CN101894244A - System and method for enciphering electronic data - Google Patents

System and method for enciphering electronic data Download PDF

Info

Publication number
CN101894244A
CN101894244A CN2009103024774A CN200910302477A CN101894244A CN 101894244 A CN101894244 A CN 101894244A CN 2009103024774 A CN2009103024774 A CN 2009103024774A CN 200910302477 A CN200910302477 A CN 200910302477A CN 101894244 A CN101894244 A CN 101894244A
Authority
CN
China
Prior art keywords
character
ascii character
data
conversion mechanism
ascii
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009103024774A
Other languages
Chinese (zh)
Other versions
CN101894244B (en
Inventor
陈维沅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN2009103024774A priority Critical patent/CN101894244B/en
Publication of CN101894244A publication Critical patent/CN101894244A/en
Application granted granted Critical
Publication of CN101894244B publication Critical patent/CN101894244B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses system and method for enciphering electronic data. The method for enciphering the electronic data comprises the following steps of: reading original data; receiving a group of cipher keys for enciphering the original data; converting each character in the original data into a corresponding ASCII (American Standard Code for Information Interchange) code according to an ASCII code conversion mechanism; converting each character of the cipher key into the corresponding ASCII code according to the ASCII code conversion mechanism; generating an algorithm; carrying out encryption algorithm on each character ASCII code in the original data and any ASCII code of the cipher key according to the algorithm and generating a corresponding arithmetic result; converting the arithmetic result into enciphered data according to an ASCII code inverse conversion mechanism; and storing the generated enciphered data into storage equipment. By implementing the invention, confidential data can be enciphered and protected, and cannot be easily deciphered even if an unauthorized person wants to acquire the confidential data, thereby effectively protecting the confidential data.

