Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encryption mode combined with file structure

A technology of encryption mode and data, which is applied in the field of encryption mode combined with data structure, can solve problems such as inconvenience, time-consuming, insufficient file security, etc., and achieve the effect of taking security into account and reducing time

Inactive Publication Date: 2007-07-04
BEST WISE INT COMPUTING
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, if the encryption method of the aforementioned prior art is carried out in a context-independent manner, when the encryption key of one of the encrypted data segments is cracked, the tampered encrypted data segment cannot be detected at the receiving end , so the security of the file is relatively insufficient. If the encryption method related to the context is used, when the encryption key of one of the encrypted data segments is cracked, the tampered encrypted data segment will affect the entire file. Whether the file can be decrypted, so that the receiving end can notice that the file has been tampered with, so the security of the file is better
However, the encryption method related to the context needs to wait for the encryption of the previous text to be completed before the subsequent text can be encrypted. It is impossible to encrypt other data at the same time.
Therefore, when the file content is huge or the number is large, the user needs to spend a lot of time waiting, which is very inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption mode combined with file structure
  • Encryption mode combined with file structure
  • Encryption mode combined with file structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] An encryption method according to a preferred embodiment of the present invention will be described below with reference to related figures, wherein the same elements will be described with the same reference symbols.

[0037] Please refer to FIG. 3 , which is a block diagram showing an embodiment of an encryption mode using a multi-element data structure in the present invention. In the figure, the encryption system includes a segmentation unit, a multiple data structure, a grouping unit and a plurality of encryption units.

[0038] The dividing unit 32 is used for dividing a data 31 into a plurality of data segments 33 . The grouping unit 34 divides the data sections into a plurality of data section groups 36 according to at least one multivariate data structure 35 . The encryption unit 372 performs an encryption process on the plurality of data segment groups to generate encrypted data segment groups 38 .

[0039] Among them, the multi-data structure is a descripti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses an encryption mode of combinated of information structure. This mode includes a separate unit, a group unit and the plural encryption modules. The separate unit separates a document into plural information sections. According to a multiple-element information structure, the group unit divides the information section into plural information section group. Finally, it uses the plural encryption modules for computing the encryption algorithms in order to generate the encrypted information sector group. Thereby, it achieves to shorten the encryption time and improve the encryption speed.

Description

technical field [0001] The present invention provides an encryption method using a multivariate data structure and a system thereof, in particular about utilizing at least one multivariate data structure for encryption processing. Background technique [0002] In today's society, due to the development of network technology, traditional written documents have gradually been replaced by electronic documents. With the prevalence of electronic documents, in order to prevent electronic documents from being intercepted by interested parties during transmission, it is necessary to rely on the encryption of electronic documents . Please refer to FIG. 1 , which is a block diagram of an encryption system in the prior art using an electronic codebook encryption system (Electronic CodeBook: ECB) as an embodiment. [0003] The division unit 12 divides a data 11 to generate a plurality of data segments 13 , and then, the encryption calculation unit 14 performs an encryption operation on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14
Inventor 叶义雄丘荣嘉黄中见黄定宇
Owner BEST WISE INT COMPUTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products