Reversible tamper-proof data encryption and decryption method based on encryption and digest algorithms

A digest algorithm and anti-tampering technology, applied in the field of computer communication, can solve problems such as inability to ensure data security, inability to decrypt plaintext, etc., and achieve the effect of increasing security

Inactive Publication Date: 2019-02-15
ZHEJIANG WANPENG EDUCATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] From the above two characteristics, we can know that the MD5 algorithm is irreversible, and the summary information obtained after the plaintext data is passed through the MD5 algorithm cannot be decrypted to the plaintext through the summary information.
Once the ciphertext encrypted by the DES algorithm is intercepted, the ciphertext can be decrypted to the plaintext through the corresponding decryption algorithm, which cannot ensure the security of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below.

[0023] A method for reversible tamper-proof encryption and decryption data based on encryption and digest algorithms, the main components are: two devices on the network for encrypting and decrypting data;

[0024] The specific steps of a method for reversible tamper-proof encryption and decryption data based on encryption and digest algorithm are:

[0025] Step (1), device 1 takes the length EALen of the plaintext character string EA, calculates the size of the EB and EC of the application memory according to the length EALen of the character string EA, if EALen is a multiple of 8, then the size of EB and EC is EALen; If the length of EALen is not a multiple of 8, the size of EB and EC is That is, the length EALen of the plaintext string EA is divided by 8 and rounded down, then added 1, and then multiplied by 8 to apply for 2 blocks of memory EB and EC respectively;

[0026] Step (2), set all the applied memo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reversible tamper-proof data encryption and decryption method based on encryption and digest algorithms. Main components for the method are as follows: two devices used for data encryption and decryption on a network. According to the method, the discreteness of the MD5 and the reversibility of the DES are combined, so that the safety of an encrypted ciphertext in a network transmission process is increased, and the ciphertext is prevented from being tampered and then transmitted after the ciphertext is tampered in the network transmission process, namely the tamper-proof performance is achieved; and meanwhile, after the ciphertext is received by a correct terminal, the ciphertext is decrypted to obtain plaintext data, namely the reversibility is achieved.

Description

technical field [0001] The invention belongs to the field of computer communication, and relates to a method for reversibly anti-tampering encryption and decryption data based on encryption and digest algorithm. Background technique [0002] In the rapidly developing Internet era, data is transmitted on various network devices. Data is exposed to various network devices during transmission. There is a risk of data being intercepted, decrypted, tampered with by network equipment, and then transmitted. In order to improve the security of data during the transmission of network equipment, it is extremely important to use more complex algorithms for encrypting and decrypting data. [0003] The full name of the MD5 message digest algorithm is Message-Digest Algorithm 5. It is one of the hash algorithms widely used by computers. It has the following characteristics: 1) It is irreversible, that is, there is no systematic method to calculate the original plaintext information cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/14H04L29/06
CPCH04L9/0625H04L9/0643H04L9/14H04L63/0428
Inventor 陈武平
Owner ZHEJIANG WANPENG EDUCATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products