CN114244633B - Microprocessor and method capable of carrying out double encryption processing on information - Google Patents

Microprocessor and method capable of carrying out double encryption processing on information Download PDF

Info

Publication number
CN114244633B
CN114244633B CN202210169098.8A CN202210169098A CN114244633B CN 114244633 B CN114244633 B CN 114244633B CN 202210169098 A CN202210169098 A CN 202210169098A CN 114244633 B CN114244633 B CN 114244633B
Authority
CN
China
Prior art keywords
information
module
private key
encryption
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210169098.8A
Other languages
Chinese (zh)
Other versions
CN114244633A (en
Inventor
马洽鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiangguang Semiconductor Co ltd
Original Assignee
Shenzhen Xiangguang Semiconductor Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiangguang Semiconductor Co ltd filed Critical Shenzhen Xiangguang Semiconductor Co ltd
Priority to CN202210169098.8A priority Critical patent/CN114244633B/en
Publication of CN114244633A publication Critical patent/CN114244633A/en
Application granted granted Critical
Publication of CN114244633B publication Critical patent/CN114244633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Abstract

The invention relates to the technical field of information encryption, in particular to a microprocessor and a method capable of carrying out double encryption processing on information. The system comprises an information input unit, a private key encryption unit, a public key encryption unit and an encryption inspection unit; the information input unit is used for integrating and respectively transmitting the input main information and the input secondary information; the private key encryption unit is used for encrypting the main information by a private key; the public key encryption unit is used for mixing the encrypted main information and the encrypted secondary information and carrying out public key encryption. The method and the device can carry out private key confidentiality on the main information, and then carry out public key encryption on the main information and the secondary information after the private key encryption, increase the security of the private key encryption, and simultaneously increase the security of the public key encryption.

