Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A data encryption method and encryption device

A technology of data encryption and encryption algorithm, applied in the field of communication, which can solve problems such as side-channel attacks of encryption algorithms

Active Publication Date: 2021-11-02
SAGE MICROELECTRONICS CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, a single encryption algorithm is easily cracked by illegal individuals or organizations using brute force cracking, side channel attacks, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption method and encryption device
  • A data encryption method and encryption device
  • A data encryption method and encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] figure 1 It is a flowchart of a data encryption method in an exemplary embodiment of the present invention. Such as figure 1 As shown, the method may include:

[0046] S1: Select an encryption mode based on a first preset rule, and select an encryption algorithm for at least two encryption engines respectively;

[0047] S2: use the encryption algorithms...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and encryption equipment, belonging to the technical field of communication encryption. In the data encryption method of the present invention, the encryption mode and the encryption algorithm in at least two encryption engines are optional, and based on the selected encryption mode, the original data is encrypted using the encryption algorithm of at least two encryption engines using the application key, Generate output ciphertext. In this application document, since at least two encryption engines are set, and the encryption algorithms in the two encryption engines can be changed and selected, the technical problem that the encryption algorithm is single and easy to be cracked is solved. At the same time, because the two encryption engines can be independently and concurrently The encryption algorithm is executed, thereby solving the technical problem of the reduction of encryption efficiency caused by the increase of the complexity of the encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a data encryption method and encryption equipment. Background technique [0002] In the prior art, more common data encryption algorithms include DES (Data Encryption Standard, i.e. Data Encryption Standard), AES (Advanced Encryption Standard, Advanced Encryption Standard), SM4 algorithm, RSA algorithm, HASH algorithm and SM2 algorithm, etc., usually based on Hardware circuits implement these algorithms to achieve the purpose of preventing cold start attacks, malicious code attacks, and brute force attacks. [0003] However, a single encryption algorithm is easily cracked by illegal individuals or organizations using brute force cracking, side channel attacks, and other methods. Contents of the invention [0004] In order to solve the above problems, the present invention provides a data encryption method and encryption equipment. [0005] In order to solve the above p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14H04L9/06
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/0822H04L9/0869H04L9/14
Inventor 刘海銮陈华月骆建军
Owner SAGE MICROELECTRONICS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products