Efficient encryption method and system of data

An encryption method and data encryption technology, applied in the field of data security, can solve problems such as being decrypted, and achieve the effects of small calculation amount, high encryption and decryption efficiency, and good encryption effect.

Inactive Publication Date: 2016-07-27
成都科创知识产权研究所
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the current encryption method, no matter what method is used, because the encrypted data is complete, it is possible to be decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient encryption method and system of data
  • Efficient encryption method and system of data
  • Efficient encryption method and system of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to facilitate a further understanding of the present invention, the specific embodiments of the present invention will be described below in conjunction with the accompanying drawings:

[0038] refer to figure 1 As shown, the original data A is decomposed into data A1 and data A2 in a discontinuous manner. Since the data obtained from data A1 and A2 are discontinuous, it cannot be restored to data A through A1 and A2. Even if the data A1 and A2 are obtained, If the decomposition law of the data cannot be obtained, it cannot be restored to achieve the encryption effect. Of course, there can be at least two after decomposing, if it can be decomposed into multiple in order to ensure safety.

[0039] refer to figure 2 In the method shown, data A is decomposed into data A1, A2, and A3 according to the function φ, and data A1, A2, and A3 are encrypted through encryption steps to generate encrypted data A1', A2', and A3'. Of course, data A1, A2, and A3 The encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an efficient encryption method and system of data. The encryption method of the data splits original data into at least two parts of data according to a preset rule, wherein the splitting is that the original data is split according to the preset rule according to a discontinuous way and is spliced again to obtain at least two parts of data. The invention also discloses a corresponding decryption method, an encryption and decryption storage system and the like. Since various combination ways are arranged, decryption difficulty is high after encryption is carried out, an original encryption index is enhanced manifold, and a data encryption effect is guaranteed. In addition, the data only needs to be split, and therefore, a good encryption effect can be performed. In addition, the encryption method is small in operation amount and high in encryption and decryption efficiency.

Description

[0001] This application is based on the divisional application of the invention patent application (application number 201010588811X, invention name: data encryption method and system) submitted by the applicant to the State Intellectual Property Office of China on December 15, 2010. technical field [0002] The invention relates to the field of data security, in particular to a data encryption method and system. Background technique [0003] Nowadays, the safe storage and transmission of data has become very important in many fields, especially for units and departments with high confidentiality requirements such as national defense and military, which have strict requirements. In order to realize the confidentiality of the data, people generally adopt the encryption method to encrypt the data now, and it is even more necessary to decrypt and restore it when using it. However, the current encryption method, no matter which method is used, may be decrypted because the encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 杨斌徐玉
Owner 成都科创知识产权研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products