Description

Microprocessor and method capable of carrying out double encryption processing on information
Technical Field
The invention relates to the technical field of information encryption, in particular to a microprocessor and a method capable of carrying out double encryption processing on information.
Background
Encryption in the communication process mainly adopts a password, a computer can be used in digital communication to adopt an encryption method, the digital structure of load information is changed, different information needs to be transmitted for different users in some internal networks, and a common public key encryption method cannot be used for keeping secret for clients with public key keys, so that a set of key system needs to be reused, resources are wasted, and a system capable of further encrypting the public key is needed.
Disclosure of Invention
The present invention is directed to a microprocessor and a method for performing double encryption processing on information, so as to solve the problems mentioned in the background art.
In order to achieve the above object, one of the objects of the present invention is to provide a microprocessor capable of performing double encryption processing on information, comprising an information input unit, a private key encryption unit, a public key encryption unit and an encryption verification unit;
the information input unit is used for integrating and respectively transmitting the input primary information and the input secondary information;
the private key encryption unit is used for encrypting the main information by a private key;
the public key encryption unit is used for mixing the encrypted main information and the encrypted secondary information and carrying out public key encryption;
the encryption verifying unit is used for decrypting the encrypted main information and the encrypted secondary information and comparing the decrypted main information with the input main information and the input secondary information.
As a further improvement of the technical scheme, the information input unit comprises a main information input module, a secondary information input module, an information integration module and respective transmission modules;
the main information input module is used for inputting main information and transmitting the main information to the information integration module;
the secondary information input module is used for inputting secondary information and transmitting the secondary information to the information integration module;
the information integration module is used for integrating the primary information and the secondary information transmitted in the primary information input module and the secondary information input module and transmitting the integrated information to the respective transmission modules;
and the respective transmission module is used for transmitting the integrated main information and the integrated secondary information to the private key encryption unit and the public key encryption unit respectively.
As a further improvement of the technical scheme, the private key encryption unit comprises an information conversion module, a private key encryption module and an information transcription module;
the information conversion module is used for receiving the main information transmitted by the transmission modules respectively, converting the main information into a code convenient for private key encryption, and transmitting the code to the private key encryption module;
the private key encryption module is used for encrypting the code through a DES algorithm and transmitting the encrypted information to the information transcription module;
the information transcription module is used for transcribing the information encrypted in the private key encryption module into information convenient for encryption and transmitting the information to the public key encryption unit.
As a further improvement of the technical solution, the DES algorithm comprises the steps of:
firstly, disorganizing and replacing 64-bit plaintext blocks at one time;
secondly, dividing the 64-bit plaintext block into two 32-bit blocks;
using secret DES key to scramble position of each 32-bit block 16 times;
(iv) reverse substitution using initial substitution.
As a further improvement of the technical solution, the public key encryption unit includes an information mixing module, a public key encryption module and an information transmission module;
the information mixing module is used for mixing the secondary information transmitted in the transmission module and the encrypted main information transmitted by the information transcription module respectively and transmitting the mixed information to the public key encryption module;
the public key encryption module is used for encrypting the secondary information and the encrypted main information through an RSA algorithm and transmitting the encrypted information to the information transmission module;
the information transmission module is used for transmitting the information encrypted by the public key encryption module to the encryption verification unit.
As a further improvement of the technical solution, the RSA algorithm includes the steps of:
finding two very large prime numbers, and calling the two prime numbers as P and Q;
finding a number E that satisfies the following condition:
A. is an odd number;
B. less than P x Q;
C. and is prime to prime, only meaning that E and the calculation of this equation do not have the same exponential factor;
calculating a value D, and satisfying the following properties: -1) divisible by x;
the public key pair is, the private key is D, and the public key is E.
As a further improvement of the technical scheme, the encryption inspection unit comprises a public key decryption module, a private key decryption module and a comparison judgment module;
the public key decryption module is used for primarily decrypting the encrypted information transmitted by the information transmission module and transmitting the decrypted information to the private key decryption module and the comparison and judgment module;
the private key decryption module is used for decrypting the information decrypted by the private key decryption module again and transmitting the decrypted information to the comparison and judgment module;
