Secure encryption method and device, secure decryption method and device
A secure encryption and security technology, applied in the field of data security, can solve problems such as error attack and leakage of information, and achieve the effect of improving security and preventing DFA attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] figure 1It is a flow chart of the secure encryption method in Embodiment 1 of the present invention. Such as figure 1 As shown, the secure encryption method includes steps S101 to S103.
[0043] In step S101, a first plaintext P and a first ciphertext C are respectively obtained, and the first ciphertext C is a result of encrypting the first plaintext P according to a preset encryption operation.
[0044] In an embodiment of the present invention, the preset encryption operation may be an encryption operation in a symmetric encryption algorithm, such as a DES encryption operation.
[0045] Step S102, obtaining a second plaintext P', which is a result of decrypting the first ciphertext C according to a decryption operation corresponding to the preset encryption operation.
[0046] In an embodiment of the present invention, the decryption operation is an inverse operation process of the preset encryption operation, for example, when the encryption operation is a DES en...
Embodiment 2
[0053] figure 2 It is a flow chart of the secure encryption method in Embodiment 2 of the present invention. Such as figure 2 As shown, the secure encryption method includes steps S201 to S203.
[0054] In step S201, a first plaintext P and a first ciphertext C are respectively obtained, and the first ciphertext C is a result of encrypting the first plaintext P according to a preset encryption operation.
[0055] In an embodiment of the present invention, the preset encryption operation may be an encryption operation in a symmetric encryption algorithm, such as a DES encryption operation.
[0056] Step S202, obtaining a second ciphertext C', which is a result of re-encrypting the first plaintext P according to the preset encryption operation.
[0057] It should be noted that when the first ciphertext C and the second ciphertext C' obtained after performing the preset encryption operation twice on the same first plaintext P are equal, the preset encryption operation is per...
Embodiment 3
[0063] image 3 It is a flow chart of the secure decryption method in Embodiment 3 of the present invention. Such as image 3 As shown, the secure decryption method includes steps S301 to S303.
[0064] In step S301, a first plaintext P and a first ciphertext C are obtained respectively, and the first plaintext P is a result of decrypting the first ciphertext C according to a preset decryption operation.
[0065] In an embodiment of the present invention, the preset decryption operation may be a decryption operation in a symmetric encryption algorithm, such as a DES decryption operation.
[0066] Step S302, obtaining a second ciphertext C', which is a result of encrypting the first plaintext P according to an encryption operation corresponding to the preset decryption operation.
[0067] In an embodiment of the present invention, the decryption operation is an inverse operation process of the preset encryption operation, for example, when the encryption operation is a DES e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


