Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method and device with user/device identity authentication

A technology of device identity and user equipment, which is applied in the field of data communication and information security, and can solve problems such as inability to directly process encrypted incomplete packets

Active Publication Date: 2017-02-15
中电科网络安全科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide an encryption and decryption method and device with authentication in view of the above existing problems. The encryption / decryption operation of plaintext / ciphertext and the encryption / decryption operation processing of incomplete group plaintext / ciphertext enable the present invention to be strictly bound to the user of the cryptographic algorithm and the cryptographic algorithm itself. The cryptographic algorithm needs padding and cannot directly deal with the problem of encrypting incomplete packets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device with user/device identity authentication
  • Encryption and decryption method and device with user/device identity authentication
  • Encryption and decryption method and device with user/device identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0045] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0046] Relevant description of the present invention:

[0047] 1. Symbol description:

[0048] 0x represents a hexadecimal number;

[0049] ID User ID;

[0050] ID_LEN length of user identification ID (bits);

[0051] IV block cipher algorithm initialization vector (equal to the full block length);

[0052] P plaintext;

[0053] P_LEN plaintext length (bits);

[0054] HASH () The hash cipher algorithm selected.

[0055] 2 Algorithm conv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data communication and information safety, in particular to an encryption and decryption method and device with user / equipment identity authentication. Aiming at the problems, the encryption and decryption method and device with the identity authentication can finish the encryption / decryption operation of complete grouped cleartext / ciphertext operation treatment and the encryption / decryption operation treatment of incomplete grouped cleartext / ciphertext by the construction process of an authentication code, so the method and device can be strictly bound with a user of code operation and the code algorithm; furthermore, the problems that a normally used grouping code algorithm needs to be filled and the incomplete grouping can not be directly processed are solved. Data transmission and authentication are performed by the user / equipment and authentication equipment, so the encryption and decryption method and device with user / equipment identity authentication are realized. The encryption and decryption method and device with user / equipment identity authentication are applied to the field of information safety and particularly suitable for the safe storage and backup of individual user data.

Description

technical field [0001] The invention relates to the fields of data communication and information security, in particular to an encryption and decryption method and device with user / device identity authentication. Background technique [0002] As the core means and technology of information security, cryptography plays an important role and status in information security. At present, block cipher algorithm is widely used in information security to realize safe storage and backup of data. Users of block cipher algorithm, group The cryptographic algorithm itself is not bound to the encryption result. The same plaintext, the same key and IV, using the general CBC encryption method, the results are consistent for different users / devices. At the same time, the general block cipher algorithm does not have user identity authentication. The block cipher algorithm cannot be bound to the user, and the user of the block cipher algorithm cannot be authenticated. Contents of the invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/28H04L29/06H04L29/08
Inventor 张文科
Owner 中电科网络安全科技股份有限公司