Encryption/decryption method, device and system for random data

A technology of random data and encryption device, applied in the field of big data network, can solve the problem of low security of encryption and decryption method

Active Publication Date: 2018-12-14
成都映潮科技股份有限公司
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Defects of the existing technology: Although the encryption of data through the combination of AES+RSA can guarantee data security to a certain extent, since the method of generating AES secret keys from random strings is common knowledge,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption/decryption method, device and system for random data
  • Encryption/decryption method, device and system for random data
  • Encryption/decryption method, device and system for random data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 Shown, a kind of random data encryption method, this method comprises:

[0047] Randomly generate a character string with a fixed length of 16, and convert the character string into an AES key with a fixed length of 16;

[0048] If the data length of the encrypted source file is 4096, it is divided into 2 block data according to the preset length of 2048, and then the data in each block is divided into 64 groups, each group length is 32; the original file data is evenly divided into M blocks of data, and then divide each block of data into 64 groups according to the preset length 32;

[0049] Randomly extract 40 groups of data from each block of data, use the AES key to encrypt, record the position length S of the randomly extracted group, and the length of the randomly extracted position is fixed at 2 bits, if it is not enough, add 0 at the end; then encrypt the encrypted 40 The group data is put back into the original randomly selected position, and...

Embodiment 2

[0057] Such as figure 2 Shown, a kind of random data encryption device, this device comprises:

[0058] AES key generation module, is used for randomly generating the character string of fixed length 16, described character string is converted into the AES key of fixed length 16;

[0059] The segmentation module is used to divide the original file data into M block data according to the preset length L, and then divide each block data into P groups according to the preset length N; if the length of the encrypted source file data is 4096, then according to the preset Let the length 2048 be divided into 2 blocks of data, and then divide the data of each block into 64 groups, each group length 32; divide the original file data into M blocks of data according to the preset length L, and then divide each block of data according to the preset length L Let length 32 be divided into 64 groups equally;

[0060] The first encryption module is used to randomly extract 40 groups of dat...

Embodiment 3

[0066] Such as image 3 As shown, corresponding to the encryption method in the specific embodiment 1, a random data decryption method, the method includes:

[0067] Receive mixed encrypted data;

[0068] Segment the mixed encrypted data according to a fixed length of 16 to obtain the AES key encrypted by the RSA public key and the remaining encrypted data;

[0069] Use the RSA private key to decrypt the AES key;

[0070] According to the total length 2128 of decryption, the remaining encrypted data is divided into 2 block data; the total length of the decryption is: the preset length 2048 plus the position length 80 of the previously randomly selected group;

[0071] Use the RSA private key to decrypt the randomly generated position length 80 in front of each block data;

[0072] Divide each block of data into 64 groups according to the preset length of 32, take out the encrypted data through the position length of the randomly selected group of 80, decrypt it with the AES...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption/decryption method, device and system for random data are provided. In use, at first, the data of the original file is subjected to encryption twice at the encrypting party, in the process of encryption, key random location S and the key of AES public key encryption are hidden in the primary encrypted data, and the last hidden random location S and AES key are transferred via a server, the random location length and AES key length are both fixed length. The receiver intercepts the key and random location by a fixed length, The AES key is decrypted by the RSA private key to get the real plaintext AES key, and then the random position is fixed. The position of the encrypted data can be obtained by the random position, and then the character string of the random position is converted into the original data after the AES secret key is decrypted by the AES algorithm. This file transfer process is more secure and stable than the existing one. When the message packet is intercepted and cracked, the real original file data cannot be obtained directly.

Description

technical field [0001] The invention belongs to the technical field of big data networks, and in particular relates to a random data encryption and decryption method, device and system. Background technique [0002] In the prior art, data encryption generally uses a combination of AES+RSA to encrypt data, AES encrypts the data content, RSA encrypts the AES key and then transmits it to the background together with the content for decryption. [0003] Encryption method: The encryptor generates a 16-bit AES secret key. After generation, it will not change, and the data to be encrypted will be encrypted with the AES key to obtain encrypted data. Then use the RSA public key to encrypt the AES key, and finally the encrypted AES key and the content encrypted by the AES key form an encrypted data packet and send it to the background server. [0004] Decryption method: The server obtains the encrypted data packet and obtains the AES encryption key through segmentation, decrypts the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/30H04L29/06H04L29/08
CPCH04L9/0631H04L9/302H04L63/045H04L67/06H04L67/108
Inventor 余刚
Owner 成都映潮科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products