CN117424699A - AES symmetric encryption optimization method and system based on CBC encryption mode - Google Patents

AES symmetric encryption optimization method and system based on CBC encryption mode Download PDF

Info

Publication number
CN117424699A
CN117424699A CN202311603837.0A CN202311603837A CN117424699A CN 117424699 A CN117424699 A CN 117424699A CN 202311603837 A CN202311603837 A CN 202311603837A CN 117424699 A CN117424699 A CN 117424699A
Authority
CN
China
Prior art keywords
encryption key
encryption
ciphertext
field
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311603837.0A
Other languages
Chinese (zh)
Inventor
魏海宇
刘一宏
刘庆林
吕宗辉
陈健
李小琼
陈正伟
谢辉
杨晓峰
刘海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zorelworld Information Technology Co ltd
Original Assignee
Beijing Zorelworld Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zorelworld Information Technology Co ltd filed Critical Beijing Zorelworld Information Technology Co ltd
Priority to CN202311603837.0A priority Critical patent/CN117424699A/en
Publication of CN117424699A publication Critical patent/CN117424699A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an AES symmetric encryption optimization method and system based on a CBC encryption mode. Firstly, generating a character string containing case letters and numbers through a random character string to serve as an encryption key; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode, intercepting the encryption key, and equally splitting the encryption key into a first encryption key and a second encryption key; performing CBC mode symmetric encryption on the first ciphertext and the first encryption key to obtain a second ciphertext; the second ciphertext and the second encryption key are subjected to CBC mode symmetric encryption to obtain the target ciphertext.

Description

AES symmetric encryption optimization method and system based on CBC encryption mode
Technical Field
The invention relates to the technical field of data processing, in particular to an AES symmetric encryption optimization method and system based on a CBC encryption mode.
Background
In programming, it is a very common operation to encrypt important information, such as encrypting a password. The encryption mode is mainly divided into two modes, one is symmetric encryption, and both encryption and decryption sides complete the encryption and decryption process by using the same secret key. The other is asymmetric encryption, the encryption party encrypts by using the public key disclosed by the other party, and the decryption party decrypts by using the private key of the decryption party, so that the whole encryption and decryption process is completed. For symmetric encryption, the method is characterized by convenience, rapidness and high running speed. Meanwhile, the method has relatively weak security, which mainly depends on the preservation and protection of the secret key, and as the two parties use the same secret key, once one party leaks carelessly, the ciphertext is completely leaked, so that the method has no security, and the common algorithm has DES, AES, blowfish and the like. For asymmetric encryption, the method is characterized by high algorithm strength and relatively high safety, but also has the advantages of slow encryption process, slightly complex realization process, RSA, rabin, ECC common algorithms and the like.
However, the encryption key in the existing symmetric encryption process has the security problems of leakage, difficult secure transmission and the like.
Disclosure of Invention
Based on the above, the embodiment of the application provides an AES symmetric encryption optimization method and system based on a CBC encryption mode, which are used for realizing hiding of an encryption key by customizing an encryption flow, customizing the number of interception bits of the encryption key and multiple encryption ciphers so as to achieve the purpose of protecting the encryption key, thereby improving the encryption level of symmetric encryption.
In a first aspect, there is provided an AES symmetric encryption optimization method based on CBC encryption mode, the method comprising:
generating a character string containing case letters and numbers as an encryption key through the random character string; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
intercepting the encryption key, and averagely splitting the encryption key into a first encryption key and a second encryption key;
performing CBC mode symmetric encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
and carrying out CBC mode symmetrical encryption on the second ciphertext and the second encryption key to obtain the target ciphertext.
Optionally, the method further comprises:
acquiring values of a cipher text field and an encryption key field from a database table;
splitting an encryption key, namely splitting the encryption key into a first encryption key and a second encryption key on average;
decrypting the cipher text by using the second encryption key to obtain a second cipher text;
decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
and decrypting the first ciphertext by the encryption key to obtain a ciphertext.
Optionally, the character string is a 32-bit character, and the first encryption key and the second encryption key are both 16-bit characters.
Optionally, after performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain the target ciphertext, the method further includes:
storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field.
Optionally, the length of the character string includes at least 16-bit, 24-bit or 32-bit characters.
In a second aspect, there is provided an AES symmetric encryption optimization system based on CBC encryption mode, the system comprising:
a first encryption module for generating a character string containing case letters and numbers as an encryption key through a random character string; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
the splitting module is used for intercepting the encryption key and splitting the encryption key into a first encryption key and a second encryption key on average;
the second encryption module carries out CBC mode symmetrical encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
and the third encryption module performs CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain a target ciphertext.
Optionally, the system further comprises:
the acquisition module is used for acquiring the values of the cipher text field and the encryption key field from the database table;
the splitting module is further used for splitting the encryption key firstly and splitting the encryption key into a first encryption key and a second encryption key on average;
the first decryption module is used for decrypting the cipher text by using the second encryption key to obtain a second cipher text;
the second decryption module is used for decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
and the third decryption module is used for decrypting the first ciphertext by the encryption key to obtain a password plaintext.
Optionally, the character string is a 32-bit character, and the first encryption key and the second encryption key are both 16-bit characters.
Optionally, after performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain the target ciphertext, the system further includes:
storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field.
Optionally, the length of the character string includes at least 16-bit, 24-bit or 32-bit characters.
The technical scheme provided by the embodiment of the application has the beneficial effects that the encryption keys with various lengths are supported by the CBC mode in the symmetrical encryption, the effective range characteristics of the encryption keys are hidden through the custom encryption process, the purpose of protecting the symmetrical encryption keys is achieved, and even if the encryption keys are exposed, the encryption keys can be theoretically considered to be incapable of being reversely decrypted through blasting or decryption under the condition that the custom encryption process is not known.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
FIG. 1 is a schematic diagram of a conventional encryption flow;
FIG. 2 is a schematic diagram of a conventional decryption process;
fig. 3 is a schematic diagram of an encryption flow provided in an embodiment of the present application;
fig. 4 is a schematic diagram of a decryption flow provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In the description of the present invention, unless otherwise indicated, "a plurality" means two or more. The terms first and second in the description and claims of the invention and in the above-mentioned figures are intended to distinguish between the objects referred to. For schemes with time sequence flows, such term expressions are not necessarily to be understood as describing a specific order or sequence, nor are such term expressions to distinguish between importance levels, positional relationships, etc. for schemes with device structures.
