Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reverse reconstruction encryption method

An encryption method and string technology, applied in the field of information security, can solve the problems of low security and easy to be cracked, and achieve the effect of high encryption security and great difficulty in cracking

Active Publication Date: 2016-06-08
陈剑辉
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current technology, the main encryption algorithm only encrypts a single password field, and there are many shortcomings: 1. Each record in the data table also uses constants or variables known in the code, which are destined to be decrypted by reverse operations. Second, this type of encryption algorithm always processes the password field, resulting in the same disadvantages after encryption if the password is the same. As long as it can enter the database, it can be cracked by replacing the password with a replacement method
Therefore, the encryption method in the current technology has low security and is easily cracked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reverse reconstruction encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] refer to figure 1 , the reverse reassembly encryption method, including steps:

[0047] S1. Obtain the first character string to be encrypted and the second character string bound to the first character string; the first character string generally refers to character strings such as passwords, and the second character string generally refers to the user name and account number bound to the password and so on.

[0048] S2. Decompose the first character string and the second character string into small unit character strings according to the first step length parameter and the second step length parameter; when decomposing, use a loop statement to intercept the corresponding character string from the left according to the value of the step length parameter The number of digits is used as a small unit string. For example, if the value of the step parameter is 2, 2 characters are intercepted each time as the small unit string; generally speaking, it is recommended to use 1...

Embodiment 2

[0055] This embodiment is a detailed example of Embodiment 1, specifically as follows:

[0056] In this embodiment, the first character string to be encrypted is called an encrypted character string, and the second character string bound to the first character string is called a bound character string, both of which are as follows:

[0057] The encrypted string is: admin;

[0058] Bind string: username;

[0059] The first step length parameter is the encrypted string decomposition step size: 1;

[0060] The second step size parameter is the binding string decomposition step size: 2;

[0061] The third step length parameter is flashback interception step size: 1;

[0062] The fourth step length parameter refers to the length of each character unit intercepted during the final recombination, also known as "gene length", and its value is 5;

[0063] The first identification string mark1 is: 999;

[0064] The second identification string mark2 is: ggg;

[0065] The character...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reverse reconstruction encryption method. The method comprises the steps of 1, acquiring a first character string to be encrypted and a second character string bound with the first character string; 2, decomposing the first character string and the second character string into subsection character strings; 3, converting the subsection character strings obtained through decomposition into corresponding coded values in a preset encoding database, and obtaining an encoding character string through intersection and reintegration according to a first identification character string; 4, conducting flashback arrangement on the encoding character string, and then decomposing the encoding character string into subsection character strings; 5, conducting digital decimal-binary conversion on each subsection character string obtained through decomposition, and then obtaining an ciphertext character string through sequential splicing of a second identification character string. The method is large in cracking difficulty and high in encryption safety and can be widely applied to the data encryption field.

Description

technical field [0001] The invention relates to the field of information security, in particular to a reverse recombination encryption method. Background technique [0002] As the network begins to infiltrate and affect all aspects of people's lives, various online businesses such as e-commerce, digital currency, and online banking are rapidly emerging, and people's requirements for confidentiality in online activities are also getting higher and higher. How to protect data security so that it does not People are paying more and more attention to issues such as being stolen, not being tampered with or destroyed. In data security, one of the more important encryption methods is to encrypt two character strings that have a binding relationship, such as encrypting the user name and password to achieve data security protection, and encrypting the CPU and hard disk numbers for software usage rights. Realize anti-piracy and so on. Most of the existing encryption methods achieve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28G06F21/60
CPCG06F21/602
Inventor 陈剑辉
Owner 陈剑辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products