Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for generating an encryption key

An encryption key and encryption algorithm technology, applied in the field of information security, can solve problems such as being easily cracked, and achieve the effect of improving security and avoiding the risk of being cracked.

Active Publication Date: 2018-02-13
BEIJING SENSESHIELD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that the traditional method of using random numbers to generate encryption keys, because the random numbers used to generate keys can be reused, the encrypted and decrypted data in the memory can be fixed, which brings difficulties to the analysis of the cracking party and the reverse encryption program. Great convenience, so there is a risk of being easily hacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating an encryption key
  • A method for generating an encryption key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0013] The core idea of ​​the present invention is: the key is generated by combining random generation and CPU clock. In this way, since the data obtained by the two methods are non-repeatable, even if the CPU clock is fixed by the cracker, it can be ensured that the key generated each time is different, thereby avoiding problems caused by key repeatability. Risk of being cracked.

[0014] figure 1 It is a schematic flow chart of Embodiment 1 of the present invention, such as figure 1 As shown, this embodiment mainly includes:

[0015] Step 101 , the encryption device determines the seed code used for key generation this time according to the identification number of the process and thread currently used to generate the key or the key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method for generating an encryption key, including: the encryption device determines the seed used for this key generation according to the identification number of the process and thread currently used to generate the key or the key generated last time code; obtain the current CPU clock tick number; generate the current encryption key according to the CPU clock tick number and the seed code. The security of the key can be improved by adopting the present invention.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for generating an encryption key. Background technique [0002] At present, in the field of data encryption, the encryption key is usually first obtained by using a random number generated by a random generator function. However, these encryption keys can often be reused. That is, after the encryption party uses the above random generation function to generate a random number, the random number can continue to be used for data encryption when generating a key next time. Since the random number is generated with the correct random generation function, therefore, The decrypting party will still see the received encrypted data as legitimate. In this way, once the cracking party intercepts the correct random number, it can pretend to be a legitimate user through the input and output of the simulation program to communicate with the party receiving the data, so as to achie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH