DES encryption algorithm based encryption method

An encryption method and encryption algorithm technology, applied to encryption devices with shift registers/memory, key distribution, can solve the problems of high probability of ciphertext being cracked, low efficiency, and special symbols of ciphertext are not suitable for network transmission, etc. Achieve the effects of increased difficulty in cracking, high efficiency, and convenient updates and upgrades

Inactive Publication Date: 2017-01-11
BEIJING SAFESOFT GREATMAKER CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the current encryption method has many deficiencies. In order to prevent tampering by others when the data is transmitted on the Internet, the sender can use a single encryption algorithm to extract the signature of the data, and send the signature of the data and the data itself to the receiver. After receiving, you only need to use the same method of the sender to extract the signature of the received data and compare it with the signature sent by the sender. If they are consistent, it means that the data is complete.
But there is a potential loophole here. If a hacker intercepts this complete data, tampers with the content of the data, recalculates and generates the signature, replaces the original signature and sends it, the receiver will not be able to verify the authenticity; In order to make up for the loophole of one-way encryption, we need to encrypt the entire piece of data
From the principle of asymmetric encryption, we can know that the public key and private key are mathematically related, and the complexity of the algorithm is much higher than that of symmetric encryption, so the efficiency under the same hardware environment will be much lower
For symmetric encryption, the encryption and decryption keys are the same. If the same key is used throughout the communication process, the probability of the ciphertext in the communication being cracked will be very high. There is no security at all; the ciphertext generated by pure symmetric encryption and asymmetric encryption may contain special symbols that are not suitable for network transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DES encryption algorithm based encryption method
  • DES encryption algorithm based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Step A, set up the key set file, the key set file is a cuboid three-dimensional model composed of three mutually perpendicular directions X, Y, Z, X, Y are key distribution coordinates, Z is a group of keys, and the key The total number of keys is equal to the product of X and Y; if X=2, Y=4, the total number of keys is 8;

[0045] Step B. The server side randomizes a coordinate within the effective value range of 2 and 4 in step A, determines a set of keys 3 and 6, and uses the key to perform DES encryption on the original data to be sent;

[0046] Step C, converting the values ​​of 2 and 4 selected in step B into 4-digit hexadecimal numbers, and combining with the DES encryption result in step B;

[0047] Step D, encrypting the combination result of step C with BASE64 and sending it to the client;

[0048] Step E, after the client receives the BASE64 encrypted data sent in step D, it decrypts the BASE64 data, and then obtains the key from the key set according to the...

Embodiment 2

[0058] Step A, set up the key set file, the key set file is a cuboid three-dimensional model composed of three mutually perpendicular directions X, Y, Z, X, Y are key distribution coordinates, Z is a group of keys, and the key The total number of keys is equal to the product of X and Y; if X=1, Y=4, the total number of keys is 4;

[0059] Step B. The server side randomizes a coordinate within the effective value range of 1 and 4 in step A, determines a set of keys 2 and 3, and uses the key to perform DES encryption on the original data to be sent;

[0060] Step C, converting the 4 values ​​selected in step B into 4 hexadecimal numbers, and combining with the DES encryption result in step B;

[0061] Step D, encrypting the combination result of step C with BASE64 and sending it to the client;

[0062] Step E, after the client receives the BASE64 encrypted data sent in step D, it decrypts the BASE64 data, and then obtains the key from the key set according to the XY coordinate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a DES encryption algorithm based encryption method. The encryption method adopts a symmetric encryption method in which a server and a client share a key set file and a dynamic key is used in the communication process. The encryption method comprises the steps that a key set file is built, wherein the key set file is a cuboid-shaped three-dimensional model formed by three mutually perpendicular directions X, Y, Z; the server randomly selects a coordinate in an effective value range of X and an effective value range of Y respectively so as to determine a set of keys, and performs DES encryption; the selected X-value and the selected Y-value are converted into 4-bit hexadecimal numbers, and the 4-bit hexadecimal numbers are combined with a DES encryption result in the step B; BASE64 encryption is performed on a combination result, and the encrypted combination result is sent to the client; and the client receives the sent BASE64 encrypted data, performs BASE64 data decryption, and then acquires a key from the key set according to the XY coordinate values so as to parse the encrypted data. The encryption method disclosed by the invention performs encryption on a data segment so as to increase the transmission security of the data in the network, the breaking difficulty is greatly increased, and the encryption efficiency is high.

Description

technical field [0001] The invention relates to an encryption method of an encryption algorithm, in particular to an encryption method based on a DES encryption algorithm, and belongs to the technical field of application of file encryption methods. Background technique [0002] In today's information age, while we enjoy the convenience and speed brought by the Internet, we are also facing huge threats, especially in today's e-commerce, the problem of data security is even more serious. Computers guarantee data transmission The method used for data security in the process is to use encryption technology. [0003] Currently the main encryption methods are as follows: [0004] 1) One-way encryption method; one-way encryption is also called non-reversible encryption. To be precise, it is not an encryption technology, but an information summary technology. He uses a secure one-way hash function to act on a piece of data to extract the signature of the piece of data to verify t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0625H04L63/0435
Inventor 张辉
Owner BEIJING SAFESOFT GREATMAKER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products