CN111740818A - Data processing method, device, equipment and storage medium - Google Patents

Data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN111740818A
CN111740818A CN202010589312.6A CN202010589312A CN111740818A CN 111740818 A CN111740818 A CN 111740818A CN 202010589312 A CN202010589312 A CN 202010589312A CN 111740818 A CN111740818 A CN 111740818A
Authority
CN
China
Prior art keywords
data
key
encryption
decryption
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010589312.6A
Other languages
Chinese (zh)
Inventor
熊子涵
童元满
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN202010589312.6A priority Critical patent/CN111740818A/en
Publication of CN111740818A publication Critical patent/CN111740818A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data processing method, a data processing device, data processing equipment and a storage medium. The method comprises the following steps: generating a target key; acquiring data to be encrypted and data to be decrypted; and carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key. In the method, the target key is respectively used for the encryption operation and the decryption operation, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency and the operation resource overhead of the encryption operation and the decryption operation are relatively ensured. In addition, the application also provides a data processing device, equipment and a storage medium, and the beneficial effects are as described above.

Description

Data processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of cryptography, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
Data encryption means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and data decryption means that ciphertext is recovered into plaintext through a decryption algorithm and a decryption key, so that the core of encryption and decryption is cryptography. Data encryption is still the most reliable way for computer systems to protect information. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
Taking AES (Advanced encryption standard) which is relatively popular in encryption and decryption of symmetric keys at present as an example, the block length of plaintext data encrypted and decrypted by AES is fixed to 128 bits, and the key length may be 128, 192, or 256 bits. The algorithm uses an agreed key to perform combined operations such as AddRoundKey (round key encryption), SubBytes (byte substitution), ShiftRows (row shift), and MixColumns (column mix) on block blocks of plaintext data to realize encryption operation on the plaintext data, and the decryption operation process is similar to the encryption operation.
When the encryption operation and the decryption operation of the symmetric key are realized based on the cryptographic algorithm at present, it is often difficult to ensure the overall efficiency of the encryption operation and the decryption operation and the operation resource overhead.
Therefore, it is a problem to be solved by those skilled in the art to provide a data processing method to relatively ensure the overall efficiency of encryption operation and decryption operation and the operation resource overhead.
Disclosure of Invention
The present application aims to provide a data processing method, apparatus, device and storage medium to relatively ensure the overall efficiency of encryption operation and decryption operation and the operation resource overhead.
In order to solve the above technical problem, the present application provides a data processing method, including:
generating a target key;
acquiring data to be encrypted and data to be decrypted;
and carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
Preferably, generating the target key comprises:
acquiring an initial key, and performing grouping operation on the initial key to obtain a key fragment;
and performing iterative operation on each key fragment to obtain a target key.
Preferably, the performing an iterative operation on each key fragment to obtain the target key includes:
and performing iterative operation on each key fragment based on an exclusive-or operation mode to obtain a target key.
Preferably, the performing an encryption operation on the data to be encrypted by using the target key includes:
carrying out encryption operation on data to be encrypted by using the target key in a mode of executing an encryption function;
the generation process of the encryption function comprises the following steps:
acquiring encryption sub-operation logic in the encryption operation logic;
acquiring a corresponding encryption sub-operation function according to the encryption sub-operation logic;
and logically combining the encryption sub-operation functions based on the encryption operation logic to obtain the encryption function.
Preferably, the performing a decryption operation on the data to be decrypted by using the target key includes:
carrying out decryption operation on data to be decrypted by using the target key in a decryption function executing mode;
the generation process of the decryption function comprises the following steps:
acquiring a decryption sub-operation logic in the decryption operation logic;
acquiring a corresponding decryption sub-operation function according to the decryption sub-operation logic;
and logically combining the decryption sub-operation functions based on the decryption operation logic to obtain the decryption function.
Preferably, the performing the encryption operation on the data to be encrypted and the performing the decryption operation on the data to be decrypted in a parallel manner by using the same target key includes:
and carrying out AES encryption operation on the data to be encrypted and AES decryption operation on the data to be decrypted in a parallel mode by using the same target key.
In addition, the present application also provides a data processing apparatus, including:
the key generation module is used for generating a target key;
the data acquisition module is used for acquiring data to be encrypted and data to be decrypted;
and the data processing module is used for performing encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
Preferably, the key generation module comprises:
the key grouping module is used for acquiring an initial key and performing grouping operation on the initial key to obtain a key segment;
and the iterative operation module is used for performing iterative operation on each key segment to obtain a target key.
