Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal

An encryption method and a decryption algorithm technology, which are applied in the field of decryption devices, can solve problems such as difficulty in ensuring key security, complex encryption operations, and reduced performance and efficiency of encrypted large data.

Inactive Publication Date: 2016-05-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Symmetric encryption technology has the advantages of high encryption efficiency and less system resource occupation, but because this technology needs to transmit keys synchronously, it is difficult to guarantee key security
Although asymmetric encryption technology solves the problem that symmetric encryption technology needs to transmit keys synchronously, the encryption operation of this technology is complicated, and the performance and efficiency of encrypting large data are greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal
  • Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal
  • Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0042] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0043] figure 1 A schematic flowchart of an encryption method according to an embodiment of the present invention is shown.

[0044] Such as figure 1 As shown, the encryption method according to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method, an encryption apparatus, a decryption method, a decryption apparatus and a terminal. The encryption method comprises: using a first secret key cipher text as a secret key of a first symmetric encryption algorithm so as to encrypt a clear text by the first symmetric encryption algorithm to obtain a cipher text; acquiring an informative abstract of the clear text, using the informative abstract as an original text of a signature algorithm, and using a second secret key cipher text as a secret key of the signature algorithm so as to generate a digital signature by the signature algorithm; packaging the first secret key cipher text, the second secret key cipher text and the digital signature to form an original text of an asymmetric cryptographic algorithm, and using an acquired public key as a secret key of the asymmetric cryptographic algorithm so as to generate a secret key set by the asymmetric cryptographic algorithm; and sending the cipher text and the secret key set to the terminal. According to the technical scheme of the invention, the encryption method, the encryption apparatus, the decryption method, the decryption apparatus and the terminal can be simultaneously guaranteed to have the characteristics of high encryption efficiency, small system resource occupation and encrypted data safety when data is encrypted.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular, to an encryption method, an encryption device, a decryption method, a decryption device and a terminal. Background technique [0002] The current file transfer generally adopts transparent transmission method, symmetric encryption method, asymmetric encryption method and general hybrid encryption method. Symmetric encryption technology has the advantages of high encryption efficiency and less system resource occupation, but because this technology needs to transmit keys synchronously, it is difficult to guarantee key security. Although asymmetric encryption technology solves the problem that symmetric encryption technology needs to transmit keys synchronously, the encryption operation of this technology is complicated, and the performance and efficiency of encrypting large data are greatly reduced. [0003] Therefore, how to simultaneously ensure high encryption efficien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/0478H04L67/06
Inventor 汤镇辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products