Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method and data encryption device

A data encryption and encryption algorithm technology, applied in the field of communication, can solve problems such as encryption algorithm side channel attacks

Active Publication Date: 2019-02-19
SAGE MICROELECTRONICS CORP
View PDF9 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, a single encryption algorithm is easily cracked by illegal individuals or organizations using brute force cracking, side channel attacks, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and data encryption device
  • Data encryption method and data encryption device
  • Data encryption method and data encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] figure 1 It is a flowchart of a data encryption method in an exemplary embodiment of the present invention. like figure 1 As shown, the method may include:

[0046] S1: Select an encryption mode based on a first preset rule, and select an encryption algorithm for at least two encryption engines respectively;

[0047] S2: use the encryption algorithms of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and a data encryption device, and belongs to the technical field of communication encryption. In the data encryption method provided by the invention,the encryption mode and the encryption algorithms in at least two encryption engines are both selectable, and the encryption algorithms in at least two encryption engines are performed on the originaldata for encryption operation by using an application key based on the selected encryption mode to generate output ciphertext. In this application file, the technical problem of easy cracking due toa single encryption algorithm is solved since at least two encryption engines are provided and the encryption algorithms in the two encryption engines are both selectable, and at the same time, the technical problem that the encryption efficiency is lowered due to the improvement of complexity of the encryption algorithm is solved since the two encryption engines can independently and concurrentlyexecute the encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a data encryption method and encryption equipment. Background technique [0002] In the prior art, more common data encryption algorithms include DES (Data Encryption Standard, i.e. Data Encryption Standard), AES (Advanced Encryption Standard, Advanced Encryption Standard), SM4 algorithm, RSA algorithm, HASH algorithm and SM2 algorithm, etc., usually based on Hardware circuits implement these algorithms to achieve the purpose of preventing cold start attacks, malicious code attacks, and brute force attacks. [0003] However, a single encryption algorithm is easily cracked by illegal individuals or organizations using brute force cracking, side channel attacks, and other methods. Contents of the invention [0004] In order to solve the above problems, the present invention provides a data encryption method and encryption equipment. [0005] In order to solve the above p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/14H04L9/06
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/0822H04L9/0869H04L9/14
Inventor 刘海銮陈华月骆建军
Owner SAGE MICROELECTRONICS CORP