A method for generating an encryption key
An encryption key and encryption algorithm technology, applied in the field of information security, can solve problems such as being easily cracked, and achieve the effect of improving security and avoiding the risk of being cracked.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0013] The core idea of the present invention is: the key is generated by combining random generation and CPU clock. In this way, since the data obtained by the two methods are non-repeatable, even if the CPU clock is fixed by the cracker, it can be ensured that the key generated each time is different, thereby avoiding problems caused by key repeatability. Risk of being cracked.
[0014] figure 1 It is a schematic flow chart of Embodiment 1 of the present invention, such as figure 1 As shown, this embodiment mainly includes:
[0015] Step 101 , the encryption device determines the seed code used for key generation this time according to the identification number of the process and thread currently used to generate the key or the key...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

