Key generation method, device and storage medium
A key generation device and key generation technology, applied in the field of information security, can solve problems such as the reduction of data packet security, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The specific implementation manners of the present application will be further described in detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present application, but not to limit the scope of the present application.
[0042] First, some terms involved in this application are introduced.
[0043] Hash operation (also known as hash function or hash algorithm): It is a function that changes an arbitrarily long input message string into a fixed-length output string, which is the hash value of the input message. A hash operation is a function that maps a key value to an index. For example: the hash function is h(x)=key%100 (that is, the remainder of dividing the key by 100), and this function is used to output the last two digits of the key. Hash algorithms include but are not limited to: SM3 or SHA-256, etc.
[0044] Symmetric encryption algorithm (or private key encryption): refers to the encryption algori...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


