CN107147616A - Data ciphering method and device - Google Patents

Data ciphering method and device Download PDF

Info

Publication number
CN107147616A
CN107147616A CN201710205349.2A CN201710205349A CN107147616A CN 107147616 A CN107147616 A CN 107147616A CN 201710205349 A CN201710205349 A CN 201710205349A CN 107147616 A CN107147616 A CN 107147616A
Authority
CN
China
Prior art keywords
data
string
character
encrypted
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710205349.2A
Other languages
Chinese (zh)
Other versions
CN107147616B (en
Inventor
熊超
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hong Te
Jiangxi Chuangjia Engineering Technology Co.,Ltd.
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710205349.2A priority Critical patent/CN107147616B/en
Publication of CN107147616A publication Critical patent/CN107147616A/en
Application granted granted Critical
Publication of CN107147616B publication Critical patent/CN107147616B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it

Abstract

The embodiments of the invention provide a kind of data ciphering method and device, wherein, methods described includes:At least one section target data segment is chosen from be-encrypted data;Computing is encrypted to the target data segment of selection according to predetermined encryption algorithm, corresponding encrypted characters string is obtained;The character arrangements order of the encrypted characters string is adjusted, target string is obtained;Target data segment in the be-encrypted data is replaced with into corresponding target string, the encryption of data is realized.Data ciphering method and device provided in an embodiment of the present invention, can quickly realize the cryptographic operation of data, effectively prevent rogue program from, to the Brute Force of encryption data, improving Information Security.

