A text encryption and decryption method and encryption and decryption device

An encryption method and encryption algorithm technology, which is applied in the field of encryption and decryption, and data encryption and decryption, can solve the problems of increasing the risk of file leakage, loss of encryption and decryption processing efficiency, and slow encryption and decryption speed, so as to improve encryption and decryption efficiency and reduce data. Possibility of leakage, reducing the effect of read and write operations

Active Publication Date: 2016-08-10
深圳市大成天下信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing encryption methods have the following disadvantages: First, because the algorithm is complex and encrypted and decrypted through multiple combinations, the efficiency of encryption and decryption is very low
In this way, if the file to be encrypted and decrypted is larger, the encryption and decryption speed will be slower; in addition, in the process of decryption, even if a certain section of content needs to be decrypted, all encrypted sections need to be decrypted, which leads to the fact that even if a small part of the file content is required , it is also necessary to decrypt the full text of the file, and decrypting the full text will generate a temporary file. Some malicious programs will bypass the entire encryption and decryption process by obtaining the content of the temporary file, which will make the existing encryption and decryption process lose efficiency and increase the risk of file leakage. risk
[0005] Therefore, there is a need for a technology that can increase the speed of encryption and decryption, and at the same time can only decrypt any part of the encrypted file, so as to avoid the risk of file leakage caused by the entire decrypted file during decryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A text encryption and decryption method and encryption and decryption device
  • A text encryption and decryption method and encryption and decryption device
  • A text encryption and decryption method and encryption and decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0019] figure 1 A flowchart of a data segment encryption method 100 according to an embodiment of the present invention is shown. The method 100 begins at step S110, where a data segment to be encrypted is received. In this application, a data segment refers to a string of data, which may be text data or some binary data. The present invention is not limited to the specific form of the data segment, and any form of data segment i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encryption of a data segment. The method for encryption of the data segment comprises the steps of (1) dividing the data segment into a plurality of sub-data segments which correspond to the length of a secret key according to the length of the secret key used for encryption of the data segment, (2) as for each sub-data segment in the sub-data segments, carrying out encryption processing on each sub-data segment by using a reversible fixed length encryption algorithm according to the secret key so as to obtain an encrypted sub-data segment, and (3) combining the encrypted sub-data segments to obtain an encrypted data segment. The invention further discloses a corresponding method for decryption and a corresponding device for encryption and decryption.

Description

technical field [0001] The invention relates to the field of encryption and decryption, in particular to the field of data encryption and decryption for encrypting and decrypting data. Background technique [0002] With the continuous popularization of technologies such as computers and networks, information security has become an increasingly important issue. In order to ensure the security of data such as files, it is usually necessary to encrypt and decrypt the data. For example, data is encrypted during data transmission and storage, and data is only decrypted when it is used. [0003] At present, various technologies for encrypting and decrypting data have emerged. For example, a commonly used encryption and decryption technology uses the following steps to encrypt files. First, the file is divided into several data segments of different sizes from the beginning to the end; Combine and re-encrypt several sets of encrypted data segments, or encrypt encrypted data segm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 黄鑫吴鲁加
Owner 深圳市大成天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products