Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method, decryption method and device

A technology of data encryption and encryption algorithm, which is applied in the computer field and can solve problems such as small scope of application

Active Publication Date: 2022-05-20
ALIBABA CLOUD COMPUTING LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing order-visible encryption algorithm only supports the encryption and comparison of positive integers, and its scope of application is small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, decryption method and device
  • Data encryption method, decryption method and device
  • Data encryption method, decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] refer to figure 1 , figure 1 It is a flow chart of steps of a data encryption method according to Embodiment 1 of the present application. Specifically, the data encryption method provided in this embodiment includes the following steps:

[0031] Step 102, acquire plaintext data to be encrypted expressed in binary format.

[0032] The data type of the plaintext data to be encrypted in the embodiment of the present application may be an integer or a floating point number, and may be a positive integer, a negative integer, a positive floating point data or a negative floating point number.

[0033] In the embodiment of the present application, there is no limitation on the data length of the plaintext data to be encrypted, for example, it may be 64 bits, or 32 bits, and so on.

[0034] Step 104: Based on the data type of the plaintext data to be encrypted, the plaintext data to be encrypted is reversed using a corresponding bit flipping method to obtain sequence-preser...

Embodiment 2

[0047] refer to image 3 , image 3 It is a flowchart of steps of a data encryption method according to Embodiment 2 of the present application. Specifically, the data encryption method provided in this embodiment includes the following steps:

[0048] Step 302, acquire plaintext data to be encrypted expressed in binary format.

[0049] Step 304: Based on the data type of the plaintext data to be encrypted, the plaintext data to be encrypted is reversed using a corresponding bit flipping method to obtain sequence-preserving binary plaintext data.

[0050] Among them, if the data type is a positive integer, negative integer or positive floating point number, only the high bits of the plaintext data to be encrypted are flipped; if the data type is a negative floating point number, all bits of the plaintext data to be encrypted are flipped.

[0051] Step 306: Segment the sequence-preserving binary plaintext data in order from the highest bit to the lowest bit to obtain a plain...

Embodiment 3

[0089] refer to Figure 5 , Figure 5 It is a flow chart of steps of a data decryption method according to Embodiment 3 of the present application. Specifically, the data decryption method provided in this embodiment includes the following steps:

[0090] Step 502, acquiring the ciphertext data and the data type of the plaintext data corresponding to the ciphertext data.

[0091] Step 504: Decrypt the ciphertext data by using a decryption algorithm corresponding to the sequence-visible encryption algorithm to obtain sequence-preserving binary plaintext data.

[0092] Step 506: According to the data type, the sequence-preserving binary plaintext data is flipped using a corresponding bit flipping method to obtain plaintext data corresponding to the ciphertext data.

[0093] In the data encryption stage, the bit flipping method corresponding to the data type of the plaintext data to be encrypted is adopted, and the plaintext data to be encrypted is flipped. Correspondingly, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a data encryption method, a decryption method, and a device. The data encryption method includes: obtaining the plaintext data to be encrypted in binary format; based on the data type of the plaintext data to be encrypted, using the corresponding bit flipping method to flip the plaintext data to be encrypted to obtain the binary plaintext data in order; the sequence can be seen Encryption algorithm, which encrypts sequence-preserving binary plaintext data to obtain ciphertext data. In the embodiment of the present application, the order-visible encryption of positive integers, negative integers, and positive floating-point numbers and negative floating-point data types of plaintext data is realized, and the scope of application is wider.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular, to a data encryption method, a decryption method, and a device. Background technique [0002] In the era of big data, the data of the data holder is often hosted and stored by a third party (such as a cloud vendor hosting platform, etc.). When the data needs to be calculated, such as: numerical comparison, it is usually handed over to the above-mentioned third party to complete the calculation. However, for sensitive data, it needs to be encrypted by the data holder before being uploaded to a third party. Although encryption can ensure data security and meet privacy protection requirements, third parties usually cannot perform data calculations based on encrypted data because the data cannot be decrypted. [0003] The order-visible encryption algorithm, as a cryptographic method, does not require to maintain the binary order of the ciphertext, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/18H04L9/40
CPCH04L9/065H04L63/0457G06F21/602
Inventor 汪晟李飞飞李亦然苏乐黎火荣
Owner ALIBABA CLOUD COMPUTING LTD