Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption key generation and encryption method, decryption key generation and decryption method

An encryption key and decryption key technology, applied to the usage of multiple keys/algorithms and key distribution, can solve problems such as the loss of meaning of data cracking, the complexity of encryption algorithms, and increase data security, so as to ensure performance and improve data security. The effect of cracking difficulty and increasing security

Pending Publication Date: 2020-02-14
西安瑞思凯微电子科技有限公司
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to increase data security, we can only continuously increase the complexity of the encryption algorithm and increase the difficulty of cracking
But any algorithm has the possibility of being cracked, so to increase data security, in addition to increasing the complexity of the algorithm, the time cost and economic cost of cracking should also be increased. When the cost of cracking is much greater than the benefits after cracking, it is meaningless for data cracking
[0003] The traditional implementation of one packet one encryption is to negotiate a key before each data transmission. This scheme can be used in the case of low-speed small amount of data transmission, but for a large number of high-speed data packets, negotiating the key every time will seriously affect the transmission performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption key generation and encryption method, decryption key generation and decryption method
  • Encryption key generation and encryption method, decryption key generation and decryption method
  • Encryption key generation and encryption method, decryption key generation and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Data encryption can be seen everywhere. Common symmetric encryption or asymmetric encryption use fixed keys or regularly updated keys. Regardless of whether fixed keys or regularly updated keys are used, there are cases where a large number of data packets use the same key. In order to increase the security of data transmission and reduce the risk of being cracked, in addition to optimizing the encryption algorithm and increasing the difficulty of cracking, it is also necessary to increase the cost of cracking. For example, the cost of cracking a packet of data is 100 yuan, and the average income of cracking a packet of data It is 1 yuan. If you use a fixed key, cracking a packet of data is equivalent to cracking all the data. The cost of cracking is only 100 yuan, and the income is 1*n, where n is the number of data packets. As long as the obtained data packets are greater than 100 is profitable. However, if each packet of data is encrypted with a different key, the co...

Embodiment 2

[0095] On the basis of the first embodiment above, please refer to figure 2 , figure 2 It is a schematic flowchart of a method for generating a decryption key provided by an embodiment of the present invention. This embodiment provides a decryption key generation method including:

[0096] Step 1, obtaining the second key factor;

[0097] Step 2, setting a second fixed key, which is preset and stored in the decryption device;

[0098] Step 3, negotiating the second dynamic key, and obtaining the second dynamic key through negotiation between the encryption device and the decryption method according to the second configuration parameter and the second key negotiation method;

[0099] Step 4, performing a second logical operation on the second key factor, the second fixed key, and the second dynamic key to obtain the first decryption key;

[0100] Step 5: Perform a hash operation on the first decryption key to obtain a second decryption key, and the second decryption key i...

Embodiment 3

[0114] On the basis of the first embodiment above, please refer to image 3 , Figure 4 , image 3 is a schematic flowchart of a data encryption method provided by an embodiment of the present invention, Figure 4 It is a schematic diagram of the connection relationship between devices in a data encryption method and a data decryption method provided by an embodiment of the present invention. This embodiment provides a data encryption method, including a connected first network device and an encryption device, and the execution of the data encryption method on the encryption device includes:

[0115] Step 1, receiving the fifth network data frame, the fifth network data frame is sent by the first network device;

[0116] Step 2. Encrypt the fifth network data frame according to the preset encryption key to obtain ciphertext data;

[0117] Step 3. Send a sixth network data frame, where the sixth network data frame includes ciphertext data.

[0118] Specifically, see also ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption key generation method, an encryption method, a decryption key generation method and a decryption method. The encryption key generation method comprises the following steps: acquiring a first key factor; setting a first fixed key, wherein the first fixed key is preset and stored in the encryption equipment; negotiating a first dynamic key, and negotiating between the encryption equipment and the decryption equipment by the first key negotiation method according to the first configuration parameter to obtain the first dynamic key; performing first logical operation on the first key factor, the first fixed key and the first dynamic key to obtain a first encryption key; and performing hash operation on the first encryption key to obtain a second encryptionkey, wherein the second encryption key is used for encrypting data. According to the encryption key generation method provided by the invention, one-packet-one-key are realized, the complexity of theencryption key is high, the security of data transmission is improved, the cracking difficulty is improved, the generated encryption key does not need to be repeatedly set in the data transmission, and the network data transmission performance is ensured.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to an encryption key generation and an encryption method thereof, a decryption key generation and a decryption method thereof. Background technique [0002] Data encryption can be seen everywhere. Common symmetric encryption or asymmetric encryption use fixed keys or regularly updated keys. Regardless of whether fixed keys or regularly updated keys are used, there are cases where a large number of data packets use the same key. Hackers only need to attack and crack one packet of data to obtain the passwords of a large number of packets. In order to increase data security, we can only continuously increase the complexity of the encryption algorithm and increase the difficulty of cracking. But any algorithm has the possibility of being cracked, so to increase data security, in addition to increasing the complexity of the algorithm, the time cost and economic cost of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/08H04L9/06H04L29/06
CPCH04L9/14H04L9/0861H04L9/0838H04L9/0643H04L63/0428
Inventor 白建马星星齐振华范琳琳
Owner 西安瑞思凯微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products