In addition, the present application also provides a data processing apparatus, including:
a memory for storing a computer program;
a processor for implementing the steps of the data processing method as described above when executing the computer program.
Furthermore, the present application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of the data processing method as described above.
According to the data processing method, the target secret key is generated firstly, the data to be encrypted and the data to be decrypted are obtained, and on the basis, the same target secret key is further utilized to conduct encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode. In the method, the target key is respectively used for the encryption operation and the decryption operation, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency and the operation resource overhead of the encryption operation and the decryption operation are relatively ensured. In addition, the application also provides a data processing device, equipment and a storage medium, and the beneficial effects are as described above.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of a data processing method disclosed in an embodiment of the present application;
FIG. 2 is a flow chart of a data processing method disclosed in an embodiment of the present application;
fig. 3 is a schematic hardware logic diagram of a data processing method disclosed in an embodiment of the present application;
fig. 4 is a schematic block diagram of an encryption process according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort belong to the protection scope of the present application.
Taking AES (Advanced encryption standard) which is relatively popular in encryption and decryption of symmetric keys at present as an example, the block length of plaintext data encrypted and decrypted by AES is fixed to 128 bits, and the key length may be 128, 192, or 256 bits. The algorithm uses an agreed key to perform combined operations such as AddRoundKey (round key encryption), SubBytes (byte substitution), ShiftRows (row shift), and MixColumns (column mix) on block blocks of plaintext data to realize encryption operation on the plaintext data, and the decryption operation process is similar to the encryption operation.
When the encryption operation and the decryption operation of the symmetric key are realized based on the cryptographic algorithm at present, it is often difficult to ensure the overall efficiency of the encryption operation and the decryption operation and the operation resource overhead.
Therefore, the core of the present application is to provide a data processing method to relatively ensure the overall efficiency of encryption operation and decryption operation and the operation resource overhead.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present application discloses a data processing method, including:
step S10: a target key is generated.
It should be noted that the target key in this embodiment is used in the subsequent steps to perform encryption operation on the data to be encrypted and perform decryption operation on the data to be decrypted.
Step S11: and acquiring data to be encrypted and data to be decrypted.
It should be noted that, the steps of generating the target key and obtaining the data to be encrypted and the data to be decrypted are theoretically non-sequential, so the sequential order of executing the step S10 and the step S11 is not fixed, and may also be executed at the same time, which is determined according to the actual situation.
Step S12: and carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
It should be noted that the key point of this step is that the same target key can be reused for the data to be encrypted and the data to be decrypted at the same time, and there is no need to generate keys for encryption operation and decryption operation, that is, the same target key is used to perform encryption operation on the data to be encrypted and perform decryption operation on the data to be decrypted in a parallel manner, that is, the data to be encrypted and the data to be decrypted in this embodiment are simultaneously performed with encryption or decryption operation, so as to achieve the purpose of reusing the target key, reduce the resource overhead when generating the key, and ensure the overall efficiency of the data processing process.
According to the data processing method, the target secret key is generated firstly, the data to be encrypted and the data to be decrypted are obtained, and on the basis, the same target secret key is further utilized to conduct encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode. In the method, the target key is respectively used for the encryption operation and the decryption operation, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency and the operation resource overhead of the encryption operation and the decryption operation are relatively ensured.
On the basis of the foregoing embodiment, as a preferred implementation manner, performing an encryption operation on data to be encrypted by using a target key includes:
carrying out encryption operation on data to be encrypted by using the target key in a mode of executing an encryption function;
the generation process of the encryption function comprises the following steps:
acquiring encryption sub-operation logic in the encryption operation logic;
acquiring a corresponding encryption sub-operation function according to the encryption sub-operation logic;
and logically combining the encryption sub-operation functions based on the encryption operation logic to obtain the encryption function.