Description

Data ciphering method and device
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of data ciphering method and device.
Background technology
Data encryption refers to plaintext is changed into ciphertext by AES and encryption key, and it is then by decryption to decrypt Algorithm and decruption key revert to ciphertext in plain text.As people increasingly pay attention to the protection of individual privacy, increasing people The private data information to oneself needed is protected, and especially with the prevailing of intelligent mobile terminal, the terminal is not only It is a simple means of communication, the inside may preserve various vital documents, usual when those vital documents are encrypted It is first to select the file or file for needing to encrypt, added afterwards by the encryption key of default by the way of It is close, to ensure the safety of data message.
In process of the present invention is realized, inventor has found that existing data ciphering method is that whole file or folder is added Close, the file or folder of storage is bigger, and time of cost is longer required for being encrypted to it;Correspondingly, to file decryption institute The time of cost also can be longer, causes data encrypting and deciphering to need to take a large amount of operational capabilities, and then cause system response time Overall reduction.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the data ciphering method and device of problem.
One aspect of the present invention there is provided a kind of data ciphering method, including:
At least one section target data segment is chosen from be-encrypted data;
Computing is encrypted to the target data segment of selection according to predetermined encryption algorithm, corresponding encrypted characters string is obtained;
The character arrangements order of the encrypted characters string is adjusted, target string is obtained;
Target data segment in the be-encrypted data is replaced with into corresponding target string, the encryption of data is realized.
Alternatively, it is described to choose at least one section target data segment from be-encrypted data, including:
The data segment specified positioned at the data segment of fixed position and/or user in the be-encrypted data is chosen as institute State target data segment.
Alternatively, it is described that computing is encrypted to the target data segment of selection according to predetermined encryption algorithm, including:
Computing is encrypted to the target data segment using eap-message digest AES.
Alternatively, the character arrangements order of the adjustment encrypted characters string, obtains target string, including:
The character arrangements order of the encrypted characters string is adjusted according to preset rules;
Character string after being adjusted to character arrangements order carries out first circulation displacement coding, obtains target string.
Alternatively, the character arrangements order that the encrypted characters string is adjusted according to preset rules, including:
Second circulation displacement coding is carried out to the encrypted characters string;
The position of each two adjacent character in character string after coding is exchanged, if character in the character string after coding Number is odd number, then retains last invariant position;
Character string after position is exchanged is split as at least two data segments, and by the position of at least two obtained data segments Put and be interchangeable.
Alternatively, the character arrangements order that the encrypted characters string is adjusted according to preset rules, including:
The position of each two adjacent character in the encrypted characters string is exchanged, if character in the encrypted characters string Number is odd number, then retains last invariant position;
Character string after being exchanged to position carries out the 3rd cyclic shift coding;
Character string after after coding is split as at least two data segments, and by the position of at least two obtained data segments Put and be interchangeable.
Alternatively, the character string after the adjustment to character arrangements order carries out first circulation displacement coding, including:
Character string after being adjusted using ROT13 coded systems to character arrangements order carries out cyclic shift coding.
Another aspect of the present invention there is provided a kind of data encryption device, including:
Data decimation module, for choosing at least one section target data segment from be-encrypted data;
Data encryption module, for computing to be encrypted to the target data segment of selection according to predetermined encryption algorithm, is obtained Corresponding encrypted characters string;
Order adjusting module, the character arrangements order for adjusting the encrypted characters string, obtains target string;
Data replacement module, for the target data segment in the be-encrypted data to be replaced with into corresponding target character String, realizes the encryption of data.
Alternatively, the data decimation module, specifically for choosing the fixed position that is located in the be-encrypted data The data segment that data segment and/or user specify is used as the target data segment.
Alternatively, the order adjusting module, including:
Order adjustment unit, the character arrangements order for adjusting the encrypted characters string according to preset rules;
First coding unit, for carrying out first circulation displacement coding to the character string after the adjustment of character arrangements order, is obtained To target string.
Data ciphering method and device provided in an embodiment of the present invention, by entering to the target data segment in be-encrypted data Row cryptographic calculation, and the character arrangements order of the encrypted characters string after cryptographic calculation is adjusted, target string is obtained, so The target data segment in be-encrypted data is replaced with into corresponding target string afterwards, and then rapidly realizes the encryption behaviour of data Make, effectively prevent rogue program from, to the Brute Force of encryption data, improving Information Security.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is a kind of flow chart of data ciphering method of the embodiment of the present invention;
