CN118300779A - Secure encryption method and system based on AES and key derivation function - Google Patents

Secure encryption method and system based on AES and key derivation function Download PDF

Info

Publication number
CN118300779A
CN118300779A CN202410299810.5A CN202410299810A CN118300779A CN 118300779 A CN118300779 A CN 118300779A CN 202410299810 A CN202410299810 A CN 202410299810A CN 118300779 A CN118300779 A CN 118300779A
Authority
CN
China
Prior art keywords
key
user
bim model
model data
global
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410299810.5A
Other languages
Chinese (zh)
Inventor
周海强
于飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Modular Iot Technology Zhejiang Co ltd
Original Assignee
Modular Iot Technology Zhejiang Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Modular Iot Technology Zhejiang Co ltd filed Critical Modular Iot Technology Zhejiang Co ltd
Priority to CN202410299810.5A priority Critical patent/CN118300779A/en
Publication of CN118300779A publication Critical patent/CN118300779A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a secure encryption method and a system based on AES and a key derivation function, comprising the following steps: s1, BIM model data are acquired, a global secret key is generated, and a user secret key is generated based on the global secret key and user basic information; s2, the BIM model data are encrypted symmetrically based on the user secret key, the user secret key is encrypted based on the global secret key, and the encrypted BIM model data and the global secret key are transmitted to a user side; s3, the user side obtains the encrypted BIM model data and the global secret key, decrypts the user secret key based on the global secret key, and decrypts the encrypted BIM model data based on the user secret key to obtain BIM model data; s4, the user side builds a BIM model based on BIM model data. The invention has the beneficial effects that: by using the AES encryption algorithm, the security and integrity of BIM model data can be protected.

