MD5-based two-way encryption data protection method

A data protection and two-way encryption technology, applied in encryption devices with shift registers/memory, digital transmission systems, user identity/authority verification, etc., can solve problems such as high performance consumption

Inactive Publication Date: 2016-07-27
王云鹏
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, MD5 is a single-item encryption method. In practical applications, the encrypted data needs to be decrypted in many places. In such cases, the MD5 encryption method cannot meet the requirements. RSA encryption and decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MD5-based two-way encryption data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0013] A two-way encrypted data protection method based on MD5, please refer to the attached figure 1 , including: key processing process, encryption process, decryption process, wherein,

[0014] The key processing process includes: performing md5 and base64 transcoding processing on the key to obtain the encryption and decryption special key; intercepting the above encryption and decryption special key to generate a fixed-digit check string for subsequent encryption and decryption processes The verification operation in is used; use the pseudo-random algorithm to process the above encryption and decryption private key, scramble its order again, and convert the string into ASCII code, that is, the key box, to be used in the subsequent encryption and decryption process;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This case is a two-way encrypted data protection method based on MD5, including: key processing process, encryption process, and decryption process. Among them, the key processing process: transcoding the key with md5 and base64; intercepting it; The pseudo-random algorithm processes and converts the string into a key box; the encryption process: convert the plaintext string into ASCII code, cycle ASCII code, and arrange pseudo-randomly through the algorithm; intercept the generated checksum during the additional key processing Check the ASCII code value of the string; loop the bitwise XOR to convert it into a string; transcode the generated string through base64 to obtain the ciphertext string; decryption process: base64 decode the ciphertext string, ASCII code processing; cyclic bitwise XOR operation; match the verification part with the verification sequence, if inconsistent, the verification will fail; the above ciphertext ASCII code string and the key box are obtained by performing cyclic bitwise XOR operation The ASCII code string is converted into a string and reversely executed as a randomization process, and finally a plaintext string is obtained.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to an MD5-based two-way encrypted data protection method. Background technique [0002] MD5 data single-entry encryption technology: the full name of this technology is Message-DigestAlgorithm5 (information-digest algorithm), which allows large-capacity information to be "compressed" into a confidential format before signing the private key with digital signature software. From a technical point of view , is to convert a string of any length into a fixed-length hexadecimal super large integer. MD5 is one-way encryption, that is to say, it is impossible for the string generated after encryption to be decrypted in turn. [0003] In actual work, the role of MD5 is mainly to verify encrypted signatures: for example, user login verification, which is to match the verification string encrypted by MD5 with the existing encrypted string stored in the system according to the login password. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/3239H04L9/0643
Inventor 王云鹏
Owner 王云鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products