Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, data decryption method and related devices

A data encryption and data decryption technology, applied in the field of information processing, can solve problems such as reduced computing speed, reduced data security, and unsuitable encryption methods, and achieve the effect of avoiding damage and tampering

Active Publication Date: 2018-06-15
NAT GEOMATICS CENT OF CHINA
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For a secret key with a length of 56 bits, although the exhaustive method is used to search, the operation of 2 to the 56th power is required, and the amount of calculation will be very large. However, with the continuous development of computer system capabilities, the DES encryption algorithm is used to encrypt of data is increasingly less secure
In addition, since the DES encryption algorithm is a binary encryption algorithm, after using this encryption algorithm to encrypt data, the arrangement format of the leveling data will be destroyed, so that the decrypted data cannot be directly processed in the later stage of the industry
[0006] 2. Although the RSA encryption algorithm is not easy to decipher, because the encryption process requires a large amount of data operation, it will undoubtedly greatly reduce the computing speed of the device that encrypts the data. If the computing speed is to be guaranteed, the resource requirements of the device are relatively high. Therefore, this encryption method is not suitable for large-scale operations using level gauges
In addition, the encryption method is too dependent on the independent public key and secret key. Once the key is leaked, the encryption method will be cracked, so the security is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data decryption method and related devices
  • Data encryption method, data decryption method and related devices
  • Data encryption method, data decryption method and related devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0029] The first embodiment of the present invention relates to a data encryption method. The data encryption method is mainly applied to leveling instruments used for leveling, specifically digital levels (also called electronic levels), so that encryption can be performed directly when leveling data is generated.

[0030]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information processing, and discloses a data encryption method, a data decryption method and related devices. The data encryption method comprises the steps that to-be-encrypted data is obtained, a block running number is assigned to the to-be-encrypted data, serial numbers are assigned to all characters in the to-be-encrypted data and a stray parameter is assigned to each character; a cyclic redundancy check code of the to-be-encrypted data is calculated, and the following operations are carried out on each character: based on a DES encryption algorithm, a fixed code corresponding to each character is calculated according to the cyclic redundancy check code, block running number, character, and serial number corresponding to the character ofthe to-be-encrypted data, and according to the fixed code and the stray parameter corresponding to the character, the character is encrypted to obtain an encryption character; each encryption character is obtained sequentially, and according to all encryption characters, an encryption block of the to-be-encrypted data is generated. The data encryption method and the data decryption method can effectively prevent leveling data from being damaged and tampered.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a data encryption method, a data decryption method and related devices. Background technique [0002] Leveling, also known as "geometric leveling", is a method of measuring the height difference between two points on the ground with a level and a leveling rod. The height difference between two points obtained by measurement is mainly used to organize and update the data stored in the national leveling data record table, so that the correct height can be determined according to the correct measurement data, that is, a point along the plumb line to the absolute base face distance. [0003] At present, in order to ensure that the measured data is not maliciously tampered with by others, it is usually encrypted during the transmission process, such as DES encryption algorithm (symmetric encryption, Des symmetric encryption), RSA algorithm (RSA encryption algorithm, RS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L1/00
CPCH04L1/0061H04L63/0435
Inventor 鄢中堡陈现军张鹏张庆兰王明善田道平
Owner NAT GEOMATICS CENT OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products