Fig. 2 for the embodiment of the present invention a kind of data ciphering method in step S13 subdivision flow chart;
Fig. 3 is a kind of structural representation of data encryption device of the embodiment of the present invention;
Fig. 4 for the embodiment of the present invention a kind of data encryption device in order adjusting module internal structure schematic diagram.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions, otherwise will not be explained with idealization or excessively formal implication.
Fig. 1 diagrammatically illustrates the flow chart of the data ciphering method of one embodiment of the invention.Reference picture 1, the present invention The data ciphering method of embodiment specifically includes following steps:
Step S11, at least one section target data segment is chosen from be-encrypted data;
Step S12, computing is encrypted to the target data segment of selection according to predetermined encryption algorithm, obtains corresponding encryption Character string;
Step S13, the adjustment encrypted characters string character arrangements order, obtain target string;
Step S14, the target data segment in the be-encrypted data replaced with into corresponding target string, realize data Encryption.
Data ciphering method provided in an embodiment of the present invention, by the way that the target data segment in be-encrypted data is encrypted Computing, and the character arrangements order of the encrypted characters string after cryptographic calculation is adjusted, target string is obtained, then will be treated Target data segment in encryption data replaces with corresponding target string, and then rapidly realizes the cryptographic operation of data, has Prevent to effect rogue program from, to the Brute Force of encryption data, improving Information Security.
In the embodiment of the present invention, at least one section target data segment is chosen from be-encrypted data in step S11, specific bag Include:The data segment specified positioned at the data segment of fixed position and/or user in the be-encrypted data is chosen as the mesh Mark data segment.
During this step is implemented, be-encrypted data can be related to system data;Either it is related to user Individual privacy data, for example:Photo, video, daily record and cookie information of user etc..Number of targets in be-encrypted data There can be various ways realization according to the choosing method of section, the example of several specific implementations only be provided below, to this hair The explanation of bright step.
Choose the first specific implementation of target data segment:The corresponding data type of identification be-encrypted data, and according to Data type selected target data segment is located at the fixed position of the be-encrypted data, according to the fixed position to this so as to after A little target data segments are encrypted.
Choose the second specific implementation of target data segment:It is the target data segment for receiving user to be-encrypted data Specify.Certain in be-encrypted data one piece of data or a few segment datas can be appointed as target data segment by user, so as to after Specified according to user and those target data segments are encrypted.
In the present embodiment, technical scheme is illustrated as be-encrypted data using the cookie information of user.First, obtain Take the data such as user uid, user cipher, user's name and current time stamp in cookie information.
In a specific example, it is assumed that:
User's unique mark uid:21311;
User cipher:123456;
User's pet name:test111;
Current time stamp:1488089646.During current time stamp, specially 01 day 00 Greenwich Mean Time 1970 year 01 month 00 point 00 second (00 point 00 second during 01 day 08 Beijing time 1970 year 01 month) is risen to present total number of seconds.
Wherein, the target data segment in the cookie information is chosen, user cipher field conduct is specially chosen The target data segment of cookie information.
It is described according to the target data segment of the predetermined encryption algorithm to selection in step S12 in the embodiment of the present invention Computing is encrypted, specifically includes:Computing is encrypted to the target data segment using eap-message digest AES.
In the present embodiment, when the target data segment of selection is encrypted, encryption method can pass through predetermined encryption algorithm Target data segment is encrypted, the mode of actually adoptable encryption can have a variety of, will not be repeated here.
In the present embodiment, the encryption to the target data segment of selection is realized using md5 () AES.
I.e. to user cipher:123456 are encrypted using using md5 () AES, obtain character string: e10adc3949ba59abbe56e057f20f883e。
Wherein, MD5 ():For a kind of widely used hash function of computer safety field, to provide the complete of message Property protection method.
In the embodiment of the present invention, as shown in Fig. 2 the character arrangements of the adjustment encrypted characters string in step S13 Sequentially, target string is obtained, is specifically included:
Step S131, the character arrangements order according to the preset rules adjustment encrypted characters string;
Step S132, to character arrangements order adjust after character string carry out first circulation displacement coding, obtain target word Symbol string.
In an alternate embodiment of the present invention where, the character for adjusting the encrypted characters string according to preset rules is arranged Row order, is specifically included:
Second circulation displacement coding is carried out to the encrypted characters string;
The position of each two adjacent character in character string after coding is exchanged, if character in the character string after coding Number is odd number, then retains last invariant position;
