Data encryption and decryption method and equipment
A data encryption and data decryption technology, which is applied in the field of data security, can solve problems such as low security and cannot meet high security requirements, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In the prior art, when the network server encrypts user data, it can generally adopt symmetric encryption or asymmetric encryption. Among them, symmetric encryption is mainly based on DES algorithm and AES algorithm, which has the advantages of fast encryption and decryption, and is widely used in data transmission and storage. Asymmetric encryption is mainly based on ECC algorithm and RSA algorithm. Due to its public key and private key More flexible and therefore more secure than symmetric encryption.
[0035] However, when encrypting a large amount of user data, there are at least the following problems in adopting symmetric encryption or asymmetric encryption:
[0036] (1) In symmetric encryption, the same key is used for both encryption and decryption, which makes the key easily leaked and the security of user data cannot be guaranteed;
[0037] (2) The amount of calculation is relatively large when using asymmetric encryption to encrypt data, so when encrypting a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


