Signature-based matrix dual encryption method
A double encryption and matrix technology, applied in the field of information security, can solve problems such as information leakage, achieve the effect of ensuring security, reducing the possibility of information leakage, and increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] The present invention will be further explained below in conjunction with the accompanying drawings and specific embodiments.
[0014] Such as figure 1 As shown, a signature-based matrix double encryption method includes a data encryption method and a data decryption method; wherein, the data encryption method is to generate a secret key, and use the key to encrypt the original data, so that the original data is converted into encrypted Data; after data plaintext encryption, data decryption needs to master the key matrix to convert the signature data before decrypting the ciphertext; the signature matrix is the same as above, and the converted matrix is obtained; the signature data is the key and the key The data string after matrix conversion is transmitted together with the ciphertext; the key matrix is a digital matrix obtained after the key data encoding conversion, and the key matrix is a matrix agreed by the encryption end and the decryption end, which is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com