Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing

A symmetric encryption algorithm and asymmetric technology, applied in the field of cloud computing, can solve problems such as inapplicable encryption and decryption of large data volume, large amount of calculation of asymmetric encryption algorithm, difficult key management, etc., to achieve easy promotion and strong practicability , a wide range of effects

Inactive Publication Date: 2014-12-10
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the encryption and decryption of the symmetric cryptographic algorithm uses the same key, there are difficulties in key management and high cost of use, and it is difficult to use it on a distributed network system; due to the large amount of computation, the asymmetric cryptographic algorithm is not suitable for En

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing
  • Symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0023] The present invention provides a cloud computing-based data symmetric and asymmetric hybrid encryption and decryption method, including data encryption and data decryption process, wherein data encryption describes the cryptographic algorithm used for data encryption, the use of keys, and the process of data encryption; Data decryption describes the cryptographic algorithm used in data decryption, the restoration of the key, and the data decryption process. Based on the above ideas, as attached figure 1 , figure 2 As shown, the following modules are involved in the data encryption process:

[0024] Plaintext: is the unencrypted raw data.

[0025] Symmetric encryption algorithm encryption: use the international AES symmetric encryption algorithm to encrypt plaintext.

[0026] Ciphertext: It is the encrypted data of the plaintext.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symmetric and asymmetric hybrid data encryption/decryption method based on cloud computing. The method includes the steps of performing data encryption, to be specific, encrypting a public key by an AES (advanced encryption standard) symmetric encryption key and an RSA asymmetric encryption algorithm; performing data decryption, to be specific, decrypting a public-key ciphertext of the AES algorithm by the RSA asymmetric algorithm to obtain plaintext of data. Compared with the prior art, the method allows the safety data storage problem in cloud computing to be effectively solved and is applicable to encryption and decryption of big data.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a highly practical cloud computing-based data symmetric and asymmetric mixed encryption and decryption method. Background technique [0002] Data security services in the cloud computing environment need to take into account efficiency while ensuring data security, so cloud computing needs to encrypt and protect user data. In the design of cloud security services, user data can be stored in any storage space in the cloud. According to the requirements of data security, the user data stored in the cloud is safe enough. After these user data are encrypted by the cloud computing server, other Users cannot obtain and decrypt. [0003] In the process of cloud computing application, in order to provide good data encryption and transmission services, it is necessary to provide effective protection in the process of data upload and download. Using the services provided by cloud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/08
Inventor 苏振宇
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products