Data encryption and decryption method and devices

A data encryption and data decryption technology, applied in the field of information security, can solve problems such as cumbersome configuration, garbled codes, inconvenient viewing and entry, etc., and achieve the effect of saving storage space, less storage space, and efficient decryption

Active Publication Date: 2015-11-25
BOYAA ONLINE GAME DEV SHENZHEN
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Encrypting data is an effective technical means to protect information security. There are many data encryption methods in traditional technology, such as MD5 (MessageDigestAlgorithm5, message digest algorithm fifth edition), PHP (HypertextPreprocessor, hypertext preprocessor) Mcrypt (an encryption extension library), etc. However, MD5 is a one-way e...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method and devices
  • Data encryption and decryption method and devices
  • Data encryption and decryption method and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] Unless the context clearly states otherwise, the number of elements and components in the present invention can exist in a single form or in multiple forms, and the present invention is not limited thereto. Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted. It can be understood that the term "and / or" used herein refers to and covers any and all possible combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method. The method comprises steps: according to a mapping relation between characters in a preset character library and numerical values, a to-be-encrypted character is mapped to be a first numerical value in a first preset scale with a byte as a unit; the first numerical value serves as a numerical value in a second preset scale to be converted into a second numerical value in a third preset scale, and encrypted data are acquired, wherein a cardinal number in the second preset scale is between the cardinal number in the first preset scale and the cardinal number in the third preset scale. According to the data encryption method, an inclusion relation among mathematical symbols in different scales is delicately used for scale conversion, the to-be-encrypted character can be encrypted high efficiently, and the storage space is saved. The invention also provides a data decryption method, a data encryption device and a data decryption device.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data encryption and decryption method and device. Background technique [0002] Encrypting data is an effective technical means to protect information security. There are many data encryption methods in traditional technology, such as MD5 (MessageDigestAlgorithm5, message digest algorithm fifth edition), PHP (HypertextPreprocessor, hypertext preprocessor) Mcrypt (an encryption extension library), etc. However, MD5 is a one-way encryption, which cannot be decrypted and restored, and Mcrypt in PHP cannot be directly displayed or display garbled characters after encryption, which is inconvenient to view and enter, and the configuration is cumbersome. Traditional data encryption methods It has been difficult to meet the security requirements of the rapidly developing information technology. Contents of the invention [0003] Based on this, it is necessary to provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
Inventor 李碧鸿
Owner BOYAA ONLINE GAME DEV SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products