Method and device of encryption and data certification and decryption and data authenticity validating
A method used for encrypting and authenticating data, comprises following steps: at first, cryptograph data blocks (C1-Ci) and corresponding marks (mark 1-mark i) are generated from one or more plaintext data blocks (P1-Pi) by authentication and encryption. Then, a mark tree (3) is generated by the...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
07.09.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A method used for encrypting and authenticating data, comprises following steps: at first, cryptograph data blocks (C1-Ci) and corresponding marks (mark 1-mark i) are generated from one or more plaintext data blocks (P1-Pi) by authentication and encryption. Then, a mark tree (3) is generated by the authentication marks (mark 1-mark i). The cryptograph data blocks (C1-Ci) and mark tree data of themark tree (3) are stored in an unauthentic memory (1), and root marks of the mark tree (3) are stored in an authentic memory (2). |
---|---|
Bibliography: | Application Number: CN20061139314 |