Furthermore, the terms "comprises," "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements that are expressly listed but may include other steps or elements not expressly listed but inherent to such process, method, article, or apparatus or steps or elements that may be added based on a further optimization of the inventive concept.
First, description is made of the implementation scenario of the present application: when the related business operation managed by the user is applied, the user needs to complete the corresponding login operation through the account password, after the user provides the correct account number and password, the user is allowed to complete the login operation task, after the user provides the wrong account number or password, the login operation behavior of the user is refused, and the login failure is prompted. It is assumed that, at the security level of the database, a table storing information related to the user account password is stripped by a hacker or the like, and after the user account password is stolen, the encryption algorithm for cracking the system is reversely deduced by decrypting the data of the encrypted key field (salt) and the password field (password) in the data table.
In the prior art, the current direct solution is to encrypt the encryption key field again, so as to hide the real key, store the key salt for encrypting and decrypting the key field, decrypt the real key, and decrypt the cipher text to obtain the real cipher text.
A schematic diagram of an existing encryption flow and a schematic diagram of an existing decryption flow are given in fig. 1 and fig. 2, respectively.
The scheme changes the use of the secret key, only generates the secret key once, uses the secret key for multiple times instead of generating the secret key twice, and adopts transverse double-layer encryption and longitudinal single-time encryption for the self-defined encryption process to realize three-layer encryption. Considering the exposure problem of the key, the key exposure problem can be avoided by only disguising the key to a certain extent and not directly using the outermost layer. Therefore, the key is improved in the use degree, and the original data of the cipher text is not required to be changed. The specific encryption flow is shown in fig. 3, and the secret uncovering flow is shown in fig. 4.
Specifically, please refer to fig. 3, which illustrates an encryption flow chart provided in an embodiment of the present application, the method may include the following steps:
s101, generating a character string containing case letters and numbers through a random character string to serve as an encryption key; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
s102, intercepting an encryption key, and averagely splitting the encryption key into a first encryption key and a second encryption key; the first encryption key and the second encryption key may also be simply referred to as key 1 and key 2, respectively, in this step.
S103, performing CBC mode symmetric encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
s104, performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain a target ciphertext.
In this embodiment, the character string is a 32-bit character, and the first encryption key and the second encryption key are each 16-bit characters. The second ciphertext and the second encryption key are subjected to CBC mode symmetric encryption, and after the target ciphertext is obtained, the method further comprises the steps of: the length of the string may also include 16-bit, 24-bit, or 32-bit characters. Storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field. The encryption process specifically comprises:
first, when generating an encryption key, a character string containing a character range of a case letter and numerals 0 to 9 of 32 bits is generated as an encryption key (salt) by a random character string. In symmetric encryption, CBC mode is used, which supports strings of different lengths, such as 16 bits, 24 bits, 32 bits, etc., as encryption keys. And carrying out CBC mode symmetric encryption on the plaintext of the password and the generated 32-bit secret key together to obtain an encrypted first-layer ciphertext. Then the 32-bit encryption key is intercepted, the encryption key is divided into two 16-bit encryption keys 1 and 2, and then the first layer ciphertext and the key 1 are subjected to CBC mode symmetric encryption again to obtain a second layer ciphertext. And finally, carrying out the symmetrical encryption of the final CBC mode on the second-layer ciphertext and the encryption key 2 to obtain a final cipher ciphertext (password). At this time, the salt and password fields are stored in the database, and even if the two fields are exposed, an attacker cannot encrypt and crack by the literal meaning and the common blasting means.
Referring to fig. 4, a schematic decryption flow chart provided in an embodiment of the present application is shown, and the method may include the following steps:
s201, acquiring values of a cipher text field and an encryption key field from a database table;
s202, firstly splitting an encryption key, and equally splitting the encryption key into a first encryption key and a second encryption key;
s203, decrypting the cipher text by using the second encryption key to obtain a second cipher text;
s204, decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
s205, decrypting the first ciphertext by the encryption key to obtain a ciphertext.
The decryption process specifically includes:
values of a cipher text field (password) and an encryption key field (salt) are first obtained from a database table. The encryption field is split first, and the 32-bit encryption key is split into two 16-bit encryption keys, encryption key 1 and encryption key 2. Firstly, decrypting the ciphertext and the encryption key 2 to obtain a second-layer cipher ciphertext, then continuously decrypting the second-layer cipher ciphertext by using the encryption key 1 to obtain a first-layer cipher ciphertext, and then decrypting the first-layer cipher ciphertext together with the 32-bit encryption key to finally obtain a cipher plaintext. The scheme is a symmetrical encryption optimization scheme, is a scheme of a cryptographic key encryption strategy, and can realize similar functions aiming at protection measures of the cryptographic key at present.
In summary, the scheme utilizes the encryption keys with various lengths supported in the CBC mode in symmetric encryption to encrypt, meanwhile splits the generated encryption keys, realizes a one-time key and multiple use mode, and in addition, in order to avoid exposing the effective encryption keys, the method performs reverse decryption attempt by common means, and the whole encryption is passed through the innermost layer in the Cheng Fangzhi custom encryption process, so that the instant encryption key is exposed, and the encryption key is invalid in the basic complete use range, namely the security is guaranteed to hide the keys, the security pain points of symmetric encryption, key storage and transmission are solved, and even if an attacker knows the symmetric encryption algorithm used, the encryption process cannot be calculated reversely in a short time theoretically.
The embodiment of the application also provides an AES symmetric encryption optimization system based on the CBC encryption mode. The system comprises:
