Data encryption method and system, data decryption method and system and terminal equipment

A technology of data encryption and data ciphertext, which is applied to transmission systems, public keys and key distribution of secure communications, and can solve the problems of low data transmission security and inability to know whether encrypted data has been attacked, and achieves security and safety. Effects of Integrity Assurance

Inactive Publication Date: 2019-05-24
金证财富南京科技有限公司
View PDF7 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a data encryption and decryption method, system, and terminal equipment to solve the problem in the prior art when the encrypted data sent by the data sender is maliciously attacked by a middleman. The party cannot know whether the encrypted data has been attacked, resulting in the problem of low security of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and system, data decryption method and system and terminal equipment
  • Data encryption method and system, data decryption method and system and terminal equipment
  • Data encryption method and system, data decryption method and system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] figure 1 It shows the implementation process of the data encryption method provided by an embodiment of the present invention, which is applied to the data sender, and the process is described in detail as follows:

[0047] In step S101, the public key of the data receiver is obtained.

[0048] In one embodiment, the public key certificate of the data recipient is obtained, and when the public key certificate is updated, the validity of the public key certificate is verified, and if the public key certificate is legal, the public key of the data recipient is obtained.

[0049] In one embodiment, the data encrypted transmission involves a data sender and a data receiver, the data sender sends encrypted data and the data receiver receives encrypted data.

[0050] In one embodiment, the data sender generates a password pair through an asymmetric encryption algorithm, and the password pair includes a public key and a sending private key.

[0051] In one embodiment, the da...

Embodiment 2

[0084] Such as figure 2 As shown, the data encryption system 100 provided by an embodiment of the present invention is applied to the data sender to perform figure 1 The method step in the corresponding embodiment, it comprises:

[0085] The first public key acquisition module 110 is used to acquire the public key of the data recipient;

[0086] A first symmetric key acquisition module 120, configured to randomly generate a symmetric key;

[0087] The key ciphertext acquisition module 130 is used to asymmetrically encrypt the symmetric key according to the public key of the data receiver to obtain the key ciphertext;

[0088] A data ciphertext acquisition module 140, configured to perform symmetric encryption on the transmission data according to the symmetric key to obtain the data ciphertext;

[0089] The digital signature acquisition module 150 is used to asymmetrically encrypt the data ciphertext according to the pre-stored sending private key to obtain the digital sig...

Embodiment 3

[0100] image 3 It shows the implementation process of the data decryption method provided by one embodiment of the present invention, which is applied to the data receiver, and the process is described in detail as follows:

[0101] In step S201, a message sent by a data sender is received.

[0102] In one embodiment, before step S201, it also includes:

[0103] The data sender obtains the public key of the data receiver, randomly generates a symmetric key, and performs asymmetric encryption on the symmetric key according to the public key of the data receiver to obtain the key ciphertext; the data sender encrypts the transmitted data according to the symmetric key. Symmetric encryption to obtain the data ciphertext; the data sender asymmetrically encrypts the data ciphertext according to the pre-stored sending private key to obtain a digital signature; the data sender packs the key ciphertext, data ciphertext and digital signature to generate a message, And send the messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method is suitable for the technical field of data encryption. The invention provides a data encryption method and system, data decryption method and system and terminal equipment. During data encryption, the data receiver obtains a public key of the data receiver to achieve RANDOM GENERATION OF SYMMETRIC KEYS, the symmetric key is encrypted according to the public key of the data receiver sothat Key ciphertext is acquired. the transmission data is encrypted according to the symmetric key to obtain a data ciphertext, the data ciphertext is encrypted according to a pre-stored sending private key to obtain a digital signature, the key ciphertext is packaged the data ciphertext and the digital signature to generate a message, the message is snet to a data receiver, and when the data is decrypted, the transmission data is acquired by the data receiver according to the message. Therefore, the problem that when the encrypted data sent by the data sender is maliciously attacked by the man-in-the-middle, the sender and the receiver of the data cannot know whether the encrypted data is attacked or not, so that the security of data transmission is low is effectively solved.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and in particular relates to a data encryption and decryption method, system and terminal equipment. Background technique [0002] With the development of Internet technology, data transmission through the network has been widely used. In order to prevent the data from being maliciously attacked during the transmission process, the sender of the data will encrypt the data. When the receiver of the data receives the encrypted When data is obtained, the encrypted data is decrypted to obtain the data. [0003] In the prior art, when the encrypted data sent by the data sender is maliciously attacked by a middleman, the sender and receiver of the data cannot know whether the encrypted data has been attacked, the security of data transmission is low, and the rights and interests of users cannot be guaranteed. Contents of the invention [0004] In view of this, the embodiment of the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
Inventor 曾焱
Owner 金证财富南京科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products