File encryption method

A file encryption and file technology, applied in the field of information security, can solve the problems of low efficiency of key selection and file encryption, and achieve the effect of ensuring file encryption security, improving file encryption efficiency, and high security requirements

Active Publication Date: 2021-04-16
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing block cipher-based file encryption method firstly selects different secret keys for different plaintext segments, which requires a lot of calculations each time, and secondly, in the process of secret key selection, there may be failed secret keys, which need to be repeated many times selected, thereby causing the file encryption efficiency to be very low, for example, the application publication number is CN110677237A, and the patent application titled "a file encryption method with a chaotic characteristic" discloses a file encryption method with a chaotic characteristic. The steps are as follows: read the content of the source file M to be encrypted as plaintext data, group the plaintext data based on the irrational DES algorithm and perform iterative encryption with the key block, and obtain the plaintext encrypted information through the iteratively encrypted ciphertext through cyclic shift and replacement ;In order to strengthen the security of file encryption, the SM3 hash algorithm is used to preprocess the password input by the user to generate a digital summary, and the natural logarithm operation is performed with E as the base to generate an irrational key from the digital summary; through multiple irrational numbers XOR Operation, cyclically encrypt the irrational number code and the plaintext encrypted information respectively, construct an encrypted environment with chaotic characteristics, and add the verification information combination file to generate the ciphertext file
However, its disadvantages are: this method requires quite complicated calculations for the DES key block generation process used in the plaintext block encryption process and the irrational number key generation process used in the user-input password encryption process, so the secret The key selection efficiency is very low, resulting in low file encryption efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method
  • File encryption method
  • File encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]The present invention will be further described below with reference to the accompanying drawings and specific embodiments:

[0032]Referfigure 1The present invention includes the following steps:

[0033]Step 1) The encryption party is pre-processed to the encrypted file F:

[0034]The encryption party will be evenly divided into J file fragments to be encrypted files to be encrypted. The length of each file fragment is 8 bytes in this instance, and the file segment collection f '= {f1, f2, ..., fj, ..., fJ} And Fragment f for each filejThe character transcoding, the common encoding method has Unicode encoding, UTF-8 encoding, base64 encoding, since Base64 encoding is simple to encrypt data compared to the first two way, this embodiment is encoded in this embodiment, obtained Place set m = {m1, M2, ..., Mj, ..., MJ}, Where fjRepresents the jth file fragment, MjFlyjCorresponding places.

[0035]For file encryption, in order to ensure security, it is usually necessary to segment the file f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file encryption method, which is used for solving the technical problem of low file encryption efficiency caused by low key selection efficiency in the existing file encryption method, and comprises the following implementation steps that: (1) an encryption party preprocesses a file F to be encrypted; (2) the encryption party generates a root key vector S; (3) the encryption party acquires a public vector H and a secret key set key; (4) the encryption party generates a ciphertext vector set C; (5) the encryption party generates a ciphertext file and a key file and sends the ciphertext file and the key file; and (6) the decryption party decrypts the ciphertext file C. According to the method, the encryption security is ensured based on the LWE difficulty problem in the second vector selection process, and meanwhile, the secret key is generated by randomly selecting the first vector and calculating the secret key parameter only through one-time vector multiplication in the secret key selection process, so that the secret key selection efficiency is improved, and the file encryption efficiency is improved.

Description

Technical field[0001]The present invention belongs to the information security technology, and it is directed to a information encryption method, and more particularly to a file encryption method.Background technique[0002]With the rapid development of network technology, the network security problem has become the focus of concern, and when people share the confidentiality requirements with higher requirements, the basic process of file encryption is required. The sender encrypts the file to be encrypted as a ciphertext file to be encrypted and sent to the decryption party through a series of operations. The decryption party uses the secret key to decrypt the decryption file. Among them, the encryption process can be reversible and encrypted files can be recovered by decimation algorithm using the secret key. The file encryption method used to share files on the Internet to share the requirements of the paper requires higher encryption security and higher encryption efficiency, whil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 于港添刘琛洋姜培海王晨泽郭志浩王小豪吕锡香
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products