It should be noted that, in the present embodiment, the encryption operation is performed on the data to be encrypted by using the target key in a manner of executing the encryption function, on this basis, the key point is that the encryption function is generated based on the combination of encryption sub-operation functions, which are correspondingly obtained according to the encryption sub-operation logics included in the encryption operation logic, that is, the encryption sub-operation functions can execute the operation functions of the corresponding encryption sub-operation logics, since the encryption arithmetic logic of the complete encryption operation is composed of a plurality of encryption sub-arithmetic logics that perform different arithmetic functions, therefore, after the corresponding encryption sub-operation function is obtained according to the encryption sub-operation logic in the encryption operation logic, and further carrying out logic combination on the encryption sub-operation functions based on the encryption operation logic to obtain a complete encryption function. In addition, the logical combination here refers to establishing the execution order and/or data flow relationship between the cryptographic sub-operation functions. In the embodiment, the encryption function is obtained by logically combining the encryption sub-operation functions, so that the functional flexibility of the encryption function and the reusability of the encryption sub-operation functions are relatively ensured.
On the basis of the foregoing embodiment, as a preferred implementation manner, performing a decryption operation on data to be decrypted by using a target key includes:
carrying out decryption operation on data to be decrypted by using the target key in a decryption function executing mode;
the generation process of the decryption function comprises the following steps:
acquiring a decryption sub-operation logic in the decryption operation logic;
acquiring a corresponding decryption sub-operation function according to the decryption sub-operation logic;
and logically combining the decryption sub-operation functions based on the decryption operation logic to obtain the decryption function.
It should be noted that, in the present embodiment, the decryption operation is performed on the data to be decrypted by using the target key in a manner of executing the decryption function, on this basis, the key point is that the decryption function is generated based on the combination of decryption sub-operation functions, which are correspondingly obtained according to the decryption sub-operation logic included in the decryption operation logic, that is, the decryption sub-operation functions can perform the operation functions of the corresponding decryption sub-operation logic, since the decryption operation logic of the complete decryption operation is composed of a plurality of decryption sub-operation logics performing different operation functions, therefore, after the decryption sub-operation logic in the decryption operation logic obtains the corresponding decryption sub-operation function, and further performing logic combination on the decryption sub-operation functions based on the decryption operation logic to obtain a complete decryption function. In addition, logical combination herein refers to establishing an execution order and/or data flow relationship between decryption sub-operation functions. In this embodiment, the decryption sub-operation functions are logically combined to obtain the decryption function, so that the functional flexibility of the decryption function and the reusability of the decryption sub-operation functions are relatively ensured.
Referring to fig. 2, an embodiment of the present application discloses a data processing method, including:
step S20: and acquiring an initial key, and performing grouping operation on the initial key to obtain a key fragment.
Step S21: and performing iterative operation on each key fragment to obtain a target key.
Step S22: and acquiring data to be encrypted and data to be decrypted.
Step S23: and carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
It should be noted that the present embodiment is focused on that the target key is obtained by performing further iterative operations based on the key fragments obtained by performing data grouping on the initial key. This is to consider that in the current encryption scenario, multiple rounds of encryption operations need to be performed on data to be encrypted, and correspondingly, multiple rounds of decryption operations need to be performed when decryption processing is performed on data to be decrypted, so that in the present embodiment, the confidentiality of the target key is further ensured by performing iterative operation on each key fragment of the initial key to obtain the target key, thereby further ensuring the reliability of each round of encryption or decryption process.
Further, as a preferred embodiment, performing an iterative operation on each key fragment to obtain a target key includes:
and performing iterative operation on each key fragment based on an exclusive-or operation mode to obtain a target key.
It should be noted that the present embodiment focuses on obtaining the target key by performing an iterative operation on each key fragment through an exclusive-or operation, and the overall operation amount of the iterative operation can be relatively reduced, thereby further improving the overall efficiency of data processing.
On the basis of the above series of embodiments, as a preferred embodiment, performing an encryption operation on data to be encrypted and a decryption operation on data to be decrypted in a parallel manner by using the same target key includes:
and carrying out AES encryption operation on the data to be encrypted and AES decryption operation on the data to be decrypted in a parallel mode by using the same target key.
It should be noted that, the present embodiment is mainly focused on performing AES encryption operation on data to be encrypted and performing AES decryption operation on data to be decrypted in a parallel manner by using the same target key, because the AES algorithm has a high operation speed, the efficiencies of the encryption operation and the decryption operation can be relatively ensured, and the AES algorithm has a low requirement on a memory, and the applicable hardware scenarios are relatively rich.
In order to further enhance the understanding of the technical solution of the present application, the following provides a specific scenario example for further explanation.
According to different key lengths, the AES has different encryption rounds, and in the present scenario, the AES with a data length of 256 bits is taken as an example, and the encryption round is 14 rounds.
