Three-level secret key encryption system

An encryption system and secret key technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as file exposure and secret key security difficulties, and achieve the effect of ensuring security

Active Publication Date: 2019-08-23
王怀尊
View PDF15 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] After the existing symmetric key encryption technology encrypts files, the security of the key becomes a difficult problem. Once the database or file system storing the key is compromised, all files are at risk of being exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-level secret key encryption system
  • Three-level secret key encryption system
  • Three-level secret key encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] combined with Figure 1~3 , a three-level secret key encryption system, comprising the following steps:

[0029] S1. The third-level secret key includes the root secret key that is solidified in the program and is only used to encrypt the system secret key, the system secret key that can be dynamically modified, and the file secret key corresponding to the file produced by a random algorithm; the initialization of the system secret key and After the system goes online, the system administrator triggers the generation function through the interface. The server sets a random key and does not transmit it to the client. The operator cannot access the content of the key. The file key is generated using a secure random algorithm when encrypting files. The client cannot access the key content.

[0030] S2. File encryption: The encryption algorithm adopts a symmetric encryption algorithm, using a 256-bit secret key and CBC mode. Each file is configured with a file secret key a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-level secret key encryption system. The method comprises the following steps of secret key classification, file encryption, file decryption and secret key management. All secret keys cannot be independently obtained in all links of system development, maintenance and use through three-level secret key encryption, a new encryption algorithm is not needed through a secret key classification method, and the safety of encrypted files is ensured.

Description

technical field [0001] The invention relates to the technical field of key encryption, in particular to a three-level key encryption system. Background technique [0002] After the existing symmetric key encryption technology encrypts files, the security of the key becomes a difficult problem. Once the database or file system storing the key is compromised, all files are at risk of being exposed. Contents of the invention [0003] In order to solve the above technical problems, the technical solution provided by the present invention is: a three-level secret key encryption system, comprising the following steps: [0004] S1. The third-level secret key includes the root key that is solidified in the program and is only used to encrypt the system secret key, the system secret key that can be dynamically modified, and the file secret key corresponding to the file produced using a random algorithm; [0005] S2. File encryption: The encryption algorithm adopts a symmetric encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/0478H04L9/0822H04L9/0869
Inventor 王怀尊
Owner 王怀尊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products