Encrypting method and device
An encryption method and encryption device technology, applied to secure communication devices and key distribution, can solve the problem of insufficient encryption method security, and achieve the effect of improving encryption security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.
[0023] figure 1 is a flowchart of the encryption method according to the first embodiment of the present invention.
[0024] Such as figure 1 As shown, the method includes the following steps S102 to S104:
[0025] Step S102, obtain the master key stream through the master key.
[0026] Step S104, performing entropy reduction on the master key stream. as well as
[0027] In step S106, the plaintext is encrypted using the entropy-reduced master key stream.
[0028] In this embodiment, by reducing the entropy of the master key stream to form a key stream of an irreversible one-way function value, and then work with the plaintext, for example, the master key stream after entropy reduction en...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com