the comparison and judgment module is used for comparing the information decrypted by the public key decryption module and the private key decryption module with the main information and the secondary information input in the information integration module.
It is a further object of the present invention to provide a method comprising a microprocessor as described above for performing a double encryption process on information, comprising the method steps of:
s1, inputting the primary information and the secondary information into a primary information input module and a secondary information input module respectively, integrating and storing the primary information and the secondary information by an information integration module, transmitting the information to a respective transmission module by the information integration module, transmitting the primary information and the secondary information to an information conversion module and an information mixing module respectively by the respective transmission module, carrying out private key encryption on the primary information received in the information conversion module by a private key encryption module, transmitting the primary information to the information mixing module through an information transcription module, transmitting the secondary information and the encrypted primary information to a public key encryption module by the information mixing module, carrying out public key encryption by the public key encryption module, and transmitting the secondary information and the encrypted primary information to an encryption inspection unit through the information transmission module;
s2, the public key decryption module decrypts the encrypted information by the public key to obtain the secondary information and the main information encrypted by the private key, the decrypted information is transmitted to the private key decryption module, the private key decryption module decrypts the encrypted main information by the private key and transmits the decrypted information to the comparison and judgment module, the comparison and judgment module compares the decrypted information with the information stored in the information integration module, and the information before decryption is transmitted after the consistency is confirmed.
Compared with the prior art, the invention has the beneficial effects that:
1. in the microprocessor and the method for carrying out double encryption processing on information, the private key can be used for carrying out private key confidentiality on the main information, and then the main information and the secondary information after the private key encryption are simultaneously used for carrying out public key encryption, so that the security of the private key encryption is increased, the security of the public key encryption is also increased, compared with the traditional encryption method, the security is higher, information with different security levels can be sent to different users on the premise of ensuring the security, and the using effect is better.
2. In the microprocessor and the method for carrying out double encryption processing on information, after the encryption of the private key secret and the public key is finished, the private key secret and the public key secret can be automatically decrypted and compared, and after the decryption fails, a round of encryption can be carried out again, so that the phenomenon of decryption failure caused by double encryption can be effectively avoided, and the stability of the use of the information secret is ensured.
Drawings
FIG. 1 is an overall block diagram of the present invention;
FIG. 2 is a block flow diagram of an information input unit of the present invention;
FIG. 3 is a block flow diagram of a private key encryption unit of the present invention;
FIG. 4 is a block flow diagram of a public key encryption unit of the present invention;
fig. 5 is a block flow diagram of an encryption verification unit of the present invention.
The various reference numbers in the figures mean:
1. an information input unit; 11. a main information input module; 12. a secondary information input module; 13. an information integration module; 14. respectively transmitting the modules; 2. a private key encryption unit; 21. an information conversion module; 22. a private key encryption module; 23. an information transcription module; 3. a public key encryption unit; 31. an information mixing module; 32. a public key encryption module; 33. an information transmission module; 4. an encryption verifying unit; 41. a public key decryption module; 42. a private key decryption module; 43. and a comparison and judgment module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the equipment or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Example 1
Referring to fig. 1-5, one of the objectives of the present embodiment is to provide a microprocessor capable of performing double encryption processing on information, which includes an information input unit 1, a private key encryption unit 2, a public key encryption unit 3, and an encryption verification unit 4;
the information input unit 1 is used for integrating and respectively transmitting the input main information and the input secondary information, and the information input unit 1 is used for integrating and storing the main information and the secondary information and respectively transmitting the main information and the secondary information to the private key encryption unit 2 and the public key encryption unit 3;
the private key encryption unit 2 is used for encrypting the main information by a private key, and the private key encryption unit 2 is used for encrypting the main information by the private key and transmitting the encrypted main information to the public key encryption unit 3;
the public key encryption unit 3 is used for mixing the encrypted main information and the encrypted secondary information and carrying out public key encryption, the public key encryption unit 3 is used for simultaneously encrypting the secondary information and the encrypted main information, the encryption effect and the security of public key encryption can be greatly improved, and the encrypted information is transmitted to the encryption inspection unit 4;
