WO2017166279A1 - 资料加解密系统及其加解密方法 - Google Patents

资料加解密系统及其加解密方法 Download PDF

Info

Publication number
WO2017166279A1
WO2017166279A1 PCT/CN2016/078295 CN2016078295W WO2017166279A1 WO 2017166279 A1 WO2017166279 A1 WO 2017166279A1 CN 2016078295 W CN2016078295 W CN 2016078295W WO 2017166279 A1 WO2017166279 A1 WO 2017166279A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
data
ciphertext data
encryption
decryption
Prior art date
Application number
PCT/CN2016/078295
Other languages
English (en)
French (fr)
Inventor
陈以德
邱毓贤
何文献
廖汉君
Original Assignee
高雄医学大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 高雄医学大学 filed Critical 高雄医学大学
Priority to PCT/CN2016/078295 priority Critical patent/WO2017166279A1/zh
Publication of WO2017166279A1 publication Critical patent/WO2017166279A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to a data encryption and decryption system and a method for encrypting and decrypting the same, in particular, a complete ciphertext data can be deconstructed into a plurality of pieces of ciphertext data, and the plurality of sub-databases respectively store different pieces of the ciphertext.
  • the encryption and decryption system can convert the electronic data from a plaintext data to a ciphertext data through an encryption key.
  • Ciphertext because the average person can't directly interpret the true meaning of the ciphertext data, even if the ciphertext data is stolen by the person in the process of transmission, if the person concerned can't crack the encryption method of the ciphertext data, That is, it can prevent leakage of confidential information in the electronic data.
  • the encryption and decryption system usually stores the complete ciphertext data in the same database, so that the person who is interested can easily steal the complete database.
  • the ciphertext data and in the case of having the complete ciphertext data, the interested person may also crack the encryption method of the ciphertext data, and then decrypt the ciphertext data back to the plaintext data, and the existing data encryption method has The problem of poor security of data confidentiality.
  • the present invention provides a data encryption and decryption system and a method for encrypting and decrypting the same to solve the problem of poor data security of the existing data encryption method.
  • An object of the present invention is to provide a data encryption and decryption system and a method for encrypting and decrypting the same, the system and method thereof Deconstructing a complete ciphertext data into several pieces of ciphertext data, and storing different pieces of ciphertext data in several sub-databases respectively has the effect of improving data security.
  • Coupled refers to a connection relationship between data transmissions between two devices.
  • the data encryption method of the present invention comprises: generating an encryption key by a verification and key generation module by a key generation algorithm; receiving an explicit text by an encryption and decryption module And the encryption key, and encrypting the plaintext data into a complete ciphertext data by using the encryption key; receiving the complete ciphertext data by a deconstruction and reconstruction module, and using the destructive algorithm to complete the ciphertext data Deconstructing into a plurality of pieces of ciphertext data; and receiving, by a database module, the plurality of pieces of ciphertext data, the database module having a plurality of sub-databases, wherein the plurality of sub-libraries respectively store different pieces of the ciphertext data.
  • the data decryption method of the present invention includes: receiving a verification signal by a verification and key generation module, the verification signal includes a verification parameter, and the verification and key generation module verifies the verification parameter, and After verifying that the parameter verification is consistent, a decryption key is generated by a key generation algorithm; when the verification parameter verification is consistent, the number of the destructor and reconstruction modules in the plurality of sub-databases of a database module is respectively retrieved a piece of ciphertext data, and reconstructing the plurality of pieces of ciphertext data into a complete ciphertext data by using a reconstruction algorithm; and receiving the complete ciphertext data and the decryption key by an encryption and decryption module, and The decryption key decrypts the complete ciphertext data into a plaintext material.
  • the data encryption and decryption system of the present invention comprises: a verification and key generation module, receiving a verification signal, and verifying a verification parameter of the verification signal, and verifying compliance with the verification parameter, with a key Generate The algorithm generates an encryption key or a decryption key; an encryption and decryption module is coupled to the verification and key generation module to receive the encryption key or the decryption key, and the encryption and decryption module can use the encryption The key encrypts a plaintext data into a complete ciphertext data, or decrypts the complete ciphertext data into the plaintext data by using the decryption key; a deconstruction and reconstruction module coupled to the encryption and decryption module to receive the complete The ciphertext data, the deconstruction and reconstruction module can deconstruct the complete ciphertext data into a plurality of fragment ciphertext data by a destructive algorithm, or reconstruct the ciphertext data into the complete ciphertext by using a reconstruction algorithm And a database module coupled
  • the plurality of segment ciphertext data has a total number of ciphertexts
  • the deconstruction and reconstruction module performs the plurality of segment ciphertexts according to a predetermined reconstruction number.
  • the data is reconstructed from the complete ciphertext data, and the predetermined number of reconstructions and the total number of ciphertexts of the segment are integers, and the predetermined number of reconstructions is greater than 1 and less than the total number of ciphertexts of the segment.
  • the reconstruction module can reconstruct the complete ciphertext data, and has the effect of improving the fault tolerance rate.
  • the destructive algorithm deconstructs the complete ciphertext data into a plurality of segment ciphertext data by a parity check method, and the reconstruction algorithm uses the same school The method reconstructs the pieces of ciphertext data into the complete ciphertext data.
  • the deconstruction and reconstruction module can be configured to reconstruct the complete ciphertext data according to the predetermined number of reconstructed numbers of the ciphertext data, which has the effect of improving the fault tolerance rate.
  • the verification signal includes a key parameter group
  • the key generation algorithm generates the encryption key or the decryption key according to the key parameter group.
  • the key parameter group has a plurality of threshold values, the plurality of threshold parameters having a total number of parameters, and the key generation algorithm is based on a predetermined Parameter
  • the number of the threshold parameters generates the encryption key or the decryption key
  • the predetermined number of parameters and the total number of the parameters are integers
  • the predetermined parameter quantity is greater than 1 and less than the total number of the parameters.
  • the threshold value parameter can generate the encryption key or the decryption key under the predetermined parameter quantity, even if a small part of the plurality of threshold parameter parameters is damaged or missing, the The verification and key generation module 1 can normally generate the encryption key or the decryption key, which has the effect of improving the fault tolerance rate.
  • FIG. 1 is a block diagram of a data encryption and decryption system of the present invention.
  • FIG. 2 is a step diagram of a data encryption method of the present invention.
  • FIG. 3 is a step diagram of a data decryption method of the present invention.
  • the data encryption and decryption system of the present invention comprises: a verification and key generation module 1, an encryption and decryption module 2, a deconstruction and reconstruction module 3 and a database module 4
  • the encryption/decryption module 2 is coupled to the test
  • the certificate and key generation module 1 is coupled to the encryption and decryption module 2
  • the database module 4 is coupled to the deconstruction and reconstruction module 3.
  • the verification and key generation module 1 receives a verification signal, and verifies a verification parameter of the verification signal, and after the verification parameter verification conforms to ⁇ , generates a cryptographic key or a key by a key generation algorithm. Decrypt the key.
  • the verification and key generation module 1 can be a processor or an integrated circuit, and the processor or the integrated circuit can be used to execute a firmware, and has functions such as data operation and logic judgment.
  • the verification signal may be stored in one or more portable electronic devices, such as a Java Card.
  • portable electronic devices such as a Java Card.
  • radio frequency identification Radio Frequency
  • the verification parameter may be a data that can be used for identity authentication, such as a password, a card number, a biometric feature, and a latitude and longitude location information.
  • identity authentication such as a password, a card number, a biometric feature, and a latitude and longitude location information.
  • a user transmits the verification parameter to the verification and key generation module 1 and the verification conforms, Representing the user as a user who can be authorized to operate, and can perform subsequent data encryption or decryption operations.
  • the type of the key generation algorithm of the verification and key generation module 1 is not limited herein. In this embodiment, the key generation algorithm is a symmetric key generation algorithm, such as high.
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • 3DES Triple Data Encryption Standard
  • Blowfish Algorithm Blowfish Algorithm
  • IDA International Data Encryption Algorithm
  • RC5 Force Oral algorithm or RC6 encryption algorithm.
  • the verification signal preferably further includes a key parameter group, and the key generation algorithm generates the encryption key or the decryption key according to the key parameter group, wherein the key parameter group has a number a threshold value parameter, the plurality of threshold value parameters having a total number of parameters, the key generation algorithm generating the encryption key or the decryption key according to the plurality of threshold parameter parameters of a predetermined parameter quantity, the predetermined parameter quantity and The total number of parameters is an integer, and the predetermined number of parameters is greater than 1 and less than the total number of parameters.
  • the threshold parameter of the key parameter group may be used to generate a seed of a manufacturing key, and when the key generation algorithm receives the threshold parameter, the The encryption key or the decryption key is generated by the seed obtained by the threshold parameter.
  • the threshold values can be executed by the "polial difference method" ( Lagrange Interpolating
  • the performance algorithm generates the encryption key or the decryption key according to the plurality of threshold parameters, and can receive only the threshold values of the predetermined number of parameters without receiving all the threshold parameters.
  • the encryption key or the decryption key is generated (for example, when the total number of parameters of the plurality of threshold parameters is 5, if the threshold values are generated by the circular secret sharing algorithm)
  • the key generation algorithm only receives three threshold parameters, the seed used to manufacture the key can be successfully obtained, and the encryption key or the decryption key is generated by the seed.
  • the verification signal has the key parameter group
  • the key parameter group since the key parameter group can be used to generate the encryption key or the decryption key, the key parameter group can also be used together for authentication, The effect of improving the security of data security; further, since the threshold value parameter can generate the encryption key or the decryption key under the predetermined parameter quantity, even if there are a small number of the threshold values If the number of the remaining threshold parameters is greater than or equal to the predetermined number of parameters, the verification and key generation module 1 can normally generate the encryption key or the decryption key, which has an improved fault tolerance rate. effect.
  • the encryption and decryption module 2 is coupled to the verification and key generation module 1 to receive the encryption key or the decryption key, and the encryption and decryption module 2 can encrypt a plaintext data P by using the encryption key. It is a complete ciphertext data C, or the complete ciphertext data C is decrypted into the plaintext data P by the decryption key.
  • the encryption/decryption module 2 can be a processor or an integrated circuit, and the processor or the integrated circuit can be used to execute a firmware, and has functions such as data operation and logic judgment.
  • the encryption and decryption mode of the encryption and decryption module 2 is not limited herein.
  • the encryption and decryption module 2 cooperates with the key generation algorithm to be a symmetric encryption and decryption module. Grouping, and receiving the plaintext data P, encrypting the plaintext data P into the complete ciphertext data C by using the encryption key; or receiving the complete ciphertext data C, using the decryption key The complete ciphertext data C is decrypted into the plaintext data P.
  • the deconstruction and reconstruction module 3 is coupled to the encryption and decryption module 2 to receive the complete ciphertext data C.
  • the deconstruction and reconstruction module 3 can deconstruct the complete ciphertext data C into a plurality of destructive algorithms. Fragment ciphertext data Cs, or reconstructing the plurality of ciphertext data Cs into the complete ciphertext data by a reconstruction algorithm, wherein the deconstruction and reconstruction module 3 can be a processor or an integrated circuit, and The processor or the integrated circuit can be used to execute a firmware and has functions such as data operation and logic judgment.
  • the deconstruction and reconstruction module 3 may reconstruct the complete ciphertext data C according to the predetermined number of reconstructed ciphertext data Cs.
  • the predetermined number of reconstructions and the total number of ciphertexts of the segment are integers, and the predetermined reconstruction number is greater than 1 and smaller than the segment. The total number of ciphertexts.
  • the deconstruction algorithm and the reconstruction algorithm have characteristics that utilize the same principle and are inversely operated with each other, for example, the destructive algorithm uses a parity check method to complete the ciphertext data C. Deconstructed into several pieces of ciphertext data Cs. Similarly, the reconstruction algorithm also reconstructs the plurality of pieces of ciphertext data Cs into the complete ciphertext data by the parity check method, wherein the parity check method can be implemented in Redundant Array of Independent Disk (RAID), and can be a Hamming code or Reed-solomom code.
  • RAID Redundant Array of Independent Disk
  • the plurality of ciphertext data Cs includes the complete ciphertext data C and the check code. Therefore, the plurality of pieces of ciphertext data Cs are to be reconstructed back to the complete ciphertext data C, and all of the plurality of pieces of ciphertext data Cs need not be received, but only the number of pieces of the predetermined number of reconstructions can be received.
  • the complete ciphertext data C can be reconstructed (for example, when the total number of ciphertexts of the pieces of ciphertext data Cs is 6 ⁇ , only 4 of the deconstruction and reconstruction modules 3 are received.
  • the complete ciphertext data C can be successfully reconstructed by comparison of the check codes.
  • the plurality of pieces of ciphertext data Cs can reconstruct the complete ciphertext data C under the predetermined reconstruction number, even if a small part of the plurality of pieces of ciphertext data Cs is damaged or missing, as long as the rest
  • the number of the ciphertext data Cs is greater than or equal to the predetermined number of reconstructions, so that the deconstruction and reconstruction module 3 reconstructs the complete ciphertext data C, which has the effect of improving the fault tolerance rate.
  • the database module 4 is coupled to the deconstruction and reconstruction module 3.
  • the database module 4 has a plurality of sub-databases 41, and the plurality of sub-databases 41 respectively store different pieces of the ciphertext data Cs. For the deconstruction and reconstruction module 3 to retrieve the plurality of pieces of ciphertext data Cs.
  • the database module 4 can be coupled to the deconstruction and reconstruction module 3 through an encryption channel, which can be a virtual private network (VPN) or an Internet Protocol.
  • an encryption channel which can be a virtual private network (VPN) or an Internet Protocol.
