CN100561546C - Circle scattering migration code-transfer ciphering method - Google Patents
Circle scattering migration code-transfer ciphering method Download PDFInfo
- Publication number
- CN100561546C CN100561546C CNB2008100189696A CN200810018969A CN100561546C CN 100561546 C CN100561546 C CN 100561546C CN B2008100189696 A CNB2008100189696 A CN B2008100189696A CN 200810018969 A CN200810018969 A CN 200810018969A CN 100561546 C CN100561546 C CN 100561546C
- Authority
- CN
- China
- Prior art keywords
- character
- decimal
- password
- carried out
- skew
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The present invention relates to a kind of circle scattering migration code-transfer ciphering method, comprise the steps: (a) transcoding: the original plaintext code characters is carried out ASCII character one by one transform, convert character to decimal to; (b) diffusion: the character to decimal after the password string conversion is carried out multiplying, and multiplier K and each the residing position of original password character constant are linear; (c) skew: the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M; (d) skew again: the individuality to each character to decimal after the skew carries out the mathematics manipulation that constant offset is N again; (e) change character: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.Binding data circle scattering migration of the present invention and transcoding technology adopt twice skew and transcoding, produce the dynamic expansion Crypted password, thereby have the performance of good opposing cipher key attacks, reach protection data information purpose of safety.
Description
Technical field
The present invention relates to software information industry data encryption and decryption technical field.
Background technology
21st century is the informationalized epoch; high speed development and widespread use along with computing machine and data communication technology; society is more and more higher to the degree of dependence of safe storage, safe transmission and the safe handling of information material, and the safeguard protection problem of information just seems more important.Information networking day by day at present, ecommerce, e-finance, technology such as office is with no paper, robotization flourish, the security of thing followed information and confidentiality are paid close attention to day by day, come into one's own more.Along with fast development of computer technology, the ability of decoding is shockingly development also, make confidential technique be faced with stern challenge, traditional encryption method is encrypted (transiposition) method owing to its regularity as replacing encryption (subsititution) or transposition, be easy to be cracked, therefore, need a kind of more reliable encryption method to make some responsive confidential information not have storage or transmission safely on the medium of safeguard procedures urgently.
Summary of the invention
The object of the invention is exactly to provide a kind of to the code characters indefinite length after feasible encryption the in clear-text passwords encryption back for solving the deficiencies in the prior art, thereby is difficult for decoded encryption method.
For solving the problems of the technologies described above technical scheme of the present invention be: a kind of circle scattering migration code-transfer ciphering method is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
Further, between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
Described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
A plurality of original plaintext code characters are carried out cyclic transformation by step (a) to step (d) respectively and are handled.
Owing to adopted above-mentioned technical scheme; advantage of the present invention is: binding data circle scattering migration of the present invention and transcoding technology, adopt twice skew and transcoding, and produce the dynamic expansion Crypted password; thereby the performance with good opposing cipher key attacks reaches protection data information purpose of safety.
Embodiment
Below graphic extension is carried out in circle scattering migration code-transfer ciphering method combination of the present invention, will be provided an embodiment at last and be described in further detail:
If the original plaintext password that needs to encrypt is:
Now above-mentioned original plaintext password is encrypted, step is as follows:
(a), transcoding step: first original plaintext code characters is carried out ASCII character transform, convert character to decimal to and be:
(b), diffusing step: the character to decimal after first original plaintext password conversion is carried out multiplying, multiplier is K, K is the diffusion variable, and it is linear to be somebody's turn to do diffusion variable K and original plaintext code characters residing position constant in the original plaintext password string, and the character after the diffusion becomes:
(c), bias step: at above-mentioned first expressly the character to decimal integral body after character diffusion add (+M), subtract (M) or the processing of delivery (%M), this addend M, subtrahend M or modulus M are called constant offset M at this, and the character after the skew becomes:
(d), the grouping step: after the character to decimal integral body after first original plaintext code characters is carried out transcoding, diffusion, skew with any self-defined grouping character variable as " | ", “ ﹠amp; ", " $ " identify, and is used for grouping;
After first original plaintext password carried out above-mentioned steps conversion; again second original plaintext password changed; so circulation; until the conversion of finishing last original plaintext code characters; it is simpler that this kind cyclic transformation mode one by one can make encryption method implement; certainly the present technique personnel also can realize the mode that enters next step after all original plaintext code characters conversions is again realized that this all should be encompassed in the protection domain of the present invention in each step according to above-mentioned thought.
