Check patentability & draft patents in minutes with Patsnap Eureka AI!

3DES (triple data encrypt standard) encryption method

An encryption method and encrypted technology, applied to encryption devices with shift registers/memory, key distribution, can solve problems such as inability to distinguish well, and achieve the effect of enhancing encryption operations

Inactive Publication Date: 2013-02-13
FUJIAN CENTM INFORMATION
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the 3DES standard is adopted, it cannot be well distinguished from the specific encryption requirements of other non-banking industries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3DES (triple data encrypt standard) encryption method
  • 3DES (triple data encrypt standard) encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Embodiment 1, byte exchange method:

[0021] 1. Encryption processing rules:

[0022] Assume that the original data DATA0 to be encrypted is 8-byte binary data.

[0023] The first DES encryption: the result of DATA0 encryption is DATA1;

[0024] The first change rule: D8 and D1 byte exchange. After changing the original data of DATA1 [D8.D7.D6.D5.D4.D3.D2.D1], the new data DATA1-1 [D1.D7.D6.D5] will be obtained .D4.D3.D2.D8]; (Note: The arrangement position of data D1 and D8 is swapped)

[0025] The second DES encryption: After encrypting the DATA1-1 after the first change, the encrypted result DATA2 is obtained;

[0026] The second change rule: D4 and D5 byte exchange. The new data DATA2-1 [D8.D7.D6.D4.D5] will be obtained after the original data of DATA2 [D7.D6.D5.D4D3.D2.D1.D0] is changed. .D3.D2.D1]; (Note: The arrangement positions of data D4 and D5 are interchanged)

[0027] The third DES encryption: after encrypting the DATA2-1 after the second change, the e...

Embodiment 2

[0037] Embodiment 2, byte reverse sequence method

[0038] 1. Encryption processing rules:

[0039] Assume that the original data DATA0 to be encrypted is 8-byte binary data.

[0040] The first DES encryption: the result DATA1 after DATA0 encryption;

[0041] The first change rule: After the original data DATA1, bytes are arranged in reverse order [D8.D7.D6.D5.D4.D3.D2.D1] byte by byte, the new data DATA1-1, character Sections in order [D1.D2.D3.D4.D5.D6.D7.D8]; (Note: data in reverse order)

[0042] The second DES encryption: the result DATA2 after DATA1-1 encryption;

[0043] The second change rule: After the original data DATA2, the bytes are arranged in the order [D8.D7.D6.D5.D4.D3.D2.D1], the new data DATA2-1 is obtained after the byte-by-byte inversion is changed. , the bytes are in order [D1.D2.D3.D4.D5.D6.D7.D8]; (Note: the data is in reverse order again)

[0044] The third DES encryption: after the second changed DATA2-1 is encrypted, the encrypted result DATA3 i...

Embodiment 3

[0054] Embodiment 3, byte cyclic shift method

[0055] 1. Encryption processing rules:

[0056] Assume that the original data DATA0 to be encrypted is 8-byte binary data.

[0057] The first DES encryption: the result DATA1 after DATA0 encryption;

[0058] The first change rule: the original data DATA1, the bytes are in the order [D8.D7.D6.D5.D4.D3.D2.D1], and the new data DATA1- 1 byte in order [D5.D4.D3.D2.D1.D8.D7.D6]; (Note: data rotates 3 bytes to the left)

[0059] The second DES encryption: the result DATA2 after DATA1-1 encryption;

[0060] The second change rule: the original data DATA2, the bytes are in the order [D8.D7.D6.D5.D4.D3.D2.D1], and after the 4-byte change, the new data DATA2- 1 byte in order [D4.D3.D2.D1.D8.D7.D6.D5]; (Note: data rotates 4 bytes to the left)

[0061] The third DES encryption: after encrypting the DATA2-1 after the second change, the encrypted result DATA3 is obtained;

[0062] DATA3 is the encrypted result of 2C3DES encrypted DATA0. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a 3DES (triple data encrypt standard) encryption method. The method comprises three encryption processes, namely, data subjected to first encryption is converted for the first time, then the data subjected to first conversion is encrypted for the second time, the data subjected to second encryption is converted for the second time, and finally, the data subjected to second conversion is encrypted for the third time; and the first conversion corresponds to the second changing process of decryption, the second conversion corresponds to the first changing process of decryption, the first conversion and the second changing process of decryption are mutually reversible, and the second conversion and the first changing process of decryption are mutually reversible. According to the invention, through a simple self-defined two-time changing method, better industry (product) privacy can be extended based on the original 3 DES encryption and the original application system is not destroyed. The method especially achieves a special data protection effect when applied to a low-cost security solution scheme.

Description

【Technical field】 [0001] The invention relates to a 3DES encryption method. 【Background technique】 [0002] DES (Data Encrypt Standard) encryption standard is the standard data encryption method in the banking industry. Through the sharing of the DES key, the purpose of data security transmission can be obtained. 3DES encryption can effectively expand the key length from 56bit to 168bit on the basis of DES, which greatly enhances the data protection capability. However, if the 3DES standard is adopted, it cannot be well distinguished from the specific encryption requirements of other non-banking industries. 3DES (Triple DES) is an encryption algorithm transitioning from DES to AES. It uses three 64-bit keys to encrypt data three times. 3DES is a safer variant of DES. It uses DES as the basic module, and designs a block encryption algorithm through a combined block method. 3DES is more secure than the original DES. [0003] Such as figure 1 As shown, it is the 3DES sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08
Inventor 钟国平李宗宇张登峰余杭军
Owner FUJIAN CENTM INFORMATION
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More