Data encryption/decryption checking method and system

A verification method and data technology, applied in the field of data processing, can solve problems such as errors or malicious tampering, increased computing overhead, and reduced transmission and storage performance

Inactive Publication Date: 2012-05-02
国家超级计算深圳中心(深圳云计算中心)
View PDF3 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can judge whether the received data is inconsistent with the original data through the receiver or user according to the check code in the process of data transmission and storage, that is, to judge whether there is an error in the data encryption or decryption process or whether it has been maliciously tampering, but this method of adding a checksum in addition to the encryption transformation has the disadvantage ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption/decryption checking method and system
  • Data encryption/decryption checking method and system
  • Data encryption/decryption checking method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0080] Such as figure 1 as shown, figure 1 It is a flowchart of a data encryption / decryption verification method in an embodiment of the present invention. The data encryption / decryption verification method mentioned in this embodiment of the invention includes steps:

[0081] In step S10, the encryption device performs an XOR operation on each data segment in the encrypted plaintext data Plain to obtain a check code Mac.

[0082] In this embodiment, the check code Mac is generated at the encryption end, and the encryption device installed in the encryption end computer PC executes the XOR operation to generate the check code Mac. Since the XOR operation is simple and the processing time is fast, the obtained check code The verification code Mac can also detect the correctness and integrity of the data, avoiding the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption/decryption checking method and system. The method comprises the following steps that: an encryption device performs Xor operation on each data section in plaintext data at an encryption end to acquire a checking code, combines the plaintext data at the encryption end with the checking code to acquire combined data, encrypts the combined data to acquire a ciphertext and outputs the ciphertext to a decryption end; and a decryption device decrypts the received ciphertext to acquire decrypted data, separates out the plaintext data at the decryption end and the checking code from the decrypted data, and checks the checking code. According to the invention, the checking code is generated through the simple Xor operation, and the data is encrypted by adopting one-time encryption transformation, so that the encryption transformation frequency is reduced, the calculation overhead is prevented from being multiplied, and the encryption/decryption efficiency is improved effectively; and by checking the correctness of the checking code, whether the data is wrong or maliciously changed during encryption or decryption and transmission or storage can be detected; and the confidentiality and correctness of the data are guaranteed at the same time.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a data encryption / decryption verification method and system thereof. Background technique [0002] At present, the encryption methods used in data transmission and storage processes mainly use block encryption algorithms, such as AES, DES, SM1, etc., to encrypt and transform data, and then transmit or store after forming ciphertext. This method can hide the original data and meet the requirement of protecting data privacy. However, this encryption method does not verify the data. If there is an error or malicious tampering in the data during transmission and storage, this encryption method cannot identify it, resulting in an error that the decrypted data is different from the original data. Condition. [0003] In order to solve the above problems, the existing method is to add a section of verification code in addition to encrypting and transforming the data. The block...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/32
Inventor 陈开渠徐泽明
Owner 国家超级计算深圳中心(深圳云计算中心)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products