A key acquisition method and system
A key and key pair technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem of low data security and achieve the effect of high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0241] As a specific implementation manner, when the first key includes m-byte data of the first part and m-byte data of the second part, the above step 2 is to use the first key to encrypt the first encryption result The step of decrypting to obtain the first data may include the following steps 2a to 2c:
[0242] Step 2a: Using the m bytes as a division unit, divide the first encryption result into data segments.
[0243] Specifically, before the above step 2a, it may also include: obtaining the total number of bytes N of the first encryption result, judging whether N is an integer multiple of m, if so, executing step 2a; if not, it means that the situation is abnormal, Just leave it alone.
[0244] Step 2b: Process each data segment obtained by dividing the first encryption result in the following manner:
[0245] A shift factor corresponding to each byte of data in the target data segment is determined from a first part of the first key, and a shift factor corresponding ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