Description

Secure encryption method and system based on AES and key derivation function
Technical Field
The invention relates to the technical field of data encryption, in particular to a secure encryption method and system based on an AES and a key derivation function.
Background
With the development of digitization and informatization, building Information Models (BIMs) are increasingly used in the construction industry. The BIM model contains a large amount of building design, structure and equipment information, and plays a key supporting role in project planning, design, construction and operation full life cycle. However, with the electronization of information, security problems of BIM model data are also increasingly prominent. Therefore, developing an effective BIM model data encryption technology has important significance for protecting information security and promoting the wide application of BIM technology.
In the prior art, the BIM model data is encrypted by adopting a DES digital encryption technology, encryption is carried out in a grouping mode, the plaintext to be encrypted is divided into a plurality of groups, each group is 64 bits, and 0 is used for filling less than 64 bits. A length of 56 bits, consisting of 8 bytes, each having a 7 bit binary number. In order for the DES algorithm to have a certain strength, a parity check needs to be performed for each bit of the key. Since the key length of DES is short, it is only 56 bits, and thus it is easily broken by violence. To improve security, periodic rekeying is required. Meanwhile, DES algorithm is not suitable for encrypting large data, and encryption and decryption speeds are slow. There is a problem in that the BIM model data cannot be encrypted by using the AES encryption algorithm, thereby protecting the security and integrity of the BIM model data.
For example, "a communication data encryption and decryption method based on DES, RSA, SHA-1 encryption algorithm", disclosed in chinese patent literature, its bulletin number is CN103684794A, its application day is 2023, 12 months and 25 days, the invention generates the data to be encrypted and transmitted; the data to be transmitted is encrypted for the first time, namely, the packet DES encryption is carried out; generating summary content by using an SHA-1 encryption algorithm on the data subjected to the first encryption; encrypting the SHA-1 encrypted data and the abstract by using an RSA encryption public key provided by a receiving end; sending ciphertext; the receiving end receives the ciphertext and decrypts the ciphertext for the first time by using the private key of the receiving end; carrying out identity authentication on the received data; and performing DES decryption on the data subjected to the identity authentication, and reading the data content. The information to be sent is encrypted by DES, SHA-1 and RSA algorithm respectively, so that the encrypted information for communication is safer, digital signature is realized, the received information is ensured to be the original information sent by the sending end, but the problem that BIM model data cannot be encrypted by using AES encryption algorithm, and therefore the safety and the integrity of the BIM model data are protected exists.
Disclosure of Invention
Aiming at the defect that BIM model data cannot be encrypted by using an AES encryption algorithm in the prior art so as to protect the safety and the integrity of the BIM model data, the application provides a safe encryption method and a safe encryption system based on an AES and a key derivation function, and the safety and the integrity of the BIM model data can be protected by using the AES encryption algorithm.
The technical scheme of the invention is that the secure encryption method based on AES and key derivation function comprises the following steps:
S1, BIM model data are acquired, a global secret key is generated, and a user secret key is generated based on the global secret key and user basic information;
S2, the BIM model data are encrypted symmetrically based on the user secret key, the user secret key is encrypted based on the global secret key, and the encrypted BIM model data and the global secret key are transmitted to a user side;
s3, the user side obtains the encrypted BIM model data and the global secret key, decrypts the user secret key based on the global secret key, and decrypts the encrypted BIM model data based on the user secret key to obtain BIM model data;
S4, the user side builds a BIM model based on BIM model data.
Preferably, in S1, the BIM model data is stored in a memory or a buffer.
Preferably, in S1, the global key is generated based on a time stamp and a random number.
Preferably, in S1, the user basic information includes a user ID and a user password.
Preferably, the user key is 128 bits in length.
Preferably, in S2, the BIM model data is encrypted symmetrically based on the user key, including the steps of:
s201, dividing BIM model data into a plurality of plaintext blocks according to 128 bits;
s202, filling the last plaintext block according to a PKCS5Padding filling mode;
s203, encrypting each plaintext block by using an AES encryptor and a user key to obtain a ciphertext block;
s204, all the ciphertext blocks are spliced to obtain encrypted BIM model data.
Preferably, in S2, the user key is encrypted based on the global key, including the steps of:
S211, generating a random value;
s212, combining the user key with the random value to obtain a combined value;
s213, encrypting the combined value by using the global key.
A secure encryption system based on AES and a key derivation function, comprising:
The key derivation module generates a user key based on the global key and the user basic information;
the user information module stores user basic information and is connected with the key derivation module;
The data acquisition module acquires BIM model data and is connected with the key derivation module;
The key generation module generates a global key and is connected with the key derivation module;
The data encryption module is used for symmetrically encrypting BIM model data based on the user key, encrypting the user key based on the global key and connecting the data acquisition module, the key derivation module and the key generation module;
the data transmission module is used for transmitting the encrypted BIM model data and the global secret key and is connected with the data encryption module;
The data decryption module decrypts the user key based on the global key, decrypts the encrypted BIM model data based on the user key to obtain BIM model data, and is connected with the data transmission module;
And the model building module is used for building a BIM model based on the BIM model data and connecting the BIM model with the data decryption module.
Preferably, the data acquisition module interfaces with the BIM model data platform.
The invention has the beneficial effects that: the aim of the BIM model to use the AES encryption technology is mainly to protect the security and integrity of BIM model data. By using the AES encryption algorithm, it can be ensured that only authorized users with the key can access and modify the BIM model data, thereby preventing unauthorized access and tampering. Meanwhile, the AES encryption algorithm can provide higher security and resist various attack means such as violent cracking, dictionary attack and the like, so that the security and the integrity of BIM model data are ensured.