Character string after position is exchanged is split as at least two data segments, and by the position of at least two obtained data segments Put and be interchangeable.
In the present embodiment, the adjustment to the character arrangements order of encrypted characters string is realized especially by following scheme, specifically It is as follows:
First, password above sequence of coden, example is overturned:After e10adc3949ba59abbe56e057f20f883e is reverse To new character strings:
e388f02f750e65ebba95ab9493cda01e
Then, above-mentioned character string each two is swapped round seat, if character string is odd number, finally thought constant:
Obtain new character strings:3e880ff257e056beab59ba4939dc0ae1
Then, the total length of character string is obtained, subtracts 1 after total length divided by 2 are rounded up and obtains new integer, example:On Face character string total length is 32, and it is 15 that (32/2), which rounds up and obtains 16,16-1,;
Finally, the first character of character string is acquired to the character obtained at integer, and character string is divided into two numbers According to section, two data segments of then putting the cart before the horse splice new character string:
Example:Integer is obtained for 15, therefore by character string:3e880ff257e056beab59ba4939dc0ae1 the 1st to The new character string of 16 compositions, i.e. first half, another character string of remaining composition, i.e. latter half.
Wherein, first half:3e880ff257e056b, latter half:eab59ba4939dc0ae1;
Spliced new character strings:eab59ba4939dc0ae13e880ff257e056b
In another alternative embodiment of the invention, the character that the encrypted characters string is adjusted according to preset rules Put in order, including:
The position of each two adjacent character in the encrypted characters string is exchanged, if character in the encrypted characters string Number is odd number, then retains last invariant position;
Character string after being exchanged to position carries out the 3rd cyclic shift coding;
Character string after after coding is split as at least two data segments, and by the position of at least two obtained data segments Put and be interchangeable.
In the present embodiment, realize that preset rules adjust the specific of the character arrangements order of the encrypted characters string by adjustment The order of operation, realizes the embodiment of another progress character arrangements order adjustment, a specific implementation as above embodiment institute State, will not be repeated here.
In the present embodiment, the character string after the adjustment to character arrangements order carries out first circulation displacement coding, including:
Character string after being adjusted using ROT13 coded systems to character arrangements order carries out cyclic shift coding.
In the present embodiment, php built-in system function str_rot13 () are called to realize the word after being adjusted to character arrangements order Symbol string carries out cyclic shift coding.
Str_rot13 () is used to realize that ROT-13 is encoded.Wherein, ROT-13 codings are each a kind of letters by another The method that letter is replaced.This is as obtained from original letter moves forward 13 letters instead of letter.Digital and non-word Alphabetic character keeps constant.This function coding and decoding is all completed by identical function.If you are encoded one Character string is used as parameter, then will return to original character string.
For example:str_rot13(eab59ba4939dc0ae13e880ff257e056b)
Obtain new character string:trno59on4939qp0nr13r880ss257r056o
After target string is obtained, the embodiment of the present invention by user uid, target string, user's name, it is current when Between stab with t mode be stitched together and obtain new character string, complete the encryption of cookie information:
21311\trno59on4939qp0nr13r880ss257r056o\ttest111\t1488089646。
The data obtained corresponding to above-mentioned AES, can carry out the decryption of data by following decipherment algorithm.Specifically such as Under:
1st, it is divided into character string to obtain user uid, user from tape function explode () Yi t using php to upset after processing Password, user's name and timestamp;
Example:It is above-mentioned to resolve to:
User id:21311
User beats hashed password:rno59on4939qp0nr13r880ss257r056o
User's pet name:test111
Encryption times are stabbed:1488089646
2nd, user cipher is carried out upsetting processing, upsets rule correspondence AES and realize, it is specific as follows;
First, php built-in system function str_rot13 () are called to carry out cyclic shift.Numeral and non-alphabetic characters are kept It is constant.This function coding and decoding is all completed by identical function.For an encoded character string as parameter, Original character string will so be returned;
Example:str_rot13(rno59on4939qp0nr13r880ss257r056o)
Obtain new character string:eab59ba4939dc0ae13e880ff257e056b
Then, the total length of character string is obtained, subtracts 1 after total length divided by 2 are rounded up and obtains new integer
Example:Character string total length is that 32 (32/2) round up that to obtain 16 16-1 be 15 above
Then, the first character of character string is acquired to the character obtained at integer, character string is divided into two-section, so Put the cart before the horse afterwards and splice new character string:
Example:If it is 15 to obtain integer, therefore by the new character string of the 1st to the 16th composition of character string, remaining composition is another One character string.
First half:Eab59ba4939dc0ae1, latter half:3e880ff257e056b
New character strings:3e880ff257e056beab59ba4939dc0ae1
Finally, above-mentioned character string each two is swapped round seat, if character string is odd number, finally thought constant:
Example obtains new character strings:e388f02f750e65ebba95ab9493cda01e
