Method and system for constructing data encryption and decryption algorithm based on ARM instruction

An encryption and decryption algorithm and encryption algorithm technology, which is applied in the field of data encryption and decryption algorithms based on ARM instructions, can solve problems such as forgery and low security, and achieve the effect of improving security and avoiding malicious cracking

Active Publication Date: 2017-07-04
WUHAN DOUYU NETWORK TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the existing encryption and decryption algorithms may still be cracked by HACK, and the security is low, so that some data in the application may still be forged by machine programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for constructing data encryption and decryption algorithm based on ARM instruction
  • Method and system for constructing data encryption and decryption algorithm based on ARM instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] The invention is a scheme for constructing data encryption and decryption algorithms based on ARM special instructions. Its design idea is: first, set (design) the basic arithmetic operations for constructing the encryption and decryption algorithm by using the special instructions of ARM. The basic arithmetic operations include: addition operation (2 data addition), subtraction operation Operation (subtraction of 2 numbers), left shift operation (a data logically shifted to the left by several bits) and right shift operation (a data logically shifted to the right by several bits). Then, a large number of combinations and repetitions of these basic arithmetic operations are used to form an encryption algorithm. At the same time, according to the combined encryption algorithm, a decryption algorithm corresponding to the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for constructing a data encryption and decryption algorithm based on an ARM instruction, and relates to the technical field of data encryption and decryption. The method comprises the following steps: setting an addition operation, wherein the addition operation is used for realizing addition operation based on the ARM instruction; setting a subtraction operation, wherein the subtraction operation is used for realizing subtraction operation based on the ARM instruction; setting a left shift operation, wherein the left shift operation is used for realizing a data logic left shift operation based on the ARM instruction; setting a right shift operation, wherein the right shift operation is used for realizing a data logic right shift operation based on the ARM instruction; and randomly combining the set basic operations to construct the data encryption and decryption algorithm based on the ARM instruction. By adoption of the method and system disclosed by the invention, the data encryption and decryption algorithm can be effectively prevented from being maliciously cracked, and the security of data encryption and decryption is improved.

Description

technical field [0001] The present invention relates to the technical field of data encryption and decryption, and specifically relates to a method and system for constructing data encryption and decryption algorithms based on ARM (CPU processor at the mobile terminal) instructions. Background technique [0002] At present, the more important data is encrypted or decrypted in the mobile terminal program. Most of the existing encryption and decryption algorithms use relatively mature public algorithms. Although the public algorithms themselves are safe, the problem is that HACK (hackers) can also obtain the same encryption and decryption algorithms to decrypt data. To obtain the original data. For example, for a live broadcast APP (Application, application program), the data of the number of viewers in each room is relatively critical data. The usual practice is that the server will send request verification data to the client, and the client will reply to the server with co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/002
Inventor 周志刚胡卫谊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products