Drawings
FIG. 1 is a schematic diagram of a secure encryption system based on AES and a key derivation function of the present invention;
FIG. 2 is a flow chart of the secure encryption method based on AES and key derivation functions of the present invention;
FIG. 3 is a data encryption flow chart of the secure encryption method based on AES and key derivation functions of the present invention;
FIG. 4 is a key encryption flow chart of the secure encryption method based on AES and key derivation functions of the present invention;
in the figure:
1. a data acquisition module; 2. a user information module; 3. a key generation module; 4. a key derivation module; 5. a data encryption module; 6. a data transmission module; 7. a data decryption module; 8. and a model building module.
Detailed Description
In order to make the technical problems solved by the present invention, the technical solutions adopted and the technical effects achieved more clear, the technical solutions of the embodiments of the present invention will be described in further detail below with reference to the accompanying drawings, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
As shown in fig. 1, a secure encryption system based on AES and a key derivation function, comprising:
The data acquisition module 1 is used for acquiring BIM model data and is connected with the BIM model data platform and the secret key derivation module 4;
the user information module 2 is used for storing user basic information, wherein the user basic information comprises a user ID, a user password and the like, and is connected with the key derivation module 4;
The key generation module 3 is used for generating a global key and connecting the key derivation module 4 and the data encryption module 5;
The key derivation module 4 generates a user key based on the global key and the user basic information, and is connected with the data acquisition module 1, the user information module 2, the key generation module 3 and the data encryption module 5;
The data encryption module 5 is used for symmetrically encrypting BIM model data based on a user key, encrypting the user key based on a global key and connecting the data acquisition module 1, the key derivation module 4, the key generation module 3 and the data transmission module 6;
the data transmission module 6 is used for transmitting the encrypted BIM model data and the global secret key and is connected with the data encryption module 5 and the data decryption module 7;
the data decryption module 7 decrypts the user key based on the global key, decrypts the encrypted BIM model data based on the user key to obtain BIM model data, and is connected with the data transmission module 6;
the model building module 8 builds a BIM model based on BIM model data and is connected with the data decryption module 7.
The data acquisition module 1 is used for acquiring BIM model data and is connected with the BIM model data platform and the key derivation module 4. Specifically, the BIM (building information model) technology is an engineering data model based on a three-dimensional digital technology and integrating various related information of a building engineering project. The method can connect data, processes and resources of different stages of the life cycle of the building project, is a complete description of engineering objects, provides real-time engineering data which can be automatically calculated, inquired and combined and split, and can be widely used by all participants of the building project. The data acquisition module 1 acquires BIM model data from the BIM model data platform through the interface, and the acquired BIM model data is stored in the memory or the cache, so that the BIM model data can be encrypted conveniently, and in a possible embodiment, the BIM model data can also be stored in the hard disk.
The user information module 2 is configured to store user basic information, where the user basic information includes a user ID, a user password, and the like, and is connected to the key derivation module 4. Specifically, after a user logs in a platform, setting relevant user basic information on the platform, wherein a user ID in the user basic information is automatically generated by the platform, and the user ID has uniqueness in the platform, and is usually a plurality of continuous numbers or letters plus a plurality of continuous numbers; the user password is user-defined input and can be a combination of a plurality of letters, numbers and symbols. And generating a user key through the participation of the user ID and the user password, so that the pertinence of the user key is improved.
The key generation module 3 is configured to generate a global key, and is connected to the key derivation module 4 and the data encryption module 5. Specifically, the global secret key is generated through the server, and the global secret key can be generated based on the time stamp and the random number, so that the non-repeatability of the global secret key is ensured.
The key derivation module 4 generates a user key based on the global key and the user basic information, and connects the data acquisition module 1, the user information module 2, the key generation module 3, and the data encryption module 5. Specifically, the global secret key is obtained, and the user secret key is generated based on the global secret key, the user ID and the user password, so that the uniqueness of the user secret key and the relevance between the user secret key and the user are ensured, and in the embodiment, the length of the user secret key is 128 bits.
The data encryption module 5 is used for symmetrically encrypting BIM model data based on a user key, encrypting the user key based on a global key, and connecting the data acquisition module 1, the key derivation module 4, the key generation module 3 and the data transmission module 6. Specifically, BIM model data is symmetrically encrypted through an AES algorithm, the BIM model data is split into independent plaintext blocks, the length of each plaintext block is 128 bits, if the length of the last plaintext block is less than 128 bits, the last plaintext block is filled through PKCS5 packing, and each plaintext block is encrypted through an AES encryptor and a user key to obtain a corresponding ciphertext block. BIM model data is split into a plurality of plaintext blocks according to 128 bits. The last plaintext block is padded in the selected padding mode. Each plaintext block is encrypted into a ciphertext block using an AES encryptor and a key. All ciphertext blocks are spliced to form the final encrypted BIM model data. The user key is protected by a key encapsulation and decapsulation technique based on the global key encryption user key, used in combination with asymmetric encryption. In this embodiment, a key transmission algorithm (e.g., RSA-KEM) combines the user key with the random value, then encrypts the combined value using the global key at the user side, and the user side decrypts the combined value using its global key and extracts the user key. Generating a random value; combining the user key with the random value to obtain a combined value; the combined value is encrypted using the global key.
