CN107846422A - A kind of configuration file ciphered compressed of gateway and the method for decryption decompression - Google Patents
A kind of configuration file ciphered compressed of gateway and the method for decryption decompression Download PDFInfo
- Publication number
- CN107846422A CN107846422A CN201711405989.4A CN201711405989A CN107846422A CN 107846422 A CN107846422 A CN 107846422A CN 201711405989 A CN201711405989 A CN 201711405989A CN 107846422 A CN107846422 A CN 107846422A
- Authority
- CN
- China
- Prior art keywords
- des
- encryption
- ciphertext
- gateway
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Abstract
The present invention provides a kind of method of the configuration file ciphered compressed of gateway, including:Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is no less than 2 integer;Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, add ambiguity function and generate final ciphertext, and be compressed;Step A5, the final ciphertext after compression is sent to server.The method that the present invention also provides a kind of configuration file decryption decompression of gateway, can be achieved security of the encryption with faster speed and Geng Gao.
Description
Technical field
The present invention relates to technical field of network equipment, more particularly to a kind of configuration file ciphered compressed of gateway and decryption to solve
The method of compression.
Background technology
Internet era, network security also annoyings us in real time while network offers convenience to us, this at present
Insecurity is internet existence foundation --- ICP/IP protocol it is intrinsic, and router is as the important terminal for accessing network
Equipment, the configuration to router is encrypted and compression is even more important.The effect of encryption configuration is exactly to prevent configuration upper
The associative operations such as ITMS platforms are transmitted to cause the relevant information of route intercepted and steal.
For example for, there is the password of wireless account in configuration, if password is sent in clear text manner
ITMS servers, and the eavesdropping on network is an extremely easy thing, then consequence will be very serious.In order to avoid this
A little problems, best solution are exactly to be encrypted and compress to configuration file, even if obtained by a hacker is also to have no idea
It is read out.
Common encryption method has much in linux system, and such as MD5, RSA, DES, AES etc., these are individually encrypted
Algorithm has the difference of respective advantage and disadvantage, mainly DSE arithmetic and asymmetric cryptosystem.From the aspects of key,
It is different to change key complexity, symmetric cryptography is more difficult, and asymmetric cryptography is easier to;For processing speed, symmetry algorithm is than non-
Symmetry algorithm is faster;For signature angle, asymmetric cryptography is easily realized compared with symmetric cryptography.Existing enciphering and deciphering algorithm is all
Individually use MD5, RSA, DES, one kind in AES is handled, it is possible to exist change key is easy, processing speed slowly,
The easily drawback such as signature.
The content of the invention
One of the technical problem to be solved in the present invention, it is a kind of method of configuration file ciphered compressed that gateway is provided,
Using being combined after md5 encryption key and N weight DES optimization symmetric cryptography combinations with the RSA cryptographic algorithms in public key system, proposition is a kind of
Brand-new AES, the key after the mac addresses progress md5 encryption of gateway as N weights DES encrypt optimization, N weights DES and RSA
Combine and compress and upload onto the server;This new algorithm can realize security of the encryption with faster speed and Geng Gao, so
Afterwards in the interaction of client and service end, compressed using gzip, save flow.
One of the problem of of the invention, it is realized in:A kind of method of the configuration file ciphered compressed of gateway, including such as
Lower step:
Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;
Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is not small
In 2 integer;
Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;
Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, ambiguity function life is added
Into final ciphertext, and it is compressed;
Step A5, the final ciphertext after compression is sent to server.
Further, N weights des encryption is specially in the step A2:
1st des encryption is that macAddrkey data corresponding with the configuration file progress des encryption generation of gateway are close
Text, this des encryption below are obtain after inversion operation or xor operation pair by the data ciphertext of previous encryption generation
The operation data and macAddrkey answered carry out data ciphertext corresponding to des encryption generation;The like, until completing n times DES
Encryption, generate the data ciphertext of n-th des encryption.
