Method and device of encryption and data certification and decryption and data authenticity validating

A method used for encrypting and authenticating data, comprises following steps: at first, cryptograph data blocks (C1-Ci) and corresponding marks (mark 1-mark i) are generated from one or more plaintext data blocks (P1-Pi) by authentication and encryption. Then, a mark tree (3) is generated by the...

Full description

Saved in:
Bibliographic Details
Main Authors PLATCA R. A, HURLEY P. T, KACHIN C
Format Patent
LanguageChinese
English
Published 07.09.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method used for encrypting and authenticating data, comprises following steps: at first, cryptograph data blocks (C1-Ci) and corresponding marks (mark 1-mark i) are generated from one or more plaintext data blocks (P1-Pi) by authentication and encryption. Then, a mark tree (3) is generated by the authentication marks (mark 1-mark i). The cryptograph data blocks (C1-Ci) and mark tree data of themark tree (3) are stored in an unauthentic memory (1), and root marks of the mark tree (3) are stored in an authentic memory (2).
Bibliography:Application Number: CN20061139314