Unlock instant, AI-driven research and patent intelligence for your innovation.

Ciphertext generation method and device

A technology of ciphertext and generating function, which is applied in the field of communication, can solve the problems of interface and message format influence, difficulty, and high cost, and achieve the effect of keeping the same, reducing cost and difficulty, and increasing the complexity of ciphertext

Inactive Publication Date: 2020-12-25
BANK OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing technology replaces the MD5 algorithm with the SHA-2 algorithm (Secure Hash Algorithm 2, Secure Hash Algorithm 2) that generates a 256-bit hash value to prevent the ciphertext generated by it from being violently cracked, but because the MD5 algorithm and SHA- 2 The length of the ciphertext generated by the algorithm is different. This improvement will have an impact on the interface and message format of the existing system, and the cost of transformation is high and difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext generation method and device
  • Ciphertext generation method and device
  • Ciphertext generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the above objects, features and advantages of the present application more obvious and understandable, the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0044] First, the MD5 algorithm (Message-Digest Algorithm, information digest algorithm) is used to generate a 128-bit (16-byte) hash value. The MD5 algorithm is improved from the MD4 algorithm, MD3 algorithm, and MD2 algorithm, and mainly enhances the complexity and irreversibility of the algorithm. The MD5 algorithm is still widely used in the field of encryption and protection of ordinary data because of its universality, stability and speed.

[0045] The inventor found in the research that at present, because the MD5 algorithm has the possibility of being cracked, the existing technology replaces the MD5 algorithm with the SHA-2 algorithm (Secure Hash Algorithm 2, Secure Hash Algor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a ciphertext generation method, and the method comprises the steps: obtaining a first ciphertext which is a ciphertext obtained after the encryption of a target message throughan information digest algorithm; performing logical operation processing and / or shift processing on the first ciphertext to generate a second ciphertext; intercepting a part of ciphertext with a preset length from the second ciphertext, and inputting the part of ciphertext with the preset length into a random number generation function to obtain a randomly processed ciphertext with the preset length; and replacing a part of intercepted ciphertext with the preset length in the second ciphertext with the randomly processed ciphertext with the preset length, and obtaining a third ciphertext after replacement. According to the method, on the basis of remarkably improving the complexity of the ciphertext, the length of the ciphertext is kept unchanged, influence on a system interface and a message format encrypted by an existing MD5 algorithm is small, and the cost and difficulty of system transformation encrypted by the existing MD5 algorithm are reduced.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method and device for generating ciphertext. Background technique [0002] Message-Digest Algorithm (MD5) is a cryptographic hash function that generates a 128-bit hash value, and is widely used in existing application systems. However, with the continuous development of computer computing power and the accumulation of collision cipher libraries during the application of the MD5 algorithm, the ciphertext generated by the MD5 algorithm may be cracked by violence. [0003] At present, the existing technology replaces the MD5 algorithm with the SHA-2 algorithm (Secure Hash Algorithm 2, Secure Hash Algorithm 2) that generates a 256-bit hash value to prevent the ciphertext generated by it from being violently cracked, but because the MD5 algorithm and SHA- 2 The length of the ciphertext generated by the algorithm is different. This improvement will have an im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0861H04L9/0869
Inventor 王公桃吕鹏张梦雅孙波丁先
Owner BANK OF CHINA