CN100561546C - Circle scattering migration code-transfer ciphering method - Google Patents

Circle scattering migration code-transfer ciphering method Download PDF

Info

Publication number
CN100561546C
CN100561546C CNB2008100189696A CN200810018969A CN100561546C CN 100561546 C CN100561546 C CN 100561546C CN B2008100189696 A CNB2008100189696 A CN B2008100189696A CN 200810018969 A CN200810018969 A CN 200810018969A CN 100561546 C CN100561546 C CN 100561546C
Authority
CN
China
Prior art keywords
character
decimal
password
carried out
skew
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2008100189696A
Other languages
Chinese (zh)
Other versions
CN101226705A (en
Inventor
李华伟
吴晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hejian Technology Suzhou Co Ltd
Original Assignee
Hejian Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hejian Technology Suzhou Co Ltd filed Critical Hejian Technology Suzhou Co Ltd
Priority to CNB2008100189696A priority Critical patent/CN100561546C/en
Publication of CN101226705A publication Critical patent/CN101226705A/en
Application granted granted Critical
Publication of CN100561546C publication Critical patent/CN100561546C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of circle scattering migration code-transfer ciphering method, comprise the steps: (a) transcoding: the original plaintext code characters is carried out ASCII character one by one transform, convert character to decimal to; (b) diffusion: the character to decimal after the password string conversion is carried out multiplying, and multiplier K and each the residing position of original password character constant are linear; (c) skew: the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M; (d) skew again: the individuality to each character to decimal after the skew carries out the mathematics manipulation that constant offset is N again; (e) change character: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.Binding data circle scattering migration of the present invention and transcoding technology adopt twice skew and transcoding, produce the dynamic expansion Crypted password, thereby have the performance of good opposing cipher key attacks, reach protection data information purpose of safety.

