Data encryption method, device, data decryption method and device

A data encryption and data decryption technology, applied in the direction of user identity/authority verification, etc., can solve the problems of reducing data security, increasing the cost of data encryption processing, increasing the risk of key decryption, etc., to achieve the effect of improving security.

Inactive Publication Date: 2016-07-13
PEKING UNIV FOUNDER GRP CO LTD +1
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, regardless of symmetric encryption or asymmetric encryption, the encryptor and decryptor must use the same or corresponding keys. If the same pair of keys is used for encryption operatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, device, data decryption method and device
  • Data encryption method, device, data decryption method and device
  • Data encryption method, device, data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] Example 1

[0031] This embodiment provides a data encryption method, such as figure 1 The method shown includes:

[0032] S11, obtain a random number. The random number is used as an identifier to distinguish different encrypted data. The random number may be pre-allocated, for example, may be calculated based on data such as hardware ID, network IP, and encryption operation time. In a practical application environment, the random numbers obtained by multiple encryptors are different, and the random numbers obtained by the same encryptor in different time periods may also be different. For example, in an Internet application, a server in the network can act as a decryptor, and a user terminal can act as an encryptor, and the random number can be generated by the server and then distributed to the corresponding user terminal. Preferably, the random number can be a universally unique identifier (Universally Unique Identifier, UUID), and the UUID is composed of the fol...

Example Embodiment

[0050] Embodiment 2

[0051] This embodiment provides another data encryption method, such as image 3 As shown, the method includes:

[0052] S31. Obtain a random number, a token corresponding to the random number, and a timestamp. A token is a sign information (a code composed of one or more binary digits). In Internet applications, only the node that obtains the token has the right to send information packets. The token can be generated by the decryption party and sent to the corresponding Encryption party, so that the encryption party has the authority to send encrypted data.

[0053] A timestamp is usually a sequence of characters used to uniquely identify the time at a certain moment, such as the time when encrypted data is generated, or the time when data is sent.

[0054] S32: Obtain a key required for encryption according to the random number.

[0055] S33, encrypt the content to be encrypted by using the key.

[0056] S34, using the encrypted content to generate...

Example Embodiment

[0069] Embodiment 3

[0070] This embodiment provides a data encryption device, such as Figure 5 The device shown includes:

[0071] an obtaining unit 51 for obtaining random numbers;

[0072] An encryption key generation unit 52, configured to obtain a key required for encryption according to the random number;

[0073] an encryption unit 53, configured to encrypt the content to be encrypted by using the key;

[0074] The first digest generating unit 54 is configured to generate a first digest using the encrypted content.

[0075] This embodiment also provides a data decryption device corresponding to the above device, such as Image 6 The device shown includes:

[0076] Data packet acquisition unit 61, for acquiring the data packet obtained according to the above-mentioned data encryption device;

[0077] A second digest generating unit 62, configured to generate a second digest using the encrypted content;

[0078] An abstract comparison unit 63, configured to compa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method, a data encryption device, a data decryption method and a data decryption device. The data encryption method includes the following steps that: a random number is obtained; a key required by encryption is obtained according to the random number; the key is utilized to encrypt content to be encrypted; and a first abstract is generated by using the encrypted content. With the data encryption method provided by the embodiments of the invention adopted, the corresponding key obtained according to the obtained random number can be selected to encrypt the data content, and an encryption mode can be more flexible with low cost; and information such as the abstract can be added into the data, and therefore, the integrity of the encrypted content can be verified, and therefore, the safety of the encrypted data can be improved.

Description

technical field [0001] The invention relates to data encryption technology, in particular to a data encryption method, a data decryption method and a device. Background technique [0002] At present, data encryption technology is usually used in the information field, and encryption technology is generally divided into two categories, namely, symmetric and asymmetric. [0003] Symmetric encryption uses the same key for encryption and decryption, and this encryption technology is widely used today. In the asymmetric encryption method, the encryption and decryption do not use the same key. Usually there are two keys, called the public key and the private key. They must be used in pairs, otherwise the encrypted file cannot be opened. The public key in it It can be disclosed, and the recipient only needs to use his own private key when decrypting. This method can ensure the security of key transmission to a certain extent. [0004] However, regardless of symmetric encryption o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 沈刚胡玉楠
Owner PEKING UNIV FOUNDER GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products