It is identical by carrying out the character string after md5 encryption budgets with user cipher, realize data deciphering.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but this area Technical staff should know that the embodiment of the present invention is not limited by described sequence of movement, because according to present invention implementation Example, some steps can be carried out sequentially or simultaneously using other.Secondly, those skilled in the art should also know, specification Described in embodiment belong to necessary to preferred embodiment, the involved action not necessarily embodiment of the present invention.
Fig. 3 diagrammatically illustrates the structural representation of the data encryption device of one embodiment of the invention.Reference picture 3, this The data encryption device of inventive embodiments specifically includes data decimation module 301, data encryption module 302, order adjusting module 303 and data replacement module 304, wherein, described data decimation module 301, for being chosen at least from be-encrypted data One section of target data segment;Described data encryption module 302, for being entered according to predetermined encryption algorithm to the target data segment of selection Row cryptographic calculation, obtains corresponding encrypted characters string;Described order adjusting module 303, for adjusting the encrypted characters string Character arrangements order, obtain target string;Described data replacement module 304, for by the be-encrypted data Target data segment replaces with corresponding target string, realizes the encryption of data.
In the embodiment of the present invention, described data decimation module 301, specifically for choosing the position in the be-encrypted data The data segment specified in the data segment of fixed position and/or user is as the target data segment.
In the embodiment of the present invention, described data encryption module 302, specifically for using eap-message digest AES to institute State target data segment and computing is encrypted.
In the embodiment of the present invention, the order adjusting module 303, as shown in figure 4, specifically including order adjustment unit 3031 With the first coding unit 3032, wherein, described order adjustment unit 3031, for adjusting the encrypted word according to preset rules Accord with the character arrangements order of string;The first described coding unit 3032, enters for the character string after being adjusted to character arrangements order The displacement of row first circulation is encoded, and obtains target string.
In an alternate embodiment of the present invention where, described order adjustment unit 3031, specifically for the encryption Character string carries out second circulation displacement coding;The position of each two adjacent character in character string after coding is exchanged, if Character number is odd number in character string after coding, then retains last invariant position;Character string after position is exchanged is split as At least two data segments, and the position of at least two obtained data segments is interchangeable.
In another alternative embodiment of the invention, described order adjustment unit 3031, specifically for that described will add The position of each two adjacent character is exchanged in close character string, if character number is odd number in the encrypted characters string, is protected Stay last invariant position;Character string after being exchanged to position carries out the 3rd cyclic shift coding;By the character string after after coding At least two data segments are split as, and the position of at least two obtained data segments is interchangeable.
In an alternate embodiment of the present invention where, the first described coding unit 3032, specifically for being compiled using ROT13 Character string after code mode is adjusted to character arrangements order carries out cyclic shift coding.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part illustrates referring to the part of embodiment of the method.
In addition, another embodiment of the present invention additionally provides a kind of electronic equipment, the electronic equipment includes:Housing, processing Device, memory, circuit board and power circuit, wherein, the circuit board is placed in the interior volume that the housing is surrounded, the place Reason device and the memory are arranged on the circuit board;The power circuit, for each circuit for the electronic equipment Or device is powered;The memory is used to store executable program code;The processor is deposited by reading in the memory The executable program code of storage runs program corresponding with executable program code, for performing following steps:From to be added At least one section target data segment is chosen in ciphertext data;Fortune is encrypted to the target data segment of selection according to predetermined encryption algorithm Calculate, obtain corresponding encrypted characters string;The character arrangements order of the encrypted characters string is adjusted, target string is obtained;By institute State the target data segment in be-encrypted data and replace with corresponding target string, realize the encryption of data.
Data ciphering method and device provided in an embodiment of the present invention, by entering to the target data segment in be-encrypted data Row cryptographic calculation, and the character arrangements order of the encrypted characters string after cryptographic calculation is adjusted, target string is obtained, so The target data segment in be-encrypted data is replaced with into corresponding target string afterwards, and then rapidly realizes the encryption behaviour of data Make, effectively prevent rogue program from, to the Brute Force of encryption data, improving Information Security.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, the part shown as unit can be or may not be physics list Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Understood based on such, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Order is to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
Although in addition, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but not the combination of the feature of be the same as Example mean be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One mode can use in any combination.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (10)

