Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Format-reserved encryption algorithm based on multi-segmented Feistel network

A format-preserving encryption and multi-segmentation technology, applied in encryption devices with shift registers/memory, digital transmission systems, electrical components, etc., can solve problems such as data being unable to be stored, corrupting data formats, etc.

Inactive Publication Date: 2016-09-21
东港股份有限公司 +1
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the traditional encryption algorithm will destroy the format of the data, so that the encrypted data cannot be stored in the original database, mobile device or smart card and other storage media, and provide a format-preserving encryption method for sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Format-reserved encryption algorithm based on multi-segmented Feistel network
  • Format-reserved encryption algorithm based on multi-segmented Feistel network
  • Format-reserved encryption algorithm based on multi-segmented Feistel network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The format-preserving encryption algorithm based on the multi-segmented Feistel network of the present invention comprises the following steps:

[0041] 1. Divide a sensitive plaintext information, according to its given format, into t data segment. That is, the plaintext space S According to its own format, it is divided into t part: S 1 , S 2 , … ,S t . so, S It can be expressed as:

[0042]

[0043] Among them, if the collection S i is of size n i , then further S Expressed as:

[0044]

[0045] 2. OK t Number of rounds to split the Feistel network r , and the keys used in each round of the function

[0046] ,

[0047] The number of rounds r for t even multiples of

[0048] 3. use Represents a legitimate sensitive data where: x 1 ∈ S 1 ,x 2 ∈ S 2 ,… ,xt ∈ S t ; that is, respectively x 1 , x 2 , … ,x n as t Split the first round of the Feistel network t input.

[0049] 4. Execute the round operation of r rounds: i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A format-preserving encryption algorithm based on a multi-segmented Feistel network, the method includes the following steps: S According to its own format, it is divided into t part: S 1 ,S 2 ,…,S t . where set S i is of size n i . Set the number of rounds for the Feistel network r and the key used by the round function k , where the number of rounds r for the number of divisions t associated even numbers; for a given plaintext m , format it as: m=x 1 || x 2 || … || x t ,in: x 1 ∈ S 1 ,x 2 ∈ S 2 ,…,x t ∈ S t ;Will x 1 ,x 2 ,…,x n as t Segmentation of the Feistel network t input, or input as ;Execute r rounds of round operations, and the final output ciphertext is c=y 1 || y 2 || … || y t ,in: y 1 ∈ S 1 ,y 2 ∈ S 2 ,…,y t ∈ S t , the advantages of the present invention are: by segmenting the sensitive data and defining the value domains of different segments, using self-defined pseudo-random functions, modulus addition and modulus subtraction operations, and using Feistel network to perform even-numbered rounds of round operations to achieve Encryption that preserves the format can support numerical data encryption schemes that retain any given format. After encryption, the data and database will not be affected, which provides the possibility for the encryption protection of numerical personal identification information in existing database application systems.

Description

technical field [0001] The invention belongs to the field of data encryption, and in particular relates to a numerical encryption method that retains any given format. The method can be applied in environments (databases, networks, smart card virtual machines, etc.) that require encryption of sensitive information. Background technique [0002] The rapid development of the Internet makes sensitive data in storage media (databases, mobile devices, smart cards, etc.) more and more easy to be stolen. The most effective way to secure your sensitive data. Sensitive data often contains its own fixed format, such as ID number, bank card number, etc. However, traditional encryption algorithms, such as AES, 3DES, etc., will destroy the format of the data, so that the encrypted data cannot be stored in the original database or node, and will destroy the functions of the existing business system. How to encrypt this information without destroying its inherent format, so as to ensure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0625
Inventor 隋传波刘哲理
Owner 东港股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products