a first encryption module for generating a character string containing case letters and numbers as an encryption key through a random character string; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
the splitting module is used for intercepting the encryption key and splitting the encryption key into a first encryption key and a second encryption key on average;
the second encryption module carries out CBC mode symmetrical encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
and the third encryption module performs CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain a target ciphertext.
In an alternative embodiment of the present application, the system further comprises:
the acquisition module is used for acquiring the values of the cipher text field and the encryption key field from the database table;
the splitting module is further used for splitting the encryption key firstly and splitting the encryption key into a first encryption key and a second encryption key on average;
the first decryption module is used for decrypting the cipher text by using the second encryption key to obtain a second cipher text;
the second decryption module is used for decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
and the third decryption module is used for decrypting the first ciphertext by the encryption key to obtain a password plaintext.
In an alternative embodiment of the present application, the character string is a 32-bit character, and the first encryption key and the second encryption key are each 16-bit characters.
In an optional embodiment of the present application, after performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain the target ciphertext, the method further includes:
storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field.
In an alternative embodiment of the present application, the length of the string comprises at least 16-bit, 24-bit or 32-bit characters.
The AES symmetric encryption optimization system based on the CBC encryption mode provided in the embodiments of the present application is used to implement the AES symmetric encryption optimization method based on the CBC encryption mode, and specific limitations regarding the AES symmetric encryption optimization system based on the CBC encryption mode may be referred to above for limitations regarding the AES symmetric encryption optimization method based on the CBC encryption mode, which are not described herein. The various parts in the AES symmetric encryption optimization system based on CBC encryption mode described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or independent of a processor in the device, or may be stored in software in a memory in the device, so that the processor may call and execute operations corresponding to the above modules.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not thereby to be construed as limiting the scope of the claims. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. An AES symmetric encryption optimization method based on CBC encryption mode, characterized in that the method comprises:
generating a character string containing case letters and numbers as an encryption key through the random character string; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
intercepting the encryption key, and averagely splitting the encryption key into a first encryption key and a second encryption key;
performing CBC mode symmetric encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
and carrying out CBC mode symmetrical encryption on the second ciphertext and the second encryption key to obtain the target ciphertext.
2. The method according to claim 1, wherein the method further comprises:
acquiring values of a cipher text field and an encryption key field from a database table;
splitting an encryption key, namely splitting the encryption key into a first encryption key and a second encryption key on average;
decrypting the cipher text by using the second encryption key to obtain a second cipher text;
decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
and decrypting the first ciphertext by the encryption key to obtain a ciphertext.
3. The method of claim 1, wherein the string is a 32-bit character, and the first encryption key and the second encryption key are each 16-bit characters.
4. The method of claim 1, wherein after performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain the target ciphertext, the method further comprises:
storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field.
5. The method of claim 1, wherein the character string comprises at least 16-bit, 24-bit, or 32-bit characters in length.
6. An AES symmetric encryption optimization system based on CBC encryption mode, the system comprising:
a first encryption module for generating a character string containing case letters and numbers as an encryption key through a random character string; symmetrically encrypting the plaintext of the password and the generated encryption key in a CBC mode to obtain an encrypted first ciphertext;
the splitting module is used for intercepting the encryption key and splitting the encryption key into a first encryption key and a second encryption key on average;
the second encryption module carries out CBC mode symmetrical encryption on the first ciphertext and the first encryption key to obtain a second ciphertext;
and the third encryption module performs CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain a target ciphertext.
7. The system of claim 6, wherein the system further comprises:
the acquisition module is used for acquiring the values of the cipher text field and the encryption key field from the database table;
the splitting module is further used for splitting the encryption key firstly and splitting the encryption key into a first encryption key and a second encryption key on average;
the first decryption module is used for decrypting the cipher text by using the second encryption key to obtain a second cipher text;
the second decryption module is used for decrypting the second ciphertext by using the first encryption key to obtain a first ciphertext;
and the third decryption module is used for decrypting the first ciphertext by the encryption key to obtain a password plaintext.
8. The system of claim 6, wherein the string is a 32-bit character, and the first encryption key and the second encryption key are each 16-bit characters.
9. The system of claim 6, wherein after performing CBC mode symmetric encryption on the second ciphertext and the second encryption key to obtain the target ciphertext, the system further comprises:
storing the value of the target ciphertext salt and the password field in a database; the salt field is used for representing the encryption key field; the password field is used to characterize the cipher-ciphertext field.
10. The system of claim 6, wherein the string length comprises at least 16-bit, 24-bit, or 32-bit characters.
CN202311603837.0A 2023-11-28 2023-11-28 AES symmetric encryption optimization method and system based on CBC encryption mode Pending CN117424699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311603837.0A CN117424699A (en) 2023-11-28 2023-11-28 AES symmetric encryption optimization method and system based on CBC encryption mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311603837.0A CN117424699A (en) 2023-11-28 2023-11-28 AES symmetric encryption optimization method and system based on CBC encryption mode