To after all original plaintext password conversions, the gained character string is as follows through above-mentioned:
Carry out again bias step (e) then: to above-mentioned single character to decimal (individuality) add (+N), subtract (N) or delivery (%N) any processing wherein, this addend N, subtrahend N or modulus N are called constant offset N at this, are transformed to:
At last each above-mentioned individual character to decimal is converted to corresponding ascii character, promptly obtain final Crypted password, Password Length after this encryption method is encrypted is unfixing, all relevant with original password length, side-play amount M, side-play amount N, if with 8 passwords, it is example that M, N are double figures, password total length after the encryption is between 24~32, therefore, be not easy to be cracked through the data after the encryption of this kind method, thereby guaranteed the safety of data information.
Provide a specific embodiment below, with clearer understanding encryption method implementation procedure of the present invention:
The setting original password is: x y z 789
(a), transcoding step: above-mentioned original plaintext password is carried out the ASCII character conversion, and the character to decimal after the conversion is:
120?121?122?55?56?57
(b), diffusing step: multiply each other with multiplier K to above-mentioned character to decimal is whole, and the position constant at multiplier K and original plaintext code characters place is linear, in the present embodiment, multiplying is as follows:
120×1?121×2?122×3?55×4?56×5?57×6,
So the decimal system after obtaining spreading is:
120?242?366?220?280?342
(c), bias step: the decimal system integral body after the above-mentioned diffusion added M, subtracts a kind of computing among M or the delivery M, in the present embodiment, adopt to add (+) computing, and M gets 20 arbitrarily, so the decimal system after being offset is:
140?262?382?240?300?362
(d), grouping step: promptly between every adjacent decimal number, divide into groups with self-defined symbol:
140|262|382|240|300|362
(e), bias step again: each individuality to above-mentioned character to decimal adds N, subtracts a kind of computing among N or the delivery N, in the present embodiment, adopt to add (+) computing, and N gets 72 arbitrarily, so tackle the skew that following data add N:
1?4?0?2?6?2?3?8?2?2?4?0?3?0?0?3?6?2
The decimal system after the skew is:
73?76?72?74?78?74?75?80?74?74?76?72?75?72?72
75?78?74
At last above-mentioned data are carried out the ASIIC transcoding again, promptly obtain final password and be:
I?L?H?J?N?J?K?P?J?J?L?H?K?H?H?K?N?J
The foregoing description only is explanation technical conceive of the present invention and characteristics, and its purpose is to allow the personage who is familiar with this technology can understand content of the present invention and enforcement according to this, can not limit protection scope of the present invention with this.All equivalences that spirit is done according to the present invention change or modify, and all should be encompassed within protection scope of the present invention.