  • IPSec Point to Point Tunneling Protocol
  • PPTP Point to Point Tunneling Protocol
  • L2TP Layer 2 Tunneling Protocol
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • the plurality of sub-databases 41 of the database module 4 are independent remote databases or cloud servers respectively. , such as Dropbox, OneDrive, Google Drive, Amazon EC2, Amazon S3, and more.
  • the plurality of sub-databases 41 are independent databases and store different pieces of the ciphertext data Cs, even if the interested person can retrieve the ciphertext data C of the one of the sub-libraries 41 s, in the case that the total number of ciphertext data Cs obtained is too small, the interested person is still unable to reconstruct the fragment ciphertext data Cs back to the complete ciphertext data C, and the complete ciphertext data C cannot be understood.
  • the true meaning of the document has the effect of improving the security of data confidentiality.
  • the data encryption method of the present invention includes a key generation step S1 l, an encryption step S12, and a deconstruction step S13 based on the embodiment of the data encryption and decryption system. And a data storage step S14.
  • the key generation step S11 generates the encryption key by the verification and key generation module 1 by the key generation algorithm.
  • the verification and key generation module 1 may further receive the key parameter group, and the key generation algorithm generates the encryption key according to the key parameter group, wherein the key parameter group has a number a threshold value parameter, the threshold value parameter has a total number of the parameters, and the key generation algorithm generates the encryption key according to the plurality of threshold parameter parameters of the predetermined parameter quantity, and the predetermined parameter quantity and the total number of the parameter are both Integer, the predetermined number of parameters is greater than 1 and less than the total number of parameters.
  • the effect is that the number of threshold values can be generated under the predetermined number of parameters, even if a small number of the threshold values are damaged or missing, as long as the remaining number
  • the number of the threshold parameter is greater than or equal to the predetermined number of parameters, so that the verification and key generation module 1 can normally generate the encryption key, which has the effect of improving the fault tolerance rate.
  • the encryption and decryption module 2 receives the plaintext data P and the encryption key, and encrypts the plaintext data P into the complete ciphertext data by using the encryption key.
  • the deconstruction step S13 receives the complete ciphertext data C from the deconstruction and reconstruction module 3, and deconstructs the complete ciphertext data C into the plurality of segment ciphertext data Cs by using the destructive algorithm.
  • the destructive algorithm deconstructs the complete ciphertext data C into the plurality of ciphertext data Cs by the parity check method, and the deconstructed and reconstructed modules are deconstructed to generate the fragments.
  • Document Cs has the piece The total number of segments of ciphertext, when the plurality of pieces of ciphertext data Cs are generated in the above manner, if the plurality of pieces of ciphertext data Cs are to perform subsequent decryption operations, the deconstruction and reconstruction module 3 can be provided for the deconstruction and reconstruction module 3 The predetermined number of reconstructed ciphertext data Cs reconstructs the complete ciphertext data C.
  • the predetermined number of reconstructions and the total number of ciphertexts of the fragment are integers, and the predetermined reconstruction number is greater than 1 and less than the total number of ciphertexts of the fragment.
  • the data storage step S14 the database module 4 receives the plurality of segment ciphertext data Cs, the database module 4 has a plurality of sub-databases 41, and the plurality of sub-databases 41 respectively store different Several fragments of ciphertext data Cs. Therefore, since the plurality of sub-databases 41 are independent databases, and different pieces of the ciphertext data Cs are stored separately, even a person with a heart can retrieve the ciphertext data Cs of the fragment in the sub-database 41. If the total number of ciphertext data Cs obtained is too small, the interested person cannot reconstruct the ciphertext data Cs back to the complete ciphertext data C, and cannot understand the complete ciphertext data C. The true meaning has the effect of improving the security of data confidentiality.
  • the data decryption method of the present invention includes a verification and key generation step S21, a reconstruction step S22, and a decryption based on the above embodiment of the data encryption and decryption system.
  • Step S23 the data decryption method of the present invention includes a verification and key generation step S21, a reconstruction step S22, and a decryption based on the above embodiment of the data encryption and decryption system.
  • the verification and key generation module 1 receives the verification signal, the verification signal includes the verification parameter, and the verification and key generation module 1 verifies the verification parameter, and After the verification parameter verification conforms to ⁇ , the key generation algorithm generates the decryption key.
  • the verification signal may further include the key parameter group, and the key generation algorithm generates the decryption key according to the key parameter group, wherein the key parameter group has a plurality of threshold parameters, The threshold value parameter has a total number of the parameters, and the key generation algorithm generates the decryption key according to the plurality of threshold parameter parameters of the predetermined parameter quantity, and the predetermined parameter quantity and the total number of the parameters are integers, and the predetermined parameter quantity Greater than 1 and less than the total number of parameters.
  • the key parameter group can also be used together for authentication, which has the security of data security.
  • the decryption key can be generated in a quantity, even if a small number of the threshold parameters are damaged or missing, as long as the remaining number of the threshold parameters is greater than or equal to the predetermined number of parameters, the verification and The key generation module 1 normally generates the decryption key, which has the effect of improving the fault tolerance rate.
  • the deconstruction and reconstruction module 3 respectively extracts several pieces of ciphertext data Cs in the plurality of sub-databases 41 of the database module 4, and The plurality of pieces of ciphertext data Cs are reconstructed into the complete ciphertext data by the reconstruction algorithm, whereby the plurality of sub-databases 41 are independent databases, and different pieces of ciphertext data Cs are stored separately.
  • the deconstructing and reconstructing module reconstructs the complete ciphertext data C according to the predetermined number of pieces of the ciphertext data Cs, the predetermined The number of reconstructions and the total number of ciphertexts of the segment are integers, and the predetermined number of reconstructions is greater than 1 and less than the total number of ciphertexts of the segment.
  • the reconstruction algorithm reconstructs the plurality of segment ciphertext data Cs into the complete ciphertext data by the parity check method, whereby the plurality of segment ciphertext data Cs can be obtained under the predetermined reconstruction number Rebuilding the complete ciphertext data C, even if a small number of the ciphertext data Cs of the plurality of fragments are damaged or missing, as long as the remaining number of ciphertext data Cs of the plurality of fragments is greater than or equal to the predetermined reconstruction number,
  • the deconstruction and reconstruction module 3 reconstructs the complete ciphertext data C, which has the effect of improving the fault tolerance rate.
  • the complete ciphertext data C and the decryption key are received by the encryption and decryption module 2, and the complete ciphertext data C is decrypted into the plaintext data P by the decryption key.
  • the data encryption and decryption system and the encryption and decryption method thereof can deconstruct a complete ciphertext data into a plurality of ciphertext data, and store different ciphertexts of the plurality of ciphertexts in a plurality of sub-databases. Information, with the effect of improving the security of data confidentiality.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