Further, ambiguity function is added in the step A4 is specially:
Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour
Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext.
Further, the data ciphertext in the step A4 after N weights des encryption with RSAkey is entered using base64 modes
Row coding;Compression is compressed using gzip in the step A4;Final ciphertext after being compressed in the step A5 is to pass through
Http protocol is sent to server.
The second technical problem to be solved by the present invention, it is the side of configuration file decryption decompression that a kind of gateway is provided
Method, N weight DES decryption and the combination of RSA decipherment algorithms propose a kind of brand-new decipherment algorithm, and this new algorithm can realize decryption tool
There are faster speed and Geng Gao security, then in the interaction of client and service end, using gzip decompression, section
About flow.
The two of the problem of of the invention, are realized in:A kind of method of the configuration file decryption decompression of gateway, including
Following steps:
Step B1, server receives final ciphertext;
Step B2, after the final ciphertext received is decompressed, add ambiguity function and operation is decrypted, and carry out
Decoding process, obtain the data ciphertext after N weight des encryptions and the RSAkey after rsa encryption;
Step B3, the RSAkey after private key and rsa encryption is subjected to RSA decryption processings, obtains macAddrkey;
Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains gateway
Configuration file, N are no less than 2 integer.
Further, ambiguity function is added in the step B 2 operation is decrypted to be specially:
Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR
Operation, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation.
Further, the DES decryption of N weights is specially in the step B4:
1st DES decryption be first by the data ciphertext after n-th des encryption carry out DES decrypt to obtain macAddrkey and
During n-th des encryption operate after operation data, then by during n-th des encryption operate after operation data carry out and n-th
Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during des encryption;2nd DES decryption
It is that the data ciphertext after the N-1 times obtained des encryption first is carried out into DES to decrypt to obtain macAddrkey and the N-1 times DES adds
Operation data after being operated when close, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption
When identical inversion operation or xor operation obtain the data ciphertext after the N-2 times des encryption;By that analogy, until completing N
Secondary DES decryption, n-th DES decryption are that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain
MacAddrkey and gateway configuration file.
Further, server is to receive final ciphertext by http protocol in the step B1;Decompressed in the step B2
Contracting is decompressed using gzip;Final ciphertext is decoded using base64 modes in the step B2.
The advantage of the invention is that:It is unique using its is embodied as macAddrkey after the mac addresses progress md5 encryption of gateway
Property, the advantages of using the public key system of N weight des encryption algorithm symmetric systems and RSA cryptographic algorithms, realize faster speed and more
High security, gzip compression can more save flow, and special data can be played on the security solution of low cost
Protect effect.
Brief description of the drawings
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is a kind of method execution flow chart of the configuration file ciphered compressed of gateway of the present invention.
Fig. 2 is a kind of method execution flow chart of the configuration file decryption decompression of gateway of the present invention.
Embodiment
To cause the present invention to become apparent, now with a preferred embodiment, and accompanying drawing is coordinated to be described in detail below.
