Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, encryption device, storage medium and electronic equipment

An encryption method and encryption algorithm technology, applied in the field of information security, can solve problems such as the inability to defend against energy analysis attacks, and achieve the effects of increased difficulty, high usability, and low cost

Pending Publication Date: 2021-01-05
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present disclosure provides an encryption method, an encryption device, a computer-readable storage medium, and an electronic device, thereby solving the problem that related technologies cannot protect against energy analysis attacks to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, encryption device, storage medium and electronic equipment
  • Encryption method, encryption device, storage medium and electronic equipment
  • Encryption method, encryption device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method, an encryption device, a computer readable storage medium and electronic equipment, and relates to the technical field of information security. The encryption method comprises the following steps: selecting at least one first module and at least one second module from a plurality of preset encryption modules, wherein different encryption algorithms are adopted for different encryption modules; and controlling the first module to encrypt to-be-processed data, and controlling the second module to encrypt interference data. According to the invention, the power consumption information of the real encryption process is masked, and the difficulty of cracking the encrypted information by an attacker through power consumption analysis is increased.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to an encryption method, an encryption device, a computer-readable storage medium, and electronic equipment. Background technique [0002] With the development of computer and communication technology, people pay more and more attention to information security. For example, in mobile communication, users often need to send information related to personal privacy and property. Through PDCP (Packet Data Convergence Protocol, packet data convergence Protocol) layer provides data encryption, which can ensure the information security in the communication process. [0003] In related technologies, the security engine of PDCP uses algorithms such as Snow 3G (byte stream encryption algorithm of 3G communication system), ZUC (Zu Chongzhi algorithm), AES (Advanced Encryption Standard, Advanced Encryption Standard) and other algorithms to encrypt data. However, these...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 刘君
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD