Data encryption and decryption method based on uniform distribution symmetry algorithm

A technology of data encryption and symmetric algorithm, applied in encryption devices with shift registers/memory, digital transmission systems, user identity/authority verification, etc., can solve the problems of high risk and easy theft of encrypted data. Increase the difficulty, effectively verify, and crack the effect of high difficulty

Active Publication Date: 2020-06-19
上海领甲数据科技有限公司
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a data encryption and decryption method based on a uniformly distributed symmetric algorithm, which is used to solve the problem that encrypted data is easily stolen during the verification process of digital certificates and blockchains. take, the problem of higher risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method based on uniform distribution symmetry algorithm
  • Data encryption and decryption method based on uniform distribution symmetry algorithm
  • Data encryption and decryption method based on uniform distribution symmetry algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0027] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption and decryption method based on a uniform distribution symmetry algorithm, and the method comprises the following steps: 1, obtaining a hash sequence of a secret key according to the secret key set by a user, and calculating a displacement weight value corresponding to the hash sequence; 2, performing shift encryption on the plaintext according to the displacement weight value to obtain a shift ciphertext, and performing Base64 encryption on the shift ciphertext to enable the ciphertext to be an ASCII code sequence to obtain a Base64 ciphertext; 3, generating an obfuscated sequence according to the hash sequence, enabling the obfuscated sequence to be an ASCII code sequence, and inserting the obfuscated sequence into the Base64 ciphertext to obtain aformal ciphertext; the problems that in the verification process of the digital certificate and the block chain, the encrypted data is easy to steal, and the risk is high are solved.

Description

technical field [0001] The invention relates to the field of data encryption and decryption, in particular to a data encryption and decryption method based on a uniform distribution symmetric algorithm. Background technique [0002] During the verification process of digital certificates and blockchains, a pair of matching keys is used to encrypt and decrypt confidential files to ensure file security. At present, the commonly used encryption and decryption methods are mostly based on symmetric algorithms such as DES, 3DES, RC5, IDEA, and SM1. [0003] Among them, the DES algorithm is a symmetric cryptographic system in the cryptographic system, also known as the American Data Encryption Standard. The plaintext is grouped by 64 bits, and the key length is 64 bits. In fact, the key is 56 bits to participate in the DES operation (8th, 16th) , 24, 32, 40, 48, 56, and 64 bits are check bits, so that each key has an odd number of 1) the plaintext after grouping and the 56-bit key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/32
CPCH04L9/0643H04L9/3268H04L9/3239
Inventor 刘红梅陆长明
Owner 上海领甲数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products