1. a kind of data ciphering method, it is characterised in that including:
At least one section target data segment is chosen from be-encrypted data;
Computing is encrypted to the target data segment of selection according to predetermined encryption algorithm, corresponding encrypted characters string is obtained;
The character arrangements order of the encrypted characters string is adjusted, target string is obtained;
Target data segment in the be-encrypted data is replaced with into corresponding target string, the encryption of data is realized.
2. according to the method described in claim 1, it is characterised in that described that at least one section number of targets is chosen from be-encrypted data According to section, including:
The data segment specified positioned at the data segment of fixed position and/or user in the be-encrypted data is chosen as the mesh Mark data segment.
3. according to the method described in claim 1, it is characterised in that described according to the target of the predetermined encryption algorithm to selection Computing is encrypted in data segment, including:
Computing is encrypted to the target data segment using eap-message digest AES.
4. the method according to claim any one of 1-3, it is characterised in that the character of the adjustment encrypted characters string Put in order, obtain target string, including:
The character arrangements order of the encrypted characters string is adjusted according to preset rules;
Character string after being adjusted to character arrangements order carries out first circulation displacement coding, obtains target string.
5. method according to claim 4, it is characterised in that described to adjust the encrypted characters string according to preset rules Character arrangements order, including:
Second circulation displacement coding is carried out to the encrypted characters string;
The position of each two adjacent character in character string after coding is exchanged, if character number in the character string after coding For odd number, then retain last invariant position;
Character string after position is exchanged is split as at least two data segments, and the position of at least two obtained data segments is entered Row is exchanged.
6. method according to claim 4, it is characterised in that described to adjust the encrypted characters string according to preset rules Character arrangements order, including:
The position of each two adjacent character in the encrypted characters string is exchanged, if character number in the encrypted characters string For odd number, then retain last invariant position;
Character string after being exchanged to position carries out the 3rd cyclic shift coding;
Character string after after coding is split as at least two data segments, and the position of at least two obtained data segments is entered Row is exchanged.
7. method according to claim 4, it is characterised in that the character string after the adjustment to character arrangements order is carried out First circulation displacement is encoded, including:
Character string after being adjusted using ROT13 coded systems to character arrangements order carries out cyclic shift coding.
8. a kind of data encryption device, it is characterised in that including:
Data decimation module, for choosing at least one section target data segment from be-encrypted data;
Data encryption module, for computing to be encrypted to the target data segment of selection according to predetermined encryption algorithm, obtains correspondence Encrypted characters string;
Order adjusting module, the character arrangements order for adjusting the encrypted characters string, obtains target string;
Data replacement module, it is real for the target data segment in the be-encrypted data to be replaced with into corresponding target string The encryption of existing data.
9. device according to claim 8, it is characterised in that the data decimation module, specifically for being treated described in selection The data segment specified positioned at the data segment of fixed position and/or user in encryption data is as the target data segment.
10. device according to claim 8 or claim 9, it is characterised in that the order adjusting module, including:
Order adjustment unit, the character arrangements order for adjusting the encrypted characters string according to preset rules;
First coding unit, for carrying out first circulation displacement coding to the character string after the adjustment of character arrangements order, obtains mesh Mark character string.
CN201710205349.2A 2017-03-31 2017-03-31 Data ciphering method and device Active CN107147616B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710205349.2A CN107147616B (en) 2017-03-31 2017-03-31 Data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710205349.2A CN107147616B (en) 2017-03-31 2017-03-31 Data ciphering method and device

