Reversible tamper-proof data encryption and decryption method based on encryption and digest algorithms
A digest algorithm and anti-tampering technology, applied in the field of computer communication, can solve problems such as inability to ensure data security, inability to decrypt plaintext, etc., and achieve the effect of increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] The present invention will be further described below.
[0023] A method for reversible tamper-proof encryption and decryption data based on encryption and digest algorithms, the main components are: two devices on the network for encrypting and decrypting data;
[0024] The specific steps of a method for reversible tamper-proof encryption and decryption data based on encryption and digest algorithm are:
[0025] Step (1), device 1 takes the length EALen of the plaintext character string EA, calculates the size of the EB and EC of the application memory according to the length EALen of the character string EA, if EALen is a multiple of 8, then the size of EB and EC is EALen; If the length of EALen is not a multiple of 8, the size of EB and EC is That is, the length EALen of the plaintext string EA is divided by 8 and rounded down, then added 1, and then multiplied by 8 to apply for 2 blocks of memory EB and EC respectively;
[0026] Step (2), set all the applied memo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com