Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for generating ciphertext

A ciphertext and data generation technology, applied in the field of information security, can solve problems affecting the command running speed, affecting the terminal response of UAM connection, card performance, etc., to avoid multiple repeated calculations, shorten the calculation time, and reduce the calculation process Effect

Inactive Publication Date: 2012-07-04
BEIJING WATCH DATA SYST
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When the above scheme is adopted, the number of 64-byte SHA-1 calculations that needs to be performed reaches 24 times, which affects the running speed of the entire command, has a very large impact on the performance of the card, and sometimes affects the response of the terminal connected to the UAM

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating ciphertext
  • Method and device for generating ciphertext
  • Method and device for generating ciphertext

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiment of the present invention provides a method and device for generating a key, which can avoid repeated calculations and improve calculation efficiency.

[0020] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] Such as figure 1 Shown is the flowchart of the embodiment method of the present invention, including:

[0022] S101: Determine the algorithm and its parameters required to generate ciphertext from the data to be encrypted, and determine the number of times required to generate ciphertext through the algorithm according to the parameters in the process of generating ciphertext, when the number of times is greater than When it is equal to 2, execute S102.

[0023] S102: Save the Nth calculation result value currently generated by performing the Nth calculation according to the Nth parameter through the Nth algorithm;

[0024] S103: Performing the N+1th cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for generating ciphertext. The method comprises the steps of: determining algorithms and parameters thereof required for generating the ciphertext from data to be encrypted, determining the number required for generating the ciphertext through calculation by means of the algorithm according to the parameters in the process of generating the ciphertext, and when the number is more than or equal to 2, preserving a current Nth calculation result value generated through Nth calculation performed by means of the algorithm according to the Nth parameter; and when the (N+1)th calculation performed by means of the algorithm according to the (N+1)th parameter comprises a process of calculating by means of the algorithm according to the Nth parameter, reading the Nth calculation result value to replace the (N+1)th calculation in the calculation process, and preserving the (N+1)th calculation result value obtained through the calculation. Accordingly, by means of the characteristic that the calculation result value of the set parameters needs to be reutilized and the manner that the calculation result value of the set parameters is preserved firstly and subsequently the preserved calculation result is directly read when subsequent reutilization is needed, the actual calculation process is shortened and the calculation time is reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for generating ciphertext. Background technique [0002] At present, in the PRF algorithm (Pseudo-random Function, the algorithm for calculating the key in the generated ciphertext) of the mobile TV UAM (UserAccess Module, specified in the user authentication module specification), the calculation of each service key requires two HMAC ( Key-Hashing for Message Authentication, Keyed Message Digest Algorithm) calculation; taking the SHA-1 (Secure Hash Standard, SHA-1 Message Digest Algorithm) algorithm as an example, each HMAC needs to perform four 64-byte SHA-1 calculations In this way, calculating one service key requires 8 SHA-1 calculations, and if calculating 3 service keys, 24 64-byte SHA-1 calculations need to be performed. [0003] When the above solution is adopted, the number of 64-byte SHA-1 calculations that needs to be performed reache...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张爱明
Owner BEIJING WATCH DATA SYST