As shown in figure 1, a kind of method of the configuration file ciphered compressed of gateway of the present invention, comprises the following steps:
Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;
Such as:The mac addresses of gateway are character string 22:33:11:22:85:45, it is encrypted according to MD5, is changed successively
For 16 small letters:Capitalize 2171a1e4ff144787 → 16:2171A1E4FF144787 → 32 small letter:
Capitalize 427238ee2171a1e4ff144787e4c022cb → 32:427238EE2171A1E4FF144787E4C022CB,
64 capitalization are calculated as by 32 × 2:
64427238EE2171A1E4FF144787E4C022CB427238EE2171A1E4FF1447 87E4C022CB, take
Keys of the unique macAddrkey of preceding 56 generations as des encryption, latter 8 for verification with;
Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is not small
In 2 integer;N is heavy, and des encryption is specially:
1st des encryption is that macAddrkey data corresponding with the configuration file progress des encryption generation of gateway are close
Text, this des encryption below are obtain after inversion operation or xor operation pair by the data ciphertext of previous encryption generation
The operation data and macAddrkey answered carry out data ciphertext corresponding to des encryption generation;The like, until completing n times DES
Encryption, generate the data ciphertext of n-th des encryption;The data ciphertext for generating previous encryption during even-times des encryption is set
Data ciphertext when carrying out inversion operation, odd-times des encryption by previous encryption generation carries out xor operation, or sets the
Add when the data ciphertext of previous encryption generation being carried out into xor operation, odd-times des encryption during even-times des encryption by previous
It is dense into data ciphertext carry out inversion operation, or even-times is set or given birth to previous encryption during odd-times des encryption
Into data ciphertext carry out inversion operation, or set and generate previous encryption when even-times or odd-times des encryption
Data ciphertext carry out xor operation, rule is set by user's sets itself;
So that data ciphertext progress inversion operation, the odd-times DES of previous encryption generation to be added during even-times des encryption
By exemplified by the data ciphertext progress xor operation of previous encryption generation when close:(during N=5, that is, carrying out 5 heavy des encryptions)
1st des encryption is that the configuration file of macAddrkey and gateway is carried out into des encryption generation data ciphertext one,
2nd des encryption is to obtain operation data one with after the inversion operation of data ciphertext one after first time encryption, by operation data one
Des encryption generation data ciphertext two is carried out with macAddrkey, the 3rd des encryption is with the data ciphertext two after the 2nd encryption
Operation data two is obtained after xor operation, operation data two and macAddrkey are subjected to des encryption generation data ciphertext three, the
4 des encryptions are to obtain operation data three with after the inversion operation of data ciphertext three after the 3rd encryption, by the He of operation data three
MacAddrkey carries out des encryption generation data ciphertext four, and the 5th des encryption is that the data ciphertext four after being encrypted with the 4th is different
Or operation data four is obtained after operation, operation data four and macAddrkey are subjected to des encryption generation data ciphertext five;Data
Ciphertext five is the data ciphertext after 5 weight des encryptions.
Step A3, macAddrkey with public key (Publickey) obtain after RSA public key encryptions calculate secret processing
RSAkey;
Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment using base64 modes with RSAkey,
Add ambiguity function and generate final ciphertext, and be compressed using gzip;Adding ambiguity function is specially:
Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour
Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext;
Such as:Character string adcdeefefefwwuuuffffeeeewwwwwggggg, 1-5 positions:Adcde negates behaviour
Make, 6-15 positions:Efefefwwuu does xor operation, 16-20 positions:Uffff does inversion operation, 21-30 positions:
Eeeewwwwwg does xor operation, 31-34 positions:Gggg does not do any operation;
Step A5, the final ciphertext after compression is sent to server by http protocol.
As shown in Fig. 2 a kind of method of the configuration file decryption decompression of gateway of the present invention, comprises the following steps:
Step B1, server receives final ciphertext by http protocol;
Step B2, after the final ciphertext received is decompressed using gzip, add ambiguity function and behaviour is decrypted
Make, and decoding process is carried out using base64 modes, after obtaining data ciphertext and rsa encryption after N weight des encryptions
RSAkey;Addition ambiguity function is decrypted operation and is specially:
Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR
Operation, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;
Such as:Former character string adcdeefefefwwuuuffffeeeewwwwwggggg is added after ambiguity function what is obtained
New character strings are operated again, and 1-5 does position inversion operation, and 6-15 does position xor operation, and 16-20 positions negate behaviour