The design of the embodiment of the present scenario is implemented by hardware logic, and referring to fig. 3, the main modules include:
an encryption module: and the plaintext encryption module of the AES 256 algorithm encrypts the input plaintext by adopting the round key which is calculated by the round key expansion module for multiple rounds according to the number of encryption rounds and then outputs an encrypted ciphertext result.
A decryption module: and the ciphertext decryption module of the AES 256 algorithm decrypts the input ciphertext for multiple rounds by adopting the round key which is calculated by the round key expansion module according to the number of decryption rounds, and then outputs a decrypted plaintext result.
Round key expansion module: the input 256-bit key is used for calculating all the sub-keys needed in 14 rounds through internal logic according to algorithm requirements, and the module can quickly and simply calculate all the sub-keys through optimized calculation design.
An input interface: text _ encrypt and text _ decrypt, which are data streams to be encrypted and decrypted respectively, and key is the key agreed by the encryption and decryption.
An output interface: encrypt _ out and decrypt _ out, which are the output data streams after encryption and decryption, respectively.
The main flow of the AES 256 encryption process mainly includes four major operations, i.e., AddRoundKey (round key encryption), SubBytes (byte substitution), ShiftRows (row shift), and MixColumns (column mix). The 4 types of operation basic modules are designed and combined into Normal _ Round and Final _ Round, as shown in fig. 4, so that the encryption process of the AES 256 text is optimized into 1 xor operation based on K _0, 13 Normal _ Round operations based on K _1 to K _13, and 1 Final _ Round operation based on K _14, wherein K _0 to K _14 are all sub-keys obtained based on key expansion. The decryption operation is similar to the encryption operation. The design structure is simple and convenient to realize, and the repeated utilization rate of the basic module is high.
Referring to fig. 5, an embodiment of the present application provides a data processing apparatus, including:
a key generation module 10, configured to generate a target key;
the data acquisition module 11 is configured to acquire data to be encrypted and data to be decrypted;
and the data processing module 12 is configured to perform encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel manner by using the same target key.
Further, as a preferred embodiment, the key generation module includes:
the key grouping module is used for acquiring an initial key and performing grouping operation on the initial key to obtain a key segment;
and the iterative operation module is used for performing iterative operation on each key segment to obtain a target key.
The data processing device provided by the application firstly generates a target key, then obtains data to be encrypted and data to be decrypted, and further conducts encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key on the basis. In the device, the target key is respectively used for encryption operation and decryption operation, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency and the operation resource overhead of the encryption operation and the decryption operation are relatively ensured.
In addition, an embodiment of the present application further provides a data processing apparatus, including:
a memory for storing a computer program;
a processor for implementing the steps of the data processing method as described above when executing the computer program.
According to the data processing equipment, the target secret key is generated firstly, the data to be encrypted and the data to be decrypted are obtained, and on the basis, the same target secret key is further utilized to conduct encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode. In the device, the target key is respectively used for encryption operation and decryption operation, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency and the operation resource overhead of the encryption operation and the decryption operation are relatively ensured.
In addition, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the data processing method as described above.
The computer-readable storage medium provided by the application firstly generates a target key, further obtains data to be encrypted and data to be decrypted, and further performs encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key on the basis. In the computer-readable storage medium, the target key is used for the encryption operation and the decryption operation respectively, which is equivalent to multiplexing the target key in the whole process of the encryption operation and the decryption operation, so that the whole efficiency of the encryption operation and the decryption operation and the operation resource overhead are relatively ensured.
A data processing method, an apparatus, a device and a storage medium provided by the present application are described in detail above. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A data processing method, comprising:
generating a target key;
acquiring data to be encrypted and data to be decrypted;
and carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
2. The data processing method of claim 1, wherein the generating a target key comprises:
acquiring an initial key, and performing grouping operation on the initial key to obtain a key fragment;
and performing iterative operation on each key fragment to obtain the target key.
3. The data processing method of claim 2, wherein the performing an iterative operation on each key fragment to obtain the target key comprises:
and executing the iterative operation on each key segment based on an exclusive-or operation mode to obtain the target key.
4. The data processing method of claim 1, wherein performing an encryption operation on the data to be encrypted by using the target key comprises:
performing encryption operation on the data to be encrypted by using the target key in a mode of executing an encryption function;
the generation process of the encryption function comprises the following steps:
acquiring encryption sub-operation logic in the encryption operation logic;
acquiring a corresponding encryption sub-operation function according to the encryption sub-operation logic;
and logically combining the encryption sub-operation functions based on the encryption operation logic to obtain the encryption function.
