CN104463019A - Method for encrypting and decrypting electronic documents - Google Patents

Method for encrypting and decrypting electronic documents Download PDF

Info

Publication number
CN104463019A
CN104463019A CN201410838293.0A CN201410838293A CN104463019A CN 104463019 A CN104463019 A CN 104463019A CN 201410838293 A CN201410838293 A CN 201410838293A CN 104463019 A CN104463019 A CN 104463019A
Authority
CN
China
Prior art keywords
content
electronic document
key
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410838293.0A
Other languages
Chinese (zh)
Other versions
CN104463019B (en
Inventor
徐石
刘古泉
姚亚平
王东旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING SEEYON SOFTWARE Co Ltd
Original Assignee
BEIJING SEEYON SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING SEEYON SOFTWARE Co Ltd filed Critical BEIJING SEEYON SOFTWARE Co Ltd
Priority to CN201410838293.0A priority Critical patent/CN104463019B/en
Publication of CN104463019A publication Critical patent/CN104463019A/en
Application granted granted Critical
Publication of CN104463019B publication Critical patent/CN104463019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a method for encrypting text electronic documents (including webpage files). The method comprises the following steps that A, the electronic document needing to be operated is loaded, and the content of the electronic document is displayed; B, a key needed by encryption is established; C, the selected content in the content of the electronic document is determined; D the selected content in the electronic document and the key are subjected to random hybrid operation and then are stored. The invention further provides a decrypting method based on the encrypting method. Part of content in important files is encrypted.

