Data encryption method based on password book

A technology of data encryption and codebook, applied in the field of computer data security, can solve problems such as insufficient security, and achieve the effect of improving efficiency and reducing algorithm complexity

Active Publication Date: 2015-04-15
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, any one of these two methods is not safe enough to use alone. Generally, these two methods are used in combination, and the DES data encryption standard adopts this combination

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method based on password book
  • Data encryption method based on password book

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0027] The idea of ​​the present invention is to use user-defined cipherbooks to encrypt data, make full use of the sequence formed by the stored data itself, and do not need to "disrupt" the original data by extracting part of the bit data or inserting data between specific bits Instead of storing the sequence, the original data sequence is "segmented by a fixed length". This "fixed length" generally exceeds 8 bits, which makes the ciphertext display simpler and more concise, and greatly increases the difficulty for users to illegally decrypt.

[0028] The data encryption method based on codebook of the present invention comprises the encryption and decryption of data, and the encryption of data is specifically as follows:

[0029] Step 1, choose 2 N different characters, and combine the 2 N characters and 0~(2 N The decimal numbers of -1) correspon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method based on a password book and belongs to the technical field of computer data safety. The data encryption method includes that the password book self-defined by a user is utilized for date encryption, a sequence formed by stored data is utilized fully, and extraction of part of bit data or inserting of data among specific bits is not needed to disturb an original data storage sequence; the original data storage sequence is subjected to fixed-length cutting, and fixed length is generally not larger than 8 bit, so that more simplicity and conciseness in ciphertext display are realized, and difficulty in illegal decryption by the user is greatly increased. Compared with the prior art, the data encryption method has the advantages that length of ciphertext is compressed effectively, data encryption speed is increased, and difficulty in illegal decryption of data is increased greatly due to creating of the password book.

Description

technical field [0001] The invention relates to a data encryption method, in particular to a codebook-based data encryption method, and belongs to the technical field of computer data security. Background technique [0002] With the emergence and rapid development of Internet technology, the way of life of human beings has been greatly changed, but at the same time, a large amount of corporate data and user privacy information have also been leaked. Even the data stored on your own computer or server is no longer safe. Therefore, the encryption process of data is particularly important. What encryption method to use to effectively encrypt data has become a key issue in computer network technology. An important part of secure data storage. [0003] Data encryption is currently the most reliable method for computer networks to protect information, and the most important thing is the encryption algorithm and encryption key used to implement data encryption. Data encryption is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 徐小龙龚培培王修来陈洪涛宋健康王磊朱洁邢凯
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products