Publications (2)

Publication Number Publication Date
CN107147616A true CN107147616A (en) 2017-09-08
CN107147616B CN107147616B (en) 2019-09-10

Family

ID=59784139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710205349.2A Active CN107147616B (en) 2017-03-31 2017-03-31 Data ciphering method and device

Country Status (1)

Country Link
CN (1) CN107147616B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN109040055A (en) * 2018-07-30 2018-12-18 美通云动(北京)科技有限公司 The method for realizing Web secure access using domestic password
CN109271797A (en) * 2018-09-12 2019-01-25 郑州云海信息技术有限公司 A kind of method and system improving the safety of database sensitive information
CN109687966A (en) * 2017-10-18 2019-04-26 北京明特量化信息技术有限公司 Encryption method and its system
CN110266682A (en) * 2019-06-18 2019-09-20 杭州情咖网络技术有限公司 Data ciphering method, device, mobile terminal and decryption method
CN110457916A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 A kind of electronic contract encryption method, device and terminal device
CN110704854A (en) * 2019-09-27 2020-01-17 上海易点时空网络有限公司 Stream type encryption method aiming at text data reserved format
CN110879893A (en) * 2019-11-11 2020-03-13 图林科技(深圳)有限公司 Logistics supply chain big data processing system based on block chain and cloud computing
CN111510745A (en) * 2020-03-27 2020-08-07 曹新 Internet video data encryption transmission method
CN111832067A (en) * 2020-05-26 2020-10-27 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN112383504A (en) * 2020-09-28 2021-02-19 国网山东省电力公司冠县供电公司 Electric power thing networking block chain data management system
CN112422491A (en) * 2020-05-08 2021-02-26 上海幻电信息科技有限公司 Encryption and decryption method for digital codes, server and storage medium
CN113810174A (en) * 2021-09-16 2021-12-17 金蝶软件(中国)有限公司 Data processing method and related equipment
WO2023005544A1 (en) * 2021-07-26 2023-02-02 海明联合能源集团矩网科技有限公司 Encrypted seal, and secondary encryption method for strip-shaped data
CN117592090A (en) * 2024-01-19 2024-02-23 中国人民解放军海军青岛特勤疗养中心 Nursing physical examination data intelligent analysis and management method
CN117592090B (en) * 2024-01-19 2024-05-17 中国人民解放军海军青岛特勤疗养中心 Nursing physical examination data intelligent analysis and management method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852088A (en) * 2005-10-13 2006-10-25 华为技术有限公司 Enciphering-deciphering method for flow medium transmission code flow and module
US20110142227A1 (en) * 2009-12-14 2011-06-16 Samsung Electronics Co., Ltd. Method and apparatus for encoding data and method and apparatus for decoding data
US20140270165A1 (en) * 2013-03-15 2014-09-18 Alexandre Andre DURAND Cryptographic system based on reproducible random sequences
CN106372517A (en) * 2016-08-30 2017-02-01 北京小米移动软件有限公司 File encryption method, file decryption method, file encryption device and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852088A (en) * 2005-10-13 2006-10-25 华为技术有限公司 Enciphering-deciphering method for flow medium transmission code flow and module
US20110142227A1 (en) * 2009-12-14 2011-06-16 Samsung Electronics Co., Ltd. Method and apparatus for encoding data and method and apparatus for decoding data
US20140270165A1 (en) * 2013-03-15 2014-09-18 Alexandre Andre DURAND Cryptographic system based on reproducible random sequences
CN106372517A (en) * 2016-08-30 2017-02-01 北京小米移动软件有限公司 File encryption method, file decryption method, file encryption device and equipment

