Check patentability & draft patents in minutes with Patsnap Eureka AI!

Secret-key-free encryption and decryption method for numbers

A key encryption, number technology, applied in the field of decryption, number keyless encryption, can solve problems such as high computational pressure

Inactive Publication Date: 2018-06-29
南京信安融慧网络技术有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Using asymmetric encryption puts a lot of computing pressure on the server; when using symmetric encryption, the security of the key becomes a crucial issue. Once the key is leaked, all data can be decrypted and viewed by criminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret-key-free encryption and decryption method for numbers
  • Secret-key-free encryption and decryption method for numbers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] A method for keyless encryption and decryption of numbers, including a mobile phone number encryption process and a mobile phone number decryption process;

[0025] Such as figure 1 As shown, the mobile phone number encryption process includes the following steps:

[0026] Step 1: Put the mobile phone number in plaintext P 0 As the key of the RC4 encryption algorithm, the plaintext P of the mobile phone number 0 Perform RC4 encryption to obtain the intermediate ciphertext M;

[0027] Step 2: Concatenate the plaintext P0 of the mobile phone number and the intermediate ciphertext M in order to form new data P to be processed 1 ;

[0028] Step 3: Put P 1 Perform the SHA256 algorithm operation to obtain the final ciphertext, and the encryption ends.

[0029] Such as figure 2 As shown, the mobile phone number decryption process includes the following steps:

[0030] Step 1: Generate the plaintext of all mobile phone numbers according to the rules of mobile phone num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret-key-free encryption and decryption method for numbers. The method includes a phone number encryption process and a phone number decryption process. The phone number encryption process includes following steps: step 1, taking a phone number plaintext P0 as a secret key of a RC4 encryption algorithm, and performing RC4 encryption on the phone number plaintext P0 to acquire an intermediate ciphertext M; step 2, sequentially splicing the phone number plaintext P0 and the intermediate ciphertext M to form new to-be-processed data P1; step 3, subjecting the P1 to SHA256 algorithm operation to acquire a final ciphertext to finish encryption. A mode of combining SHA256 with RC4 is used to encrypt phone numbers, and the phone number plaintext and the ciphertext areused to perform HashMap lookup and encryption.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for keyless encryption and decryption of numbers. Background technique [0002] The network has penetrated into every corner of personal life, and the security of personal sensitive information has become an urgent problem to be solved. Phone numbers are the most sensitive information in personal privacy information. Systems that collect or record sensitive personal information should ensure that sensitive information is stored encrypted, and only under certain circumstances can it be decrypted out of the storage. [0003] Using asymmetric encryption puts a lot of computing pressure on the server; when using symmetric encryption, the security of the key becomes a crucial issue. Once the key is leaked, all data can be decrypted and viewed by criminals. Contents of the invention [0004] The invention provides a keyless encryption and decryption method for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/06H04W12/02
CPCH04L9/0643H04L9/065H04L9/14H04W12/02
Inventor 石飞刘庆良
Owner 南京信安融慧网络技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More