Encryption/decryption method

An encryption and decryption technology to be encrypted, which is applied in the field of encryption and decryption, can solve the problems that the encryption and decryption method cannot meet people's needs, the algorithm encryption security is not enough, the security and reliability are insufficient, and the encryption and decryption method is simple and the encryption is safe. , the effect of convenient operation

Inactive Publication Date: 2018-12-28
深圳市琦志航智能科技有限公司
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The encryption and decryption method is a method for encrypting and decrypting plaintext during transmission and reception to avoid file content leakage. However, with the development of science and technology, people have higher and higher requirements for encryption and decryption methods, resulting in traditional encryption and decryption. The method can no longer meet the needs of people;
[0003] There are certain disadvantages in the existing encryption and decryption methods. First, the existing conventional encryption and decryption methods include the existing RSA algorithm and the AES algorithm. The end-to-end delay of the existing RSA algorithm is large, and its security and reliability The performance is relatively insufficient; the end-to-end delay of the AES algorithm is small, but the encryption security of the algorithm itself is not enough, at the cost of sacrificing security, and the security is reduced. Therefore, we propose an encryption and decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption/decryption method
  • Encryption/decryption method
  • Encryption/decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] (1), select the plaintext to be encrypted, read the plaintext data through the processor, and the processor reads the binary digital data in the plaintext;

[0024] (2), use the AES algorithm to encrypt the plaintext data obtained in step (1), and the plaintext to be encrypted is encrypted by the AES key generator. The AES password is an iterative, symmetric key block password, and it can use 256-bit encryption key, and use 128-bit block encryption and decryption data to obtain encrypted plaintext and AES password, add at least one set of interference data in front and rear of the plaintext data, after decryption, remove the interference data added in front and rear of the sequence;

[0025] (3), use the RSA algorithm to encrypt the AES password obtained through step (2), and use SSL to send the connection request at the same time, after being encrypted by the RSA algorithm, the public key and the private key are obtained;

[0026] (4), after authentication, accept the ...

Embodiment 2

[0036] (1), select the plaintext to be encrypted, read the plaintext data through the processor, and the processor reads the binary digital data in the plaintext;

[0037] (2), use the AES algorithm to encrypt the plaintext data obtained in step (1), and the plaintext to be encrypted is encrypted by the AES key generator. The AES password is an iterative, symmetric key block password, and it can use 256-bit encryption key, and use 128-bit block encryption and decryption data to obtain encrypted plaintext and AES password, add at least one set of interference data in front and rear of the plaintext data, after decryption, remove the interference data added in front and rear of the sequence;

[0038] (3), use the RSA algorithm to encrypt the AES password obtained through step (2), and use SSL to send the connection request at the same time, after being encrypted by the RSA algorithm, the public key and the private key are obtained;

[0039] (4), after authentication, accept the ...

Embodiment 3

[0047] (1), select the plaintext to be encrypted, read the plaintext data through the processor, and the processor reads the binary digital data in the plaintext;

[0048] (2), use the AES algorithm to encrypt the plaintext data obtained in step (1), and the plaintext to be encrypted is encrypted by the AES key generator. The AES password is an iterative, symmetric key block password, and it can use 256-bit encryption key, and use 128-bit block encryption and decryption data, the delay of AES algorithm is 227 / ms, get the encrypted plaintext and AES password, add at least one set of interference data in front and rear of the plaintext data, after decryption, the sequence of Removal of interference data added in the front and rear;

[0049] (3) Use the RSA algorithm to encrypt the AES password obtained in step (2), and use SSL to send the connection request at the same time. After being encrypted by the RSA algorithm, the public key and the private key are obtained. The delay of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method, comprising the following steps: selecting plaintext to be encrypted, reading plaintext data through a processor, and reading binary digitaldata in the plaintext by the processor; the AES algorithm is used to encrypt the plaintext data, the plaintext to be encrypted is encrypted by the AES key generator, the AES cipher is an iterative, symmetric key block cipher that can use a 256-bit key and encrypts and decrypts data using a 128-bit block to obtain encrypted plaintext and AES ciphers, adding at least one set of interfering data infront of and behind the plaintext data, and then decrypting the encrypted data. The invention relates to an encryption and decryption method, compared with RSA and AES, the hybrid algorithm of AES andRSA has significant advantages in encryption security, low latency and ciphertext synchronization. The hybrid algorithm of AES and SSL has the smallest delay time difference, and its advantages in encryption security, low latency and effective access authentication are obvious, which brings a better application prospect.

Description

technical field [0001] The invention relates to the field of encryption and decryption, in particular to an encryption and decryption method. Background technique [0002] The encryption and decryption method is a method for encrypting and decrypting plaintext during transmission and reception to avoid file content leakage. However, with the development of science and technology, people have higher and higher requirements for encryption and decryption methods, resulting in traditional encryption and decryption. The method can no longer meet the needs of people; [0003] There are certain disadvantages in the existing encryption and decryption methods. First, the existing conventional encryption and decryption methods include the existing RSA algorithm and the AES algorithm. The end-to-end delay of the existing RSA algorithm is large, and its security and reliability The performance is relatively insufficient; the end-to-end delay of the AES algorithm is small, but the encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L29/06H04L9/30H04L9/06
CPCH04L9/0631H04L9/14H04L9/302H04L63/045
Inventor 张亚辉
Owner 深圳市琦志航智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products