A data encryption/decryption method and encryption/decryption apparatus

A data encryption and data technology, which is applied in secure communication devices, digital transmission systems, usage of multiple keys/algorithms, etc., can solve the problems of increasing the amount of calculation, outweighing the losses, and being vulnerable to threats, and achieves the effect of protecting confidentiality.

Inactive Publication Date: 2005-06-29
徐子杰
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

They have the following disadvantages: 1) It is necessary to increase the amount of calculation when increasing the encryption s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption/decryption method and encryption/decryption apparatus
  • A data encryption/decryption method and encryption/decryption apparatus
  • A data encryption/decryption method and encryption/decryption apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] A data encryption method for encrypting plaintext data. The method includes the following processes: the process of digitizing the user key K, converting the user key K from a character expression to a digital expression through a character number code table, the user The key K is used to encrypt plaintext data; the process of constructing a plaintext data block, where the length of the plaintext data block is less than or equal to the length of the user key K, and the corresponding plaintext data vector X and the plaintext data are constructed from the plaintext data block in the form of a digital stream Position vector WX; there is a permutation function f, the random key vector D is constructed by the inverse function f'of the permutation function f and the plaintext data position vector WX, and the secret key vector D is constructed by the permutation function f, the data position vector WX and the random key vector D The process of text data location vector WY; the pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a data ciphering and deciphering method which randomly selects a random cryptographic key to replace positions to clear-text data, then dispatches a user cryptographic key to cipher the random cryptographic keys and the data layer by layer and outputs the cipher-text. Deciphering method: the random cryptographic key is recovered first, then the clear-text data position replaced vector is got and clear-text data are recovered by dispatching suitable user cryptographic key to output the clear-text finally. A device includes a cipher/decipher processor, clear-text cipher-text buffer memory for storing the clear-text cipher-text input data and inputting them to a processor, a memory for staring various data and inputting them to a processor, an output device for outputting the cipher-text.

Description

Technical field [0001] The invention relates to a data encryption and decryption method and an encryption and decryption device, in particular to a method and an encryption and decryption device for encrypting and decrypting plaintext data using pseudo-random numbers. Background technique [0002] At present, the development of electronic technology makes it possible to access many documents through public telecommunications, including many confidential documents, which poses a threat to the confidentiality of documents. Data encryption is to protect the confidentiality of files from unauthorized infringement. Encryption converts the plaintext into meaningless ciphertext, and decryption restores the meaningless ciphertext to plaintext. [0003] When used, the encryptor first encrypts the plaintext into ciphertext before transmitting and storing. When data is needed, the decryptor can decrypt the ciphertext into plaintext. This requires that the encryption system is easy to use an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/22
Inventor 徐子杰
Owner 徐子杰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products