the encryption verifying unit 4 is used for decrypting the encrypted main information and the encrypted secondary information and comparing the decrypted main information with the input main information and the input secondary information, the encryption verifying unit 4 is used for decrypting the encrypted information and comparing the decrypted information with the information stored in the information input unit 1, if the comparison result is consistent, the information is sent out, and if the comparison result is inconsistent, the information is encrypted again, so that the situation that the decryption is in a problem due to double encryption is avoided.
The information input unit 1 comprises a main information input module 11, a secondary information input module 12, an information integration module 13 and a respective transmission module 14;
the main information input module 11 is used for inputting main information and transmitting the main information to the information integration module 13, and the main information input module 11 is used for inputting the main information into the information integration module 13;
the secondary information input module 12 is configured to input secondary information and transmit the secondary information to the information integration module 13, and the secondary information input module 12 is configured to input the secondary information into the information integration module 13;
the information integration module 13 is used for integrating the primary information and the secondary information transmitted in the primary information input module 11 and the secondary information input module 12, and transmitting the integrated information to the respective transmission modules 14, and the information integration module 13 is used for integrating and storing the primary information;
the respective transmission module 14 is configured to transmit the integrated primary information and secondary information to the private key encryption unit 2 and the public key encryption unit 3, and the respective transmission module 14 is configured to transmit the primary information to the information conversion module 21 and transmit the secondary information to the information mixing module 31, so as to achieve the effect of transmitting and storing the primary information and the secondary information, respectively encrypt the primary information and the secondary information, and compare the information after decryption by the comparison and determination module 43.
The private key encryption unit 2 comprises an information conversion module 21, a private key encryption module 22 and an information transcription module 23;
the information conversion module 21 is configured to receive the main information transmitted by the respective transmission module 14, convert the main information into a code convenient for private key encryption, and transmit the code to the private key encryption module 22, where the information conversion module 21 is configured to convert the main information and facilitate the private key encryption module 22 to encrypt the main information;
the private key encryption module 22 is used for encrypting the code through a DES algorithm and transmitting the encrypted information to the information transcription module 23, and the private key encryption module 22 is used for encrypting the private key of the main information through the DES algorithm, so that the main information is prevented from being informed by a user without a private key, and the information security is improved;
the information transcription module 23 is configured to transcribe the information encrypted in the private key encryption module 22 into information convenient for encryption, and transmit the information to the public key encryption unit 3, and the information transcription module 23 is configured to transcribe the encrypted main information, so that the public key encryption module 32 can encrypt the main information with a public key, thereby achieving the effect of encrypting the main information with a private key, and effectively avoiding increasing the security of the main information.
The DES algorithm comprises the following steps:
firstly, disorganizing and replacing 64-bit plaintext blocks at one time;
secondly, dividing the 64-bit plaintext block into two 32-bit blocks;
using secret DES key to scramble position of each 32-bit block 16 times;
(iv) reverse substitution using initial substitution.
The public key encryption unit 3 comprises an information mixing module 31, a public key encryption module 32 and an information transmission module 33;
the information mixing module 31 is configured to mix the secondary information transmitted in the transmission module 14 and the encrypted primary information transmitted by the information transcription module 23, and transmit the mixed information to the public key encryption module 32, and the information mixing module 31 is configured to integrate the encrypted primary information and the encrypted secondary information, so as to perform simultaneous public key encryption on the primary information and the secondary information;
the public key encryption module 32 is configured to encrypt the secondary information and the encrypted primary information by using an RSA algorithm, and transmit the encrypted information to the information transmission module 33, and the public key encryption module 32 is configured to perform public key encryption on the secondary information and the encrypted primary information at the same time;
the information transmission module 33 is configured to transmit the information encrypted by the public key encryption module 32 to the encryption verification unit 4, and the information transmission module 33 is configured to transmit the encrypted information to the public key decryption module 41, so that the effect of performing public key encryption on the secondary information and the primary information encrypted by the private key at the same time is achieved, and the effect of transmitting different users according to different information is achieved.
The RSA algorithm comprises the following steps:
finding two very large prime numbers, and calling the two prime numbers as P and Q;
finding a number E that satisfies the following condition:
A. is an odd number;
B. less than P x Q;
C. is relatively prime to P-1Q-1, except that E and the calculation of the equation do not have the same exponential factor;
calculating a value D, and satisfying the following properties: d E-1 can be divided by P-1Q-1;
the public key pair is P x Q, E, the private key is D, and the public key is E.
