A data encryption and decryption method and device
A data encryption and data link technology, applied in transmission systems, electrical components, etc., can solve the problems of no management method, inability to resist hacking, inability to guarantee data security, etc., to achieve the effect of protecting security and preventing cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] see figure 1 It is a schematic flowchart of a data encryption method provided by Embodiment 1 of the present invention, the method includes the following steps:
[0063] S11. Obtain original data, encrypt the original data, and generate encrypted data and a key;
[0064] Specifically, the original data may include any data type to be encrypted, such as fingerprint data type or data information such as other files.
[0065] At the same time, when obtaining the original data, part of the memory space can be initialized. The memory space includes two parts, one part is the storage space used to store the encryption program, and the further stored encryption program can be multiple encryption programs, and the other part is The space to be used means that there is no data in the space, and it is prepared for subsequent storage of related information of binary codes, wherein the related information of binary codes includes: identification feature code, length of binary code...
Embodiment 2
[0084] refer to figure 2 It is a schematic flowchart of a data decryption method provided in Embodiment 2 of the present invention, the method includes:
[0085] S21. Obtain ciphertext, wherein the ciphertext includes identification feature code, binary code related information, binary code and encrypted data, and the binary code related information includes binary code length, identification feature code and binary code offset quantity;
[0086] S22. Read and analyze the ciphertext, judge whether the ciphertext contains a preset binary code according to the identification feature code, and if so, obtain according to the length of the binary code and the offset of the binary code said binary code;
[0087] Specifically, the first 6 bytes of the ciphertext are defined as: the identification feature code (1 byte) and the relevant information of the binary code (5 bytes), and the relevant information of the binary code is the length of the decoding program (1 byte) section), ...
Embodiment 3
[0098] Corresponding to the data encryption method disclosed in Embodiment 1 of the present invention, Embodiment 3 of the present invention also provides a data encryption device, see image 3 , the device consists of:
[0099] The first encryption module 10 is used to obtain original data, encrypt said original data, and generate encrypted data and a key;
[0100] The conversion module 11 is configured to obtain a decryption program corresponding to the key, convert the decryption program into a binary code, and calculate relevant information of the binary code, wherein the relevant information of the binary code includes a binary code length, Identify the signature and the offset of the binary code;
[0101] The second encryption module 12 is configured to splice the relevant information of the binary code and the binary code into the encrypted data according to a preset format to obtain ciphertext. .
[0102] Correspondingly, the first encryption module 10 includes:
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