Description

Circle scattering migration code-transfer ciphering method
Technical field
The present invention relates to software information industry data encryption and decryption technical field.
Background technology
21st century is the informationalized epoch; high speed development and widespread use along with computing machine and data communication technology; society is more and more higher to the degree of dependence of safe storage, safe transmission and the safe handling of information material, and the safeguard protection problem of information just seems more important.Information networking day by day at present, ecommerce, e-finance, technology such as office is with no paper, robotization flourish, the security of thing followed information and confidentiality are paid close attention to day by day, come into one's own more.Along with fast development of computer technology, the ability of decoding is shockingly development also, make confidential technique be faced with stern challenge, traditional encryption method is encrypted (transiposition) method owing to its regularity as replacing encryption (subsititution) or transposition, be easy to be cracked, therefore, need a kind of more reliable encryption method to make some responsive confidential information not have storage or transmission safely on the medium of safeguard procedures urgently.
Summary of the invention
The object of the invention is exactly to provide a kind of to the code characters indefinite length after feasible encryption the in clear-text passwords encryption back for solving the deficiencies in the prior art, thereby is difficult for decoded encryption method.
For solving the problems of the technologies described above technical scheme of the present invention be: a kind of circle scattering migration code-transfer ciphering method is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
Further, between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
Described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
A plurality of original plaintext code characters are carried out cyclic transformation by step (a) to step (d) respectively and are handled.
Owing to adopted above-mentioned technical scheme; advantage of the present invention is: binding data circle scattering migration of the present invention and transcoding technology, adopt twice skew and transcoding, and produce the dynamic expansion Crypted password; thereby the performance with good opposing cipher key attacks reaches protection data information purpose of safety.
Embodiment
Below graphic extension is carried out in circle scattering migration code-transfer ciphering method combination of the present invention, will be provided an embodiment at last and be described in further detail:
If the original plaintext password that needs to encrypt is:
Figure C20081001896900041
Now above-mentioned original plaintext password is encrypted, step is as follows:
(a), transcoding step: first original plaintext code characters is carried out ASCII character transform, convert character to decimal to and be:
Figure C20081001896900042
(b), diffusing step: the character to decimal after first original plaintext password conversion is carried out multiplying, multiplier is K, K is the diffusion variable, and it is linear to be somebody's turn to do diffusion variable K and original plaintext code characters residing position constant in the original plaintext password string, and the character after the diffusion becomes:
Figure C20081001896900043
(c), bias step: at above-mentioned first expressly the character to decimal integral body after character diffusion add (+M), subtract (M) or the processing of delivery (%M), this addend M, subtrahend M or modulus M are called constant offset M at this, and the character after the skew becomes:
Figure C20081001896900044
(d), the grouping step: after the character to decimal integral body after first original plaintext code characters is carried out transcoding, diffusion, skew with any self-defined grouping character variable as " | ", “ ﹠amp; ", " $ " identify, and is used for grouping;
After first original plaintext password carried out above-mentioned steps conversion; again second original plaintext password changed; so circulation; until the conversion of finishing last original plaintext code characters; it is simpler that this kind cyclic transformation mode one by one can make encryption method implement; certainly the present technique personnel also can realize the mode that enters next step after all original plaintext code characters conversions is again realized that this all should be encompassed in the protection domain of the present invention in each step according to above-mentioned thought.
To after all original plaintext password conversions, the gained character string is as follows through above-mentioned:
Figure C20081001896900051
Carry out again bias step (e) then: to above-mentioned single character to decimal (individuality) add (+N), subtract (N) or delivery (%N) any processing wherein, this addend N, subtrahend N or modulus N are called constant offset N at this, are transformed to:
Figure C20081001896900052
At last each above-mentioned individual character to decimal is converted to corresponding ascii character, promptly obtain final Crypted password, Password Length after this encryption method is encrypted is unfixing, all relevant with original password length, side-play amount M, side-play amount N, if with 8 passwords, it is example that M, N are double figures, password total length after the encryption is between 24~32, therefore, be not easy to be cracked through the data after the encryption of this kind method, thereby guaranteed the safety of data information.
Provide a specific embodiment below, with clearer understanding encryption method implementation procedure of the present invention:
The setting original password is: x y z 789
(a), transcoding step: above-mentioned original plaintext password is carried out the ASCII character conversion, and the character to decimal after the conversion is:
120?121?122?55?56?57
(b), diffusing step: multiply each other with multiplier K to above-mentioned character to decimal is whole, and the position constant at multiplier K and original plaintext code characters place is linear, in the present embodiment, multiplying is as follows:
120×1?121×2?122×3?55×4?56×5?57×6,
So the decimal system after obtaining spreading is:
120?242?366?220?280?342
(c), bias step: the decimal system integral body after the above-mentioned diffusion added M, subtracts a kind of computing among M or the delivery M, in the present embodiment, adopt to add (+) computing, and M gets 20 arbitrarily, so the decimal system after being offset is:
140?262?382?240?300?362
(d), grouping step: promptly between every adjacent decimal number, divide into groups with self-defined symbol:
140|262|382|240|300|362
(e), bias step again: each individuality to above-mentioned character to decimal adds N, subtracts a kind of computing among N or the delivery N, in the present embodiment, adopt to add (+) computing, and N gets 72 arbitrarily, so tackle the skew that following data add N:
1?4?0?2?6?2?3?8?2?2?4?0?3?0?0?3?6?2
The decimal system after the skew is:
73?76?72?74?78?74?75?80?74?74?76?72?75?72?72
75?78?74
At last above-mentioned data are carried out the ASIIC transcoding again, promptly obtain final password and be:
I?L?H?J?N?J?K?P?J?J?L?H?K?H?H?K?N?J
The foregoing description only is explanation technical conceive of the present invention and characteristics, and its purpose is to allow the personage who is familiar with this technology can understand content of the present invention and enforcement according to this, can not limit protection scope of the present invention with this.All equivalences that spirit is done according to the present invention change or modify, and all should be encompassed within protection scope of the present invention.

Claims (3)

1, a kind of circle scattering migration code-transfer ciphering method, it is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
2, circle scattering migration code-transfer ciphering method according to claim 1, it is characterized in that: between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
3, circle scattering migration code-transfer ciphering method according to claim 2 is characterized in that: described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
CNB2008100189696A 2008-01-28 2008-01-28 Circle scattering migration code-transfer ciphering method Expired - Fee Related CN100561546C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2008100189696A CN100561546C (en) 2008-01-28 2008-01-28 Circle scattering migration code-transfer ciphering method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2008100189696A CN100561546C (en) 2008-01-28 2008-01-28 Circle scattering migration code-transfer ciphering method

Publications (2)

Publication Number Publication Date
CN101226705A CN101226705A (en) 2008-07-23
CN100561546C true CN100561546C (en) 2009-11-18

Family

ID=39858676

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2008100189696A Expired - Fee Related CN100561546C (en) 2008-01-28 2008-01-28 Circle scattering migration code-transfer ciphering method

Country Status (1)

Country Link
CN (1) CN100561546C (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894244B (en) * 2009-05-20 2012-11-21 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN101697116B (en) * 2009-10-27 2011-11-09 飞天诚信科技股份有限公司 Data conversion method and device
CN102904712B (en) * 2011-07-25 2016-01-06 深圳市金溢科技股份有限公司 Information ciphering method
CN102571324A (en) * 2011-12-31 2012-07-11 深圳市永达电子股份有限公司 Method for building dynamic nonstandard character library, built character library, and system applying method and character library above
CN104615954B (en) * 2014-06-30 2018-09-11 腾讯科技(深圳)有限公司 Password storage method and apparatus
CN104113410B (en) * 2014-07-04 2017-05-17 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN105049094B (en) * 2015-07-16 2018-09-28 陈飞 A kind of method and system of the multigroup parameter transcoding transmission of complexity
CN105141631B (en) * 2015-09-21 2019-06-11 宇龙计算机通信科技(深圳)有限公司 The methods, devices and systems that a kind of terminal, server and account safety log in
CN108234513A (en) * 2018-01-23 2018-06-29 马鞍山博望科创生产力促进中心有限公司 A kind of numerically controlled lathe remote control signal Transmission system
CN110019075B (en) * 2018-08-09 2021-08-10 苏州科达科技股份有限公司 Log encryption method and device and log decryption method and device
CN113536287A (en) * 2021-06-21 2021-10-22 苏州工业园区服务外包职业学院 Information checking method, system, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN1777089A (en) * 2005-11-24 2006-05-24 上海森田科学技术研究所有限公司 Complex phase shift encrypting and decrypting method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN1777089A (en) * 2005-11-24 2006-05-24 上海森田科学技术研究所有限公司 Complex phase shift encrypting and decrypting method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
1564512A 2005.01.12

Also Published As

Publication number Publication date
CN101226705A (en) 2008-07-23

Similar Documents

Publication Publication Date Title
CN100561546C (en) Circle scattering migration code-transfer ciphering method
CN108090329A (en) A kind of method and device that digital watermarking encipherment protection is carried out to content of text
Debnath et al. Brief review on journey of secured hash algorithms
Khan et al. A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI
Aung et al. A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher)
US20140208102A1 (en) Method of protecting digital information
CN100546239C (en) The application cryptogram diagram technology carries out method of encrypting to data
Chen et al. Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain
Mittal et al. PData security using RSA encryption combined with image steganography
Rangaswamaiah et al. Multilevel data concealing technique using steganography and visual cryptography
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
Siahaan et al. Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for File Security
CN115170380A (en) Image layered scrambling encryption method based on chaotic mapping
Lavanya et al. An Encryption Algorithm Functioning on ASCII Values and Random Number Generation
Sangwan Combining Huffman text compression with new double encryption algorithm
Mushtaq et al. New cryptographic algorithm using ASCII values and gray code (AGC)
Asbeh et al. AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices
CN109327478A (en) A kind of chaos physical layer secrecy cut-in method
Pawar et al. Survey of cryptography techniques for data security
Ekka et al. Enrichment of security using hybrid algorithm
Gola et al. Circular Queue Based Data Encryption Algorithm Using 512 Random Bits.
Arshad et al. Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality.
Hiwarekar Encryption-decryption using laplace transforms
Curley Cryptography: Cracking Codes
Dhingra et al. An improved version of playfair technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091118

Termination date: 20170128

CF01 Termination of patent right due to non-payment of annual fee