/00H04L9/14
Inventor 刘慧
Owner BIGKNOW (BEIJING) DATA TECH CO LTD