Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetrical encryption and decryption algorithm subpackage processing method

A technology of symmetric encryption algorithm and encryption and decryption algorithm, which is applied in the direction of encryption device with shift register/memory, digital transmission system, electrical components, etc. It can solve the limitation of transmission medium transmission volume, troublesome key management, easy to be cracked, etc. problem, to avoid the limitation of transmission medium, reduce the probability of transmission failure, and save time consumption

Pending Publication Date: 2022-04-15
深圳君正时代集成电路有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 3. The process of key transmission is not safe, and it is easy to be cracked, and key management is also troublesome;
This leads to a waste of encryption time on the A side, time on the transmission medium B, and decryption time on the C side
[0017] 2: Due to the limitation of the transmission volume of the transmission medium, communication cannot be performed
[0018] The amount of encrypted data on the A side is 10k, and the existing transmission medium B can only transmit 8k at most, so it cannot communicate to the C side

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetrical encryption and decryption algorithm subpackage processing method
  • Symmetrical encryption and decryption algorithm subpackage processing method
  • Symmetrical encryption and decryption algorithm subpackage processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to understand the technical content and advantages of the present invention more clearly, the present invention will be further described in detail in conjunction with the accompanying drawings.

[0049] Different symmetric encryption algorithms have different subpackage methods, but the idea is roughly the same. Both are based on the encrypted data obtained by one-time encryption and segmental encryption of the encrypted data. Therefore, segmental encryption can be used.

[0050] like figure 2 Shown, the present invention relates to a kind of symmetric encryption and decryption algorithm packet processing method, described method comprises the following steps:

[0051] S1. Divide the x-bit plaintext into the first y-bit and the last z-bit. The first y-bit is passed through the symmetric encryption algorithm of the same key to generate y-bit ciphertext, and the encryption length is y bits;

[0052] S2, the last z bits of the x-bit plaintext pass through the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a symmetric encryption and decryption algorithm subpackage processing method, which comprises the following steps of: S1, dividing an x-bit plaintext into front y bits and rear z bits, generating a y-bit ciphertext from the front y bits through a symmetric encryption algorithm with the same key, and ensuring that the encryption length is y bits; s2, the rear z bits of the x-bit plaintext generate z-bit ciphertext through a symmetric encryption algorithm with the same key, x, y and z are positive integers and are integer multiples of the minimum length of the encryption algorithm, and the rear z bits of the plaintext resume through a breakpoint; and S3, connecting the ciphertexts obtained through the two times of segmentation encryption in the S1 and the S2 together to obtain a final ciphertext. The method has the advantages that: 1, time consumption can be saved under the condition that a transmission medium is unstable; and by adopting segmented encryption transmission, the probability of transmission failure is greatly reduced, and the wasted time is in direct proportion to the data length even if the transmission failure occurs. Therefore, the time overhead is saved. Under the condition that the transmission capacity of the transmission medium is insufficient, subpackage processing is adopted, and the limitation of the transmission medium can be avoided;

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a packet processing method for a symmetric encryption and decryption algorithm. Background technique [0002] In today's society, encryption technology is used in all walks of life, especially in the fields of finance and security. Among them, the symmetric encryption algorithm is an earlier encryption algorithm with mature technology. In the symmetric encryption algorithm, the data sender processes the plaintext (original data) and the encryption key together with a special encryption algorithm, turning it into complex encrypted ciphertext and sending it out. After the recipient receives the ciphertext, if he wants to interpret the original text, he needs to use the encrypted key and the inverse algorithm of the same algorithm to decrypt the ciphertext to restore it to readable plaintext. In the symmetric encryption algorithm, only one key is used, and both the sender and r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/40H04L67/1074
Inventor 周一纯
Owner 深圳君正时代集成电路有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products