一种资料加解密系统及其加解密方法,该系统包含一验证与金钥产生模组(1)、一加解密模组(2)、一解构与重建模组(3)及一资料库模组(4),该加解密模组(2)耦接该验证与金钥产生模组(1),该解构与重建模组(3)耦接该加解密模组(2),该资料库模组(4)耦接该解构与重建模组(3),该解构与重建模组(3)以一解构演算法将一完整密文资料解构为数个片段密文资料,再将数个片段密文资料分别储存于该资料库模组的数个子资料库,借助上述系统所执行的加解密方法,可提升资料保密安全性。

Description

资料加解密系统及其加解密方法
技术领域
[0001] 本发明关于一种资料加解密系统及其加解密方法, 尤其是可将一完整密文资料 解构为数个片段密文资料, 并以数个子资料库分别储存不同的该数个片段密文 资料的系统及其方法。
背景技术
[0002] 随着电子技术的蓬勃发展, 使得资讯的呈现不单单于纸本形式停驻, 而是一步 步朝电子格式迈进。 由于电子式资料可通过存取而简单地传递于网路或电子装 置之间, 使得电子式资料中的机密资讯容易落入他人之手, 因此, 为电子式资 料进行加密作业以防止他人窥得机密资讯, 实属必要防护措施。
[0003] 一般而言, 当以一加解密系统对一电子式资料进行加密作业吋, 该加解密系统 可通过一加密金钥将该电子式资料由一明文资料 (Plaintext) 转变一密文资料 ( Ciphertext) , 由于一般人无法直接判读该密文资料的真正意涵, 即使该密文资 料在传输的过程中遭有心人士窃取, 在该有心人士无法破解该密文资料的加密 方式的情况下, 即能防止该电子式资料内的机密资讯外泄。
技术问题
[0004] 只是, 当该明文资料加密为该密文资料后, 该加解密系统通常会将完整的该密 文资料储存于同一个资料库中, 使得有心人士容易由同一个资料库中窃取完整 的该密文资料, 且在具有完整的该密文资料的情况下, 该有心人士亦可能破解 该密文资料的加密方式, 进而将密文资料解密回该明文资料, 现有资料加密方 法具有资料保密安全性不佳的问题。
[0005] 有鉴于此, 遂提供一种资料加解密系统及其加解密方法, 以解决现有资料加密 方法的资料保密安全性不佳的问题。
问题的解决方案
技术解决方案
[0006] 本发明的目的是提供一种资料加解密系统及其加解密方法, 该系统及其方法可 将一完整密文资料解构为数个片段密文资料, 并以数个子资料库分别储存不同 的该数个片段密文资料, 具有提升资料保密安全性的效果。
[0007] 本发明全文所述的"耦接", 指二装置间具有资料传递的连接关系。
[0008] 本发明全文所述的"明文资料 (Plaintext) ", 指一般人可以直接判读且可以了 解其真实意涵的电子式资料。
[0009] 本发明全文所述的"密文资料 (Ciphertext) ", 指一般人无法直接判读且无法了 解其真实意涵的电子式资料。
[0010] 为达到前述发明目的, 本发明的资料加密方法, 包含: 由一验证与金钥产生模 组以一金钥产生演算法产生一加密金钥; 由一加解密模组接收一明文资料及该 加密金钥, 并以该加密金钥将该明文资料加密为一完整密文资料; 由一解构与 重建模组接收该完整密文资料, 并以一解构演算法将该完整密文资料解构为数 个片段密文资料; 及由一资料库模组接收该数个片段密文资料, 该资料库模组 具有数个子资料库, 该数个子资料库分别储存不同的该数个片段密文资料。 借 此, 由于该数个子资料库彼此为独立的资料库, 且分别储存不同的该数个片段 密文资料, 使得有心人士难以完全取得该数个片段密文资料以重建该完整密文 资料, 具有提升资料保密安全性的效果。
[0011] 本发明的资料解密方法, 包含: 以一验证与金钥产生模组接收一验证信号, 该 验证信号包含一验证参数, 该验证与金钥产生模组验证该验证参数, 并于该验 证参数验证符合吋, 以一金钥产生演算法产生一解密金钥; 当该验证参数验证 符合吋, 以一解构与重建模组于一资料库模组的数个子资料库中分别撷取数个 片段密文资料, 并以一重建演算法将该数个片段密文资料重建为一完整密文资 料; 及由一加解密模组接收该完整密文资料及该解密金钥, 并以该解密金钥将 该完整密文资料解密为一明文资料。 借此, 由于该数个子资料库彼此为独立的 资料库, 且分别储存不同的该数个片段密文资料, 使得有心人士难以完全取得 该数个片段密文资料以重建该完整密文资料, 具有提升资料保密安全性的效果
[0012] 本发明的资料加解密系统, 包含: 一验证与金钥产生模组, 接收一验证信号, 并验证该验证信号的一验证参数, 且在该验证参数验证符合吋, 以一金钥产生 演算法产生一加密金钥或一解密金钥; 一加解密模组, 耦接该验证与金钥产生 模组以接收该加密金钥或该解密金钥, 该加解密模组能够以该加密金钥将一明 文资料加密为一完整密文资料, 或者以该解密金钥将该完整密文资料解密为该 明文资料; 一解构与重建模组, 耦接该加解密模组以接收该完整密文资料, 该 解构与重建模组能够以一解构演算法将该完整密文资料解构为数个片段密文资 料, 或者以一重建演算法将该数个片段密文资料重建为该完整密文资料; 及一 资料库模组, 耦接该解构与重建模组, 该资料库模组具有数个子资料库, 该数 个子资料库分别储存不同的该数个片段密文资料, 以供该解构与重建模组撷取 该数个片段密文资料。 借此, 由于该数个子资料库彼此为独立的资料库, 且分 别储存不同的该数个片段密文资料, 使得有心人士难以完全取得该数个片段密 文资料以重建该完整密文资料, 具有提升资料保密安全性的效果。
[0013] 在本发明的资料加解密系统及其加解密方法中, 该数个片段密文资料具有一片 段密文总数, 该解构与重建模组根据一预定重建数量的该数个片段密文资料重 建该完整密文资料, 该预定重建数量及该片段密文总数均为整数, 该预定重建 数量大于 1且小于该片段密文总数。 借此, 由于该数个片段密文资料可在该预定 重建数量下即能重建该完整密文资料, 即使该数个片段密文资料中有少部份毁 损或缺漏, 亦可使该解构与重建模组能重建该完整密文资料, 具有提高容错率 的效果。
[0014] 在本发明的资料加解密系统及其加解密方法中, 该解构演算法以一同位校验法 将该完整密文资料解构为数个片段密文资料, 该重建演算法以该同位校验法将 该数个片段密文资料重建为该完整密文资料。 借此, 可帮助该解构与重建模组 根据该预定重建数量的该数个片段密文资料以重建该完整密文资料, 具有提高 容错率的效果。
[0015] 在本发明的资料加解密系统及其加解密方法中, 该验证信号包含一金钥参数组 , 该金钥产生演算法根据该金钥参数组产生该加密金钥或该解密金钥。 借此, 该金钥参数组可一并作为认证之用, 具有提升资料保密安全性的效果。
[0016] 在本发明的资料加解密系统及其加解密方法中, 该金钥参数组具有数个门槛值 参数, 该数个门槛值参数具有一参数总数, 该金钥产生演算法根据一预定参数 数量的该数个门槛值参数产生该加密金钥或该解密金钥, 该预定参数数量及该 参数总数均为整数, 该预定参数数量大于 1且小于该参数总数。 借此, 由于该数 个门槛值参数可在该预定参数数量下即能产生该加密金钥或该解密金钥, 即使 该数个门槛值参数中有少部份毁损或缺漏, 亦可使该验证与金钥产生模组 1能正 常产生该加密金钥或该解密金钥, 具有提高容错率的效果。
发明的有益效果
对附图的简要说明
附图说明
[0017] 图 1 : 本发明的资料加解密系统的方块图。
[0018] 图 2: 本发明的资料加密方法的步骤图。
[0019] 图 3: 本发明的资料解密方法的步骤图。
[0020] 【附图标记说明】
[0021] 〔本发明〕
[0022] 1 验证与金钥产生模组
[0023] 2加解密模组
[0024] 3 解构与重建模组
[0025] 4 资料库模组 41子资料库
[0026] S11金钥产生步骤 S12加密步骤
[0027] S13解构步骤 S14资料储存步骤
[0028] S21验证与金钥产生步骤 S22重建步骤
[0029] S23解密步骤。
实施该发明的最佳实施例
本发明的最佳实施方式
[0030] 为让本发明的上述及其他目的、 特征及优点能更明显易懂, 下文特举本发明的 较佳实施例, 并配合附图, 作详细说明如下:
[0031] 请参照图 1所示, 本发明的资料加解密系统包含: 一验证与金钥产生模组 1、 一 加解密模组 2、 一解构与重建模组 3及一资料库模组 4, 该加解密模组 2耦接该验 证与金钥产生模组 1, 该解构与重建模组 3耦接该加解密模组 2, 该资料库模组 4 耦接该解构与重建模组 3。
[0032] 该验证与金钥产生模组 1接收一验证信号, 并验证该验证信号的一验证参数, 且在该验证参数验证符合吋, 以一金钥产生演算法产生一加密金钥或一解密金 钥。 其中, 该验证与金钥产生模组 1可为一处理器或一积体电路, 且该处理器或 该积体电路可用以执行一韧体, 并具有资料运算与逻辑判断等功能。
[0033] 更具体的, 该验证信号可储存于一个或一个以上的可携式电子装置, 例如 Java Card. 具有无线射频辨识 (Radio Frequency
IDentification, RFID) 或近场通讯 (Near Field Communication, NFC) 功能的装 置。 该验证参数可为密码、 卡号、 生物特征及经纬度定位资讯等能用以进行身 份认证的资料, 当一使用者将该验证参数传输至该验证与金钥产生模组 1且验证 符合吋, 即代表该使用者属于可授权操作的用户, 且可进行后续的资料加密或 解密等操作。 其中, 该验证与金钥产生模组 1的金钥产生演算法的种类在此并不 设限, 在本实施例中, 该金钥产生演算法为对称式的金钥产生演算法, 例如高 阶加密标准 (Advanced Encryption Standard, AES) 、 资料加密标准 (Data Encryption Standard, DES) 、 三重资料加密标准 (3DES) 、 Blowfish演算法、 国际资料加密演算法 (International Data Encryption Algorithm, IDEA) 、 RC5力口 密演算法或 RC6加密演算法等。
[0034] 又, 该验证信号较佳另包含一金钥参数组, 该金钥产生演算法根据该金钥参数 组产生该加密金钥或该解密金钥, 其中, 该金钥参数组具有数个门槛值参数, 该数个门槛值参数具有一参数总数, 该金钥产生演算法根据一预定参数数量的 该数个门槛值参数产生该加密金钥或该解密金钥, 该预定参数数量及该参数总 数均为整数, 该预定参数数量大于 1且小于该参数总数。
[0035] 更具体的, 该金钥参数组的数个门槛值参数可用以产生制造金钥的种子 (seed ) , 当该金钥产生演算法接收该数个门槛值参数吋, 即可根据该数个门槛值参 数所得到的种子而产生该加密金钥或该解密金钥。 该数个门槛值参数可通过执 行 ~ "多项式内差法 ( Lagrange Interpolating
Polynomial) 或一圆形秘密分享 (Secret Sharing) 演算法所产生, 以便该金钥产 生演算法根据该数个门槛值参数产生该加密金钥或该解密金钥吋, 可不需接收 所有的该数个门槛值参数, 而能在仅接收该预定参数数量的该数个门槛值参数 的情况下, 即可产生该加密金钥或该解密金钥 (例如当该数个门槛值参数的参 数总数为 5个吋, 若该数个门槛值参数由该圆形秘密分享演算法产生而得, 在该 金钥产生演算法仅接收 3个该门槛值参数的情况下, 亦可顺利得到用以制造金钥 的种子, 并以该种子产生该加密金钥或该解密金钥) 。 借此, 当该验证信号具 有该金钥参数组吋, 由于该金钥参数组可用以产生该加密金钥或该解密金钥, 使得该金钥参数组亦可一并作为认证之用, 具有提升资料保密安全性的效果; 再者, 由于该数个门槛值参数可在该预定参数数量下即能产生该加密金钥或该 解密金钥, 即使该数个门槛值参数中有少部份毁损或缺漏, 只要其余的该门槛 值参数的数量大于或等于该预定参数数量, 便可使该验证与金钥产生模组 1正常 产生该加密金钥或该解密金钥, 具有提高容错率的效果。
[0036] 该加解密模组 2耦接该验证与金钥产生模组 1以接收该加密金钥或该解密金钥, 该加解密模组 2能够以该加密金钥将一明文资料 P加密为一完整密文资料 C, 或者 以该解密金钥将该完整密文资料 C解密为该明文资料 P。 其中, 该加解密模组 2可 为一处理器或一积体电路, 且该处理器或该积体电路可用以执行一韧体, 并具 有资料运算与逻辑判断等功能。
[0037] 其中, 该加解密模组 2的加解密方式在此并不设限, 在本实施例中, 该加解密 模组 2配合该金钥产生演算法而为一种对称式加解密模组, 且可在接收该明文资 料 P吋, 以该加密金钥将该明文资料 P加密为该完整密文资料 C; 或者是在接收该 完整密文资料 C吋, 以该解密金钥将该完整密文资料 C解密为该明文资料 P。
[0038] 该解构与重建模组 3耦接该加解密模组 2以接收该完整密文资料 C, 该解构与重 建模组 3能够以一解构演算法将该完整密文资料 C解构为数个片段密文资料 Cs, 或者以一重建演算法将该数个片段密文资料 Cs重建为该完整密文资料^ 其中, 该解构与重建模组 3可为一处理器或一积体电路, 且该处理器或该积体电路可用 以执行一韧体, 并具有资料运算与逻辑判断等功能。
[0039] 又, 当该解构与重建模组 3以该解构演算法将该完整密文资料 C解构为数个片段 密文资料 Cs吋, 该数个片段密文资料 Cs具有一片段密文总数, 且该解构与重建 模组 3可根据一预定重建数量的该数个片段密文资料 Cs重建该完整密文资料 C, 该预定重建数量及该片段密文总数均为整数, 该预定重建数量大于 1且小于该片 段密文总数。
[0040] 更具体的, 该解构演算法及该重建演算法具有利用相同原理且彼此反向运算的 特性, 例如该解构演算法以一同位校验 (parity check) 法将该完整密文资料 C解 构为数个片段密文资料 Cs, 同理, 该重建演算法亦以该同位校验法将该数个片 段密文资料 Cs重建为该完整密文资料^ 其中, 该同位校验法可实现于容错式磁 碟阵列 (Redundant Array of Independent Disk, RAID) , 且可为汉明码或里德- 所罗门码 (Reed-solomom code) 等校验法。 当该完整密文资料 C通过该同位校验 法而被解构为该数个片段密文资料 Cs吋, 该数个片段密文资料 Cs整体即包含了 该完整密文资料 C及校验码, 以便该数个片段密文资料 Cs欲被重建回该完整密文 资料 C吋, 可不需接收所有的该数个片段密文资料 Cs, 而能在仅接收该预定重建 数量的该数个片段密文资料 Cs的情况下, 即可重建该完整密文资料 C (例如当该 数个片段密文资料 Cs的片段密文总数为 6个吋, 在该解构与重建模组 3仅接收 4个 该片段密文资料 Cs的情况下, 亦可通过校验码的比对而顺利重建该完整密文资 料 C) 。 借此, 由于该数个片段密文资料 Cs可在该预定重建数量下即能重建该完 整密文资料 C, 即使该数个片段密文资料 Cs中有少部份毁损或缺漏, 只要其余的 该片段密文资料 Cs的数量大于或等于该预定重建数量, 便可使该解构与重建模 组 3重建该完整密文资料 C, 具有提高容错率的效果。
[0041] 该资料库模组 4耦接该解构与重建模组 3, 该资料库模组 4具有数个子资料库 41 , 该数个子资料库 41分别储存不同的该数个片段密文资料 Cs, 以供该解构与重 建模组 3撷取该数个片段密文资料 Cs。
[0042] 更具体的, 该资料库模组 4可通过一加密通道耦接该解构与重建模组 3, 该加密 通道可为 Virtual Private Network (VPN) 、 Internet Protocol
Security ( IPSec) 、 Point to Point Tunneling Protocol (PPTP) 、 Layer 2 Tunneling Protocol (L2TP) 、 Secure Sockets Layer (SSL) 、 Transport Layer Security (TLS
) 等, 借此提升该资料库模组 4及该解构与重建模组 3之间的资料传输安全性。 又, 该资料库模组 4的该数个子资料库 41分别为独立的远端资料库或云端伺服器 , 例如 Dropbox、 OneDrive、 Google云端硬碟、 Amazon EC2、 Amazon S3等。 借 此, 由于该数个子资料库 41彼此为独立的资料库, 且分别储存不同的该片段密 文资料 Cs, 即使有心人士得以撷取其中一个该子资料库 41中的该片段密文资料 C s, 在所取得的该片段密文资料 Cs的总数过少的情况下, 该有心人士仍无法将该 片段密文资料 Cs重建回该完整密文资料 C, 且无法了解该完整密文资料 C的真实 意涵, 具有提升资料保密安全性的效果。
[0043] 请同吋参照图 1及图 2所示, 基于上述资料加解密系统的实施例下, 本发明的资 料加密方法包含一金钥产生步骤 Sl l、 一加密步骤 S12、 一解构步骤 S13及一资料 储存步骤 S 14。
[0044] 该金钥产生步骤 Sl l, 由该验证与金钥产生模组 1以该金钥产生演算法产生该加 密金钥。
[0045] 又, 该验证与金钥产生模组 1可另接收该金钥参数组, 该金钥产生演算法根据 该金钥参数组产生该加密金钥, 其中, 该金钥参数组具有数个门槛值参数, 该 数个门槛值参数具有该参数总数, 该金钥产生演算法根据该预定参数数量的该 数个门槛值参数产生该加密金钥, 该预定参数数量及该参数总数均为整数, 该 预定参数数量大于 1且小于该参数总数。 借此, 当该验证信号具有该金钥参数组 吋, 由于该金钥参数组可用以产生该加密金钥, 使得该金钥参数组亦可一并作 为认证的用, 具有提升资料保密安全性的效果; 再者, 由于该数个门槛值参数 可在该预定参数数量下即能产生该加密金钥, 即使该数个门槛值参数中有少部 份毁损或缺漏, 只要其余的该数个门槛值参数的数量大于或等于该预定参数数 量, 便可使该验证与金钥产生模组 1正常产生该加密金钥, 具有提高容错率的效 果。
[0046] 该加密步骤 S12, 由该加解密模组 2接收该明文资料 P及该加密金钥, 并以该加 密金钥将该明文资料 P加密为该完整密文资料^
[0047] 该解构步骤 S13, 由该解构与重建模组 3接收该完整密文资料 C, 并以该解构演 算法将该完整密文资料 C解构为该数个片段密文资料 Cs。
[0048] 其中, 该解构演算法以该同位校验法将该完整密文资料 C解构为该数个片段密 文资料 Cs, 且该解构与重建模组 3所解构产生的该数个片段密文资料 Cs具有该片 段密文总数, 当该数个片段密文资料 Cs以上述方式产生的情况下, 若该数个片 段密文资料 Cs欲执行后续的解密作业吋, 即能供该解构与重建模组 3根据该预定 重建数量的该数个片段密文资料 Cs重建该完整密文资料 C, 该预定重建数量及该 片段密文总数均为整数, 该预定重建数量大于 1且小于该片段密文总数。 借此, 由于该数个片段密文资料 Cs可在该预定重建数量下即能重建该完整密文资料 C, 即使该数个片段密文资料 Cs中有少部份毁损或缺漏, 只要其余的该数个片段密 文资料 Cs的数量大于或等于该预定重建数量, 便可使该解构与重建模组 3重建该 完整密文资料 C, 具有提高容错率的效果。
[0049] 该资料储存步骤 S14, 由该资料库模组 4接收该数个片段密文资料 Cs, 该资料库 模组 4具有数个子资料库 41, 该数个子资料库 41分别储存不同的该数个片段密文 资料 Cs。 借此, 由于该数个子资料库 41彼此为独立的资料库, 且分别储存不同 的该片段密文资料 Cs, 即使有心人士得以撷取其中一个该子资料库 41中的该片 段密文资料 Cs, 在所取得的该片段密文资料 Cs的总数过少的情况下, 该有心人 士仍无法将该片段密文资料 Cs重建回该完整密文资料 C, 且无法了解该完整密文 资料 C的真实意涵, 具有提升资料保密安全性的效果。
[0050] 请同吋参照图 1及图 3所示, 基于上述的资料加解密系统的实施例下, 本发明的 资料解密方法包含一验证与金钥产生步骤 S21、 一重建步骤 S22及一解密步骤 S23
[0051] 该验证与金钥产生步骤 S21, 以该验证与金钥产生模组 1接收该验证信号, 该验 证信号包含该验证参数, 该验证与金钥产生模组 1验证该验证参数, 并于该验证 参数验证符合吋, 以该金钥产生演算法产生该解密金钥。
[0052] 又, 该验证信号可另包含该金钥参数组, 该金钥产生演算法根据该金钥参数组 产生该解密金钥, 其中, 该金钥参数组具有数个门槛值参数, 该数个门槛值参 数具有该参数总数, 该金钥产生演算法根据该预定参数数量的该数个门槛值参 数产生该解密金钥, 该预定参数数量及该参数总数均为整数, 该预定参数数量 大于 1且小于该参数总数。 借此, 当该验证信号具有该金钥参数组吋, 由于该金 钥参数组可用以产生该解密金钥, 使得该金钥参数组亦可一并作为认证之用, 具有提升资料保密安全性的效果; 再者, 由于该数个门槛值参数可在该预定参 数数量下即能产生该解密金钥, 即使该数个门槛值参数中有少部份毁损或缺漏 , 只要其余的该门槛值参数的数量大于或等于该预定参数数量, 便可使该验证 与金钥产生模组 1正常产生该解密金钥, 具有提高容错率的效果。
[0053] 该重建步骤 S22, 当该验证参数验证符合吋, 以该解构与重建模组 3于该资料库 模组 4的数个子资料库 41中分别撷取数个片段密文资料 Cs, 并以该重建演算法将 该数个片段密文资料 Cs重建为该完整密文资料^ 借此, 由于该数个子资料库 41 彼此为独立的资料库, 且分别储存不同的该片段密文资料 Cs, 即使有心人士得 以撷取其中一个该子资料库 41中的该片段密文资料 Cs, 在所取得的该片段密文 资料 Cs的总数过少的情况下, 该有心人士仍无法将该片段密文资料 Cs重建回该 完整密文资料 C, 且无法了解该完整密文资料 C的真实意涵, 具有提升资料保密 安全性的效果。
[0054] 其中, 该数个片段密文资料 Cs具有该片段密文总数, 该解构与重建模组根据该 预定重建数量的该数个片段密文资料 Cs重建该完整密文资料 C, 该预定重建数量 及该片段密文总数均为整数, 该预定重建数量大于 1且小于该片段密文总数。 又 , 该重建演算法以该同位校验法将该数个片段密文资料 Cs重建为该完整密文资 料^ 借此, 由于该数个片段密文资料 Cs可在该预定重建数量下即能重建该完整 密文资料 C, 即使该数个片段密文资料 Cs中有少部份毁损或缺漏, 只要其余的该 数个片段密文资料 Cs的数量大于或等于该预定重建数量, 便可使该解构与重建 模组 3重建该完整密文资料 C, 具有提高容错率的效果。
[0055] 该解密步骤 S23, 由该加解密模组 2接收该完整密文资料 C及该解密金钥, 并以 该解密金钥将该完整密文资料 C解密为该明文资料 P。
[0056] 所述, 本发明的资料加解密系统及其加解密方法, 可将一完整密文资料解构为 数个片段密文资料, 并以数个子资料库分别储存不同的该数个片段密文资料, 具有提升资料保密安全性的效果。

Claims

权利要求书
[权利要求 1] 一种资料加密方法, 包含: 由一个验证与金钥产生模组以一个金钥 产生演算法产生一个加密金钥; 由一个加解密模组接收一个明文资 料及该加密金钥, 并以该加密金钥将该明文资料加密为一个完整密文 资料; 由一个解构与重建模组接收该完整密文资料, 并以一个解构 演算法将该完整密文资料解构为数个片段密文资料; 及由一个资料 库模组接收该数个片段密文资料, 该资料库模组具有数个子资料库, 该数个子资料库分别储存不同的该数个片段密文资料。
[权利要求 2] 如权利要求 1所述的资料加密方法, 其中该解构演算法以一个同位校 验法将该完整密文资料解构为该数个片段密文资料。
[权利要求 3] 如权利要求 1所述的资料加密方法, 其中该验证与金钥产生模组接收 一个金钥参数组, 该金钥产生演算法根据该金钥参数组产生该加密金 钥。
[权利要求 4] 如权利要求 3所述的资料加密方法, 其中该金钥参数组具有数个门槛 值参数, 该数个门槛值参数具有一个参数总数, 该金钥产生演算法根 据一个预定参数数量的该数个门槛值参数产生该加密金钥, 该预定参 数数量及该参数总数均为整数, 该预定参数数量大于 1且小于该参数 总数。
[权利要求 5] —种资料解密方法, 包含: 以一个验证与金钥产生模组接收一个验 证信号, 该验证信号包含一个验证参数, 该验证与金钥产生模组验证 该验证参数, 并于该验证参数验证符合吋, 以一个金钥产生演算法产 生一个解密金钥; 当该验证参数验证符合吋, 以一个解构与重建模 组于一个资料库模组的数个子资料库中分别撷取数个片段密文资料, 并以一个重建演算法将该数个片段密文资料重建为一个完整密文资料 ; 及由一个加解密模组接收该完整密文资料及该解密金钥, 并以该 解密金钥将该完整密文资料解密为一个明文资料。
[权利要求 6] 如权利要求 5所述的资料解密方法, 其中该数个片段密文资料具有一 个片段密文总数, 该解构与重建模组根据一个预定重建数量的该数个 片段密文资料重建该完整密文资料, 该预定重建数量及该片段密文总 数均为整数, 该预定重建数量大于 1且小于该片段密文总数。
[权利要求 7] 如权利要求 5所述的资料解密方法, 其中该重建演算法以一个同位校 验法将该数个片段密文资料重建为该完整密文资料。
[权利要求 8] 如权利要求 5所述的资料解密方法, 其中该验证信号包含一个金钥参 数组, 该金钥产生演算法根据该金钥参数组产生该解密金钥。
[权利要求 9] 如权利要求 8所述的资料解密方法, 其中该金钥参数组具有数个门槛 值参数, 该数个门槛值参数具有一个参数总数, 该金钥产生演算法根 据一个预定参数数量的该数个门槛值参数产生该解密金钥, 该预定参 数数量及该参数总数均为整数, 该预定参数数量大于 1且小于该参数 总数。
[权利要求 10] 一种资料加解密系统, 包含: 一个验证与金钥产生模组, 接收一个 验证信号, 并验证该验证信号的一个验证参数, 且在该验证参数验证 符合吋, 以一个金钥产生演算法产生一个加密金钥或一个解密金钥; 一个加解密模组, 耦接该验证与金钥产生模组以接收该加密金钥或该 解密金钥, 该加解密模组能够以该加密金钥将一个明文资料加密为一 个完整密文资料, 或者以该解密金钥将该完整密文资料解密为该明文 资料; 一个解构与重建模组, 耦接该加解密模组以接收该完整密文 资料, 该解构与重建模组能够以一个解构演算法将该完整密文资料解 构为数个片段密文资料, 或者以一个重建演算法将该数个片段密文资 料重建为该完整密文资料; 及一个资料库模组, 耦接该解构与重建 模组, 该资料库模组具有数个子资料库, 该数个子资料库分别储存不 同的该数个片段密文资料, 以供该解构与重建模组撷取该数个片段密 文资料。
[权利要求 11] 如权利要求 10所述的资料加解密系统, 其中该数个片段密文资料具有 一个片段密文总数, 该解构与重建模组根据一个预定重建数量的该数 个片段密文资料重建该完整密文资料, 该预定重建数量及该片段密文 总数均为整数, 该预定重建数量大于 1且小于该片段密文总数。
[权利要求 12] 如权利要求 10所述的资料加解密系统, 其中该解构演算法以一个同位 校验法将该完整密文资料解构为数个片段密文资料, 该重建演算法以 该同位校验法将该数个片段密文资料重建为该完整密文资料。
[权利要求 13] 如权利要求 10所述的资料加解密系统, 其中该验证信号包含一个金钥 参数组, 该金钥产生演算法根据该金钥参数组产生该加密金钥或该解 密金钥。
[权利要求 14] 如权利要求 13所述的资料解密方法, 其中该金钥参数组具有数个门槛 值参数, 该数个门槛值参数具有一个参数总数, 该金钥产生演算法根 据一个预定参数数量的该数个门槛值参数产生该加密金钥或该解密金 钥, 该预定参数数量及该参数总数均为整数, 该预定参数数量大于 1 且小于该参数总数。
PCT/CN2016/078295 2016-04-01 2016-04-01 资料加解密系统及其加解密方法 WO2017166279A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/078295 WO2017166279A1 (zh) 2016-04-01 2016-04-01 资料加解密系统及其加解密方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/078295 WO2017166279A1 (zh) 2016-04-01 2016-04-01 资料加解密系统及其加解密方法

Publications (1)

Publication Number Publication Date
WO2017166279A1 true WO2017166279A1 (zh) 2017-10-05

Family

ID=59962508

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/078295 WO2017166279A1 (zh) 2016-04-01 2016-04-01 资料加解密系统及其加解密方法

Country Status (1)

Country Link
WO (1) WO2017166279A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597512A (zh) * 2020-03-31 2020-08-28 尚承科技股份有限公司 软韧体或资料保护系统及保护方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795696A (zh) * 2012-10-31 2014-05-14 英业达科技有限公司 数据存取的方法及云端服务器系统
CN104023027A (zh) * 2014-06-18 2014-09-03 西安电子科技大学 基于密文采样分片的云端数据确定性删除方法
US20150016604A1 (en) * 2006-11-07 2015-01-15 Security First Corp. Systems and methods for distributing and securing data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150016604A1 (en) * 2006-11-07 2015-01-15 Security First Corp. Systems and methods for distributing and securing data
CN103795696A (zh) * 2012-10-31 2014-05-14 英业达科技有限公司 数据存取的方法及云端服务器系统
CN104023027A (zh) * 2014-06-18 2014-09-03 西安电子科技大学 基于密文采样分片的云端数据确定性删除方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597512A (zh) * 2020-03-31 2020-08-28 尚承科技股份有限公司 软韧体或资料保护系统及保护方法
CN111597512B (zh) * 2020-03-31 2023-10-31 尚承科技股份有限公司 软韧体或资料保护系统及保护方法

Similar Documents

Publication Publication Date Title
US8745394B1 (en) Methods and systems for secure electronic communication
US9020149B1 (en) Protected storage for cryptographic materials
JP5855696B2 (ja) 完全性検証を含むブロック暗号化方法およびブロック復号化方法
US20150280911A1 (en) Methods of and Systems for Facilitating Decryption of Encrypted Electronic Information
US20170085543A1 (en) Apparatus and method for exchanging encryption key
US20140195804A1 (en) Techniques for secure data exchange
CN107317677B (zh) 密钥存储及设备身份认证方法、装置
JP2008533882A (ja) 暗号化キーをバックアップ及び復元する方法
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN104868996A (zh) 一种数据加密解密方法、装置以及终端
CN103458382A (zh) 一种手机私密短信的硬件加密传输和存储方法及系统
CN107465665A (zh) 一种基于指纹识别技术的文件加解密方法
CN108809633B (zh) 一种身份认证的方法、装置及系统
US9954828B1 (en) Protection of data stored in the cloud
CN106506453B (zh) 基于快速匹配和完整性检测的电力大数据传输方法及系统
CN107528689B (zh) 一种基于Ukey的密码修改方法
CN103036880A (zh) 网络信息传输方法、设备及系统
US11757625B2 (en) Multi-factor-protected private key distribution
CN102236756A (zh) 一种基于TCM可信密码模块和USBKey的文件加密方法
WO2018120938A1 (zh) 密钥离线传输方法、终端和存储介质
CN109842589A (zh) 一种云存储加密方法、装置、设备及存储介质
WO2012053886A1 (en) A method and system for file encryption and decryption in a server
CN109299618B (zh) 基于量子密钥卡的抗量子计算云存储方法和系统
CN112385175A (zh) 一种用于数据加密和完整性的设备
CN107276961B (zh) 一种基于密码算法加密和解密数据的方法及装置

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896059

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896059

Country of ref document: EP

Kind code of ref document: A1