Grouped multiple-key encryption method and grouped multiple-key encryption device
An encryption method and technology of an encryption device, applied in the field of data encryption and decryption, can solve problems such as affecting data security, encrypted data being decrypted, etc., and achieve the effects of reducing losses, facilitating recovery, and solving security risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0019] Example 1
[0020] Such as figure 1 Shown is a flow chart of the implementation of the group multi-key encryption method according to the present invention. The group multi-key algorithm includes the steps:
[0021] S1. Set encryption and decryption data parameters: encryption and decryption data block size L: represents the length of data encrypted and decrypted by a key; number of packets N: represents the number of packets processed in parallel for one encryption and decryption; number of hash algorithm cycles M: represents calculation The hash algorithm used in the key is calculated rounds;
[0022] S2. Read the password Pwd entered by the user and generate a temporary value T according to the password and temporary value calculation formula, and then divide the temporary value T into M groups evenly to generate M groups of temporary data from T1 to TM, and store the M groups of temporary data separately , The calculation formula of the temporary value is: T=(the sum of ...
Example Embodiment
[0036] Example 2
[0037] This embodiment provides a block multi-key encryption device, which includes:
[0038] Encryption and decryption parameter setting module: used to set the encryption and decryption data block size L, the number of packets N, the number of hash algorithm cycles M, where the encryption and decryption data block size L: represents the length of the data encrypted and decrypted by a key; the number of packets N : Indicates the number of packets processed in parallel for one encryption and decryption; the number of hash algorithm cycles M: indicates the cycle calculation rounds of the hash algorithm used when calculating the key; temporary data T1~TM generation module: used to read the password entered by the user Pwd, generate a temporary value T, the temporary value T = (the sum of the byte value of each password * the length of the password) 10, divide the temporary value T into M groups (the same as the number of algorithm cycles), and generate a total of M...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap