Data security protection method based on granulation

A data security and granular technology, applied in the field of information security, can solve the problem of high probability of stealing and restoring some valid information

Active Publication Date: 2020-10-13
BEIJING CHERILEAD TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, data packet security protection methods generally adopt data multi-byte packet encryption because of the need to ensure efficiency, and the smallest encryption basic unit is the number of bytes in a p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method based on granulation
  • Data security protection method based on granulation
  • Data security protection method based on granulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0084] The embodiment of the present invention provides a particle-based data security protection method, such as figure 1 shown, including:

[0085] Step S1: Obtain a set of plaintext data ;

[0086] Step S2: For the plaintext data Perform preprocessing to obtain plaintext packet data ;

[0087] Step S3: grouping the plaintext data Perform the first pseudo-random permutation to obtain permutation data ;

[0088] Step S4: For the replacement data Perform block encryption to obtain block encrypted data ;

[0089] Step S5: Encrypt data to the group Perform the second pseudo-random permutation to obtain ciphertext data .

[0090] The working princ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data security protection method based on granulation. The data security protection method comprises the following steps: S1, acquiring a group of plaintext data; Ss2, preprocessing the plaintext data to obtain plaintext grouped data; Ss3, performing first pseudo-random replacement on the plaintext grouped data to obtain replacement data; Ss4, performing grouping encryptionon the replacement data to obtain grouping encryption data; and S5, performing second pseudo-random replacement on the block encryption data to obtain ciphertext data. According to the data securityprotection method based on granulation, the probability that a secret stealer steals and restores effective information is reduced, and the security of data transmission is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a particle-based data security protection method. Background technique [0002] At present, data packet security protection methods generally adopt data multi-byte packet encryption because of the need to ensure efficiency, and the smallest encryption basic unit is the number of bytes in a packet. In this case, no matter which packet encryption method is used, Even if the stealer cannot completely steal all the information, the probability of stealing and restoring some valid information is still very high. Contents of the invention [0003] One of the purposes of the present invention is to provide a data security protection method based on granularity, which changes the general coarse-grained group bytes as the encryption basic unit into fine-grained bits as the encryption basic unit, which greatly reduces the number of secrets stolen and restored by thieves. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/0631H04L9/14
Inventor 张凯郑应强赵旭春
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products