The data transmission module 6 is used for transmitting the encrypted BIM model data and the global key, and is connected with the data encryption module 5 and the data decryption module 7. Specifically, the data transmission module 6 transmits the encrypted BIM model data and the global key to the user side.
The data decryption module 7 decrypts the user key based on the global key, decrypts the encrypted BIM model data based on the user key to obtain BIM model data, and is connected with the data transmission module 6. Specifically, after the user side obtains the encrypted BIM model data and the global secret key, the user secret key is decrypted based on the global secret key through a corresponding decryption algorithm, and then the user secret key is used for decrypting the encrypted BIM model data to obtain BIM model data, so that BIM model data is obtained.
Embodiments are described below: the data acquisition module 1 acquires BIM model data from the BIM model data platform through the interface, and the acquired BIM model data is stored in the memory or the cache, so that the BIM model data can be encrypted conveniently, and in a possible embodiment, the BIM model data can also be stored in the hard disk. The user information module 2 generates a user key through the participation of the user ID and the user password, and improves the pertinence of the user key. The key generation module 3 generates a global key through a server, and the global key can be generated based on time stamping and adding a random number, so that the non-repeatability of the global key is ensured. The key derivation module 4 generates a user key based on the global key, the user ID, and the user password, thereby ensuring the uniqueness of the user key and the association with the user. The data encryption module 5 symmetrically encrypts BIM model data through an AES algorithm, splits the BIM model data into independent plaintext blocks, wherein the length of each plaintext block is 128 bits, if the length of the last plaintext block is less than 128 bits, the last plaintext block is filled through PKCS5Padding, and each plaintext block is encrypted through an AES encryptor and a user key to obtain a corresponding ciphertext block; the user key is protected by key encapsulation and decapsulation techniques, used in conjunction with asymmetric encryption. Generating a random value; combining the user key with the random value to obtain a combined value; the combined value is encrypted using the global key. The data transmission module 6 transmits the encrypted BIM model data and the global key to the user side. After the user side obtains the encrypted BIM model data and the global secret key, the user secret key is decrypted based on the global secret key through a corresponding decryption algorithm, and then the user secret key is used for decrypting the encrypted BIM model data to obtain BIM model data, so that BIM model data is obtained. After BIM model data are obtained, a BIM model is built based on the BIM model data through modeling software in a model building module 8, so that safe transmission of the BIM model data and building of the BIM model are realized.
Example two
As shown in fig. 2 to 4, the secure encryption method based on AES and a key derivation function includes the steps of:
S1, BIM model data are acquired, a global secret key is generated, and a user secret key is generated based on the global secret key and user basic information;
S2, the BIM model data are encrypted symmetrically based on the user secret key, the user secret key is encrypted based on the global secret key, and the encrypted BIM model data and the global secret key are transmitted to a user side;
s3, the user side obtains the encrypted BIM model data and the global secret key, decrypts the user secret key based on the global secret key, and decrypts the encrypted BIM model data based on the user secret key to obtain BIM model data;
S4, the user side builds a BIM model based on BIM model data.
In step S1, BIM model data is acquired, a global key is generated, and a user key is generated based on the global key and user basic information. Specifically, the data acquisition module 1 acquires BIM model data from the BIM model data platform through the interface, and the acquired BIM model data is stored in the memory or the cache, so that the BIM model data can be encrypted conveniently, and in a possible embodiment, the BIM model data can also be stored in the hard disk; the key generation module 3 generates a global key through a server, wherein the global key can be generated based on time stamp plus random number; the key derivation module 4 generates a user key based on the global key, the user ID and the user password, so as to ensure the uniqueness of the user key and the association with the user, and the length of the user key is 128 bits.
In step S2, the BIM model data is encrypted based on the user key, the user key is encrypted based on the global key, and the encrypted BIM model data and the global key are transmitted to the user side. Specifically, the data encryption module 5 symmetrically encrypts BIM model data through an AES algorithm, splits the BIM model data into independent plaintext blocks, wherein the length of each plaintext block is 128 bits, if the length of the last plaintext block is less than 128 bits, the last plaintext block is filled through PKCS5Padding, and each plaintext block is encrypted through an AES encryptor and a user key to obtain a corresponding ciphertext block. BIM model data is split into a plurality of plaintext blocks according to 128 bits. The last plaintext block is padded in the selected padding mode. Each plaintext block is encrypted into a ciphertext block using an AES encryptor and a key. Splicing all ciphertext blocks to obtain final encrypted BIM model data; the data transmission module 6 transmits the encrypted BIM model data and the global key to the user side.
In step S3, the user side obtains the encrypted BIM model data and the global key, decrypts the user key based on the global key, and decrypts the encrypted BIM model data based on the user key to obtain the BIM model data. Specifically, after the user side obtains the encrypted BIM model data and the global key, the data decryption module 7 decrypts the user key based on the global key through the corresponding decryption algorithm, and then decrypts the encrypted BIM model data by using the user key to obtain the BIM model data, thereby obtaining the BIM model data.
The aim of the BIM model to use the AES encryption technology is mainly to protect the security and integrity of BIM model data. By using the AES encryption algorithm, it can be ensured that only authorized users with the key can access and modify the BIM model data, thereby preventing unauthorized access and tampering. Meanwhile, the AES encryption algorithm can provide higher security and resist various attack means such as violent cracking, dictionary attack and the like, so that the security and the integrity of BIM model data are ensured.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (9)

1. The secure encryption method based on the AES and the key derivation function is characterized by comprising the following steps:
S1, BIM model data are acquired, a global secret key is generated, and a user secret key is generated based on the global secret key and user basic information;
S2, the BIM model data are encrypted symmetrically based on the user secret key, the user secret key is encrypted based on the global secret key, and the encrypted BIM model data and the global secret key are transmitted to a user side;
s3, the user side obtains the encrypted BIM model data and the global secret key, decrypts the user secret key based on the global secret key, and decrypts the encrypted BIM model data based on the user secret key to obtain BIM model data;
S4, the user side builds a BIM model based on BIM model data.
2. The secure encryption method based on AES and key derivation functions according to claim 1, wherein in S1, BIM model data is stored in a memory or a buffer.
3. The secure encryption method based on AES and key derivation function according to claim 1, wherein in S1, the global key is generated based on a time stamp and a random number.
4. The secure encryption method based on AES and key derivation function according to claim 1, wherein in S1, the user basic information includes a user ID and a user password.
5. The secure encryption method based on AES and key derivation function according to claim 1, wherein the length of the user key is 128 bits.
6. The secure encryption method based on AES and key derivation functions according to claim 1 or 4, wherein in S2, BIM model data is encrypted based on user key symmetry, comprising the steps of:
s201, dividing BIM model data into a plurality of plaintext blocks according to 128 bits;
s202, filling the last plaintext block according to a PKCS5Padding filling mode;
s203, encrypting each plaintext block by using an AES encryptor and a user key to obtain a ciphertext block;
s204, all the ciphertext blocks are spliced to obtain encrypted BIM model data.
7. The secure encryption method based on AES and key derivation functions according to claim 1 or 4, wherein in S2, the user key is encrypted based on the global key, comprising the steps of:
S211, generating a random value;
s212, combining the user key with the random value to obtain a combined value;
s213, encrypting the combined value by using the global key.
8. A secure encryption system based on AES and a key derivation function, adapted to the secure encryption method based on AES and a key derivation function according to any one of claims 1 to 7, comprising:
The key derivation module generates a user key based on the global key and the user basic information;
the user information module stores user basic information and is connected with the key derivation module;
The data acquisition module acquires BIM model data and is connected with the key derivation module;
The key generation module generates a global key and is connected with the key derivation module;
The data encryption module is used for symmetrically encrypting BIM model data based on the user key, encrypting the user key based on the global key and connecting the data acquisition module, the key derivation module and the key generation module;
The data transmission module is used for transmitting the encrypted BIM model data and the global secret key and is connected with the data encryption module; the data decryption module decrypts the user key based on the global key, decrypts the encrypted BIM model data based on the user key to obtain BIM model data, and is connected with the data transmission module;
And the model building module is used for building a BIM model based on the BIM model data and connecting the BIM model with the data decryption module.
9. The AES and key derivation function-based secure encryption system of claim 8, wherein the data acquisition module interfaces with a BIM model data platform.
CN202410299810.5A 2024-03-15 2024-03-15 Secure encryption method and system based on AES and key derivation function Pending CN118300779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410299810.5A CN118300779A (en) 2024-03-15 2024-03-15 Secure encryption method and system based on AES and key derivation function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410299810.5A CN118300779A (en) 2024-03-15 2024-03-15 Secure encryption method and system based on AES and key derivation function

