Unlock instant, AI-driven research and patent intelligence for your innovation.

Asymmetric white-box cipher encryption method and device and equipment

A technology of white-box cryptography and encryption method, which is applied in the field of asymmetric white-box cryptography encryption method and device, and can solve problems such as being unable to be known by attackers, unable to access algorithms and keys, and attacking data

Active Publication Date: 2020-12-22
BEIJING BANGCLE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current encryption mainly assumes that the attacker of the data cannot access the environment where the encryption operates, nor can he control the environment where the encrypted data is stored, nor can he access the encryption algorithm and key
That is, the encryption process and the storage of encrypted data exist as a "black box", which cannot be known by the attacker
[0003] However, in fact, in some cases, data attackers can gain access to the encrypted operating environment, and even gain control over data encryption and encrypted data storage environments.
In this way, it is easy for them to infer the encryption algorithm and key through data encryption, some intermediate data in the encrypted data storage environment, environmental data, etc., in order to attack the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric white-box cipher encryption method and device and equipment
  • Asymmetric white-box cipher encryption method and device and equipment
  • Asymmetric white-box cipher encryption method and device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0028] Please refer to figure 1 , which shows an exemplary system architecture to which the embodiments of the present application can be applied.

[0029] Such as figure 1 As shown, the system architecture may include a message sending terminal 102 , an authentication center 101 , and a message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an encryption method and device and facility of asymmetric white box cryptography. The method comprises the following steps: receiving an encrypted message and an encryption serial number from a message sending terminal; sending the correspondingly stored encrypted message and encryption serial number to a certificate authority in response to a request of acquiring the message content so that the certificate authority performs certification on an identity of a message receiving end and searches a message grouping scheme and an encryption public key which are corresponding to the received encryption serial number after the certification is passed; decrypting the encrypted message according to the message grouping scheme and an encryption private key corresponding to the corresponding encryption public key of each group; and receiving the decrypted message content from the certificate authority. By use of the encryption method disclosed by the application, the information security still can be realized when an attacker acquires the control to the running and storing environment of the encrypted data.

Description

technical field [0001] The present disclosure generally relates to the field of computer technology, specifically to the field of information processing security, and in particular to an asymmetric white-box encryption method and device. Background technique [0002] In data transmission and storage, data encryption is usually required for information security considerations. The current encryption mainly assumes that the attacker of the data cannot access the environment where the encryption operates, nor can he control the environment where the encrypted data is stored, nor can he access the encryption algorithm and key. That is, the encryption process and the storage of encrypted data exist as a "black box" and cannot be known by attackers. [0003] However, in fact, in some cases, data attackers can gain access to the encrypted operating environment, and even gain control over data encryption and encrypted data storage environments. In this way, it is easy for them to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/06H04L63/08
Inventor 阚志刚彭建芬陈彪王全洲李世杰卢佐华
Owner BEIJING BANGCLE TECH CO LTD