Data encrypting method and encrypted data transmitting device

A technology for encrypting data and data, applied in the field of data transmission, can solve problems such as difficult mathematical algorithms, difficult security, difficult data transmission, etc., and achieve the effects of high encryption security, excellent data compression ability and random encryption ability

Inactive Publication Date: 2012-07-04
光束科技(北京)有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, from the perspective of the historical development process of data encryption and decryption, it is difficult to achieve ideal security simply by relying on the difficulty of the mathematical algorithm used in the encryption process. As long as there is regularity in the encryption process, cracking is a matter of time, and it is difficult to achieve ideal security. Data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encrypting method and encrypted data transmitting device
  • Data encrypting method and encrypted data transmitting device
  • Data encrypting method and encrypted data transmitting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] first reference figure 1 the examples. According to this embodiment, we know that data encryption adopts variable and random dynamic encryption means. First, in step 11, the transmission data W to be encrypted is read into the memory or cache of the computer system at one time or in the form of data flow, and W is used as the basis for generating the encryption key. However, the length of W is uncertain, and simply using W as the basis for key generation will make the consumption of computing resources uncertain, thus making the performance of products applying this method unstable. Therefore, this example adopts a relatively Optimizing practices. The method is to set a constant k in advance, randomly intercept the data W' of predetermined length k from the transmission data W, and use W' as the basis of the encryption key. In general applications, the length of W is usually greater than k. At this time, the acquisition of W' is an interception operation, and the sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encrypting method and an encrypted data transmitting device. The data encrypting method comprises the following steps: firstly, randomly capturing data W' with a reserved length k from transmission data W; generating a random number r by using the data W' as a seed, randomly calculating the length q and an initial point a of a data domain by using the r as the seed, and capturing the data from the transmission data W by using the q and the a as parameters so as to generate a data domain F; generating a public key E and a private key R by using the data domain F as a parameter; and finally, encoding the W by using the publish key E so as to obtain an encryption result Z. The invention further provides a data encrypting device, an encrypted data transmitting method, and the encrypted data transmitting device.

Description

technical field [0001] The invention relates to a data transmission method, in particular to a data encryption method and an encrypted data transmission method. Background technique [0002] In order to achieve the confidentiality of the transmitted data, people have taken many measures, one of which is to encrypt the transmitted data during the data transmission process. The public key private key encryption system is a typical representative in the field of data encryption. The system uses a public key and a private key, and the public key can be publicly transmitted between nodes sharing data to encrypt data and provide protection for transmitted data. However, the private key is confidential and has an independent correspondence with the node. Only the private key can be used to decrypt the data encrypted with the public key. [0003] However, the traditional encryption systems similar to this system used in the data transmission process all face the challenge of qu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 白杰
Owner 光束科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products