Publications (1)

Publication Number Publication Date
CN118300779A true CN118300779A (en) 2024-07-05

Family

ID=91686771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410299810.5A Pending CN118300779A (en) 2024-03-15 2024-03-15 Secure encryption method and system based on AES and key derivation function

Country Status (1)

Country Link
CN (1) CN118300779A (en)

Similar Documents

Publication Publication Date Title
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
KR101324825B1 (en) Message authentication code pre-computation with applications to secure memory
CN100592683C (en) Protected return path from digital rights management dongle
US9537657B1 (en) Multipart authenticated encryption
CN103366132B (en) Equipment and method for encryption data
CN109067814B (en) Media data encryption method, system, device and storage medium
CN112738051B (en) Data information encryption method, system and computer readable storage medium
US6640303B1 (en) System and method for encryption using transparent keys
CN105227566A (en) Cipher key processing method, key handling device and key handling system
CN104396182A (en) Method of encrypting data
CN105468940A (en) Software protection method and apparatus
RU2010105036A (en) MAS CODE CHECK WITHOUT ITS DISCLOSURE
CN114499875A (en) Service data processing method and device, computer equipment and storage medium
CN113408013A (en) Encryption and decryption chip framework with multiple algorithm rules mixed
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
CN113326518A (en) Data processing method and device
US8862893B2 (en) Techniques for performing symmetric cryptography
CN104392153A (en) Software protection method and system
CN115987500A (en) Data safety transmission method and system based on industrial equipment data acquisition
CN118300779A (en) Secure encryption method and system based on AES and key derivation function
CN115118416A (en) Distributed database system based on privacy protection and confidentiality method
CN116781265A (en) Data encryption method and device
JP7012920B2 (en) Cryptographic device, decryption device, encryption method, decryption method, encryption program and decryption program
JP5586758B1 (en) Dynamic encryption key generation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination