Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and device, decryption method and device, computer equipment and storage medium

An encryption method and ciphertext technology, applied in the field of information security, can solve the problems of large computing resources and storage space, real-time encryption and occupation of inapplicable data, etc.

Active Publication Date: 2020-06-05
广州华迅网络科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above encryption method takes up large computing resources and storage space, and is not suitable for the scenario of real-time encryption of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, decryption method and device, computer equipment and storage medium
  • Encryption method and device, decryption method and device, computer equipment and storage medium
  • Encryption method and device, decryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0105] The encryption method and decryption method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the computer device 100 may be a radio frequency tag, or a terminal device such as a mobile phone, an Internet of Things module, a tablet computer, and a portable wearable device, or a server, and the type of the computer device 100 is not limited here.

[0106] In one embodiment, such as figure 2 As shown, an encryption method is provided, which is applied to figure 1 The computer equipment 100 in is taken as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption method and device, a decryption method and device, computer equipment and a storage medium, and the method comprises the steps: enabling the computer equipment to group a to-be-encrypted plaintext sequence, respectively converting at least one obtained data group into a plaintext matrix, and obtaining a plaintext matrix sequence, wherein the row number and the column number of the plaintext matrix being preset row number and column number respectively; then, obtaining a diffusion seed matrix, and respectively performing matrix operation on the plaintext matrix according to the diffusion seed matrix to obtain a ciphertext matrix; obtaining the diffusion seed matrix based on diffusion initial parameters and a preset first nonlinear mapping relationship;and finally, converting data in each ciphertext matrix corresponding to the plaintext matrix sequence into a vector to obtain a ciphertext sequence corresponding to the plaintext sequence. By adopting the method, the encryption real-time performance of the plaintext sequence can be improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to an encryption method, a decryption method, a device, a computer device and a storage medium. Background technique [0002] With the rapid development of network technology, the importance of network security technology has become increasingly prominent. Encryption technology is the core technology in network security technology, and it is also the main security and confidentiality measures adopted by e-commerce. The technology for encrypting information is divided into two categories, namely symmetric encryption and asymmetric encryption. The former is characterized by the use of the same key for file encryption and decryption, while the latter requires a public key (public key) and a private key (private key). Two keys; the public key and the private key are a pair. If the information is encrypted with the public key, it can only be decrypted with the cor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/08H04L29/06
CPCG06F21/602H04L9/0861H04L9/0869H04L63/0428
Inventor 欧阳敏宁盛先富
Owner 广州华迅网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products