Encryption method and device, encryption performance analysis method and device, electronic equipment and readable storage medium

An encryption method and encryption algorithm technology, applied in the field of information security, can solve problems such as video content cracking

Active Publication Date: 2020-11-13
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if a user's authentication is attacked and cracked, it means that the video content of the entire network is cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, encryption performance analysis method and device, electronic equipment and readable storage medium
  • Encryption method and device, encryption performance analysis method and device, electronic equipment and readable storage medium
  • Encryption method and device, encryption performance analysis method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107]The technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Referring to the non-limiting exemplary embodiments shown in the accompanying drawings and detailed in the following description, the examples of the present disclosure will be more fully described. Embodiments and their various features and advantageous details. It should be noted that the features shown in the figures are not necessarily drawn to scale. The present disclosure omits descriptions of well-known materials, components, and process techniques so as not to obscure the example embodiments of the present disclosure. The examples given are only intended to facilitate understanding of the implementation of the example embodiments of the present disclosure and to further enable those skilled in the art to practice the example embodiments. Accordingly, these examples should not be construed as limiting t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an encryption method, an encryption device and an encryption performance analysis method and device. The encryption method comprises the steps of selecting target key data from key data of target information, wherein the key data is basis for confirmation of other data in the target information; carrying out random selection on all target key data to determine to-be-encrypted information in the target key data; encrypting the to-be-encrypted information in the target key data through adoption of an encryption algorithm, and obtaining encrypted data corresponding to the target key data; and correspondingly replacing the target key data in the target information by the encrypted data, thereby encrypting target information.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to an encryption method, an encryption device, and an encryption performance analysis method and device. Background technique [0002] In the field of encryption, people are used to encrypting all the protected data, which is undoubtedly a very safe method at the level of cryptanalysis. However, compared with traditional text information and static images, video not only has a large amount of data, but also meets the needs of real-time transmission, such as webcasting, video conferencing, etc. If all video data is encrypted, high-complexity encryption algorithms and A large amount of encrypted data will cause a huge overhead on the server. The throughput rate of AES-256 provided by the openSSL library mainly used for secure network data transmission is about 96Mbps-524Mbps. Therefore, in order to reduce server overhead, the same video content is generall...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N21/2347
CPCH04L63/0428H04N21/2347
Inventor 王兴军寇馨予
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products