Chained data encryption method, chained data decryption method and corresponding systems

A chained data and encryption method technology, which is applied in the field of information security in computer technology, can solve problems such as insufficient encryption strength, huge amount of calculation, long encryption and decryption process, etc., and achieve enhanced encryption effect, improved processing efficiency, and improved encryption effect Effect

Pending Publication Date: 2020-09-11
BANK OF CHINA
View PDF12 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the SM3 digest algorithm is not used, data integrity cannot be guaranteed, and there is no effective way to ensure data integrity at the splicing point. It can be seen that this method has great limitations. For example, in the case of a large amount of data, use Digital Envelope Encryption Efficiency Still Unsatisfactory
When the amount of data reaches several G, the encryption and d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chained data encryption method, chained data decryption method and corresponding systems
  • Chained data encryption method, chained data decryption method and corresponding systems
  • Chained data encryption method, chained data decryption method and corresponding systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0044]Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0045] According to the embodiments of the present invention, a chained data encryption met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a chained data encryption method, a chained data decryption method and corresponding systems, and the chained data encryption method comprises the steps: obtaining to-be-encrypted data, and splitting the to-be-encrypted data into a plurality of data packets; generating an initial random symmetric key corresponding to each data packet; utilizing a public key of a receiver andthe initial random symmetric secret key to respectively carry out chain type data encryption on each data packet; and combining the digital signature of the sender and each encrypted data packet which is encrypted, and sending the combined data packet to a receiver. According to the scheme, in encryption and decryption operation of large-scale data, the processing efficiency can be greatly improved; on the premise that the system processing amount is not increased, the encryption effect is obviously enhanced, meanwhile, under the condition that an abstract algorithm is not increased, the datahas tamper resistance, multiple different encryption algorithms in a cloud platform can be effectively compatible, and the transformation cost is low.

Description

technical field [0001] The invention relates to the technical field of information security in computer technology, in particular to a chain data encryption method, a chain data decryption method and a corresponding system. Background technique [0002] In the prior art, big data encryption usually uses a single host to complete the encryption of big data or use digital envelope technology for encryption; among them, there are some obvious disadvantages in the way of single host to complete the big data encryption, for example, the execution efficiency is very low, and the execution efficiency of big data is very low. Digest algorithms are very inefficient and often fail to verify data integrity. [0003] Because the digital envelope technology takes into account the characteristics of high efficiency of symmetric encryption and strong security of asymmetric encryption, it plays an important role in today's data processing. However, the digital envelope encryption technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L9/14H04L9/32
CPCH04L63/045H04L63/08H04L9/0618H04L9/14H04L9/3247
Inventor 张牧宇
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products