Fast encryption method for social websites

An encryption method and technology for social networking sites, applied in the field of password encryption, can solve the problems of reduced user password security and user efficiency, and achieve the effects of short waiting time, increased difficulty, and enhanced security.

Inactive Publication Date: 2012-12-26
HANGZHOU YEYAOMAI ELECTRONICS BUSINESS
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although encryption using MD5 method is irreversible, hackers now have a large amount of MD5 original text/cipher text comparison database, which can quickly decipher the MD5 cipher text of commonly used passwords, and the passwords of users in social networking sites are basically common passwords. The security of the user password is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fast encryption method for social websites

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] A fast encryption method for social networking sites, such as figure 1 shown, including the following steps:

[0021] A. After receiving the password string P entered by the user, the client sends the string P to the server;

[0022] B. After receiving the string P, the server automatically generates an additional key b. The server scrambles the string P into a scrambled ciphertext a, and then returns the scrambled ciphertext a and additional key b to the client;

[0023] C. The client performs nonlinear and irreversible encryption on the disordered ciphertext a for the first time to generate an intermediate ciphertext c;

[0024] D. The client uses the additional key b to scramble the intermediate ciphertext c for the second time to obtain the scrambled ciphertext d;

[0025] E. The client performs nonlinear and irreversible encryption on the disordered ciphertext d for the second time to obtain the final ciphertext e;

[0026] F. The client sends the final cipherte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fast encryption method for social websites. The fast encryption method for the social websites comprises the main steps of disordering for the first time, performing nonlinear encryption for the first time, disordering for the second time and performing nonlinear encryption for the second time. A password character string is disordered on the basis of the conventional message-digest algorithm 5 (MD5) encryption, so the safety of the password is enhanced; and MD5 encryption is performed for two times, so that the original text of the final ciphertext comprises character strings without logical relationship, a hacker needs a brand new original tex/ciphertext control database which does not exist at present and has huge data quantity to decode the, the difficulty of decoding the ciphertext by the hacker is greatly enhanced and the safety of the password is enhanced. The encryption flow only needs one-time communication between a client side and a server side, has low requirement on the network environment and only needs short waiting time, so the using efficiency of users is improved.

Description

technical field [0001] The invention relates to a password encryption method, in particular to a fast encryption method for social networking sites. Background technique [0002] The full name of MD5 is Message-Digest Algorithm 5, which was invented by MIT's Computer Science Laboratory and RSA Data Security Inc in the early 1990s. MD5 transforms a string of any length into a 128-bit large integer, and is an irreversible string conversion method. MD5 encryption module is a module with MD5 encryption function. [0003] Existing social networking sites usually encrypt passwords directly using the MD5 method. Although encryption using MD5 method is irreversible, hackers now have a large amount of MD5 original text / cipher text comparison database, which can quickly decipher the MD5 cipher text of commonly used passwords, and the passwords of users in social networking sites are basically common passwords. The security of the user password is greatly reduced; some social networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/14
Inventor 胡佳善
Owner HANGZHOU YEYAOMAI ELECTRONICS BUSINESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products