Grouped multiple-key encryption method and grouped multiple-key encryption device

An encryption method and technology of an encryption device, applied in the field of data encryption and decryption, can solve problems such as affecting data security, encrypted data being decrypted, etc., and achieve the effects of reducing losses, facilitating recovery, and solving security risks.

Active Publication Date: 2014-04-09
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case that the password is not cracked, the encrypted data may

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grouped multiple-key encryption method and grouped multiple-key encryption device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] Example 1

[0020] Such as figure 1 Shown is a flow chart of the implementation of the group multi-key encryption method according to the present invention. The group multi-key algorithm includes the steps:

[0021] S1. Set encryption and decryption data parameters: encryption and decryption data block size L: represents the length of data encrypted and decrypted by a key; number of packets N: represents the number of packets processed in parallel for one encryption and decryption; number of hash algorithm cycles M: represents calculation The hash algorithm used in the key is calculated rounds;

[0022] S2. Read the password Pwd entered by the user and generate a temporary value T according to the password and temporary value calculation formula, and then divide the temporary value T into M groups evenly to generate M groups of temporary data from T1 to TM, and store the M groups of temporary data separately , The calculation formula of the temporary value is: T=(the sum of ...

Example Embodiment

[0036] Example 2

[0037] This embodiment provides a block multi-key encryption device, which includes:

[0038] Encryption and decryption parameter setting module: used to set the encryption and decryption data block size L, the number of packets N, the number of hash algorithm cycles M, where the encryption and decryption data block size L: represents the length of the data encrypted and decrypted by a key; the number of packets N : Indicates the number of packets processed in parallel for one encryption and decryption; the number of hash algorithm cycles M: indicates the cycle calculation rounds of the hash algorithm used when calculating the key; temporary data T1~TM generation module: used to read the password entered by the user Pwd, generate a temporary value T, the temporary value T = (the sum of the byte value of each password * the length of the password) 10, divide the temporary value T into M groups (the same as the number of algorithm cycles), and generate a total of M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a grouped multiple-key encryption method and a grouped multiple-key encryption device. A plurality of groups of different keys are generated, to-be-encrypted data is grouped and encryption and secondary encryption are carried out on the to-be-encrypted data with the use of the plurality of groups of different keys, thus greatly improving the security of the keys and the security of encrypted files. By the adoption of a multiple-key data-grouping encryption mechanism, the problem that all data is insecure once a key is acquired for an existing single-key encryption method is solved. As different keys are used, different encrypted data is generated after data of the same content is encrypted, thus solving the hidden safety problems of an ECB model. As an ECB model is adopted among blocks and encryption blocks are independent of each other, only data of the damaged blocks is affected and other data is not affected at all even if the encrypted data is damaged, which is conducive to data recovery and reduces the loss caused by data damage.

Description

technical field [0001] The invention relates to the field of data encryption and decryption, in particular to a group multi-key encryption method and device for grouping data to be encrypted by using multi-key encryption. Background technique [0002] In order to ensure data security, at present, most data encryption software in the field of computer data encryption uses hash algorithms (such as MD5, SHA-1, etc.) to generate encryption keys based on passwords entered by users, and then uses symmetric encryption algorithms (DES, AES, etc.) encrypt the plaintext data, and when decrypting, use the hash algorithm to generate the decryption key according to the password, and then use the decryption algorithm to decrypt the ciphertext data. [0003] There are two ways to crack encrypted data, one is to crack the encrypted password, and the other is to crack the key used for decryption. In order to reduce the possibility of the password being cracked, existing software reduces the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/06
Inventor 张光斌张永光王海滨汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products