CN107846422A - A kind of configuration file ciphered compressed of gateway and the method for decryption decompression - Google Patents

A kind of configuration file ciphered compressed of gateway and the method for decryption decompression Download PDF

Info

Publication number
CN107846422A
CN107846422A CN201711405989.4A CN201711405989A CN107846422A CN 107846422 A CN107846422 A CN 107846422A CN 201711405989 A CN201711405989 A CN 201711405989A CN 107846422 A CN107846422 A CN 107846422A
Authority
CN
China
Prior art keywords
des
encryption
ciphertext
gateway
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711405989.4A
Other languages
Chinese (zh)
Inventor
黄永
陈乃康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Star Network Intelligent Software Co Ltd
Original Assignee
Fujian Star Network Intelligent Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Star Network Intelligent Software Co Ltd filed Critical Fujian Star Network Intelligent Software Co Ltd
Priority to CN201711405989.4A priority Critical patent/CN107846422A/en
Publication of CN107846422A publication Critical patent/CN107846422A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The present invention provides a kind of method of the configuration file ciphered compressed of gateway, including:Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is no less than 2 integer;Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, add ambiguity function and generate final ciphertext, and be compressed;Step A5, the final ciphertext after compression is sent to server.The method that the present invention also provides a kind of configuration file decryption decompression of gateway, can be achieved security of the encryption with faster speed and Geng Gao.

