Random sequence based encryption method with misleading function
An encryption method and function technology, applied in the field of information security, can solve the problem of inability to determine the key, and achieve the effect of avoiding database synchronization and reducing redundancy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The following are examples of the present invention, however, the present invention is not limited to the examples.
[0037] In the actual implementation, it is stipulated that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm adopts 256-bit AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. In order to ensure irreversibility in the inner layer encryption, a stream cipher algorithm is used. For example, a 256-bit stream cipher algorithm can be used. The first 256 bits of the inner key are the keys of the stream cipher algorithm, which corresponds to the key stream generation part in Figure 3 , the remaining part of the key is used to modify the key stream, the front part is the position information of the keyword, which is located accordi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com