Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Grouped multiple-key encryption method and grouped multiple-key encryption device

An encryption method and technology of an encryption device, applied in the field of data encryption and decryption, can solve problems such as affecting data security, encrypted data being decrypted, etc., and achieve the effects of reducing losses, facilitating recovery, and solving security risks.

Active Publication Date: 2014-04-09
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case that the password is not cracked, the encrypted data may still be decrypted, which seriously affects the security of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grouped multiple-key encryption method and grouped multiple-key encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] like figure 1 Shown is the flow chart that the present invention implements grouping multi-key encryption method, and this grouping multi-key algorithm comprises steps:

[0021] S1. Set encryption and decryption data parameters: encryption and decryption data block size L: indicates the length of data encrypted and decrypted by a key; number of packets N: indicates the number of packets processed in parallel for one encryption and decryption; number of hash algorithm cycles M: indicates calculation The cycle calculation rounds of the hash algorithm used for the key;

[0022] S2. Read the password Pwd entered by the user and generate a temporary value T according to the password and the calculation formula of the temporary value, and then divide the temporary value T into M groups on average to generate M groups of temporary data from T1 to TM, and store the M groups of temporary data separately , the formula for calculating the temporary value is: T=(the sum of each by...

Embodiment 2

[0037] This embodiment provides a group multi-key encryption device, which includes:

[0038] Encryption and decryption parameter setting module: used to set the encryption and decryption data block size L, the number of packets N, and the number of cycles of the hash algorithm M, where the encryption and decryption data block size L: indicates the length of data encrypted and decrypted by a key; the number of packets N : Indicates the number of packets processed in parallel for one encryption and decryption; Hash algorithm cycle times M: Indicates the hash algorithm cycle calculation rounds used when calculating the key; Temporary data T1~TM generation module: used to read the password input by the user Pwd, generate a temporary value T, the temporary value T=(the sum of each byte value of the password*password length)10, divide the temporary value T into M groups on average (same as the number of cycles of the algorithm), and generate a total of M from T1 to TM group of temp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a grouped multiple-key encryption method and a grouped multiple-key encryption device. A plurality of groups of different keys are generated, to-be-encrypted data is grouped and encryption and secondary encryption are carried out on the to-be-encrypted data with the use of the plurality of groups of different keys, thus greatly improving the security of the keys and the security of encrypted files. By the adoption of a multiple-key data-grouping encryption mechanism, the problem that all data is insecure once a key is acquired for an existing single-key encryption method is solved. As different keys are used, different encrypted data is generated after data of the same content is encrypted, thus solving the hidden safety problems of an ECB model. As an ECB model is adopted among blocks and encryption blocks are independent of each other, only data of the damaged blocks is affected and other data is not affected at all even if the encrypted data is damaged, which is conducive to data recovery and reduces the loss caused by data damage.

Description

technical field [0001] The invention relates to the field of data encryption and decryption, in particular to a group multi-key encryption method and device for grouping data to be encrypted by using multi-key encryption. Background technique [0002] In order to ensure data security, at present, most data encryption software in the field of computer data encryption uses hash algorithms (such as MD5, SHA-1, etc.) to generate encryption keys based on passwords entered by users, and then uses symmetric encryption algorithms (DES, AES, etc.) encrypt the plaintext data, and when decrypting, use the hash algorithm to generate the decryption key according to the password, and then use the decryption algorithm to decrypt the ciphertext data. [0003] There are two ways to crack encrypted data, one is to crack the encrypted password, and the other is to crack the key used for decryption. In order to reduce the possibility of the password being cracked, existing software reduces the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/06
Inventor 张光斌张永光王海滨汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products