Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data encryption and decryption method and device

A data encryption and decryption algorithm technology, applied in the field of information security, can solve the problems of single, fixed, and easily cracked static keys and encryption algorithms, and achieve the effect of improving the efficiency of encryption and decryption

Active Publication Date: 2020-02-07
CHINA MOBILE GROUP JILIN BRANCH +1
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that the static secret key and encryption algorithm in the existing data encryption method are single, fixed for a long time, and easy to be cracked, the embodiment of the present invention provides a A kind of data encryption, decryption method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method and device
  • Data encryption and decryption method and device
  • Data encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to solve the problem that the static secret key and the encryption algorithm are single, fixed for a long time and easy to be cracked in the existing data encryption method, the embodiment of the present invention provides a data encryption and decryption method and device.

[0075] The implementation principle of the data encryption and decryption method provided by the embodiment of the present invention is: the server receives the secret key and algorithm distribution request sent by the first terminal, wherein the secret key and algorithm distribution request includes the required secret key level and algorithm type, and the server receives Store a pre-established secret key database and algorithm database, select a secret key from the established secret key database according to the required secret key level, select an encryption algorithm and a corresponding encryption algorithm from the established algorithm database according to the required algorithm typ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method and device and a data decryption method and device, and aims to solve the problems that a static secret key and an encryption algorithm in an existingdata encryption method are single, fixed for a long time and easy to crack. The method comprises the following steps: enabling a server to receive a secret key and algorithm allocation request sent bya first terminal, wherein the secret key and algorithm allocation request comprises a needed secret key level and an algorithm category; selecting a secret key, an encryption algorithm and a corresponding decryption algorithm from the established secret key database and algorithm database according to the required secret key level and algorithm category; sending the secret key identifier and thealgorithm identifier to the first terminal; receiving a data encryption request sent by a second terminal, wherein the data encryption request carries a secret key identifier and an algorithm identifier sent to the second terminal by the first terminal; extracting a secret key corresponding to the secret key identifier and an encryption algorithm corresponding to the algorithm identifier from thesecret key database and the algorithm database respectively; and enabling the second terminal to encrypt the data requested by the first terminal by using the secret key and the encryption algorithm.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data encryption and decryption method and device. Background technique [0002] The symmetric encryption technology algorithm is the main existing data encryption algorithm, which is encrypted by means of replacement and shifting. Specifically, the transmitted data is divided into several data blocks, and the length of each data block is a 64-bit binary number. The data provider Agree on a fixed public key with the data demander. The public key is a 64-bit binary number. During the data transmission process, each data block and public key are encrypted and decrypted by binary AND operation, so as to realize the encrypted transmission of data . [0003] However, since the static secret key and encryption algorithm are single and fixed for a long time, they are easy to be cracked and the security of data transmission is low. Contents of the invention [0004] In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819
Inventor 魏娜於少菲周铭张军华李硕朱冬梅卢永峰吴进夫辛海英
Owner CHINA MOBILE GROUP JILIN BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products