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109687966A (en) * 2017-10-18 2019-04-26 北京明特量化信息技术有限公司 Encryption method and its system
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN107819569B (en) * 2017-12-14 2018-09-11 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN109040055A (en) * 2018-07-30 2018-12-18 美通云动(北京)科技有限公司 The method for realizing Web secure access using domestic password
CN109271797A (en) * 2018-09-12 2019-01-25 郑州云海信息技术有限公司 A kind of method and system improving the safety of database sensitive information
CN110266682B (en) * 2019-06-18 2021-11-02 杭州情咖网络技术有限公司 Data encryption method and device, mobile terminal and decryption method
CN110266682A (en) * 2019-06-18 2019-09-20 杭州情咖网络技术有限公司 Data ciphering method, device, mobile terminal and decryption method
CN110457916A (en) * 2019-07-19 2019-11-15 平安科技(深圳)有限公司 A kind of electronic contract encryption method, device and terminal device
WO2021012527A1 (en) * 2019-07-19 2021-01-28 平安科技(深圳)有限公司 Electronic contract encryption method and apparatus, terminal device and medium
CN110457916B (en) * 2019-07-19 2023-04-14 平安科技(深圳)有限公司 Electronic contract encryption method and device and terminal equipment
CN110704854B (en) * 2019-09-27 2021-11-09 上海易点时空网络有限公司 Stream type encryption method aiming at text data reserved format
CN110704854A (en) * 2019-09-27 2020-01-17 上海易点时空网络有限公司 Stream type encryption method aiming at text data reserved format
CN110879893A (en) * 2019-11-11 2020-03-13 图林科技(深圳)有限公司 Logistics supply chain big data processing system based on block chain and cloud computing
CN111510745A (en) * 2020-03-27 2020-08-07 曹新 Internet video data encryption transmission method
CN111510745B (en) * 2020-03-27 2021-01-19 曹新 Internet video data encryption transmission method
CN112422491A (en) * 2020-05-08 2021-02-26 上海幻电信息科技有限公司 Encryption and decryption method for digital codes, server and storage medium
CN111832067A (en) * 2020-05-26 2020-10-27 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN111832067B (en) * 2020-05-26 2021-12-17 华控清交信息科技(北京)有限公司 Data processing method and device and data processing device
CN112383504A (en) * 2020-09-28 2021-02-19 国网山东省电力公司冠县供电公司 Electric power thing networking block chain data management system
WO2023005544A1 (en) * 2021-07-26 2023-02-02 海明联合能源集团矩网科技有限公司 Encrypted seal, and secondary encryption method for strip-shaped data
CN113810174A (en) * 2021-09-16 2021-12-17 金蝶软件(中国)有限公司 Data processing method and related equipment
CN117592090A (en) * 2024-01-19 2024-02-23 中国人民解放军海军青岛特勤疗养中心 Nursing physical examination data intelligent analysis and management method
CN117592090B (en) * 2024-01-19 2024-05-17 中国人民解放军海军青岛特勤疗养中心 Nursing physical examination data intelligent analysis and management method

Also Published As

Publication number Publication date
CN107147616B (en) 2019-09-10

Similar Documents

Publication Publication Date Title
CN107147616A (en) Data ciphering method and device
US8429421B2 (en) Server-side encrypted pattern matching
EP2924677B1 (en) Splitting s-boxes in a white-box implementation to resist attacks
CN108377183B (en) XDR data information encryption method, device, equipment and medium
US9455833B2 (en) Behavioral fingerprint in a white-box implementation
CN105117635B (en) A kind of safety system and method for local data
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN105187364A (en) Protecting A White-box Implementation Against Attacks
CN110941817B (en) Method and device for encrypting password and decrypting ciphertext
CN105721135A (en) S-box selection in white-box cryptographic implementation
CN103095449A (en) Dynamic encryption and decryption method based on stream ciphers
CN105022937B (en) For white box to be realized to the interface compatibility method for being tightly attached to program around
CN108650269A (en) A kind of graded encryption method and system based on intensified learning
EP3643097A1 (en) Controlling access to data
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN104794243B (en) Third party's cipher text retrieval method based on filename
CN114338217A (en) Data encryption transmission method
Muslim et al. Modified Transposition Cipher Algorithm for Images Encryption
CN108256342A (en) Encryption method, device and the decryption method of Shader files, device
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
EP2940917A1 (en) Behavioral fingerprint in a white-box implementation
Ariyus Optimization substitution cipher and hidden plaintext in image data using LSB method
US20160337120A1 (en) Equivoe-T: Transposition Equivocation Cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230515

Address after: No. 19 Jinqiao Road, High tech Industrial Development Zone, Yingtan City, Jiangxi Province, 335000

Patentee after: Jiangxi Chuangjia Engineering Technology Co.,Ltd.

Patentee after: Hong Te

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right