Data set encryption pre-processing method

A data set and data concentration technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as narrow applicability and inapplicability of large data sets, and achieve the effect of saving encryption time

Active Publication Date: 2016-09-14
CHONGQING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the applicability of this algorithm is too narrow, it is only suitable for image encryption and requires the pixel size of the image to be 2 a ×2 a , a is a positive integer, not suitable for a large number of data sets with arbitrary structures
And currently there is no standard encryption algorithm suitable for large-scale data sets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data set encryption pre-processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0025] Such as figure 1 As shown, a data set encryption pre-processing method includes the following steps:

[0026] Step 1. The total number of elements N in the data set is counted, and N is a positive integer.

[0027] Step 2: Calculate the number of rounds that the data set needs to be encrypted.

[0028] Step 3, grouping each data element in the data set; it is carried out according to the following steps:

[0029] A1. The position of the data element in the data set is represented by an m-bit binary number, expressed as x m x m-1 …x 2 x 1 ; m is a positive integer, 2 m ≤Nm+1 ; x i Indicates the binary value represented by the i-th bit, i=1, 2, 3, ..., m.

[0030] A2. Group the data elements in the data set according to the grouping strategy;

[0031] The grouping of the data elements in the data set according to the grouping strategy is perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data set encryption preprocessing method, which belongs to the field of information encryption. The invention first counts the total amount of elements in the data set, then calculates the number of rounds that the data set needs to be encrypted, and finally groups each data element in the data set; through By processing the data before encryption, the invention makes the encryption of a large amount of data sets more efficient and safe, is suitable for large-scale data sets of any structure, and can save later encryption time.

Description

technical field [0001] The invention belongs to the field of information encryption, in particular to a data set encryption preprocessing method. Background technique [0002] With the development of cloud computing, the amount of data generated and processed by the Internet is increasing day by day. Big data almost runs through the entire real world. However, while enjoying the convenience brought by big data, the privacy of personal data and the security of enterprise data are also getting more and more attention. Cryptography is an effective means to prevent data from being illegally tampered with and eavesdropped. However, the security of applying existing cryptographic standards directly to the encryption of large-scale data sets has not yet been fully proved. For example, images encrypted with the AES algorithm may leak some information, so improper use of existing encryption algorithms cannot ensure data security. [0003] An important requirement of the encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L9/00H04L29/06
Inventor 周庆王宏胡月郑友杰王湛鹏孟瑶
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products