Make, 21-30 does position xor operation, is finally reduced into former character string adcdeefefefwwuuuffffeeeewwwwwggggg;
Step B3, the RSAkey after private key (Privatekey) and rsa encryption is subjected to RSA decryption processings, obtained
macAddrkey;
Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains gateway
Configuration file, N are no less than 2 integer;N weights DES, which is decrypted, is specially:
1st DES decryption be first by the data ciphertext after n-th des encryption carry out DES decrypt to obtain macAddrkey and
During n-th des encryption operate after operation data, then by during n-th des encryption operate after operation data carry out and n-th
Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during des encryption;2nd DES decryption
It is that the data ciphertext after the N-1 times obtained des encryption first is carried out into DES to decrypt to obtain macAddrkey and the N-1 times DES adds
Operation data after being operated when close, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption
When identical inversion operation or xor operation obtain the data ciphertext after the N-2 times des encryption;By that analogy, until completing N
Secondary DES decryption, n-th DES decryption are that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain
MacAddrkey and gateway configuration file;According to the setting rule of user's sets itself during des encryption, to carry out corresponding solution
Close operation;
So that data ciphertext progress inversion operation, the odd-times DES of previous encryption generation to be added during even-times des encryption
By exemplified by the data ciphertext progress xor operation of previous encryption generation when close:(during N=5, that is, carrying out 5 weight DES decryption), then correspond to
Decryption oprerations be:
1st DES decryption is that the data ciphertext five after the 5th des encryption first is carried out into DES to decrypt to obtain macAddrkey
With operated during the 5th des encryption after operation data four, then operation data four is subjected to xor operation and obtains the 4th des encryption
Data ciphertext four afterwards (is odd number because N is 5, is the process of the 5th des encryption corresponding to the 1st DES decryption, due to the 5th
It is xor operation during secondary des encryption, is then also xor operation during corresponding 1st DES decryption);2nd DES decryption is first will
Data ciphertext four carries out the operation data three after operation when DES decrypts to obtain macAddrkey and the 4th des encryption, then will behaviour
Make the progress inversion operation of data three and obtain the data ciphertext three after the 3rd des encryption;3rd DES decryption is first by data ciphertext
Operation data two when three progress DES decrypt to obtain macAddrkey and the 3rd des encryption after operation, then by operation data two
Carry out xor operation and obtain the data ciphertext two after the 2nd des encryption;The 4th DES decryption is first to carry out data ciphertext two
Operation data one when DES decrypts to obtain macAddrkey and the 2nd des encryption after operation, then operation data one is taken
Inverse operations obtains the data ciphertext one after the 1st des encryption;The 5th DES decryption is that data ciphertext one first is carried out into DES decryption
Obtain the configuration file of macAddrkey and gateway.
Advantages of the present invention is as follows:
Its uniqueness is embodied as macAddrkey after the mac addresses of gateway are carried out into md5 encryption, utilizes N weight des encryptions
The advantages of public key system of algorithm symmetric system and RSA cryptographic algorithms, faster speed and Geng Gao security are realized, gzip's
Compression can more save flow, and special data protection effect can be played on the security solution of low cost.
Explanation:
MAC (Media Access Control or Medium Access Control) address, free translation is media interviews
Control, or be physical address, hardware address, for defining the position of the network equipment.
MD5 is Message-Digest Algorithm 5 (Message-Digest Algorithm 5), for ensuring that information transfer is complete
Unanimously.It is one of widely used hash algorithm of computer (translating digest algorithm, hash algorithm again), main flow programming language is universal
There are MD5 realizations.
MacAddrkey is mac address keys.
The full name Data Encryption Standard of DES algorithms, Chinese name are exactly:Data encryption standards.
RSA public key encryption algorithms are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs
What (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together.In July, 1987 is public in the U.S. first
Cloth, three of them worked in the Massachusetts Institute of Technology at that time practises.RSA is exactly that their three people's surnames beginning letter is stitched together group
Into.
RSAkey is RSA key.
HTTP (HyperText Transfer Protocol, HTTP) is that interconnection web-based applications are the widest
A kind of general procotol.
Base64 is to be most commonly used for transmitting one of coded system of 8Bit bytecodes on network, and Base64 is exactly a kind of
The method of binary data is represented based on 64 printable characters.
Gzip is GNUzip abbreviation, and it is the ZIP of a GNU free software.
Although the foregoing describing the embodiment of the present invention, those familiar with the art should manage
Solution, the specific embodiment described by us are merely exemplary, rather than for the restriction to the scope of the present invention, are familiar with this
The equivalent modification and change that the technical staff in field is made in the spirit according to the present invention, should all cover the present invention's
In scope of the claimed protection.
Claims (8)
- A kind of 1. method of the configuration file ciphered compressed of gateway, it is characterised in that:Comprise the following steps:Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is no less than 2 Integer;Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, ambiguity function generation is added most Whole ciphertext, and be compressed;Step A5, the final ciphertext after compression is sent to server.
- A kind of 2. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A2 Middle N is heavy, and des encryption is specially:1st des encryption is that the configuration file of macAddrkey and gateway is carried out into the corresponding data ciphertext of des encryption generation, This des encryption below be will previous encryption generation data ciphertext obtain after inversion operation or xor operation corresponding to Operation data and macAddrkey carry out data ciphertext corresponding to des encryption generation;The like, add until completing n times DES It is close, generate the data ciphertext of n-th des encryption.
- A kind of 3. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A4 It is middle addition ambiguity function be specially:Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress xor operation, Inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext.
- A kind of 4. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A4 Data ciphertext after middle N weight des encryption with RSAkey is encoded using base64 modes;Compression is to adopt in the step A4 It is compressed with gzip;Final ciphertext after being compressed in the step A5 is to be sent to server by http protocol.
- A kind of 5. method of the configuration file decryption decompression of gateway, it is characterised in that:Comprise the following steps:Step B1, server receives final ciphertext;Step B2, after the final ciphertext received is decompressed, add ambiguity function and operation is decrypted, and decoded Processing, obtain the data ciphertext after N weight des encryptions and the RSAkey after rsa encryption;Step B3, the RSAkey after private key and rsa encryption is subjected to RSA decryption processings, obtains macAddrkey;Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains the configuration of gateway File, N are no less than 2 integer.
- A kind of 6. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step Ambiguity function is added in B2 operation is decrypted to be specially:Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation.
- A kind of 7. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step N weights DES, which is decrypted, in B4 is specially:1st DES decryption is that the data ciphertext after n-th des encryption first is carried out into DES to decrypt to obtain macAddrkey and N Operation data after being operated during secondary des encryption, then the operation data after being operated during n-th des encryption is carried out and n-th DES Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during encryption;2nd DES decryption is first When data ciphertext progress DES after the N-1 times obtained des encryption is decrypted to obtain macAddrkey and the N-1 times des encryption Operation data after operation, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption phase Same inversion operation or xor operation obtains the data ciphertext after the N-2 times des encryption;By that analogy, until completing n-th DES is decrypted, and n-th DES decryption is that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain macAddrkey With the configuration file of gateway.
- A kind of 8. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step Server is to receive final ciphertext by http protocol in B1;Decompression is decompressed using gzip in the step B2; Final ciphertext is decoded using base64 modes in the step B2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711405989.4A CN107846422A (en) | 2017-12-22 | 2017-12-22 | A kind of configuration file ciphered compressed of gateway and the method for decryption decompression |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711405989.4A CN107846422A (en) | 2017-12-22 | 2017-12-22 | A kind of configuration file ciphered compressed of gateway and the method for decryption decompression |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107846422A true CN107846422A (en) | 2018-03-27 |