Description

The encipher-decipher method of electronic document
Technical field
The present invention relates to a kind of encipher-decipher method of electronic document.
Background technology
The electronic document encryption of present stage is pressed encryption routine and is divided, and can be divided into two classes: a class is the file encryption function that WINDOWS system carries; Another kind of is the commercialization encryption software adopting cryptographic algorithm to realize.Business-like encryption software is divided into again driving stage to encrypt and the encryption of plug-in unit level.If divided by cryptographic algorithm, can be divided three classes again: symmetrical IDEA algorithm, asymmetric RSA Algorithm and irreversible aes algorithm.
The general process of data encryption is exactly process according to certain algorithm the original file as plaintext version appearance or data, becomes unreadable one section of coding, is commonly called " ciphertext ".The original content of this section of code just can only can be demonstrated after the corresponding key of input.Thus, protected data is realized not by the object of illegally stealing and reading by such approach.The inverse process of this ciphering process is deciphering, that is: coded message is converted into the process of its raw data.
" symmetrical expression " and " asymmetric " encryption technology:
Symmetry encryption is exactly that encryption and decryption use same key, is usually referred to as " Session Key " this encryption technology and is widely adopted now, as U.S. government the des encryption standard that adopts be exactly a kind of typical " symmetrical expression " enciphered method.
What unsymmetrical tridiagonal matrix was exactly that encryption and decryption use is not same key, usually has two keys, is called " PKI " and " private key ", must match use, otherwise can not open encrypt file.Here " PKI " refers to the key that can externally announce, and " private key " is then the key that can not externally announce, and only has possessor to know.Its superiority is: because the encryption method of symmetrical expression is if be just difficult to key to tell the other side at transmission over networks encrypt file, no matter how all likely not intercepted.And the encryption method of asymmetric has two keys, and " PKI " be wherein can disclosed in, be not just afraid of others yet and know, as long as with the private key of oneself and passable when addressee deciphers, so just avoid the transmission security sex chromosome mosaicism of key well.
RSA cryptographic algorithms:
Rivest, Shamir and Adleman put forward based on number theory asymmetry (open key) cryptographic algorithm-RSA.The prime factor difficulty decomposition of big integer is the basis of RSA Algorithm.
RSA enters the practical stage abroad already, has developed the special chip of the RSA of multiple high speed.Although the numerous characteristics of RSA is not very good, under the pressure of the actual needs of information security, many important infosystems still adopt encryption mechanism based on RSA.Propose soon from RSA, relevant department of China is just studied it always.From the angle of application, the RSA of software simulating has started for computer network encryption, has been used for the function such as encryption key distribution, digital signature.
Except RSA, also has DES (data encryption standards).Although DES discloses its cryptographic algorithm and was once classified as " standard " by the U.S., go out of use very soon.Encryption technology revert to again " algorithm secrecy " traditionally.
Encryption technology is the main security secrecy provision that ecommerce is taked, the most frequently used safe and secret means, utilize technological means that important data are become mess code (encryption) to transmit, again by identical or different means reduction (deciphering) behind arrival destination.
Encryption technology development trend:
(1) in view of the feature that private key and PKI two kinds of cipher systems are encrypted, compromise proposal can be adopted in actual applications, namely DES/IDEA and RSA is combined, be " kernel " with DES, RSA is " shell ", and can encrypt with DES or IDEA for the data transmitted in network, the key encrypted then uses rsa encryption transmission, this kind of method both ensure that data security turn improved the speed of encryption and decryption, and this is also one of new direction of current encryption technology development.
(2) new algorithm is sought: jump out the structure thinking based on common iteration, depart from the building method based on some mathematical problem complicacy.
(3) encryption is integrated in System and Network the most at last, and such as IPV6 agreement just there has been the support of built-in encryption, and at hardware aspect, Intel Company is just developing a kind of cryptographic coprocessor, and it can be integrated on the main frame of microcomputer.
(4) combination of multiple encryption algorithms, starts encryption technology frontier.Along with the development of technology, simple symmetric cryptography and asymmetric encryption can not meet the day by day complicated data encryption protection requirements of enterprises and individuals user.In order to adapt to the data encryption demand of modern multiple existence form, multiple security context, the high-adaptability encryption technology in conjunction with symmetry algorithm and asymmetric arithmetic is more and more subject to the favor of enterprises and individuals user.Wherein international advanced multimode encryption technology is exactly a Typical Representative.
(5) Custom Encryption algorithmic tool.Fixing encryption technology and method is of long duration the risk of divulging a secret, in order to meet the absolute requirement of special population to encryption, Custom Encryption algorithmic tool provides cryptographic algorithm that is personalized, that freely define.Like this, algorithm is random, and key is self-defining, and the content of encryption is optional.
At present, encryption method is also controlled by technician substantially, normally file is carried out to the entirety encryption of " defense ", or control of authority, and the independence of end user is inadequate.In work at ordinary times, always can meet some vital documents needs the problem to partial content encryption: disclosed in most contents is, only have fraction content open to fraction people; If can cause on the contrary entire chapter file encryption and use inconvenience.
Summary of the invention
In view of this, fundamental purpose of the present invention is the encipher-decipher method providing a kind of (text class) electronic document (comprising web page files), to solve the above-mentioned problems in the prior art.
A kind of electronic document encryption method provided by the invention, comprises the following steps:
The content of electronic document also shows by the electronic document that A, loading will operate;
B, establishment are encrypted required key;
C, to determine in described electronic document content chosen content;
D, content selected in above-mentioned electronic document and key are carried out random hybrid operation after preserve.
As seen from the above, electronic document encryption method provided by the invention achieves the encryption for partial content in electronic document, and operating process is simple, need not be implemented, improve the independence of electronic document user by special technician.
In the methods described above, key described in step B be input required key or stochastic generation by User Interface user and be shown to user key or load one record key in the file of key information;
Described key is any character.
As seen from the above, electronic document encryption method provided by the invention supports multiple key input mode, is user-friendly to, and using Chinese character as key, can increase the difficulty identifying key thus further.
In the methods described above, step C also comprises: mark chosen content by the mode arranging identifier in the front and back of this chosen content;
Corresponding, step D also comprises: the identifier corresponding to the content after random hybrid operation is updated to the one other identification symbol for identifying ciphertext.
As seen from the above, by the mark of identifier, the part that user is encrypted in positioning electronic document quickly and accurately can be made.
In the methods described above, described in step D, random hybrid operation comprises: adopt the random aligning method mixing described key of arrangement and encrypted content.
As seen from the above, by mixing arrangement key and encrypted content, make conventional method to distinguish cipher key location, further increase security.
A kind of decryption method based on above-mentioned electronic document encryption method provided by the invention, comprises the following steps:
Load electronic document, and show its content;
Obtain the password needed for deciphering of user's input;
In traversal electronic document content, encrypted content is decrypted and shows.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of electronic document encryption method of the present invention;
Fig. 2 is the schematic diagram at the interface of implementing electronic document encryption method of the present invention.
Embodiment
Below in conjunction with accompanying drawing, introduce electronic document encryption method provided by the invention and electronic document Encryption Tool in detail.
As shown in Figure 1, electronic document encryption method provided by the invention comprises the following steps:
Step 100: load the electronic document that will operate, and the content of electronic document is shown.
Electronic document of the present invention mainly refers to the document that can carry out editing, as the electronic document of the forms such as txt, doc, wps, html.
Step 200: create and required key is encrypted to electronic document.
In this step, can User Interface be passed through, manually be inputted the key that will use by user.Key can adopt the forms such as numeral, English alphabet, Chinese.
Or, by User Interface, generate a random key as required key, and this key be shown to user, by user record.
Or, by User Interface, call the file that records key information, using the information in described file as required key.Such as be previously stored with the text containing a character string, when calling text document creation key by User Interface, the described character string in text file will as described key.
Step 300: the part determining user-selected fixed needs encryption in the full content of loaded electronic document.
By the content of documents editing interface display electronic document, and according to the selection of user, using selected content part as the part that will encrypt.Wherein, user can draw the mode of choosing by mouse, select the arbitrary content in document content.
Further, the content that will encrypt selected can be marked by ad hoc fashion, such as identifier is set by the front and back at this chosen content, as arranged the identifier of black bars.
Step 400: use the chosen content in above-mentioned secret key encryption electronic document, the encrypted part in electronic document content adopts ciphertext display.
Specifically, above-mentioned ciphering process is adopt the random aligning method mixing above-mentioned key of arrangement and encrypted content, and that is, each encryption is all arrange with the mixing of different aligning methods to above-mentioned key and encrypted content.
Wherein, as shown in Figure 2, part encrypted in document, can adopt digital ciphertext to show.Further, the identifier of described black bars is updated to diamond block identifier and marks.
Step 500: preserve the electronic document including encrypted chosen content, and the part of encryption metadata as this electronic document is preserved simultaneously.
Wherein, the described encryption metadata cryptographic algorithm that at least comprises above-mentioned used key, adopt.Encryption metadata can adopt encrypted test mode to be stored in the top of file of electronic document, or file attribute portion.
In addition, have employed digital ciphertext in step 400 to show encrypted content.Other modes can also be adopted, such as, select to hide the encrypted content in electronic document.For example, hide one section of content in the electronic document of encryption, and the content after this section of content is advanceed to by this section of Content placement simultaneously the position of this section of content to the ending of electronic document, realize " seamless " encryption thus, namely except encipherer, other people not understanding this electronic document generally cannot discover the content that there is encryption in this electronic document, which further increases the level of security of encrypted content.
Or, adopt preset one group in step 400 for representing that the symbol (any character) of encrypted content substitutes the mode shown by digital ciphertext.
Or except use preset characters, the combination of also encoding by random digit and encrypted content represents encrypted content.For example, according to secret generating random digit that user specifies.Then use conventional numerical method of combination that the coding of random digit and encrypted content is arranged set of number, use this group numeral to represent encrypted content.
For the deciphering of encrypted content, it is namely the inverse process of above-mentioned encryption method.Loading electronic document and after display, when selecting deciphering, then needing user to input password needed for deciphering, after this cryptographic check is passed through, then travel through content encrypted in literary composition, such as, travel through out encrypted content according to the diamond block identifier in step 400, and be decrypted.Carry out recovery display afterwards.
It should be noted that, for the encrypted electronic document operated of partial content, when being loaded and after showing, if again perform above-mentioned steps 200-500, then also comprising the steps: in step 400
Judge that whether this key used is consistent with the encryption metadata (the encryption metadata that previous execution step 500 is preserved) of stored electronic document, when inconsistent, adopt the content that one other identification symbol mark is encrypted, such as, marked by star-like identifier.For this situation, when performing step 500, encryption metadata also should comprise the identifier of counterpart keys.In this way, can realize in an electronic document, different piece adopts different encryption keys to be encrypted, and when deciphering, the encrypted identifier that this double secret key is answered can be traveled through in the encryption metadata of this electronic document according to the key inputted, then travel through the encrypted content of the mark of encrypted identifier described in electronic document content, and be decrypted according to this content of described double secret key and show, thus realize only to the deciphering of appropriate section.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (5)

