A random data encryption method, device and system

A random data and encryption device technology, applied in the field of big data network, can solve the problem of low security of encryption and decryption methods

Active Publication Date: 2021-09-14
成都映潮科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Defects of the existing technology: Although the encryption of data through the combination of AES+RSA can guarantee data security to a certain extent, since the method of generating AES secret keys from random strings is common knowledge, and in the process of data transmission The medium random string is easy to be intercepted by notifying the server to transmit, so as to directly obtain the AES key and encrypted data, so the overall encryption and decryption method is less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A random data encryption method, device and system
  • A random data encryption method, device and system
  • A random data encryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 Shown, a kind of random data encryption method, this method comprises:

[0047] Randomly generate a character string with a fixed length of 16, and convert the character string into an AES key with a fixed length of 16;

[0048] If the data length of the encrypted source file is 4096, it is divided into 2 block data according to the preset length of 2048, and then the data in each block is divided into 64 groups, each group length is 32; the original file data is evenly divided into M blocks of data, and then divide each block of data into 64 groups according to the preset length 32;

[0049] Randomly extract 40 groups of data from each block of data, use the AES key to encrypt, record the position length S of the randomly extracted group, and the length of the randomly extracted position is fixed at 2 bits, if it is not enough, add 0 at the end; then encrypt the encrypted 40 The group data is put back into the original randomly selected position, and...

Embodiment 2

[0057] Such as figure 2 Shown, a kind of random data encryption device, this device comprises:

[0058] AES key generation module, is used for randomly generating the character string of fixed length 16, described character string is converted into the AES key of fixed length 16;

[0059] The segmentation module is used to divide the original file data into M block data according to the preset length L, and then divide each block data into P groups according to the preset length N; if the length of the encrypted source file data is 4096, then according to the preset Let the length 2048 be divided into 2 blocks of data, and then divide the data of each block into 64 groups, each group length 32; divide the original file data into M blocks of data according to the preset length L, and then divide each block of data according to the preset length L Let length 32 be divided into 64 groups equally;

[0060] The first encryption module is used to randomly extract 40 groups of dat...

Embodiment 3

[0066] Such as image 3 As shown, corresponding to the encryption method in the specific embodiment 1, a random data decryption method, the method includes:

[0067] Receive mixed encrypted data;

[0068] Segment the mixed encrypted data according to a fixed length of 16 to obtain the AES key encrypted by the RSA public key and the remaining encrypted data;

[0069] Use the RSA private key to decrypt the AES key;

[0070] According to the total length 2128 of decryption, the remaining encrypted data is divided into 2 block data; the total length of the decryption is: the preset length 2048 plus the position length 80 of the previously randomly selected group;

[0071] Use the RSA private key to decrypt the randomly generated position length 80 in front of each block data;

[0072] Divide each block of data into 64 groups according to the preset length of 32, take out the encrypted data through the position length of the randomly selected group of 80, decrypt it with the AES...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a random data encryption and decryption method, device and system. When the method is used, the original file data is encrypted twice from the encryption party, and the key random position S and The key of AES public key encryption is hidden in the primary encrypted data, and finally the random position S and the AES key are hidden using the server as a relay. The length of the random position and the length of the AES key are both fixed lengths. The receiver intercepts the key and random position through a fixed length. The AES key is decrypted by the RSA private key to obtain the real plaintext AES key, and then the random position is also fixed. The position of the encrypted data in the data can be obtained through the random position, and then passed The AES algorithm converts the string at a random position into the original data decrypted by the AES key. This file transfer process is more secure and stable than the existing ones. When the message packet is intercepted and cracked, the real original file data cannot be obtained directly.

Description

technical field [0001] The invention belongs to the technical field of big data networks, and in particular relates to a random data encryption and decryption method, device and system. Background technique [0002] In the prior art, data encryption generally uses a combination of AES+RSA to encrypt data, AES encrypts the data content, RSA encrypts the AES key and then transmits it to the background together with the content for decryption. [0003] Encryption method: The encryptor generates a 16-bit AES secret key. After generation, it will not change, and the data to be encrypted will be encrypted with the AES key to obtain encrypted data. Then use the RSA public key to encrypt the AES key, and finally the encrypted AES key and the content encrypted by the AES key form an encrypted data packet and send it to the background server. [0004] Decryption method: The server obtains the encrypted data packet and obtains the AES encryption key through segmentation, decrypts the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/30H04L29/06H04L29/08
CPCH04L9/0631H04L9/302H04L63/045H04L67/06H04L67/108
Inventor 余刚
Owner 成都映潮科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products