Description

A kind of configuration file ciphered compressed of gateway and the method for decryption decompression
Technical field
The present invention relates to technical field of network equipment, more particularly to a kind of configuration file ciphered compressed of gateway and decryption to solve The method of compression.
Background technology
Internet era, network security also annoyings us in real time while network offers convenience to us, this at present Insecurity is internet existence foundation --- ICP/IP protocol it is intrinsic, and router is as the important terminal for accessing network Equipment, the configuration to router is encrypted and compression is even more important.The effect of encryption configuration is exactly to prevent configuration upper The associative operations such as ITMS platforms are transmitted to cause the relevant information of route intercepted and steal.
For example for, there is the password of wireless account in configuration, if password is sent in clear text manner ITMS servers, and the eavesdropping on network is an extremely easy thing, then consequence will be very serious.In order to avoid this A little problems, best solution are exactly to be encrypted and compress to configuration file, even if obtained by a hacker is also to have no idea It is read out.
Common encryption method has much in linux system, and such as MD5, RSA, DES, AES etc., these are individually encrypted Algorithm has the difference of respective advantage and disadvantage, mainly DSE arithmetic and asymmetric cryptosystem.From the aspects of key, It is different to change key complexity, symmetric cryptography is more difficult, and asymmetric cryptography is easier to;For processing speed, symmetry algorithm is than non- Symmetry algorithm is faster;For signature angle, asymmetric cryptography is easily realized compared with symmetric cryptography.Existing enciphering and deciphering algorithm is all Individually use MD5, RSA, DES, one kind in AES is handled, it is possible to exist change key is easy, processing speed slowly, The easily drawback such as signature.
The content of the invention
One of the technical problem to be solved in the present invention, it is a kind of method of configuration file ciphered compressed that gateway is provided, Using being combined after md5 encryption key and N weight DES optimization symmetric cryptography combinations with the RSA cryptographic algorithms in public key system, proposition is a kind of Brand-new AES, the key after the mac addresses progress md5 encryption of gateway as N weights DES encrypt optimization, N weights DES and RSA Combine and compress and upload onto the server;This new algorithm can realize security of the encryption with faster speed and Geng Gao, so Afterwards in the interaction of client and service end, compressed using gzip, save flow.
One of the problem of of the invention, it is realized in:A kind of method of the configuration file ciphered compressed of gateway, including such as Lower step:
Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;
Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is not small In 2 integer;
Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;
Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, ambiguity function life is added Into final ciphertext, and it is compressed;
Step A5, the final ciphertext after compression is sent to server.
Further, N weights des encryption is specially in the step A2:
1st des encryption is that macAddrkey data corresponding with the configuration file progress des encryption generation of gateway are close Text, this des encryption below are obtain after inversion operation or xor operation pair by the data ciphertext of previous encryption generation The operation data and macAddrkey answered carry out data ciphertext corresponding to des encryption generation;The like, until completing n times DES Encryption, generate the data ciphertext of n-th des encryption.
Further, ambiguity function is added in the step A4 is specially:
Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext.
Further, the data ciphertext in the step A4 after N weights des encryption with RSAkey is entered using base64 modes Row coding;Compression is compressed using gzip in the step A4;Final ciphertext after being compressed in the step A5 is to pass through Http protocol is sent to server.
The second technical problem to be solved by the present invention, it is the side of configuration file decryption decompression that a kind of gateway is provided Method, N weight DES decryption and the combination of RSA decipherment algorithms propose a kind of brand-new decipherment algorithm, and this new algorithm can realize decryption tool There are faster speed and Geng Gao security, then in the interaction of client and service end, using gzip decompression, section About flow.
The two of the problem of of the invention, are realized in:A kind of method of the configuration file decryption decompression of gateway, including Following steps:
Step B1, server receives final ciphertext;
Step B2, after the final ciphertext received is decompressed, add ambiguity function and operation is decrypted, and carry out Decoding process, obtain the data ciphertext after N weight des encryptions and the RSAkey after rsa encryption;
Step B3, the RSAkey after private key and rsa encryption is subjected to RSA decryption processings, obtains macAddrkey;
Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains gateway Configuration file, N are no less than 2 integer.
Further, ambiguity function is added in the step B 2 operation is decrypted to be specially:
Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR Operation, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation.
Further, the DES decryption of N weights is specially in the step B4:
1st DES decryption be first by the data ciphertext after n-th des encryption carry out DES decrypt to obtain macAddrkey and During n-th des encryption operate after operation data, then by during n-th des encryption operate after operation data carry out and n-th Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during des encryption;2nd DES decryption It is that the data ciphertext after the N-1 times obtained des encryption first is carried out into DES to decrypt to obtain macAddrkey and the N-1 times DES adds Operation data after being operated when close, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption When identical inversion operation or xor operation obtain the data ciphertext after the N-2 times des encryption;By that analogy, until completing N Secondary DES decryption, n-th DES decryption are that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain MacAddrkey and gateway configuration file.
