Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption Algorithm Realization Method and System

A technology of encryption algorithm and implementation method, which is applied in the direction of transmission system, electrical components, etc., and can solve the problems that encryption technology is easy to be cracked

Active Publication Date: 2019-04-19
RUN TECH CO LTD BEIJING
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides an encryption algorithm implementation method and system to overcome the defects that various existing encryption technologies are more and more easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption Algorithm Realization Method and System
  • Encryption Algorithm Realization Method and System
  • Encryption Algorithm Realization Method and System

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0046] figure 1 It is a schematic flowchart of an encryption algorithm implementation method provided in the first embodiment of the present invention. This method is suitable for scenarios where information needs to be transmitted securely, and can be executed by an encryption algorithm implementation system, wherein the system can be implemented by software and / or hardware , and generally can be integrated in the terminal. Such as figure 1 As shown, the method includes:

[0047] Step 110, the first terminal generates a first key pair according to a first set rule, wherein the first key pair is composed of a first public key and a first private key;

[0048] In this embodiment, the first terminal specifically refers to a device capable of sending and receiving data, and running related software such as key generation, encryption, and decryption (for example, a key generator, etc.). Typical examples can be: computers, smartphones and other terminals.

[0049] In this embod...

no. 2 example

[0076] figure 2 It is a schematic flowchart of an encryption algorithm implementation method provided by the second embodiment of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments. In this embodiment, the first setting rule is optimized as: a rule generated according to a first algorithm defined by a user or a rule generated according to a second algorithm randomly selected by a program. rule.

[0077] Correspondingly, the method in this embodiment specifically includes:

[0078] Step 210, the first terminal generates a first key pair according to the rules generated by the first algorithm defined by the user or according to the rules generated by the second algorithm randomly selected by the program, wherein the first key pair is composed of the first public key and The composition of the first private key;

[0079] In this embodiment, the first algorithm defined by the user specifically refers to at least two encryption a...

no. 3 example

[0095] image 3 It is a schematic flowchart of an encryption algorithm implementation method provided by the third embodiment of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, the second setting rule is optimized as: a rule generated according to a third algorithm defined by the user or a rule generated according to a fourth algorithm randomly selected by a program. rule.

[0096] Correspondingly, the method in this embodiment specifically includes:

[0097] Step 310, the first terminal generates a first key pair according to a first set rule, wherein the first key pair consists of a first public key and a first private key;

[0098] Step 320, the first terminal sends the first public key to the second terminal;

[0099] Step 330, the second terminal generates a second key pair according to the first public key, wherein the second key pair consists of a second public key and a second private key;

[0100] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an encryption algorithm realizing method and system. The method comprises the steps that a first terminal generates a first secret key pair according to a first setting rule; a first public key is sent to a second terminal; the second terminal generates a second secret key pair according to the first public key; a second public key is sent to the first terminal; the first terminal encrypts first data by using a first private key according to a second setting rule so as to generate a first ciphertext, generates a first ciphertext decryption rule according to the second setting rule, generates a data check packet according to the first ciphertxt, generates a data check packet ciphertext according to the first private key and the data check packet, and sends the first ciphertext and the data check packet to the second terminal; the second terminal decryptes the data check packet ciphertext by using the first public key so as to obtain the data check packet, and checks whether the first ciphertext is valid; if the first ciphertext is valid, a decryption rule is obtained, a local secret key is generated according to the second private key and the first public key, and the first ciphertext is decrypted by using the local secret key and the decryption rule. According to the encryption algorithm realizing method, information transmission reliability and security are improved.

Description

technical field [0001] The embodiment of the present invention relates to computer data processing technology, and in particular to a method and system for implementing an encryption algorithm. Background technique [0002] With the rapid development of computer network technology and the wide application of mobile banking APP (Application, application program), the safe transmission of information is particularly important. In order to ensure the reliability and authority of information in the process of processing, storage and transmission, Data encryption technology is widely used. [0003] At present, encryption techniques are generally divided into two categories, "symmetric" and "asymmetric". Symmetric encryption technology uses the same key for encryption and decryption. This encryption technology is widely used today. For example, the DES encryption standard is a typical "symmetric" encryption algorithm. Asymmetric encryption technology uses two different keys for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0478H04L63/06
Inventor 朱希禄
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products