Unlock instant, AI-driven research and patent intelligence for your innovation.

An Encryption Method for Large Files

An encryption method and technology for large files, applied in the field of information security, can solve the problems of large redundancy, high cost, huge amount of calculation, etc., and achieve the effect of ensuring reversibility

Active Publication Date: 2019-12-20
GUILIN UNIV OF ELECTRONIC TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Homomorphic encryption has low efficiency and high redundancy, and its application in reality has great limitations. It is unrealistic to directly use the above-mentioned encryption method to encrypt large-scale data because of the huge amount of calculation, and homomorphic encryption often Bringing data expansion, the cost is high, and heavy proxy encryption is only suitable for key conversion between specific users. In reality, it is not necessary to perform the above encryption on all data
Homomorphic encryption is more suitable for the encryption of data that needs to be calculated, but the cost is relatively high
Encrypting these data with traditional encryption methods also has problems such as large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1 is the embodiment of this encryption method, and we choose the SequenceFile file as an example, and the encryption steps are as follows:

[0035] 1. After reading the file, you can analyze each record and its length, and use one of its records as a data block. The start position and end position of the record are used as the positioning information of the data block.

[0036]2. According to the set keyword calculation rules, the sensitivity of the records is obtained. Records reaching a certain threshold need to be encrypted. At the same time, it can be determined according to the rules whether it is symmetric encryption or public key encryption (including some homomorphic encryption and proxy re-encryption. ), if the user chooses to encrypt the records that do not reach the threshold according to the needs, the block is also encrypted. If the file does not belong to the above two situations, it will not be encrypted.

[0037] 3. Select an existing key or...

Embodiment 2

[0040] Embodiment 2 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, considering that in files, text and numerical values ​​are often mixed together, when numerical values ​​and texts are mixed together, the text and numerical values ​​are mixed together. Isolation, using appropriate encryption methods for each, for example, for the initial segment, consider different encryption needs, further segment, use different encryption methods for values ​​and text, perform homomorphic encryption on values, and use general symmetric encryption for other data, So segment them as well to isolate them. For streaming files, there is no need to increase the number of records. When a certain record contains data that needs to be homomorphically encrypted, segment the data before and after the data. The ciphertexts of multiple segments in the record are put together, but the starting position of the first segment and the length of each segment ...

Embodiment 3

[0041] Embodiment 3 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, the calculation functions that may be involved in the values ​​that require homomorphic encryption are analyzed to determine whether the data involved need to use the same State encryption, what kind of homomorphic encryption needs to be used, when performing certain entrusted calculations, other general encryption and non-fully homomorphic encryption cannot be directly calculated, when fully homomorphic encryption is required, fully homomorphic encryption is used , when both fully homomorphic encryption and non-fully homomorphic encryption are feasible, use non-fully homomorphic (semi-homomorphic) encryption methods. When ordinary encryption is feasible, choose ordinary encryption methods first, that is, when multiple methods are When the purpose can be achieved, the preferred order is general encryption, semi-homomorphic encryption, and fully homomorphic encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security and relates to a method for encrypting large files. This method considers that the data of large files is huge, so it is not suitable for all encryption, and different encryption methods have different advantages and disadvantages. Fully homomorphic encryption cannot solve all entrusted computing entrustments, and the cost of encryption is high. For the encryption of misleading functions, some only need to use general symmetric encryption, so according to the needs, select the appropriate encryption method by segment, and only encrypt part of the data through rules or selection. At the same time, an optimal scheme for reducing key management and ensuring security is proposed, which can only require fewer keys for file encryption and decryption.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for encrypting large files. Background technique [0002] With the development of information technology, many services tend to be informatized and digitized. People rely more and more on data, and the amount of data is also increasing. Correspondingly, some files are getting bigger and bigger. Some files of very popular big data (big data, megadata) are also very large, and some are stored in the form of streaming files. Obviously, these files often have security requirements and need to be encrypted for protection, but it is obviously unrealistic to encrypt a large amount of data. Because the value of some data in big data is relatively low, there is no need to keep it confidential. However, due to its complexity and diversity, some data may be of very high value and require different levels of protection. For cloud computing and big data encryption, there are curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/08H04L63/0464
Inventor 王勇付莉刘永宏林震陈冬梅黄雄华唐红武于凤姣杜诚吴思文
Owner GUILIN UNIV OF ELECTRONIC TECH