Data encryption method and decryption method and device

A data encryption and data technology, applied in the field of information security, can solve the problems of poor data confidentiality and security, low encryption efficiency, serious data expansion, etc., and achieve the effect of increasing the difficulty of cracking, increasing confidentiality and security

Active Publication Date: 2017-01-04
ZTE CORP
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. There is a one-to-one correspondence between the length of the ciphertext and the length of the plaintext, and the confidentiality and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and decryption method and device
  • Data encryption method and decryption method and device
  • Data encryption method and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0072] Such as figure 2 As shown, the first embodiment of the present invention provides a method for data encryption, the method comprising:

[0073] Step S21, performing bit operations according to the plaintext data, the key and the first random data to obtain the first ciphertext data;

[0074] In the first embodiment of the present invention, as image 3 As shown, the plaintext data can first perform a bit operation (such as an XOR operation) with the first random data to obtain the third ciphertext, and then let the third ciphertext and the key perform a bit operation (such as an XOR operation) to obtain the first encryption text data. Of course, the plaintext data can also perform bit operations (such as XOR operation) with the key to obtain the third ciphertext, and then let the third ciphertext and the first random data perform bit operations (such as XOR operation) to obtain the first ciphertext data. Wherein the specific obtaining of the first ciphertext data c...

no. 2 example

[0084] Such as Image 6 As shown, the second embodiment of the present invention provides a method for data encryption, the method comprising:

[0085] Step S61, according to the first length value of the plaintext data, determine the second length value of the final ciphertext data, wherein the second length value is the minimum integer multiple of a natural number greater than the preset value, and the second length value is greater than the first length value;

[0086] In the second embodiment of the present invention, the above-mentioned preset value can be 2. Of course, it can be understood that in the second embodiment of the present invention, the specific value of the preset value is not limited, and can be adjusted according to actual needs .

[0087] Step S62, obtaining a third length value of the first random data according to the difference between the second length value and the first length value;

[0088] Step S63, generating first random data according to a ...

no. 3 example

[0115] Such as Figure 7 As shown, the third embodiment of the present invention provides a data encryption device, which includes:

[0116] The first operation module 71 is used to perform bit operations according to the plaintext data, the key and the first random data to obtain the first ciphertext data;

[0117] The second operation module 72 is used to perform bit operation according to the key and the first random data to obtain the second random data;

[0118] Insertion module 73, for inserting the second random data into the first ciphertext data to obtain the second ciphertext data;

[0119] The first operation module 74 is configured to perform a bit inversion operation on the second ciphertext data to obtain final ciphertext data.

[0120] Among them, the device also includes:

[0121] The first determination module is configured to determine the second length value of the final ciphertext data according to the first length value of the plaintext data, wherein th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data encryption method and decryption method and device. The data encryption method comprises the steps that bit operation is performed according to plaintext data, a secret key and first random data so that first ciphertext data are obtained; bit operation is performed according to the secret key and the first random data so that second random data are obtained; the second random data are inserted in the first ciphertext data so that second ciphertext data are obtained; and bit inversion operation is performed on the second ciphertext data so that final ciphertext data are obtained. The algorithm is simple and the encryption efficiency is high so that the decoding difficulty can be greatly increased and thus the confidentiality and the security of information can be increased.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a data encryption method, a decryption method and a device. Background technique [0002] Exposure during data transmission, storage, and exchange may lead to the accidental disclosure of important and private information carried in the data. Therefore, it is necessary to encrypt data to ensure that information and data can be safely stored, transmitted, or exchanged. [0003] Data encryption is a technology with a long history. It refers to converting plaintext into ciphertext through encryption algorithm and encryption key, and decryption is to restore ciphertext to plaintext through decryption algorithm and decryption key. Data encryption is still the most reliable way for computer systems to protect information. It uses cryptographic technology to encrypt information and realize information concealment, thereby protecting the security of information. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/06
Inventor 潘志国
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products