5. The data processing method of claim 1, wherein performing a decryption operation on the data to be decrypted by using the target key comprises:
carrying out decryption operation on the data to be decrypted by using the target secret key in a decryption function executing mode;
the generation process of the decryption function comprises the following steps:
acquiring a decryption sub-operation logic in the decryption operation logic;
acquiring a corresponding decryption sub-operation function according to the decryption sub-operation logic;
and logically combining the decryption sub-operation functions based on the decryption operation logic to obtain the decryption function.
6. The data processing method according to any one of claims 1 to 5, wherein the performing an encryption operation on the data to be encrypted and performing a decryption operation on the data to be decrypted in a parallel manner by using the same target key comprises:
and carrying out AES encryption operation on the data to be encrypted and AES decryption operation on the data to be decrypted in a parallel mode by using the same target key.
7. A data processing apparatus, comprising:
the key generation module is used for generating a target key;
the data acquisition module is used for acquiring data to be encrypted and data to be decrypted;
and the data processing module is used for carrying out encryption operation on the data to be encrypted and decryption operation on the data to be decrypted in a parallel mode by using the same target key.
8. The data processing apparatus of claim 7, wherein the key generation module comprises:
the key grouping module is used for acquiring an initial key and performing grouping operation on the initial key to obtain a key segment;
and the iterative operation module is used for performing iterative operation on each key fragment to obtain the target key.
9. A data processing apparatus, characterized by comprising:
a memory for storing a computer program;
a processor for implementing the steps of the data processing method according to any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the data processing method according to any one of claims 1 to 6.
CN202010589312.6A 2020-06-24 2020-06-24 Data processing method, device, equipment and storage medium Withdrawn CN111740818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010589312.6A CN111740818A (en) 2020-06-24 2020-06-24 Data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010589312.6A CN111740818A (en) 2020-06-24 2020-06-24 Data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111740818A true CN111740818A (en) 2020-10-02

Family

ID=72650987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010589312.6A Withdrawn CN111740818A (en) 2020-06-24 2020-06-24 Data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111740818A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989426A (en) * 2021-04-30 2021-06-18 腾讯科技(深圳)有限公司 Authorization authentication method and device, and resource access token acquisition method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989426A (en) * 2021-04-30 2021-06-18 腾讯科技(深圳)有限公司 Authorization authentication method and device, and resource access token acquisition method

Similar Documents

Publication Publication Date Title
CN106788974B (en) Mask S box, grouping key calculation unit, device and corresponding construction method
Mathur et al. AES based text encryption using 12 rounds with dynamic key selection
US11546135B2 (en) Key sequence generation for cryptographic operations
US7978851B2 (en) Keystream encryption device, method, and program
JP5402632B2 (en) Common key block encryption apparatus, common key block encryption method, and program
Chen et al. High performance data encryption with AES implementation on FPGA
KR20100069610A (en) Methods and devices for a chained encryption mode
US9565018B2 (en) Protecting cryptographic operations using conjugacy class functions
US20150304102A1 (en) Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program
WO2016088453A1 (en) Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program
WO2021129470A1 (en) Polynomial-based system and method for fully homomorphic encryption of binary data
CN116488795B (en) GCM-AES processing method and device
CN111740818A (en) Data processing method, device, equipment and storage medium
Buell Modern symmetric ciphers—Des and Aes
Murtaza et al. Fortification of aes with dynamic mix-column transformation
Sasongko et al. Architecture for the secret-key BC3 cryptography algorithm
RU2738321C1 (en) Cryptographic transformation method and device for its implementation
Labbi et al. Symmetric encryption algorithm for RFID systems using a dynamic generation of key
Tun et al. Message Security using One Time Pad and AES Hybrid Cryptography
US9246681B2 (en) Use of 32-bit random numbers to produce cipher key stream for 8-bit data stream
CN114244552B (en) Data encryption transmission method and device based on block chain
US20220417012A1 (en) Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product
RU2775253C1 (en) Method for cryptographic transformation with simultaneous generation of a derived encryption key
KR20110042419A (en) Mode of operation adapted to multimedia environments
Braddy Multiple Algorithm Aperiodic Cryptosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201002

WW01 Invention patent application withdrawn after publication