Publications (1)

Publication Number Publication Date
CN117424699A true CN117424699A (en) 2024-01-19

Family

ID=89528508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311603837.0A Pending CN117424699A (en) 2023-11-28 2023-11-28 AES symmetric encryption optimization method and system based on CBC encryption mode

Country Status (1)

Country Link
CN (1) CN117424699A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118233095A (en) * 2024-04-28 2024-06-21 上海煜安华信息安全技术有限公司 Sensitive information protection method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118233095A (en) * 2024-04-28 2024-06-21 上海煜安华信息安全技术有限公司 Sensitive information protection method and system
CN118233095B (en) * 2024-04-28 2024-09-13 上海煜安华信息安全技术有限公司 Sensitive information protection method and system

Similar Documents

Publication Publication Date Title
US11233659B2 (en) Method of RSA signature or decryption protected using a homomorphic encryption
US11308241B2 (en) Security data generation based upon software unreadable registers
US11874935B2 (en) Protecting data from brute force attack
US8681975B2 (en) Encryption method and apparatus using composition of ciphers
EP3035585B1 (en) S-box selection in white-box cryptographic implementation
US20130136256A1 (en) Block encryption
KR102644767B1 (en) Data protection and recovery systems and methods
CN103259651A (en) Encryption and decryption method and system of terminal data
CN105722067A (en) Mobile terminal data encryption/decryption method and mobile terminal data encryption/decryption device
CN117424699A (en) AES symmetric encryption optimization method and system based on CBC encryption mode
KR20140047291A (en) Method of encrypting and decrypting the data of the session state
CN107342865B (en) SM 4-based authentication encryption algorithm
CN101997680B (en) Security chip directly supporting certificate management
Basha et al. Data security in cloud using advanced encryption standard
CN107592963B (en) Method and computing device for performing secure computations
US10075290B2 (en) Operator lifting in cryptographic algorithm
Tyagi et al. Analysis and Implementation of AES and RSA for cloud
WO2022199796A1 (en) Method and computer-based system for key management
Neforawati et al. Message Digest 5 (MD-5) Decryption Application using Python-Based Dictionary Attack Technique
CN113254952B (en) Key protection management method based on Android system
Shah A Hybrid Model for Cloud Data Security Using ECC-DES
Rao et al. Application of elliptical curve cryptography in empowering cloud data security
Sarkar et al. Cipher: Encryption & Decryption
KR20110042419A (en) Mode of operation adapted to multimedia environments
CN106059750A (en) Encryption and decryption algorithm based on Chinese hash

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination