CN102790672A - Self-adapting data encrypting and decrypting method - Google Patents
Self-adapting data encrypting and decrypting method Download PDFInfo
- Publication number
- CN102790672A CN102790672A CN2012102793155A CN201210279315A CN102790672A CN 102790672 A CN102790672 A CN 102790672A CN 2012102793155 A CN2012102793155 A CN 2012102793155A CN 201210279315 A CN201210279315 A CN 201210279315A CN 102790672 A CN102790672 A CN 102790672A
- Authority
- CN
- China
- Prior art keywords
- encryption
- data
- decryption
- encrypting
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a self-adapting data encrypting and decrypting method. A system comprises a data identification and configuration module, a DES (Data Encryption Standard) encrypting and decrypting module and an AES (Advanced Encryption Standard) encrypting and decrypting module. According to a regulated data transmission protocol, an encrypting and decrypting manner of data is identified through hardware, a control register is configured and an encrypting and decrypting algorithm meeting the protocol is gated. The encrypting and decrypting algorithm comprises a DES, a 3DES and an AES to meet different encrypting and decrypting requirements. According to the system disclosed by the invention, a data encrypting and decrypting manner can be identified in a self-adapting way according to a transmission protocol, so that the data transmission manner and the reliability are increased.
Description
Technical field
This patent relates to the communication security field, be specifically related to a kind of according to host-host protocol regulation, adaptive data encrypting and deciphering technology.
Background technology
The communication technology and development of internet technology are maked rapid progress, and all trades and professions all be unable to do without computer now.People are increasingly high for the security requirement of data in transmission course, so the information security technology important that seems.Encryption plays an important role as the strongest weapon in the information security.The DES algorithm is a kind of block encryption algorithm, carries out encryption and decryption with 64 grouped datas, and data encryption is conciliate the secret emissary with identical algorithm structure, and just the use of key order is different.3DES is a kind of pattern of des encryption algorithm, and it uses 3 64 key that data are encrypted 3 times.AES adopts symmetrical block cipher system, and the minimum support of key length is 128,192,256, and is stronger 1021 times than 56 keys of DES.
Though AES is better than the confidentiality of DES, also paid more hardware resource and encryption time simultaneously.
Summary of the invention
The method that the purpose of this invention is to provide a kind of adaptive data encrypting and deciphering.
The objective of the invention is to realize by following mode; System has comprised data identification configuration module, DES encryption and decryption module and AES encryption and decryption module; Data Transport Protocol according to the rules; Adaptive selection data encrypting and deciphering mode of operation; Comprise that des encryption, 3DES encrypt or AES encrypts, the data identification configuration module is analyzed all information that contain data encrypting and deciphering mode and encryption and decryption figure place in first byte in the data transmission procedure, and the information that remaining byte comprises according to first byte is placed among the buffer of required encryption and decryption module.
Concrete steps are following:
In the process of transfer of data; The data identification configuration module can dispose the needed pattern of encryption and decryption process according to the entrained information of first byte of transmission; Expressly, the length of ciphertext length and key; General's byte subsequently in the middle of the buffer of corresponding module, is carried out encryption and decryption to the transmission data, to the last EO according to the regular allocation of encryption and decryption at last then.
According to different encryption and decryption modes, DES, 3DES and AES encryption and decryption module all have the form of different separately plaintexts, ciphertext and key, accomplish the encryption and decryption of data at last through the different encryption and decryption cycles.
The invention has the beneficial effects as follows: DES and AES AES are merged, according to Data Transport Protocol, adaptive selection configuration data encryption and decryption mode.Also increased the alternative of communication mode when so not only having improved communication security.
Description of drawings
Fig. 1 is the flow chart of the method for self-adapting data encryption and decryption.
Embodiment
Explanation at length below with reference to Figure of description method of the present invention being done.
System has comprised data identification configuration module, DES encryption and decryption module and AES encryption and decryption module; Data Transport Protocol according to the rules; Adaptive selection data encrypting and deciphering mode of operation; Comprise that des encryption, 3DES encrypt or AES encrypts, the data identification configuration module is analyzed all information that contain data encrypting and deciphering mode and encryption and decryption figure place in first byte in the data transmission procedure, and the information that remaining byte comprises according to first byte is placed among the buffer of required encryption and decryption module.Concrete steps are following:
In the process of transfer of data, the data identification configuration module can dispose the needed pattern of encryption and decryption process according to the entrained information of first byte of transmission, expressly, the length of ciphertext length and key.Byte that then will be subsequently according to the regular allocation of encryption and decryption in the middle of the buffer of corresponding module.At last the transmission data are carried out encryption and decryption, to the last EO.
Except that the described technical characterictic of specification, be the known technology of those skilled in the art.
Claims (2)
1. the method for an adaptive data encrypting and deciphering; It is characterized in that system has comprised data identification configuration module, DES encryption and decryption module and AES encryption and decryption module; Data Transport Protocol according to the rules; Adaptive selection data encrypting and deciphering mode of operation comprises that des encryption, 3DES encrypt or AES encrypts, and the data identification configuration module is analyzed all information that contain data encrypting and deciphering mode and encryption and decryption figure place in first byte in the data transmission procedure; The information that remaining byte comprises according to first byte is placed among the buffer of required encryption and decryption module, and concrete steps are following:
In the process of transfer of data; The data identification configuration module can dispose the needed pattern of encryption and decryption process according to the entrained information of first byte of transmission; Expressly, the length of ciphertext length and key; General's byte subsequently in the middle of the buffer of corresponding module, is carried out encryption and decryption to the transmission data, to the last EO according to the regular allocation of encryption and decryption at last then.
2. method according to claim 1; It is characterized in that according to different encryption and decryption modes; DES, 3DES and AES encryption and decryption module all have the form of different separately plaintexts, ciphertext and key, accomplish the encryption and decryption of data at last through the different encryption and decryption cycles.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102793155A CN102790672A (en) | 2012-08-08 | 2012-08-08 | Self-adapting data encrypting and decrypting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102793155A CN102790672A (en) | 2012-08-08 | 2012-08-08 | Self-adapting data encrypting and decrypting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102790672A true CN102790672A (en) | 2012-11-21 |
Family
ID=47155980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102793155A Pending CN102790672A (en) | 2012-08-08 | 2012-08-08 | Self-adapting data encrypting and decrypting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102790672A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103716166A (en) * | 2013-12-27 | 2014-04-09 | 哈尔滨工业大学深圳研究生院 | Self-adaptation hybrid encryption method and device and encryption communication system |
CN103874060A (en) * | 2012-12-13 | 2014-06-18 | 中兴通讯股份有限公司 | Data coding/decoding method and device |
CN104393988A (en) * | 2014-12-03 | 2015-03-04 | 浪潮(北京)电子信息产业有限公司 | Reversible data encryption method and device |
CN107124435A (en) * | 2017-07-06 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | A kind of TCP message encrypted circuit and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247188A (en) * | 2008-03-07 | 2008-08-20 | 北京握奇数据系统有限公司 | Method for remotely managing electronic purse state |
CN101420428A (en) * | 2007-09-28 | 2009-04-29 | 东芝解决方案株式会社 | Cryptographic module management apparatus, method, and program |
CN101753520A (en) * | 2008-11-28 | 2010-06-23 | 爱思开电讯投资(中国)有限公司 | Method for providing encrypting and deciphering service for external equipment application by utilizing intelligent card |
-
2012
- 2012-08-08 CN CN2012102793155A patent/CN102790672A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420428A (en) * | 2007-09-28 | 2009-04-29 | 东芝解决方案株式会社 | Cryptographic module management apparatus, method, and program |
CN101247188A (en) * | 2008-03-07 | 2008-08-20 | 北京握奇数据系统有限公司 | Method for remotely managing electronic purse state |
CN101753520A (en) * | 2008-11-28 | 2010-06-23 | 爱思开电讯投资(中国)有限公司 | Method for providing encrypting and deciphering service for external equipment application by utilizing intelligent card |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103874060A (en) * | 2012-12-13 | 2014-06-18 | 中兴通讯股份有限公司 | Data coding/decoding method and device |
CN103874060B (en) * | 2012-12-13 | 2019-04-30 | 深圳市中兴微电子技术有限公司 | The method for encryption/decryption and device of data |
CN103716166A (en) * | 2013-12-27 | 2014-04-09 | 哈尔滨工业大学深圳研究生院 | Self-adaptation hybrid encryption method and device and encryption communication system |
CN104393988A (en) * | 2014-12-03 | 2015-03-04 | 浪潮(北京)电子信息产业有限公司 | Reversible data encryption method and device |
CN104393988B (en) * | 2014-12-03 | 2018-06-22 | 浪潮(北京)电子信息产业有限公司 | A kind of reversible data ciphering method and device |
CN107124435A (en) * | 2017-07-06 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | A kind of TCP message encrypted circuit and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040090B (en) | A kind of data ciphering method and device | |
US9294266B2 (en) | Method and apparatus to encrypt plaintext data | |
EP3192207B1 (en) | Apparatus and method for data encryption | |
CN101043326B (en) | Dynamic information encrypting system and method | |
CN102880836A (en) | Security device | |
CN105262772A (en) | Data transmission method, data transmission system and related apparatus for data transmission method and system | |
DE60238853D1 (en) | Method and system for memory encryption | |
US10721059B2 (en) | Apparatus and method for data encryption, apparatus and method for data decryption | |
CN106411515B (en) | The method and system for promoting key safety are split to key using cipher machine | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN101534190A (en) | A multi-channel encryption/decryption method, device and system | |
CN102790672A (en) | Self-adapting data encrypting and decrypting method | |
CN101431411A (en) | Dynamic encryption method for network game data | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN102932135A (en) | 3DES (triple data encrypt standard) encryption method | |
CN102332077A (en) | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof | |
CN103501220B (en) | encryption method and device | |
CN104954362B (en) | The encryption and decryption approaches and its device of sequence number | |
JP2016019233A (en) | Communication system, communication device, key managing device and communication method | |
CN100464337C (en) | Method and equipment for carrying out safety communication between USB device and host | |
KR101709276B1 (en) | Endpoint Security Server Management System | |
CN103312496A (en) | Data encryption and decryption method and device as well as data encryption and decryption system | |
CN104038337A (en) | Data encryption method based on AES128 | |
JP6167721B2 (en) | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20121121 |