1. an electronic document encryption method, is characterized in that, comprises the following steps:
The content of electronic document also shows by the electronic document that A, loading will operate;
B, establishment are encrypted required key;
C, to determine in described electronic document content chosen content;
D, content selected in above-mentioned electronic document and key are carried out random hybrid operation after preserve.
2. method according to claim 1, is characterized in that,
Key described in step B be input required key or stochastic generation by User Interface user and be shown to user key or load one record key in the file of key information;
Described key is any character.
3. method according to claim 1, is characterized in that,
Step C also comprises: mark chosen content by the mode arranging identifier in the front and back of this chosen content;
Corresponding, step D also comprises: the identifier corresponding to the content after random hybrid operation is updated to the one other identification symbol for identifying ciphertext.
4. the method according to claim 1,2 or 3, is characterized in that,
Random hybrid operation described in step D comprises: adopt the random aligning method mixing described key of arrangement and encrypted content.
5., based on a decryption method for electronic document encryption method described in claim 1, it is characterized in that, comprise the following steps:
Load electronic document, and show its content;
Obtain the password needed for deciphering of user's input;
In traversal electronic document content, encrypted content is decrypted and shows.
CN201410838293.0A 2014-12-29 2014-12-29 The encipher-decipher method of electronic document Active CN104463019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410838293.0A CN104463019B (en) 2014-12-29 2014-12-29 The encipher-decipher method of electronic document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410838293.0A CN104463019B (en) 2014-12-29 2014-12-29 The encipher-decipher method of electronic document

