Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Particle-Based Data Security Protection Method

A data security and security protection technology, applied in the field of information security, can solve the problem of high probability of stealing and restoring some valid information

Active Publication Date: 2021-01-01
BEIJING CHERILEAD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, data packet security protection methods generally adopt data multi-byte packet encryption because of the need to ensure efficiency, and the smallest encryption basic unit is the number of bytes in a packet. In this case, no matter which packet encryption method is used, Even if the stealer cannot completely steal all the information, the probability of stealing and restoring some valid information is still very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Particle-Based Data Security Protection Method
  • A Particle-Based Data Security Protection Method
  • A Particle-Based Data Security Protection Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0076] The embodiment of the present invention provides a particle-based data security protection method, such as figure 1 shown, including:

[0077] Step S1: Obtain a set of plaintext data ;

[0078] Step S2: For the plaintext data Perform preprocessing to obtain plaintext packet data ;

[0079] Step S3: grouping the plaintext data Perform the first pseudo-random permutation to obtain permutation data ;

[0080] Step S4: For the replacement data Perform block encryption to obtain block encrypted data ;

[0081] Step S5: Encrypt data to the group Perform the second pseudo-random permutation to obtain ciphertext data .

[0082] The working princ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a particle-based data security protection method, comprising: step S1: obtaining a group of plaintext data; step S2: preprocessing the plaintext data to obtain plaintext group data; step S3: performing the first forgery on the plaintext group data Obtaining permutation data by random permutation; step S4: performing block encryption on the permutation data to obtain block encryption data; step S5: performing second pseudo-random permutation on block encryption data to obtain ciphertext data. The particle-based data security protection method of the present invention reduces the probability of secret stealers stealing and restoring valid information, and improves the security of data transmission.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a particle-based data security protection method. Background technique [0002] At present, data packet security protection methods generally adopt data multi-byte packet encryption because of the need to ensure efficiency, and the smallest encryption basic unit is the number of bytes in a packet. In this case, no matter which packet encryption method is used, Even if the stealer cannot completely steal all the information, the probability of stealing and restoring some valid information is still very high. Contents of the invention [0003] One of the purposes of the present invention is to provide a data security protection method based on granularity, which changes the general coarse-grained group bytes as the basic unit of encryption into fine-grained bits as the basic unit of encryption, which greatly reduces the number of thieves who steal and restore The prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/0631H04L9/14
Inventor 张凯郑应强赵旭春
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products