Further, server is to receive final ciphertext by http protocol in the step B1;Decompressed in the step B2 Contracting is decompressed using gzip;Final ciphertext is decoded using base64 modes in the step B2.
The advantage of the invention is that:It is unique using its is embodied as macAddrkey after the mac addresses progress md5 encryption of gateway Property, the advantages of using the public key system of N weight des encryption algorithm symmetric systems and RSA cryptographic algorithms, realize faster speed and more High security, gzip compression can more save flow, and special data can be played on the security solution of low cost Protect effect.
Brief description of the drawings
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is a kind of method execution flow chart of the configuration file ciphered compressed of gateway of the present invention.
Fig. 2 is a kind of method execution flow chart of the configuration file decryption decompression of gateway of the present invention.
Embodiment
To cause the present invention to become apparent, now with a preferred embodiment, and accompanying drawing is coordinated to be described in detail below.
As shown in figure 1, a kind of method of the configuration file ciphered compressed of gateway of the present invention, comprises the following steps:
Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;
Such as:The mac addresses of gateway are character string 22:33:11:22:85:45, it is encrypted according to MD5, is changed successively For 16 small letters:Capitalize 2171a1e4ff144787 → 16:2171A1E4FF144787 → 32 small letter: Capitalize 427238ee2171a1e4ff144787e4c022cb → 32:427238EE2171A1E4FF144787E4C022CB, 64 capitalization are calculated as by 32 × 2:
64427238EE2171A1E4FF144787E4C022CB427238EE2171A1E4FF1447 87E4C022CB, take Keys of the unique macAddrkey of preceding 56 generations as des encryption, latter 8 for verification with;
Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is not small In 2 integer;N is heavy, and des encryption is specially:
1st des encryption is that macAddrkey data corresponding with the configuration file progress des encryption generation of gateway are close Text, this des encryption below are obtain after inversion operation or xor operation pair by the data ciphertext of previous encryption generation The operation data and macAddrkey answered carry out data ciphertext corresponding to des encryption generation;The like, until completing n times DES Encryption, generate the data ciphertext of n-th des encryption;The data ciphertext for generating previous encryption during even-times des encryption is set Data ciphertext when carrying out inversion operation, odd-times des encryption by previous encryption generation carries out xor operation, or sets the Add when the data ciphertext of previous encryption generation being carried out into xor operation, odd-times des encryption during even-times des encryption by previous It is dense into data ciphertext carry out inversion operation, or even-times is set or given birth to previous encryption during odd-times des encryption Into data ciphertext carry out inversion operation, or set and generate previous encryption when even-times or odd-times des encryption Data ciphertext carry out xor operation, rule is set by user's sets itself;
So that data ciphertext progress inversion operation, the odd-times DES of previous encryption generation to be added during even-times des encryption By exemplified by the data ciphertext progress xor operation of previous encryption generation when close:(during N=5, that is, carrying out 5 heavy des encryptions)
1st des encryption is that the configuration file of macAddrkey and gateway is carried out into des encryption generation data ciphertext one, 2nd des encryption is to obtain operation data one with after the inversion operation of data ciphertext one after first time encryption, by operation data one Des encryption generation data ciphertext two is carried out with macAddrkey, the 3rd des encryption is with the data ciphertext two after the 2nd encryption Operation data two is obtained after xor operation, operation data two and macAddrkey are subjected to des encryption generation data ciphertext three, the 4 des encryptions are to obtain operation data three with after the inversion operation of data ciphertext three after the 3rd encryption, by the He of operation data three MacAddrkey carries out des encryption generation data ciphertext four, and the 5th des encryption is that the data ciphertext four after being encrypted with the 4th is different Or operation data four is obtained after operation, operation data four and macAddrkey are subjected to des encryption generation data ciphertext five;Data Ciphertext five is the data ciphertext after 5 weight des encryptions.
Step A3, macAddrkey with public key (Publickey) obtain after RSA public key encryptions calculate secret processing RSAkey;
Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment using base64 modes with RSAkey, Add ambiguity function and generate final ciphertext, and be compressed using gzip;Adding ambiguity function is specially:
Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext;
Such as:Character string adcdeefefefwwuuuffffeeeewwwwwggggg, 1-5 positions:Adcde negates behaviour Make, 6-15 positions:Efefefwwuu does xor operation, 16-20 positions:Uffff does inversion operation, 21-30 positions: Eeeewwwwwg does xor operation, 31-34 positions:Gggg does not do any operation;
Step A5, the final ciphertext after compression is sent to server by http protocol.
As shown in Fig. 2 a kind of method of the configuration file decryption decompression of gateway of the present invention, comprises the following steps:
Step B1, server receives final ciphertext by http protocol;
Step B2, after the final ciphertext received is decompressed using gzip, add ambiguity function and behaviour is decrypted Make, and decoding process is carried out using base64 modes, after obtaining data ciphertext and rsa encryption after N weight des encryptions RSAkey;Addition ambiguity function is decrypted operation and is specially:
Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR Operation, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;
Such as:Former character string adcdeefefefwwuuuffffeeeewwwwwggggg is added after ambiguity function what is obtained New character strings are operated again, and 1-5 does position inversion operation, and 6-15 does position xor operation, and 16-20 positions negate behaviour Make, 21-30 does position xor operation, is finally reduced into former character string adcdeefefefwwuuuffffeeeewwwwwggggg;
Step B3, the RSAkey after private key (Privatekey) and rsa encryption is subjected to RSA decryption processings, obtained macAddrkey;
Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains gateway Configuration file, N are no less than 2 integer;N weights DES, which is decrypted, is specially:
1st DES decryption be first by the data ciphertext after n-th des encryption carry out DES decrypt to obtain macAddrkey and During n-th des encryption operate after operation data, then by during n-th des encryption operate after operation data carry out and n-th Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during des encryption;2nd DES decryption It is that the data ciphertext after the N-1 times obtained des encryption first is carried out into DES to decrypt to obtain macAddrkey and the N-1 times DES adds Operation data after being operated when close, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption When identical inversion operation or xor operation obtain the data ciphertext after the N-2 times des encryption;By that analogy, until completing N Secondary DES decryption, n-th DES decryption are that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain MacAddrkey and gateway configuration file;According to the setting rule of user's sets itself during des encryption, to carry out corresponding solution Close operation;
So that data ciphertext progress inversion operation, the odd-times DES of previous encryption generation to be added during even-times des encryption By exemplified by the data ciphertext progress xor operation of previous encryption generation when close:(during N=5, that is, carrying out 5 weight DES decryption), then correspond to Decryption oprerations be:
1st DES decryption is that the data ciphertext five after the 5th des encryption first is carried out into DES to decrypt to obtain macAddrkey With operated during the 5th des encryption after operation data four, then operation data four is subjected to xor operation and obtains the 4th des encryption Data ciphertext four afterwards (is odd number because N is 5, is the process of the 5th des encryption corresponding to the 1st DES decryption, due to the 5th It is xor operation during secondary des encryption, is then also xor operation during corresponding 1st DES decryption);2nd DES decryption is first will Data ciphertext four carries out the operation data three after operation when DES decrypts to obtain macAddrkey and the 4th des encryption, then will behaviour Make the progress inversion operation of data three and obtain the data ciphertext three after the 3rd des encryption;3rd DES decryption is first by data ciphertext Operation data two when three progress DES decrypt to obtain macAddrkey and the 3rd des encryption after operation, then by operation data two Carry out xor operation and obtain the data ciphertext two after the 2nd des encryption;The 4th DES decryption is first to carry out data ciphertext two Operation data one when DES decrypts to obtain macAddrkey and the 2nd des encryption after operation, then operation data one is taken Inverse operations obtains the data ciphertext one after the 1st des encryption;The 5th DES decryption is that data ciphertext one first is carried out into DES decryption Obtain the configuration file of macAddrkey and gateway.
Advantages of the present invention is as follows:
Its uniqueness is embodied as macAddrkey after the mac addresses of gateway are carried out into md5 encryption, utilizes N weight des encryptions The advantages of public key system of algorithm symmetric system and RSA cryptographic algorithms, faster speed and Geng Gao security are realized, gzip's Compression can more save flow, and special data protection effect can be played on the security solution of low cost.
Explanation:
MAC (Media Access Control or Medium Access Control) address, free translation is media interviews Control, or be physical address, hardware address, for defining the position of the network equipment.
MD5 is Message-Digest Algorithm 5 (Message-Digest Algorithm 5), for ensuring that information transfer is complete Unanimously.It is one of widely used hash algorithm of computer (translating digest algorithm, hash algorithm again), main flow programming language is universal There are MD5 realizations.
MacAddrkey is mac address keys.
The full name Data Encryption Standard of DES algorithms, Chinese name are exactly:Data encryption standards.
RSA public key encryption algorithms are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs What (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together.In July, 1987 is public in the U.S. first Cloth, three of them worked in the Massachusetts Institute of Technology at that time practises.RSA is exactly that their three people's surnames beginning letter is stitched together group Into.
RSAkey is RSA key.
HTTP (HyperText Transfer Protocol, HTTP) is that interconnection web-based applications are the widest A kind of general procotol.
Base64 is to be most commonly used for transmitting one of coded system of 8Bit bytecodes on network, and Base64 is exactly a kind of The method of binary data is represented based on 64 printable characters.
Gzip is GNUzip abbreviation, and it is the ZIP of a GNU free software.
Although the foregoing describing the embodiment of the present invention, those familiar with the art should manage Solution, the specific embodiment described by us are merely exemplary, rather than for the restriction to the scope of the present invention, are familiar with this The equivalent modification and change that the technical staff in field is made in the spirit according to the present invention, should all cover the present invention's In scope of the claimed protection.

Claims (8)

  1. A kind of 1. method of the configuration file ciphered compressed of gateway, it is characterised in that:Comprise the following steps:
    Step A1, the mac addresses of gateway are subjected to md5 encryption, generate unique macAddrkey;
    Step A2, the configuration file of the macAddrkey and gateway carries out N weight des encryptions and obtains data ciphertext, and N is no less than 2 Integer;
    Step A3, macAddrkey and public key are carried out obtaining RSAkey after RSA public key encryptions calculate secret processing;
    Step A4, after the data ciphertext after N weight des encryptions being carried out into coded treatment with RSAkey, ambiguity function generation is added most Whole ciphertext, and be compressed;
    Step A5, the final ciphertext after compression is sent to server.
  2. A kind of 2. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A2 Middle N is heavy, and des encryption is specially:
    1st des encryption is that the configuration file of macAddrkey and gateway is carried out into the corresponding data ciphertext of des encryption generation, This des encryption below be will previous encryption generation data ciphertext obtain after inversion operation or xor operation corresponding to Operation data and macAddrkey carry out data ciphertext corresponding to des encryption generation;The like, add until completing n times DES It is close, generate the data ciphertext of n-th des encryption.
  3. A kind of 3. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A4 It is middle addition ambiguity function be specially:
    Data ciphertext after coding is from left to right operated, every 5 progress inversion operation, every 10 progress xor operation, Inversion operation and xor operation poll successively, end is less than 5 or 10 without operation;Generate final ciphertext.
  4. A kind of 4. method of the configuration file ciphered compressed of gateway as claimed in claim 1, it is characterised in that:The step A4 Data ciphertext after middle N weight des encryption with RSAkey is encoded using base64 modes;Compression is to adopt in the step A4 It is compressed with gzip;Final ciphertext after being compressed in the step A5 is to be sent to server by http protocol.
  5. A kind of 5. method of the configuration file decryption decompression of gateway, it is characterised in that:Comprise the following steps:
    Step B1, server receives final ciphertext;
    Step B2, after the final ciphertext received is decompressed, add ambiguity function and operation is decrypted, and decoded Processing, obtain the data ciphertext after N weight des encryptions and the RSAkey after rsa encryption;
    Step B3, the RSAkey after private key and rsa encryption is subjected to RSA decryption processings, obtains macAddrkey;
    Step B4, the data ciphertext after macAddrkey and N weight des encryptions is subjected to N weight DES decryption, obtains the configuration of gateway File, N are no less than 2 integer.
  6. A kind of 6. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step Ambiguity function is added in B2 operation is decrypted to be specially:
    Final ciphertext after decompression is from left to right operated, every 5 progress inversion operation, every 10 progress XOR behaviour Make, inversion operation and xor operation poll successively, end is less than 5 or 10 without operation.
  7. A kind of 7. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step N weights DES, which is decrypted, in B4 is specially:
    1st DES decryption is that the data ciphertext after n-th des encryption first is carried out into DES to decrypt to obtain macAddrkey and N Operation data after being operated during secondary des encryption, then the operation data after being operated during n-th des encryption is carried out and n-th DES Identical inversion operation or xor operation obtain the data ciphertext after the N-1 times des encryption during encryption;2nd DES decryption is first When data ciphertext progress DES after the N-1 times obtained des encryption is decrypted to obtain macAddrkey and the N-1 times des encryption Operation data after operation, then the operation data after being operated during the N-1 times des encryption is carried out and the N-1 times des encryption phase Same inversion operation or xor operation obtains the data ciphertext after the N-2 times des encryption;By that analogy, until completing n-th DES is decrypted, and n-th DES decryption is that the data ciphertext after the 1st des encryption directly is carried out into DES to decrypt to obtain macAddrkey With the configuration file of gateway.
  8. A kind of 8. method of the configuration file decryption decompression of gateway as claimed in claim 5, it is characterised in that:The step Server is to receive final ciphertext by http protocol in B1;Decompression is decompressed using gzip in the step B2; Final ciphertext is decoded using base64 modes in the step B2.
CN201711405989.4A 2017-12-22 2017-12-22 A kind of configuration file ciphered compressed of gateway and the method for decryption decompression Pending CN107846422A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711405989.4A CN107846422A (en) 2017-12-22 2017-12-22 A kind of configuration file ciphered compressed of gateway and the method for decryption decompression

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711405989.4A CN107846422A (en) 2017-12-22 2017-12-22 A kind of configuration file ciphered compressed of gateway and the method for decryption decompression

Publications (1)

Publication Number Publication Date
CN107846422A true CN107846422A (en) 2018-03-27

