Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

MD5-based two-way encryption data protection method

A data protection and two-way encryption technology, applied in encryption devices with shift registers/memory, digital transmission systems, user identity/authority verification, etc., can solve problems such as high performance consumption

Inactive Publication Date: 2016-07-27
王云鹏
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, MD5 is a single-item encryption method. In practical applications, the encrypted data needs to be decrypted in many places. In such cases, the MD5 encryption method cannot meet the requirements. RSA encryption and decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MD5-based two-way encryption data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0013] A two-way encrypted data protection method based on MD5, please refer to the attached figure 1 , including: key processing process, encryption process, decryption process, wherein,

[0014] The key processing process includes: performing md5 and base64 transcoding processing on the key to obtain the encryption and decryption special key; intercepting the above encryption and decryption special key to generate a fixed-digit check string for subsequent encryption and decryption processes The verification operation in is used; use the pseudo-random algorithm to process the above encryption and decryption private key, scramble its order again, and convert the string into ASCII code, that is, the key box, to be used in the subsequent encryption and decryption process;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an MD5-based two-way encryption data protection method, comprising: a key processing process, an encryption process and a decryption process, wherein the key processing process includes: subjecting a key to MD5 and BASE64 transcoding; intercepting the key; processing with a pseudorandom algorithm and converting a character string into a key box; the encryption process includes: converting a plaintext character string into ASCII code, circulating the ASCII code, and carrying out pseudorandom arrangement through an algorithm; adding ASCII code value of a check character string generated by intercepting in the key processing process; performing circulating bitwise XOR to convert the value into a character string; subjecting the generated character string to BASE64 transcoding to obtain a cyphertext character string; the decryption process includes: subjecting the cyphertext character string to BASE64 decoding, and carrying out ASCII coding; performing circulating bitwise XOR operation; matching a check portion with a check sequence, failing the check in case of inconformity; subjecting the cyphertext ASCII code string and the key box to circulating bitwise XOR operation to convert the obtained ASCII code string into a character string, and reversely executing as a random process to finally obtain a plaintext character string.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to an MD5-based two-way encrypted data protection method. Background technique [0002] MD5 data single-entry encryption technology: the full name of this technology is Message-DigestAlgorithm5 (information-digest algorithm), which allows large-capacity information to be "compressed" into a confidential format before signing the private key with digital signature software. From a technical point of view , is to convert a string of any length into a fixed-length hexadecimal super large integer. MD5 is one-way encryption, that is to say, it is impossible for the string generated after encryption to be decrypted in turn. [0003] In actual work, the role of MD5 is mainly to verify encrypted signatures: for example, user login verification, which is to match the verification string encrypted by MD5 with the existing encrypted string stored in the system according to the login password. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/3239H04L9/0643
Inventor 王云鹏
Owner 王云鹏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products