Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method and device and data decryption method and device

An encryption method and encryption key technology, applied in the field of information security, can solve the problems of low transmission efficiency of encrypted data transmission

Active Publication Date: 2019-10-18
朗新数据科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a data encryption method and device, and a data decryption method and device, so as to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device and data decryption method and device
  • Data encryption method and device and data decryption method and device
  • Data encryption method and device and data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0056] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and device and a data decryption method and device. The method comprises the steps that n + 1 pieces of plaintext data m0, m1,..., mn and n + 1 piecesof secret key data k0, k1,..., kn are obtained, and the n + 1 pieces of plaintext data correspond to the n + 1 pieces of secret key data in a one-to-one mode; (k0, m0), (k1, m1),..., (kn, mn) are taken as coordinates of n + 1 points to generate an n-order polynomial F (x) = a0 + a1 * x + a2 * x2 +... + an * xn, and the n + 1 points fall on a curve represented by the n-order polynomial; and determining the coefficient [a0, a1, a2... An] of the n-order polynomial as ciphertext data corresponding to the n + 1 pieces of plaintext data. According to the invention, the technical problem of low transmission efficiency in the encrypted data transmission process during multi-party interaction is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular, to a data encryption method and device, and a data decryption method and device. Background technique [0002] The current symmetric encryption algorithm is that both parties maintain the same key to carry out the same encryption and decryption algorithm to transmit information, but they face the problem of symmetric key management; [0003] Asymmetric encryption can help symmetric encryption solve the problem of key management, but the encryption speed and efficiency still need to be improved; [0004] In symmetric encryption, each message is encrypted in groups or sequences, and the length of the ciphertext is equal to that of the plaintext. The efficiency of message transmission is low, and an algorithm is required for fast encryption and fast message transmission. [0005] For the above problems, no effective solution has been proposed yet. Contents of the inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 程威
Owner 朗新数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products