The encryption verifying unit 4 comprises a public key decryption module 41, a private key decryption module 42 and a comparison judging module 43;
the public key decryption module 41 is configured to primarily decrypt the encrypted information transmitted by the information transmission module 33, and transmit the decrypted information to the private key decryption module 42 and the comparison and judgment module 43, and the public key decryption module 41 is configured to decrypt the information encrypted by the public key, so as to obtain the secondary information and the main information encrypted by the private key;
the private key decryption module 42 is configured to decrypt the information decrypted by the private key decryption module 42 again, and transmit the decrypted information to the comparison and judgment module 43, and the private key decryption module 42 is configured to decrypt the main information encrypted by the private key, so as to obtain the group information;
the comparison and judgment module 43 is used for comparing the information decrypted by the public key decryption module 41 and the private key decryption module 42 with the primary information and the secondary information input in the information integration module 13, the comparison and judgment module 43 is used for comparing the decrypted primary information with the secondary information stored in the information integration module 13, if the results are consistent, the information is sent out, and if the results are inconsistent, a round of encryption is performed again, so that errors are avoided in the double encryption process.
In use, the invention inputs the main information into a main information input module 11, inputs the secondary information into a secondary information input module 12, an information integration module 13 stores and integrates the main information and the secondary information, transmits the main information and the secondary information to respective transmission modules 14, the respective transmission modules 14 transmit the main information to an information conversion module 21, transmits the secondary information to an information mixing module 31, the information conversion module 21 converts the main information into codes convenient for private key encryption, and performs private key encryption through a private key encryption module 22, the private key encryption module 22 transmits the main information encrypted by the private key to an information transcription module 23, the information transcription module 23 converts the main information into information convenient for public key encryption and transmits the information to the information mixing module 31, the information mixing module 31 mixes the received secondary information with the main information encrypted by the private key, the information is transmitted to a public key encryption module 32 for public key encryption, the public key encryption module 32 transmits the confidential information to an information transmission module 33, the information transmission module 33 transmits the encrypted information to a public key decryption module 41 for public key decryption to obtain secondary information and primary information encrypted by a private key, the primary information encrypted by the private key is decrypted by a private key decryption module 42, the primary information and the secondary information stored in a comparison and judgment module 43 and an information integration module 13 are compared, if the comparison result is consistent, the information is sent out, if the comparison result is inconsistent, one round of encryption is performed again to avoid errors in the double encryption process, the complete primary information can be seen by only possessing a public key and a private key at the same time, the safety of the primary information can be ensured, and meanwhile, the primary information and the secondary information encrypted by the private key are encrypted by the public key at the same time, can effectively improve the security of public key encryption, it is higher to compare in common public key encryption and private key encryption security, can decrypt the encryption information automatically before information sends simultaneously, avoids leading to the phenomenon of unable decryption because of dual encryption, effectively improves the stability of using.
Another object of this embodiment is to provide a processing method for performing double encryption processing on information, comprising the following steps:
s1, inputting the primary information and the secondary information into the primary information input module 11 and the secondary information input module 12, respectively, integrating and storing the primary information and the secondary information by the information integrating module 13, transmitting the information to the respective transmission modules 14 by the information integrating module 13, transmitting the primary information and the secondary information to the information conversion module 21 and the information mixing module 31 by the respective transmission modules 14, encrypting the primary information received by the information conversion module 21 by the private key encryption module 22, transmitting the encrypted primary information to the information mixing module 31 by the information transcription module 23, transmitting the secondary information and the encrypted primary information to the public key encryption module 32 by the information mixing module 31, encrypting the public key by the public key encryption module 32, and transmitting the encrypted primary information to the encryption inspection unit 4 by the information transmission module 33;
s2, the public key decryption module 41 decrypts the encrypted information by the public key to obtain the secondary information and the main information encrypted by the private key, and transmits the decrypted information to the private key decryption module 42, the private key decryption module 42 decrypts the encrypted main information by the private key and transmits the decrypted information to the comparison and judgment module 43, the comparison and judgment module 43 compares the decrypted information with the information stored in the information integration module 13, and transmits the information before decryption after confirming the consistency.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (8)

