Hybrid encryption method and device for realizing the same

A hybrid encryption and secret square technology, applied in the field of information security, can solve problems such as slow data processing speed, complex algorithm operation, and inability to distribute keys, and achieve the effects of easy modularization, high processing efficiency, and improved security

Active Publication Date: 2015-11-25
SOUTHEAST UNIV
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its security depends on the strength of the encryption algorithm and the protection of the key. The symmetric encryption algorithm has key management problems and key distribution cannot be performed.
Asymmetric encryption algorithm, which has strong security and can distribute and manage keys. However, the algorithm is complex and the data processing speed is slow. It is suitable for encrypting small blocks of data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid encryption method and device for realizing the same
  • Hybrid encryption method and device for realizing the same
  • Hybrid encryption method and device for realizing the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0035] figure 1 The encryption flow of the hybrid encryption method of the present invention is shown. Such as figure 1 As shown, the encrypting party receives the plaintext M to be encrypted, the public key Pb of the decrypting party, and the elliptic curve system parameters used for SM2 encryption. Subsequently, an AES key Key is randomly generated. Then, use the AES key Key to encrypt the plaintext M with the AES algorithm, use the public key Pb of the decryption party to encrypt the AES key Key with the SM2 algorithm, and use the SHA-256 algorithm to calculate the hash of the AES key and the plaintext (M / / Key) value. Finally, the encryption party sends the ciphertext group: the ciphertext C1 obtained by AES encryption, the key block Ckey obtained by SM2 encryption, and the digest C2 calculated by the SHA-256 algorithm.

[0036] figure 2 The d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hybrid encryption method, which belongs to the information security technology field. The hybrid encryption method utilizes an AES symmetric encryption algorithm to encrypt the message data and utilizes SM2 encryption algorithm to encrypt the session key. The invention also discloses a device for realizing the above hybrid encryption method by using hardware. The method combines the advantages of the AES algorithm and the SM2 algorithm, wherein the AES algorithm has advantages of fast arithmetic speed, low requirement for memory, reliable algorithm and can effectively resist the attack of differential cryptanalysis and linear cryptanalysis, and the SM2 algorithm can provide public key ciphers with most significant bit and obtain a ciphertext with a high security level by using a short secret key, according to the above advantages, the method can effectively resolve the contradiction between the big data encryption efficiency and the algorithm security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hybrid encryption method and a device for realizing the method. Background technique [0002] Data encryption technology is the most commonly used and most important technology to ensure network information security. Key-based encryption algorithms in encryption technology can be divided into two categories: symmetric encryption technology and asymmetric encryption technology. The symmetric encryption algorithm uses exactly the same key to encrypt and decrypt data, which is highly efficient, and its advantages are more obvious for large-block data processing. However, its security depends on the strength of the encryption algorithm and the protection of the key. The symmetric encryption algorithm has key management problems and key distribution cannot be performed. Asymmetric encryption algorithm, which has strong security, and can distribute and manage keys, but...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/28H04L29/06
Inventor 赵霞王珍妮丁凤刘勇李冰王刚董乾陈帅王凡张余杜清
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products