Supercharge Your Innovation With Domain-Expert AI Agents!

Reserved format encryption method based on stream cipher

A format-preserving encryption and stream cipher technology, applied in the field of information security, can solve problems such as reducing data availability, changing ciphertext length and type, affecting database structure and business system functions, etc., achieving low complexity, high encryption and decryption efficiency and performance effect

Active Publication Date: 2020-02-14
GUIZHOU UNIV
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a format-preserving encryption method based on a stream cipher, which can make the telephone number still maintain the characteristics of the original data format after encryption, and is a legal telephone number, which can solve the problem that traditional encryption techniques will cause The length and type of ciphertext change, which reduces data availability and affects database structure and business system functions, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reserved format encryption method based on stream cipher
  • Reserved format encryption method based on stream cipher
  • Reserved format encryption method based on stream cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the present invention: use a stream cipher-based format-preserving encryption method according to the present invention to encrypt and decrypt the 11-digit telephone number plaintext, and select the ZUC algorithm in the stream cipher algorithm. The structure of the ZUC algorithm is divided into upper, middle and lower layers. The upper layer is a 16-level linear feedback shift register (LFSR), the middle layer is bit reorganization (BR), and the lower layer is a nonlinear function (F). The ZUC algorithm belongs to the stream cipher (sequence cipher), input the initial key of 128bits and the initial vector of 128bits, every time it is run, it will generate a keyword of 32bits (a bit string composed of 2 or more bits is called a word) Sequence, group the plaintext to be encrypted according to the required length, and then use the key stream generated by the encryption algorithm to encrypt the plaintext message group respectively, so as to obtain the correspo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reserved format encryption method based on a stream cipher. The reserved format encryption method comprises: segmenting a telephone number, constructing a mapping rule, and establishing a region number replacement table for the first three region numbers, so as to complete encryption of the first three region numbers and guarantee the legality of an encryption result; forthe last eight telephone numbers, carrying out XOR operation on the last eight telephone numbers by utilizing a key stream generated by a ZUC (Zu Chongzhi) algorithm, realizing conformal encryption by combining modular operation, and introduces a Lagrange interpolation formula, so as to guarantee the correctness of encryption and decryption. According to the reserved format encryption method, theconsistency and legality of formats before and after data encryption are safely and effectively realized, and the statistical characteristics of plaintexts are well hidden, so that the data is protected in the transmission process under the condition that the format is not changed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a format-preserving encryption method based on a stream cipher. Background technique [0002] In the era of big data and cloud computing, while many APP software and social software used in our life bring us convenience, they also collect our data information all the time. These data include many personal sensitive data, especially phone numbers. Sensitive data that will inevitably be collected has high value and is easy to be stolen and used by criminals. Once stolen, it is likely to cause property loss or life troubles, such as winning text messages, assisting the police in investigating cases, and pretending to be others In the form of urgent money transfer, etc., the target object will transfer the funds to the designated account, so as to achieve the purpose of defrauding and obtaining huge profits. In September 2019, Facebook's database of hundreds of millions...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6227G06F21/6245G06F2221/2107H04L9/065Y02D30/50
Inventor 彭长根陈佳丁红发赵园园
Owner GUIZHOU UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More