Supercharge Your Innovation With Domain-Expert AI Agents!

Cryptographic algorithm encryption and decryption system

A cryptographic algorithm, encryption and decryption technology, applied in the field of cryptographic algorithm encryption and decryption systems, can solve problems such as inconvenient operation and inability to use normally, and achieve the effect of ensuring security

Pending Publication Date: 2020-02-28
CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are frequent personal information leakage incidents in some industries, and criminals even use the massive data information that has been leaked to conduct correlation analysis, and even make customer portraits. After accurately locating the user's identity, they carry out precise fraud. Information leakage involves all walks of life: Finance, government agencies, public institutions, communication operators, IT information technology, education and scientific research, manufacturing, life services, energy, social security, transportation, etc., data encryption is the core of preventing data leakage, so it is involved in various fields Encryption and decryption of information. In modern cryptography, common encryption systems can be divided into three categories, symmetric encryption algorithm, asymmetric encryption algorithm and Hash algorithm. At present, encryption algorithms play a very important role in both academia and other application fields. However, there are only some online tools on the market that provide encryption and decryption of individual encryption algorithms, and there is no system that truly integrates common encryption algorithms for users to use. In addition, the disadvantage of using online tools is that they cannot be used normally when there is no network connection. Inconvenient to operate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic algorithm encryption and decryption system
  • Cryptographic algorithm encryption and decryption system
  • Cryptographic algorithm encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] like Figure 1-3 As shown, the present invention provides a technical solution: a cryptographic algorithm encryption and decryption system, comprising an information input unit 1, a receiving buffer module 2, an encryption and decryption chip 3, an output buffer module 4 and a display unit 5, the output of the information input unit 1 The terminal is connected to the input terminal of the buffer module 2, the output terminal of the buffer module 2 is connected to the input terminal of the encryption and decryption chip 3, the output terminal of the encryption and decryption chip 3 is connected to the input terminal of the output buffer module 4, and the output buffer The output terminal of the module 4 is signal-connected to the input terminal of the display unit 5 .

[0016] Further, the encryption and decryption chip 3 includes a key generation unit 301, an arithmetic unit 302, an encryption unit 303, a key expansion module 304, a decryption unit 305 and a collection ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of encryption and decryption. The invention further discloses a cryptographic algorithm encryption and decryption system. The system comprises an information input unit, a receiving buffer module, an encryption and decryption chip, an output buffer module and a display unit, the output end of the information input unit is connected with the input end ofthe receiving buffer module; the output end of the receiving buffer module is connected with the input end of the encryption and decryption chip; wherein the output end of the encryption and decryption chip is connected with the input end of the output buffer module, the output end of the output buffer module is connected with the input end of the display unit, and the encryption and decryption chip comprises a key generation unit, an operation unit, an encryption unit, a key expansion module, a decryption unit and a collection unit. The problems that only some online tools on the market provide encryption and decryption of individual encryption algorithms, no system truly integrating common encryption algorithms is provided for users to use, and in addition, the online tools have the defects that the online tools cannot be normally used and are inconvenient to operate when network connection does not exist are solved.

Description

technical field [0001] The invention relates to the technical field of encryption and decryption, in particular to a cryptographic algorithm encryption and decryption system. Background technique [0002] So far, a large number of major information leakage incidents at home and abroad have been exposed by the media. The leaked information ranges from hundreds of thousands to hundreds of millions. The harm of information leakage has also attracted great attention from the whole society. Information leakage has become a risk source of security problems, and from the perspective of the types of information leaked by institutions, it is mainly divided into two categories, personal information and confidential information. Technical secrets and other confidential information, in the wave of rapid development of the big data industry, personal information security and privacy protection are facing a severe situation. As the core content of data information, personal information i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0869
Inventor 张丽娟陈柔伊赖宇阳陈海倩孙宏棣杨漾江瑾田占军曹夏莎
Owner CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More