Data encryption method

A data encryption and data technology, applied in the direction of public keys for secure communication, can solve problems such as key management difficulties, and achieve the effects of high encryption strength, block operation speed, and low system overhead.

Active Publication Date: 2014-09-03
GUANGZHOU SIE CONSULTING CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 3. It is difficult to manage the key when using private key encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method
  • Data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] The present invention absorbs the advantages of private key and public key encryption algorithm, does not adopt the conventional construction idea based on iteration, avoids the construction method based on the complexity of mathematical problems, and combines the identity authentication, private key and public key of both communication parties. Before the communication, the server and the client first perform identity authentication, and the key is used to e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method which comprises the following steps of generating an encryption key, and generating a group of sub-keys by the encryption key according to a predetermined rule; B. packing input plain text data randomly to generate a plurality of plain text data blocks; C. selecting a corresponding sub-key and carrying out encryption operation on the sub-key according to size of each plain text data block and the predetermined rule to obtain a plurality of encrypted data blocks; and D. forming output encrypted data by the plurality of the encrypted data blocks. The data encryption method disclosed by the invention has the advantages of being high in encryption strength, quick in operation speed, low in operation system expense, capable of being expanded and optimized, and the like, and is suitable for storage and transmission encryption of mobile equipment.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a packet data encryption method. [0002] Background technique [0003] Data encryption, also known as cryptography, refers to converting plaintext into ciphertext through encryption algorithms and encryption keys, and decryption refers to restoring ciphertext to plaintext through decryption algorithms and decryption keys. Data encryption is still the most reliable way for computer systems to protect information. It uses cryptographic technology to encrypt information and realize information concealment, thereby protecting the security of information. [0004] There are two main types of encryption: [0005] 1. Private key encryption technology [0006] Private key encryption algorithms use a single private key to encrypt and decrypt data. Since any party with the key can use the key to decrypt data, the key must be protected from unauthorized agents. Private key encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 刘伟超张成康林立岳彭炜凌黄良迅
Owner GUANGZHOU SIE CONSULTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products