Publications (2)

Publication Number Publication Date
CN104463019A true CN104463019A (en) 2015-03-25
CN104463019B CN104463019B (en) 2017-07-25

Family

ID=52909039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410838293.0A Active CN104463019B (en) 2014-12-29 2014-12-29 The encipher-decipher method of electronic document

Country Status (1)

Country Link
CN (1) CN104463019B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187204A (en) * 2015-09-29 2015-12-23 北京元心科技有限公司 Encryption method and decryption method for file, and encryption and decryption system
CN105335643A (en) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 Processing method and processing system of files
CN107040550A (en) * 2017-06-09 2017-08-11 成都轻车快马网络科技有限公司 Data ciphering method during instant messaging
CN107426175A (en) * 2017-06-09 2017-12-01 成都轻车快马网络科技有限公司 The real-time encrypted transmission method of data
CN108334481A (en) * 2018-03-01 2018-07-27 四川语言桥信息技术有限公司 Document processing method and device
CN110851842A (en) * 2018-08-20 2020-02-28 珠海金山办公软件有限公司 Document display method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567255A (en) * 2003-09-02 2005-01-19 四川大学 Method for controlling storage and access of security file system
US20100185854A1 (en) * 2009-01-21 2010-07-22 Microsoft Corporation Multiple content protection systems in a file
US20120216046A1 (en) * 2011-02-22 2012-08-23 Raytheon Company System and Method for Decrypting Files
CN103500294A (en) * 2013-09-23 2014-01-08 北京荣之联科技股份有限公司 Document encrypting and decrypting method and device
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567255A (en) * 2003-09-02 2005-01-19 四川大学 Method for controlling storage and access of security file system
US20100185854A1 (en) * 2009-01-21 2010-07-22 Microsoft Corporation Multiple content protection systems in a file
US20120216046A1 (en) * 2011-02-22 2012-08-23 Raytheon Company System and Method for Decrypting Files
CN103500294A (en) * 2013-09-23 2014-01-08 北京荣之联科技股份有限公司 Document encrypting and decrypting method and device
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187204A (en) * 2015-09-29 2015-12-23 北京元心科技有限公司 Encryption method and decryption method for file, and encryption and decryption system
CN105335643A (en) * 2015-10-28 2016-02-17 广东欧珀移动通信有限公司 Processing method and processing system of files
CN107040550A (en) * 2017-06-09 2017-08-11 成都轻车快马网络科技有限公司 Data ciphering method during instant messaging
CN107426175A (en) * 2017-06-09 2017-12-01 成都轻车快马网络科技有限公司 The real-time encrypted transmission method of data
CN108334481A (en) * 2018-03-01 2018-07-27 四川语言桥信息技术有限公司 Document processing method and device
CN108334481B (en) * 2018-03-01 2021-08-27 四川语言桥信息技术有限公司 Document processing method and device
CN110851842A (en) * 2018-08-20 2020-02-28 珠海金山办公软件有限公司 Document display method and device and electronic equipment

Also Published As

Publication number Publication date
CN104463019B (en) 2017-07-25

Similar Documents

Publication Publication Date Title
CN101340279B (en) Method, system and apparatus for data ciphering and deciphering
CN104463019A (en) Method for encrypting and decrypting electronic documents
CN104205117B (en) device file encryption and decryption method and device
CN105007155B (en) Quick Response Code mask encryption and decryption approaches and system
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
CN108009440A (en) Date storage method, querying method, device, storage medium and computer equipment
CN105591737A (en) Data encryption, decryption and transmission methods and systems
Alam et al. A modified version of playfair cipher using 7? 4 matrix
CN107038383A (en) A kind of method and apparatus of data processing
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN104657670A (en) Data encryption based safety use method of configuration file
CN110138739B (en) Data information encryption method and device, computer equipment and storage medium
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN106599723A (en) File encryption method and device, and file decryption method and device
CN104243149A (en) Encrypting and decrypting method, device and server
CN106131049A (en) A kind of method of data transmission encryption and decryption
CN112653719A (en) Automobile information safety storage method and device, electronic equipment and storage medium
CN104518865A (en) Data encryption method based on password book
Xu et al. Applications of cryptography in database: a review
Mittal et al. PData security using RSA encryption combined with image steganography
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN103326851B (en) SCM Based a kind of compass encrypting and decrypting method
CN113591117A (en) Social platform daily conversation encryption method and system, storage medium and computing device
CN102882675A (en) Password encryption method for social network sites
JP2007181011A (en) Data sharing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N

Applicant after: Beijing Zhiyuan Internet software Limited by Share Ltd

Address before: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N

Applicant before: Beijing Seeyon Software Co., Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant