Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security management method and system for internet of things based on combinatorial encryption algorithm

An encryption algorithm and information security technology, which is applied in the field of information security management of the Internet of Things based on the combined encryption algorithm and the information security management system of the Internet of Things based on the combined encryption algorithm, can solve problems such as poor information security

Inactive Publication Date: 2019-01-22
CHANGSHU INSTITUTE OF TECHNOLOGY +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides an Internet of Things information security management method and system system based on a combined encryption algorithm to solve the problems in the prior art proposed in the above-mentioned background technology. Because the existing encryption method is relatively simple, when encountering a brute force attack password, directly Exhaustive enumeration of the limited number of keys can be decrypted faster, which leads to the problem of poor information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management method and system for internet of things based on combinatorial encryption algorithm
  • Information security management method and system for internet of things based on combinatorial encryption algorithm
  • Information security management method and system for internet of things based on combinatorial encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0066] This embodiment: as figure 1 As shown, a method for information security management of the Internet of Things based on a combined encryption algorithm includes:

[0067] Determine the key S101 for a specific meaning;

[0068] Compile the key into the password matrix S102 sequentially from the first row according to the row order or from the first column according to the column sequence, and compile other English letters that do not appear in the key into the remaining elements of the password matrix according to the English alphabet order S103;

[0069] If the password matrix is ​​prepared S104, then every two letters in the plaintext form a combination of a plaintext alphabet, and the plaintext alphabet is encrypted into a corresponding ciphertext alphabet S105 by the password matrix encryption method;

[0070] The plaintext letter group includes a first element M1 and a second element M2;

[0071] The ciphertext alphabet includes a first element O1 and a second elem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, in particular to an information security management method for the Internet of Things based on a combined encryption algorithm, the invention also provides an information security management system of the internet of things based on a combined encryption algorithm; the cryptographic matrix encryption method comprises the following steps: if the first element M1 and the second element M2 are in the same row, the corresponding first element O1 and the second element O2 are letters adjacent to the right of the first element M1and the second element M2, respectively.As that exist encryption method is relatively simple, when the password is attacked by force, the encryption key can be decrypted quickly by exhausting the limited number of times directly, which leads to the problem of poor information security. The invention has the advantages of enhancing the information security intensity, facilitating the memory and easy storage, ensuring the integrity of ciphertext, and ensuring the flexibility of encryption.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an information security management method for the Internet of Things based on a combined encryption algorithm. The invention also provides an information security management system for the Internet of Things based on a combined encryption algorithm. Background technique [0002] According to the needs of the development of informatization construction, information includes three levels of content: one is the objects collected, transmitted, processed and stored in the network and system, such as technical documents, storage media, various information, etc.; The third is information such as keys and passwords for security management methods. The security management of software facilities mainly considers configuration management, use and maintenance management, development management, and virus management. Software facilities mainly include operating system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/0618H04L9/14
Inventor 徐江阚志刚赵健成陈彪张方舟张杰
Owner CHANGSHU INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products