1. A microprocessor capable of performing double encryption processing on information, comprising: the system comprises an information input unit (1), a private key encryption unit (2), a public key encryption unit (3) and an encryption verification unit (4);
the information input unit (1) is used for integrating and respectively transmitting the input primary information and the input secondary information;
the private key encryption unit (2) is used for encrypting the main information by a private key;
the public key encryption unit (3) is used for mixing the encrypted main information and the encrypted secondary information and carrying out public key encryption;
the encryption verifying unit (4) is used for decrypting the encrypted main information and the encrypted secondary information and comparing the decrypted main information and the encrypted secondary information with the input main information and the input secondary information.
2. The microprocessor of claim 1, wherein: the information input unit (1) comprises a main information input module (11), a secondary information input module (12), an information integration module (13) and a respective transmission module (14);
the main information input module (11) is used for inputting main information and transmitting the main information to the information integration module (13);
the secondary information input module (12) is used for inputting secondary information and transmitting the secondary information to the information integration module (13);
the information integration module (13) is used for integrating the primary information and the secondary information transmitted in the primary information input module (11) and the secondary information input module (12) and transmitting the integrated information to the respective transmission modules (14);
the respective transmission module (14) is used for transmitting the integrated primary information and the integrated secondary information to the private key encryption unit (2) and the public key encryption unit (3) respectively.
3. The microprocessor of claim 2, wherein: the private key encryption unit (2) comprises an information conversion module (21), a private key encryption module (22) and an information transcription module (23);
the information conversion module (21) is used for receiving the main information transmitted by the respective transmission modules (14), converting the main information into a code convenient for private key encryption, and transmitting the code to the private key encryption module (22);
the private key encryption module (22) is used for encrypting the code through a DES algorithm and transmitting the encrypted information to the information transcription module (23);
the information transcription module (23) is used for transcribing the information encrypted in the private key encryption module (22) into information convenient for encryption and transmitting the information to the public key encryption unit (3).
4. The microprocessor of claim 3, wherein the microprocessor is further configured to perform a double encryption process on the information: the DES algorithm comprises the following steps:
firstly, disorganizing and replacing 64-bit plaintext blocks at one time;
secondly, dividing the 64-bit plaintext block into two 32-bit blocks;
using secret DES key to scramble position of each 32-bit block 16 times;
(iv) reverse substitution using initial substitution.
5. The microprocessor of claim 1, wherein: the public key encryption unit (3) comprises an information mixing module (31), a public key encryption module (32) and an information transmission module (33);
the information mixing module (31) is used for mixing the secondary information transmitted in the transmission module (14) and the encrypted main information transmitted by the information transcription module (23) respectively and transmitting the mixed information to the public key encryption module (32);
the public key encryption module (32) is used for encrypting the secondary information and the encrypted main information through an RSA algorithm and transmitting the encrypted information to the information transmission module (33);
the information transmission module (33) is used for transmitting the information encrypted by the public key encryption module (32) to the encryption verification unit (4).
6. The microprocessor of claim 5, wherein: the RSA algorithm comprises the following steps:
finding two very large prime numbers, and calling the two prime numbers as P and Q;
finding a number E that satisfies the following condition:
A. is an odd number;
B. less than P x Q;
C. is relatively prime to (P-1) (Q-1) except that E and the calculation result of the equation do not have the same exponential factor;
calculating a value D, and satisfying the following properties: (D E) -1 is divisible by (P-1) Q-1;
the public key pair is (P x Q, E), the private key is D, and the public key is E.
7. The microprocessor of claim 1, wherein: the encryption verification unit (4) comprises a public key decryption module (41), a private key decryption module (42) and a comparison judgment module (43);
the public key decryption module (41) is used for primarily decrypting the encrypted information transmitted by the information transmission module (33) and transmitting the decrypted information to the private key decryption module (42) and the comparison judgment module (43);
the private key decryption module (42) is used for decrypting the information decrypted by the private key decryption module (42) again and transmitting the decrypted information to the comparison judgment module (43);
the comparison judging module (43) is used for comparing the information decrypted by the public key decryption module (41) and the private key decryption module (42) with the main information and the secondary information input in the information integration module (13).
8. A processing method for performing double encryption processing on information, comprising the microprocessor for performing double encryption processing on information according to any one of claims 1 to 7, wherein: the method comprises the following steps:
s1, inputting the main information and the secondary information into a main information input module (11) and a secondary information input module (12) respectively, integrating and storing the main information and the secondary information by an information integration module (13), transmitting the information to a transmission module (14) respectively by the information integration module (13), transmitting the main information and the secondary information to an information conversion module (21) and an information mixing module (31) respectively by the transmission module (14), encrypting the main information received in the information conversion module (21) by a private key encryption module (22), and transmitted to the information mixing module (31) through the information transcription module (23), the information mixing module (31) transmits the secondary information and the encrypted main information to the public key encryption module (32) for public key encryption, and transmitted to the encryption verifying unit (4) through the information transmission module (33);
s2, the public key decryption module (41) decrypts the encrypted information by the public key to obtain the secondary information and the main information encrypted by the private key, the decrypted information is transmitted to the private key decryption module (42), the private key decryption module (42) decrypts the encrypted main information by the private key and transmits the decrypted information to the comparison judgment module (43), the comparison judgment module (43) compares the decrypted information with the information stored in the information integration module (13), and after the consistency is confirmed, the information before decryption is transmitted.
CN202210169098.8A 2022-02-24 2022-02-24 Microprocessor and method capable of carrying out double encryption processing on information Active CN114244633B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210169098.8A CN114244633B (en) 2022-02-24 2022-02-24 Microprocessor and method capable of carrying out double encryption processing on information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210169098.8A CN114244633B (en) 2022-02-24 2022-02-24 Microprocessor and method capable of carrying out double encryption processing on information