Family

ID=61684078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711405989.4A Pending CN107846422A (en) 2017-12-22 2017-12-22 A kind of configuration file ciphered compressed of gateway and the method for decryption decompression

Country Status (1)

Country Link
CN (1) CN107846422A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769007A (en) * 2018-05-28 2018-11-06 上海顺舟智能科技股份有限公司 Gateway security authentication method, server and gateway
CN109670325A (en) * 2018-12-21 2019-04-23 北京思源互联科技有限公司 A kind of devices and methods therefor of configuration file encryption and decryption
CN111314052A (en) * 2018-12-12 2020-06-19 上海领甲数据科技有限公司 Data encryption and decryption method based on uniformly distributed symmetric compression algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding
CN104539573A (en) * 2014-10-30 2015-04-22 北京科技大学 Communication method and device of industrial security gateway based on embedded system
CN106250727A (en) * 2016-08-16 2016-12-21 深圳市冠旭电子股份有限公司 A kind of method for protecting software and device
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe
CN107070900A (en) * 2017-03-23 2017-08-18 西安电子科技大学 Re-encryption method is can search for based on what is obscured

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904717A (en) * 2012-10-13 2013-01-30 华南理工大学 Chaos synchronization encrypting/decrypting method and device using data compression encoding
CN104539573A (en) * 2014-10-30 2015-04-22 北京科技大学 Communication method and device of industrial security gateway based on embedded system
CN106250727A (en) * 2016-08-16 2016-12-21 深圳市冠旭电子股份有限公司 A kind of method for protecting software and device
CN106789004A (en) * 2016-12-15 2017-05-31 国云科技股份有限公司 A kind of network communication method of highly effective and safe
CN107070900A (en) * 2017-03-23 2017-08-18 西安电子科技大学 Re-encryption method is can search for based on what is obscured

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769007A (en) * 2018-05-28 2018-11-06 上海顺舟智能科技股份有限公司 Gateway security authentication method, server and gateway
CN111314052A (en) * 2018-12-12 2020-06-19 上海领甲数据科技有限公司 Data encryption and decryption method based on uniformly distributed symmetric compression algorithm
CN111314052B (en) * 2018-12-12 2023-02-07 上海领甲数据科技有限公司 Data encryption and decryption method
CN109670325A (en) * 2018-12-21 2019-04-23 北京思源互联科技有限公司 A kind of devices and methods therefor of configuration file encryption and decryption
CN109670325B (en) * 2018-12-21 2023-03-28 北京思源理想控股集团有限公司 Device and method for encrypting and decrypting configuration file

Similar Documents

Publication Publication Date Title
D'souza et al. Advanced encryption standard (AES) security enhancement using hybrid approach
CN110313146B (en) Ambiguity enhancement
US7865730B2 (en) Bcencryption (BCE)—a public-key based method to encrypt a data stream
CN104468090B (en) Character cipher coding method based on image pixel coordinates
Schäfer et al. Security in fixed and wireless networks
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
KR100259179B1 (en) Process of communication cryptograph
Abusukhon et al. A novel network security algorithm based on private key encryption
CN108768617A (en) A kind of holding format encryption method based on legacy packets password
CN109450615A (en) A kind of efficient OPC UA client and server data transfer encryption method
Abusukhon et al. Secure network communication based on text-to-image encryption
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN107846422A (en) A kind of configuration file ciphered compressed of gateway and the method for decryption decompression
Joshy et al. Text to image encryption technique using RGB substitution and AES
Kaur et al. A random selective block encryption technique for secure image cryptography using blowfish algorithm
Oleiwi et al. Overview and Performance Analysis of Encryption Algorithms
Ooi et al. Cryptanalysis of s-des
Kumar et al. A novel framework for secure file transmission using modified AES and MD5 algorithms
Kumar et al. Hybridization of Cryptography for Security of Cloud Data
US7539305B2 (en) Schryption method and device
Varun et al. Implementation of encryption and decryption algorithms for security of mobile devices
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
US20100014670A1 (en) One-Way Hash Extension for Encrypted Communication
Acharya et al. Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices
Hossen et al. Join Public Key and Private Key for Encrypting Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180327