Data encryption and decryption method, device, electronic device and storage medium

A data encryption and data technology, applied in secure communication devices, electrical components, digital transmission systems, etc., can solve the problems of low security and achieve the effect of high security

Active Publication Date: 2021-11-16
WUBA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a data encryption and decryption method, device, electronic equipment and storage medium to solve the problem of low security of existing symmetric encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device, electronic device and storage medium
  • Data encryption and decryption method, device, electronic device and storage medium
  • Data encryption and decryption method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0085] Data is transmitted from the sending end to the receiving end through the network. During the transmission process, if the data is encrypted, it can effectively prevent data leakage. The traditional symmetric encryption method requires the receiving and sending ends to negotiate and maintain the same key store in advance, and the k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a data encryption and decryption method, device, electronic equipment and storage medium. The method first generates a position data set according to a preset picture library, and then obtains a color value data set according to the position data set. The color value data set It includes the color value data of the pixels represented by each group of position data in the position data set, and encrypts the data to be sent according to the color value data set to obtain ciphertext, and finally sends the ciphertext and position data set to the receiving end. In this application method, the sending end uses the image resources consistent with the receiving end as the key source to realize the dynamic generation of the key, and the receiving end obtains the information used by the sending end according to the location data set used by the sending end combined with the image resources consistent with the sending end. The key is used to decrypt the ciphertext, which has higher security while realizing symmetric encryption.

Description

technical field [0001] The present application relates to the technical field of data encryption, in particular to data encryption and decryption methods, devices, electronic equipment and storage media. Background technique [0002] In communication systems, plaintext refers to unencrypted bit streams, such as text, bitmap, digitized voice or video images, etc. Information can be obtained from plaintext through some kind of public encoding standard. The plaintext is processed by an encryption algorithm to generate ciphertext, and the ciphertext is decrypted by the corresponding decryption algorithm to obtain the plaintext. [0003] Data is transmitted from the sending end to the receiving end through the network. During the transmission process, if the data is encrypted, it can effectively prevent data leakage. Symmetric encryption is a commonly used data encryption method. In this method, the sending end needs to use a key unknown to the third party to encrypt and send t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L9/0872H04L63/0435
Inventor 刘孟彭飞邓竹立
Owner WUBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products