Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure encryption method and device, secure decryption method and device

A secure encryption and security technology, applied in the field of data security, can solve problems such as error attack and leakage of information, and achieve the effect of improving security and preventing DFA attacks

Active Publication Date: 2018-06-08
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method of verification by comparison has the risk of being vulnerable to error attacks to leak information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure encryption method and device, secure decryption method and device
  • Secure encryption method and device, secure decryption method and device
  • Secure encryption method and device, secure decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1It is a flow chart of the secure encryption method in Embodiment 1 of the present invention. Such as figure 1 As shown, the secure encryption method includes steps S101 to S103.

[0043] In step S101, a first plaintext P and a first ciphertext C are respectively obtained, and the first ciphertext C is a result of encrypting the first plaintext P according to a preset encryption operation.

[0044] In an embodiment of the present invention, the preset encryption operation may be an encryption operation in a symmetric encryption algorithm, such as a DES encryption operation.

[0045] Step S102, obtaining a second plaintext P', which is a result of decrypting the first ciphertext C according to a decryption operation corresponding to the preset encryption operation.

[0046] In an embodiment of the present invention, the decryption operation is an inverse operation process of the preset encryption operation, for example, when the encryption operation is a DES en...

Embodiment 2

[0053] figure 2 It is a flow chart of the secure encryption method in Embodiment 2 of the present invention. Such as figure 2 As shown, the secure encryption method includes steps S201 to S203.

[0054] In step S201, a first plaintext P and a first ciphertext C are respectively obtained, and the first ciphertext C is a result of encrypting the first plaintext P according to a preset encryption operation.

[0055] In an embodiment of the present invention, the preset encryption operation may be an encryption operation in a symmetric encryption algorithm, such as a DES encryption operation.

[0056] Step S202, obtaining a second ciphertext C', which is a result of re-encrypting the first plaintext P according to the preset encryption operation.

[0057] It should be noted that when the first ciphertext C and the second ciphertext C' obtained after performing the preset encryption operation twice on the same first plaintext P are equal, the preset encryption operation is per...

Embodiment 3

[0063] image 3 It is a flow chart of the secure decryption method in Embodiment 3 of the present invention. Such as image 3 As shown, the secure decryption method includes steps S301 to S303.

[0064] In step S301, a first plaintext P and a first ciphertext C are obtained respectively, and the first plaintext P is a result of decrypting the first ciphertext C according to a preset decryption operation.

[0065] In an embodiment of the present invention, the preset decryption operation may be a decryption operation in a symmetric encryption algorithm, such as a DES decryption operation.

[0066] Step S302, obtaining a second ciphertext C', which is a result of encrypting the first plaintext P according to an encryption operation corresponding to the preset decryption operation.

[0067] In an embodiment of the present invention, the decryption operation is an inverse operation process of the preset encryption operation, for example, when the encryption operation is a DES e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security encryption method, a security encryption device, a security decryption method and a security decryption device. The encryption method includes the steps of: respectively obtaining a first plaintext P and a first ciphertext C, wherein the first ciphertext C is a result obtained by encrypting the first plaintext P according to preset encryption operation; obtaining a second plaintext P' which is a result after decrypting the first ciphertext C according to decryption operation corresponding to the preset encryption operation; inputting the first plaintext P, the first ciphertext C and the second plaintext P' into a first preset function F, and outputting the operation result of the first preset function F, wherein when the first plaintext P is equal to the second plaintext P', the operation result of the first preset function F is equal to the first ciphertext C. According to the methods and the devices, data security can be improved.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a secure encryption method and device, and a secure decryption method and device. Background technique [0002] In the prior art, it is generally verified whether the result of the encryption operation or the decryption operation is correct by comparing the results of the two encryption operations or the decryption operation. When the results of the two encryption operations or the decryption operation are equal, it can be judged that If the result of the encryption operation or decryption operation is correct, the operation result can be output, otherwise an error message will be returned and the operation result will not be output. However, the above method of verification by comparison has the risk of being vulnerable to error attacks and leaking information. [0003] Therefore, it is necessary to propose a new secure encryption method and device, and a secure d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 李清张志敏郑业扬张纲郭丽敏柳逊
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP