Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets

A data packet, large-capacity technology, applied in electrical components, transmission systems, etc., can solve problems such as low security, server pressure, and poor computing efficiency, and achieve the effect of improving encryption speed.

Inactive Publication Date: 2011-08-10
上海盛轩网络科技有限公司
View PDF9 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As we all know, encryption and decryption are very resource-intensive calculations. If a large number of different clients apply to the server for a large encrypted data package within a relatively short period of time, it will put a huge pressure on the server.
[0003] The current popular symmetric encryption algorithm is more efficient, but because the key needs to be transmitted through the network in the distributed encryption and decryption system, the security is not high
The asymmetric encryption and decryption algorithm only needs to transmit the public key that can only be encrypted on the network, and does not need to transmit the private key that can be decrypted. Its security is relatively high, but its operation efficiency is very poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
  • Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
  • Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Such as figure 2 As shown, the efficient parallel safe encryption and decryption method of large-capacity data packets of the present invention specifically includes the following steps:

[0015] (1) After the server obtains a large-capacity data packet, it divides the data packet into a fixed number of blocks (see figure 1 , divided into N blocks of data blocks), except for the last block which is slightly smaller, the other blocks have the same size; then, all the data blocks are decomposed into fixed-volume data slices (see figure 1 , divided into M pieces of data slices), except for the last block, the volume of other blocks is an integer multiple of the data slice volume.

[0016] For the original data (large-capacity data packet), that is, the division of the plaintext is divided into two levels, the higher level is the data block, and the lower level is the data slice. The number of data blocks is fixed, and the volume is basically the same (except for the las...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets, comprising the steps as follows: 1, after a server acquires the high-capacity data packets, the data packets are divided into a fixed number of sub-blocks, and all data sub-blocks are decomposed into the data fragments with a fixed volume; 2, each data fragment is encrypted with randomly generated symmetric encryption keys, and the encryption result of the former data fragment is required to be used when the next data fragment is encrypted; 3, after the encryption is finished, all the symmetric encryption keys and first data fragment ciphertext of each data sub-block are stored together (called key data); and ciphertexts beginning from the second data fragment of each data sub-block are stored together (called non-key data); 4, when a client-side requests for the high-capacity data packets, the server issues the non-key data through public channels and the key data through safe channels; and 5, the client-side carries out decryption in accordance with the opposite encryption sequence. The method provided by the invention is high in safety and transmission efficiency.

Description

technical field [0001] The invention belongs to the field of computer application system security, and in particular relates to a high-efficiency parallel security encryption and decryption method for large-capacity data packets. Background technique [0002] Now more and more data needs to be transmitted securely on the network, especially in some distributed encryption and decryption systems, the server needs to do separate encryption for each different client in order to achieve "one secret, one key". As we all know, encryption and decryption are very resource-intensive calculations. If a large number of different clients apply to the server for a large encrypted data package within a relatively short period of time, it will put a huge pressure on the server. [0003] The current popular symmetric encryption algorithm has high efficiency, but because the key needs to be transmitted through the network in the distributed encryption and decryption system, the security is no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王立
Owner 上海盛轩网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products