Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved large file encryption method

An encryption method, technology for large files

Active Publication Date: 2017-09-05
桂林傅里叶电子科技有限责任公司
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These data cannot be compressed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1 is the embodiment of this encryption method, and we choose SequenceFile file as an example, and the encryption step is as follows:

[0035] 1. Read the file, you can analyze each record and its length, and use one of its records as a data block. The start position and end position of the record are used as the positioning information of the data block.

[0036] 2. According to the set keyword calculation rules, the sensitivity of the records is obtained. The records that reach a certain threshold are determined to be encrypted. At the same time, according to the rules, it can be determined whether it is symmetric encryption or public key encryption (including some homomorphic encryption and proxy re-encryption). ), if the user chooses to encrypt records that do not reach the threshold according to their needs, the block is also encrypted. If the file does not belong to the above two situations, it will not be encrypted.

[0037] 3. Select an existing key ...

Embodiment 2

[0040] Embodiment 2 is a further improvement of Embodiment 1 of the encryption method. On the basis of Embodiment 1, considering that in files, text and numerical values ​​are often mixed together, when numerical values ​​and texts are mixed together, text and numerical values ​​are mixed together. For isolation, each adopts an appropriate encryption method. For example, for the initial segmentation, considering different encryption needs, perform further segmentation, use different encryption methods for numerical values ​​and texts, perform homomorphic encryption on numerical values, and use general symmetric encryption for other data. So segment them for isolation as well. For streaming files, there is no need to increase the number of records. When a record contains data that needs to be homomorphically encrypted, the data is segmented before and after the data. The ciphertexts of multiple segments in the record are put together, but the starting position of the first segm...

Embodiment 3

[0041] Embodiment 3 is a further improvement of Embodiment 1 of the encryption method. On the basis of Embodiment 1, the calculation functions that may be involved in the numerical value requiring homomorphic encryption are analyzed to determine whether the data involved need to use the same method. What kind of homomorphic encryption needs to be used for state encryption? When performing some entrusted calculations, other general encryption and non-fully homomorphic encryption cannot be directly calculated. When fully homomorphic encryption is required, fully homomorphic encryption is used. , when both fully homomorphic encryption and non-fully homomorphic encryption are feasible, the non-fully homomorphic (semi-homomorphic) encryption method is used. When ordinary encryption is feasible, the ordinary encryption method is preferred, that is, when multiple methods are When the purpose can be achieved, the preferred order is general encryption, semi-homomorphic encryption, and f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, and relates to a large file encryption method. It is not suitable for a large file to be encrypted wholly for the large file has enormous data, in addition, different encryption methods have different advantages and disadvantages. Fully homomorphic encryption cannot resolve all commissioned calculation, and the encryption cost is high. Some large files need encryption with a mislead function, and some only need common symmetrical encryption, so that different segments use different proper encryption methods according to needs. Some data is encrypted according to rules or selection. The large file without a requirement of maintaining the data before encryption is compressed and then encrypted, thereby being safer and occupying a smaller storage space. In addition, the invention provides an optimal solution reducing secret keys and ensuring security, so that fewer secret keys are used for encrypting and decrypting the file.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a method for encrypting large files. Background technique [0002] With the development of information technology, many services also tend to be informatized and digitalized, people are more and more dependent on data, and the amount of data is also increasing. Correspondingly, some files are also getting larger. Some files of the currently very popular big data (big data, megadata) are also very large, and some are stored in the form of streaming files. Obviously, these files often have security requirements and need to be encrypted and protected, but it is obviously unrealistic to encrypt a large amount of data. Because some data in big data is of low value and does not need to be kept secret. However, due to its complexity and diversity, some data may have very high value and need to be protected to varying degrees. For cloud computing and big data encryption, there are cu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/14H04L29/06
CPCH04L9/008H04L9/14H04L63/0428
Inventor 王勇付莉杨巍于凤姣
Owner 桂林傅里叶电子科技有限责任公司