Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method, decryption method, communication method, system and device

An encryption method and a technology for encrypting strings, which are applied in secure communication devices, encryption devices with shift registers/memory, transmission systems, etc. Universality, the effect of improving real-time security

Active Publication Date: 2021-06-18
南京铉盈网络科技有限公司 +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Common algorithms used for network communication encryption, such as RSA, are mostly used in network security checks in cloud systems. The process is complex, asymmetric encryption, encryption and decryption are slow, and the use of algorithms and the loading of algorithm libraries are also more troublesome. Without real-time verification of data communication, it is not suitable for real-time and fast interaction of LAN data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method, communication method, system and device
  • Encryption method, decryption method, communication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0062] The invention provides a communication method, comprising the following steps:

[0063] For a raw string "HardwareType#1#1004",

[0064] Process 1 encrypts the original string to obtain the encrypted string 0YFhpus01y98UpMg1bAs0fICp9vHY7DEExd8p1XcQeE42Riuu6Iv.

[0065] Process one sends the encrypted string to process two.

[0066] After process 2 receives the encrypted string, it decrypts the encrypted string to obtain the original string HardwareType#1#1004.

[0067] Based on the same inventive concept, the present invention also provides a communication system, including an encryption module, a sending module, a receiving module and a decryption module.

[0068] Based on the same i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method, a decryption method, a communication method and systems and devices thereof. The method comprises the following steps: initializing a state vector K; performing binary conversion on the algorithm key to form a first byte stream, and generating an index number; marking frame header information of the algorithm key according to the index number; rotating the first byte stream to form a new password state vector Q; performing loss XOR calculation on the state vector K, the password state vector Q and the original character string to form a second byte stream; storing the second byte stream in an array to form a character encryption string; and according to the real-time timestamp, the index number and the data key, encrypting the character encryption string by using base64 to obtain an encrypted character string. According to the encryption and decryption method, on the basis of matrix loss symmetric conversion, the formed result is complex, cutting irregularity can follow, meanwhile, the generated string is the binary password stream, the generated string cannot be simulated, brute force cracking is difficult, and the safety level is high.

Description

technical field [0001] The invention belongs to the technical field of data communication encryption, and in particular relates to an encryption method, a decryption method, a communication method and a system and device thereof. Background technique [0002] Common algorithms used for network communication encryption, such as RSA, are mostly used for network security verification in cloud systems. Without the real-time verification of data communication, it is not suitable for real-time and fast interaction of LAN data. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide an encryption method, a decryption method, a communication method and their system and device, which can encrypt and decrypt data by using two-level keys to further improve the security of data transmission. [0004] The present invention is achieved in that a kind of encryption method comprises the steps: [0005] Initialize the state vector K; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/32
CPCH04L9/0656H04L9/3297
Inventor 张洁王刚周维杰
Owner 南京铉盈网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products