Family
ID=61684078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711405989.4A Pending CN107846422A (en) | 2017-12-22 | 2017-12-22 | A kind of configuration file ciphered compressed of gateway and the method for decryption decompression |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107846422A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769007A (en) * | 2018-05-28 | 2018-11-06 | 上海顺舟智能科技股份有限公司 | Gateway security authentication method, server and gateway |
CN109670325A (en) * | 2018-12-21 | 2019-04-23 | 北京思源互联科技有限公司 | A kind of devices and methods therefor of configuration file encryption and decryption |
CN111314052A (en) * | 2018-12-12 | 2020-06-19 | 上海领甲数据科技有限公司 | Data encryption and decryption method based on uniformly distributed symmetric compression algorithm |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
CN104539573A (en) * | 2014-10-30 | 2015-04-22 | 北京科技大学 | Communication method and device of industrial security gateway based on embedded system |
CN106250727A (en) * | 2016-08-16 | 2016-12-21 | 深圳市冠旭电子股份有限公司 | A kind of method for protecting software and device |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
CN107070900A (en) * | 2017-03-23 | 2017-08-18 | 西安电子科技大学 | Re-encryption method is can search for based on what is obscured |
-
2017
- 2017-12-22 CN CN201711405989.4A patent/CN107846422A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
CN104539573A (en) * | 2014-10-30 | 2015-04-22 | 北京科技大学 | Communication method and device of industrial security gateway based on embedded system |
CN106250727A (en) * | 2016-08-16 | 2016-12-21 | 深圳市冠旭电子股份有限公司 | A kind of method for protecting software and device |
CN106789004A (en) * | 2016-12-15 | 2017-05-31 | 国云科技股份有限公司 | A kind of network communication method of highly effective and safe |
CN107070900A (en) * | 2017-03-23 | 2017-08-18 | 西安电子科技大学 | Re-encryption method is can search for based on what is obscured |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769007A (en) * | 2018-05-28 | 2018-11-06 | 上海顺舟智能科技股份有限公司 | Gateway security authentication method, server and gateway |
CN111314052A (en) * | 2018-12-12 | 2020-06-19 | 上海领甲数据科技有限公司 | Data encryption and decryption method based on uniformly distributed symmetric compression algorithm |
CN111314052B (en) * | 2018-12-12 | 2023-02-07 | 上海领甲数据科技有限公司 | Data encryption and decryption method |
CN109670325A (en) * | 2018-12-21 | 2019-04-23 | 北京思源互联科技有限公司 | A kind of devices and methods therefor of configuration file encryption and decryption |
CN109670325B (en) * | 2018-12-21 | 2023-03-28 | 北京思源理想控股集团有限公司 | Device and method for encrypting and decrypting configuration file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
D'souza et al. | Advanced encryption standard (AES) security enhancement using hybrid approach | |
CN110313146B (en) | Ambiguity enhancement | |
US7865730B2 (en) | Bcencryption (BCE)—a public-key based method to encrypt a data stream | |
CN104468090B (en) | Character cipher coding method based on image pixel coordinates | |
Schäfer et al. | Security in fixed and wireless networks | |
US20130028419A1 (en) | System and a method for use in a symmetric key cryptographic communications | |
KR100259179B1 (en) | Process of communication cryptograph | |
Abusukhon et al. | A novel network security algorithm based on private key encryption | |
CN108768617A (en) | A kind of holding format encryption method based on legacy packets password | |
CN109450615A (en) | A kind of efficient OPC UA client and server data transfer encryption method | |
Abusukhon et al. | Secure network communication based on text-to-image encryption | |
CN113726725A (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
CN107846422A (en) | A kind of configuration file ciphered compressed of gateway and the method for decryption decompression | |
Joshy et al. | Text to image encryption technique using RGB substitution and AES | |
Kaur et al. | A random selective block encryption technique for secure image cryptography using blowfish algorithm | |
Oleiwi et al. | Overview and Performance Analysis of Encryption Algorithms | |
Ooi et al. | Cryptanalysis of s-des | |
Kumar et al. | A novel framework for secure file transmission using modified AES and MD5 algorithms | |
Kumar et al. | Hybridization of Cryptography for Security of Cloud Data | |
US7539305B2 (en) | Schryption method and device | |
Varun et al. | Implementation of encryption and decryption algorithms for security of mobile devices | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
US20100014670A1 (en) | One-Way Hash Extension for Encrypted Communication | |
Acharya et al. | Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices | |
Hossen et al. | Join Public Key and Private Key for Encrypting Data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180327 |