Publications (2)

Publication Number Publication Date
CN114244633A CN114244633A (en) 2022-03-25
CN114244633B true CN114244633B (en) 2022-04-26

Family

ID=80747890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210169098.8A Active CN114244633B (en) 2022-02-24 2022-02-24 Microprocessor and method capable of carrying out double encryption processing on information

Country Status (1)

Country Link
CN (1) CN114244633B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
CN101964786A (en) * 2010-09-17 2011-02-02 中山大学 Set-top box-based secure information transmission system and method
WO2011030352A2 (en) * 2009-09-11 2011-03-17 3I Infotech Consumer Services Ltd. System and method for mobile phone resident digital signing and encryption/decryption of sms
CN112866227A (en) * 2021-01-13 2021-05-28 北京连山科技股份有限公司 File authorization protection method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11233658B2 (en) * 2019-08-14 2022-01-25 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101262341A (en) * 2008-02-22 2008-09-10 北京航空航天大学 A mixed encryption method in session system
WO2011030352A2 (en) * 2009-09-11 2011-03-17 3I Infotech Consumer Services Ltd. System and method for mobile phone resident digital signing and encryption/decryption of sms
CN101964786A (en) * 2010-09-17 2011-02-02 中山大学 Set-top box-based secure information transmission system and method
CN112866227A (en) * 2021-01-13 2021-05-28 北京连山科技股份有限公司 File authorization protection method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication;W.Ren;《2010 Second International Conference on Modeling, Simulation and Visualization Methods》;20100802;全文 *
基于DES和RSA的混合加密算法研究与设计;翁云翔;《电子设计工程》;20161110;全文 *

Also Published As

Publication number Publication date
CN114244633A (en) 2022-03-25

Similar Documents

Publication Publication Date Title
US5179591A (en) Method for algorithm independent cryptographic key management
CN101340443B (en) Session key negotiating method, system and server in communication network
CN101404577B (en) Secret communication method for amalgamating multi-secrecy technology
CN106973056B (en) Object-oriented security chip and encryption method thereof
CN109818747B (en) Digital signature method and device
US8230218B2 (en) Mobile station authentication in tetra networks
CN103986583A (en) Dynamic encryption method and encryption communication system thereof
CN111953479B (en) Data processing method and device
CN102572817A (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN100350816C (en) Method for implementing wireless authentication and data safety transmission based on GSM network
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
CN109274663A (en) Communication means based on SM2 dynamic key exchange and SM4 data encryption
CN101420687B (en) Identity verification method based on mobile terminal payment
CN114244633B (en) Microprocessor and method capable of carrying out double encryption processing on information
CN1949196A (en) Method, device and system for storage data in portable device safely
CN102036194A (en) Method and system for encrypting MMS
CN101159540A (en) Method and process device of transmitting-receiving data flow
EP4020875A1 (en) Method, first server, second server, and system for transmitting securely a key
JPH10313306A (en) Authentication device, ciphering device, decoding device and cipher communication system
CN111654859A (en) Mobile block chain resource allocation method and device
CN111555873B (en) Remote authentication method, device and system
EP3235214B1 (en) Method for authenticating attributes in a non-traceable manner and without connection to a server
US20230297708A1 (en) System and method for managing data-file transmission and access right to data files
WO2022135404A1 (en) Identity authentication method and device, storage medium, program, and program product
WO2024057538A1 (en) Server, authentication system, authentication method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant