Data packet encryption method, data packet decryption method, data packet sending end and data packet receiving end

An encryption method and data packet technology, which are applied in serial/continuous modification of data streams, encryption devices with shift registers/memory, digital transmission systems, etc., can solve problems such as slow operation speed, complex implementation, and low security , to achieve the effect of fast encryption speed, improved encryption level, and easy decryption

Pending Publication Date: 2020-01-07
BEIJING TRICOLOR TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when encrypting data packets such as video, audio, and network, most of them use the method of generating a pseudo-random sequence, and perform an XOR operation on the input signal and the pseudo-random sequence to generate a pseudo-random encrypted data packet, but this method exists Low security and easy to be breached
For some mature encryption methods that are difficult to crack, they can solve the problem of high encryption security, but there are problems such as slow operation speed and complex implementation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data packet encryption method, data packet decryption method, data packet sending end and data packet receiving end
  • Data packet encryption method, data packet decryption method, data packet sending end and data packet receiving end
  • Data packet encryption method, data packet decryption method, data packet sending end and data packet receiving end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0054] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data packet encryption method, a data packet decryption method, a data packet sending end and a data packet receiving end, and relates to the technical field of data encryption. The data packet encryption method comprises the steps that a sending end configures a plurality of scrambling polynomial sequences; an encryption head is set in the data packet of the sending end;wherein the encryption head is a second scrambling polynomial sequence randomly selected from the plurality of scrambling polynomial sequences; and the data packet is encrypted and then the data packet is output. The data decryption method comprises the following steps: receiving a data packet; analyzing an encryption head in the received data packet; wherein the encryption head is a second scrambling polynomial sequence randomly selected from a plurality of scrambling polynomial sequences configured at a sending end; and decrypting the data packet according to the analyzed encryption head. The method can improve the encryption level, is not easy to crack, is simple, is easy to implement, is high in encryption speed, and is good in encryption effect.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a data packet encryption method and decryption method, a data packet sending end and a receiving end. Background technique [0002] With the rapid development of electronic information technology, more and more data are transmitted through the network. In order to ensure the security of data during network transmission, it is necessary to encrypt the data. At present, when encrypting data packets such as video, audio, and network, most of them use the method of generating a pseudo-random sequence, and perform an XOR operation on the input signal and the pseudo-random sequence to generate a pseudo-random encrypted data packet, but this method exists The problem of low security and easy to be broken. For some mature encryption methods that are difficult to crack, they can solve the problem of high encryption security, but there are problems such as slow operation speed and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/20H04L9/18
CPCH04L9/0656H04L9/065
Inventor 孙怀义
Owner BEIJING TRICOLOR TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products