Claims (3)
1, a kind of circle scattering migration code-transfer ciphering method, it is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
2, circle scattering migration code-transfer ciphering method according to claim 1, it is characterized in that: between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
3, circle scattering migration code-transfer ciphering method according to claim 2 is characterized in that: described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2008100189696A CN100561546C (en) | 2008-01-28 | 2008-01-28 | Circle scattering migration code-transfer ciphering method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2008100189696A CN100561546C (en) | 2008-01-28 | 2008-01-28 | Circle scattering migration code-transfer ciphering method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101226705A CN101226705A (en) | 2008-07-23 |
CN100561546C true CN100561546C (en) | 2009-11-18 |
Family
ID=39858676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2008100189696A Expired - Fee Related CN100561546C (en) | 2008-01-28 | 2008-01-28 | Circle scattering migration code-transfer ciphering method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100561546C (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894244B (en) * | 2009-05-20 | 2012-11-21 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN101697116B (en) * | 2009-10-27 | 2011-11-09 | 飞天诚信科技股份有限公司 | Data conversion method and device |
CN102904712B (en) * | 2011-07-25 | 2016-01-06 | 深圳市金溢科技股份有限公司 | Information ciphering method |
CN102571324A (en) * | 2011-12-31 | 2012-07-11 | 深圳市永达电子股份有限公司 | Method for building dynamic nonstandard character library, built character library, and system applying method and character library above |
CN104615954B (en) * | 2014-06-30 | 2018-09-11 | 腾讯科技(深圳)有限公司 | Password storage method and apparatus |
CN104113410B (en) * | 2014-07-04 | 2017-05-17 | 北京思特奇信息技术股份有限公司 | Method and device for data encryption transmission based on multi-table encryption method |
CN105049094B (en) * | 2015-07-16 | 2018-09-28 | 陈飞 | A kind of method and system of the multigroup parameter transcoding transmission of complexity |
CN105141631B (en) * | 2015-09-21 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | The methods, devices and systems that a kind of terminal, server and account safety log in |
CN108234513A (en) * | 2018-01-23 | 2018-06-29 | 马鞍山博望科创生产力促进中心有限公司 | A kind of numerically controlled lathe remote control signal Transmission system |
CN110019075B (en) * | 2018-08-09 | 2021-08-10 | 苏州科达科技股份有限公司 | Log encryption method and device and log decryption method and device |
CN113536287A (en) * | 2021-06-21 | 2021-10-22 | 苏州工业园区服务外包职业学院 | Information checking method, system, computer equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1542628A (en) * | 2003-05-04 | 2004-11-03 | 江南机器(集团)有限公司 | Electronic file characters internal code transformation encryption method |
CN1777089A (en) * | 2005-11-24 | 2006-05-24 | 上海森田科学技术研究所有限公司 | Complex phase shift encrypting and decrypting method |
-
2008
- 2008-01-28 CN CNB2008100189696A patent/CN100561546C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1542628A (en) * | 2003-05-04 | 2004-11-03 | 江南机器(集团)有限公司 | Electronic file characters internal code transformation encryption method |
CN1777089A (en) * | 2005-11-24 | 2006-05-24 | 上海森田科学技术研究所有限公司 | Complex phase shift encrypting and decrypting method |
Non-Patent Citations (1)
Title |
---|
1564512A 2005.01.12 |
Also Published As
Publication number | Publication date |
---|---|
CN101226705A (en) | 2008-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100561546C (en) | Circle scattering migration code-transfer ciphering method | |
CN108090329A (en) | A kind of method and device that digital watermarking encipherment protection is carried out to content of text | |
Debnath et al. | Brief review on journey of secured hash algorithms | |
Khan et al. | A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI | |
Aung et al. | A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher) | |
US20140208102A1 (en) | Method of protecting digital information | |
CN100546239C (en) | The application cryptogram diagram technology carries out method of encrypting to data | |
Chen et al. | Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain | |
Mittal et al. | PData security using RSA encryption combined with image steganography | |
Rangaswamaiah et al. | Multilevel data concealing technique using steganography and visual cryptography | |
CN115765963A (en) | Text image audit information recording and extracting method based on reversible steganography of ciphertext domain | |
Siahaan et al. | Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security | |
CN115170380A (en) | Image layered scrambling encryption method based on chaotic mapping | |
Lavanya et al. | An Encryption Algorithm Functioning on ASCII Values and Random Number Generation | |
Sangwan | Combining Huffman text compression with new double encryption algorithm | |
Mushtaq et al. | New cryptographic algorithm using ASCII values and gray code (AGC) | |
Asbeh et al. | AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices | |
CN109327478A (en) | A kind of chaos physical layer secrecy cut-in method | |
Pawar et al. | Survey of cryptography techniques for data security | |
Ekka et al. | Enrichment of security using hybrid algorithm | |
Gola et al. | Circular Queue Based Data Encryption Algorithm Using 512 Random Bits. | |
Arshad et al. | Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality. | |
Hiwarekar | Encryption-decryption using laplace transforms | |
Curley | Cryptography: Cracking Codes | |
Dhingra et al. | An improved version of playfair technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20091118 Termination date: 20170128 |
|
CF01 | Termination of patent right due to non-payment of annual fee |