Description

Electronic bits of data encryption system and method
Technical field
The present invention relates to a kind of protection system and method for electronic bits of data, particularly about a kind of electronic bits of data encryption system and method.
Background technology
Universal day by day along with electronic product, the capsule information of a lot of individuals, company or government be electronic digitalizing all, wherein has the data of secret character certainly.What these data were very frequent transmits in different media or storage, for example in Internet network or the storage medium.Therefore, the data of how carrying out is encrypted or peep-proof, prevents that those without authority from reading data content, has just become a very important problem.
In existing data encryption technology, major part all is to do data with cryptographic technique to encrypt, and therefore works as the user and wants to untie encrypted data, just must learn original setting code, for example this principle running of WinZIP software utilization.Yet this data encryption technology has individual shortcoming, is exactly that those without authority can repeatedly guess and password.That is to say,,, can guess easily in a short period of time password, and then crack encrypted data, thereby make encrypted data lose protection no matter use manually or computer software if Password Length is not enough or uncomplicated.
Summary of the invention
In view of above content, be necessary to provide a kind of electronic bits of data encryption system that confidential data is encrypted, can not be cracked easily even those without authority obtain this confidential data, thereby make confidential data obtain protection effectively.
In addition, also be necessary to provide a kind of electronic bits of data encryption method that confidential data is encrypted, can not be cracked easily, thereby make confidential data obtain protection effectively even those without authority obtain this confidential data.
A kind of electronic bits of data encryption system runs in the computing machine, and this computing machine comprises memory device and input equipment.Described electronic bits of data encryption system comprises: the data storage module is used for reading source book from memory device, and will be stored in the memory device through the encrypted data after encrypting; The key receiver module, be used to receive the user from the input equipment input be used for source book is carried out encrypted secret key; The data modular converter, being used for according to the ASCII character conversion mechanism is corresponding ASCII character with each character conversion of source book, and is corresponding ASCII character with each character conversion of key; The cryptographic calculation module, be used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to encrypted data according to the contrary conversion mechanism of ASCII character.
A kind of electronic bits of data encryption method is used for the source book that is stored in memory device is carried out encipherment protection, and this method comprises the steps: to read source book from described memory device; Receiving one group is used for source book is carried out encrypted secret key; Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book; Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key; Produce a kind of algorithm; According to this algorithm each character ASCII character of source book and any one ASCII character of key are made cryptographic calculation, and produce corresponding operation result; According to the contrary conversion mechanism of ASCII character operation result is converted to encrypted data; And the encrypted data that produces is stored in the memory device.
Compared to prior art; described electronic bits of data encryption system and method are because the key of user input is a character string arbitrarily; simultaneously to original confidential data and the computing of key process ASCII coding; tool is not in all senses for the resulting encrypted data; therefore even those without authority obtain encrypted data and can not be cracked easily; just do not have the risk of information leakage yet, thereby make original confidential data obtain protection effectively.
Description of drawings
Fig. 1 is the Organization Chart of electronic bits of data encryption system of the present invention preferred embodiment.
Fig. 2 is the process flow diagram of electronic bits of data encryption method of the present invention preferred embodiment.
Fig. 3 is the present invention carries out an instantiation of cryptographic calculation to source book a synoptic diagram.
Fig. 4 is the present invention carries out the another one instantiation of cryptographic calculation to source book a synoptic diagram.
Embodiment
As shown in Figure 1, be the Organization Chart of electronic bits of data encryption system 10 preferred embodiments of the present invention.In the present embodiment, described electronic bits of data encryption system 10 runs in the computing machine 1, and this computing machine 1 comprises memory device 20 and input equipment 30.Described memory device 20 is used to store source book, and through the encrypted data after encrypting.Described source book can be the data of text (TEXT) data, scale-of-two (Binary) data or other form, it combines by one or more character, and each character is formed in the tens digit between all available 0 to 255 on the memory device 20.Described input equipment 30 is used to import one group and is used for source book is carried out encrypted secret key, and this key can be the character string of the combination in any of letter, numeral or symbol.Described electronic bits of data encryption system 10 comprises data storage module 101, key receiver module 102, data modular converter 103 and cryptographic calculation module 104.
Described data storage module 101 is used for reading source book from memory device 20, and will be stored in the described memory device 20 through the encrypted data after encrypting.Described key receiver module 102 is used to receive the group key of user from input equipment 30 inputs.
It is corresponding ASCII character with each character conversion of source book that described data modular converter 103 is used for according to ASCII (American Standard Code for Information Interchange) sign indicating number conversion mechanism, and is corresponding ASCII character with each character conversion of key.Described ASCII character conversion mechanism is the information translation standard that the U.S. formulates, all corresponding a kind of specific ASCII character of its each character.In the present embodiment, with decimal system ASCII character is example, suppose that source book is " This is a sample ", data modular converter 103 is changed the mechanism according to ASCII character each character in the source book is converted to decimal system ASCII character successively, and it is respectively " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 ".It is " 1,2,3,4,5 " that key receiver module 102 receives a group key from input equipment 30, data modular converter 103 is changed the mechanism according to ASCII character each character in this group key is converted to decimal system ASCII character successively, and it is respectively " 49,50,51,52,53 ".
Described cryptographic calculation module 104 is used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character.Described algorithm can be for additive operation, subtraction a kind of, the perhaps combination in any of two kinds of operation methods.The contrary conversion mechanism of described ASCII character is a kind of inverse operation of ASCII character conversion mechanism, and it can reverse each ASCII character and be changed to corresponding characters.Wherein, how cryptographic calculation module 104 is carried out cryptographic calculation to the ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " of source book and is seen also down Fig. 3 and instantiation shown in Figure 4.
As shown in Figure 2, be the process flow diagram of electronic bits of data encryption method of the present invention preferred embodiment.In the present embodiment, computing machine 1 is carried out 10 pairs of source book that are stored in the memory device 20 of described electronic bits of data encryption system and is encrypted, and the encrypted data after will encrypting is stored in the memory device 20.
Step S21, data storage module 101 reads source book from memory device 20, and for example source book is " This is a sample ".Step S22, key receiver module 102 receives the group key of user from input equipment 30 inputs, and this key can be the character string of the combination in any of letter, numeral or symbol, and for example key is " 1,2,3,4,5 ".
Step S23, data modular converter 103 is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book, and for example data modular converter 103 is converted to decimal system ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " respectively with each character in the source book.Step S24, data modular converter 103 is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key, and for example data modular converter 103 is converted to decimal system ASCII character " 49,50,51,52,53 " respectively with each character of key " 1,2,3,4,5 ".
Step S25, cryptographic calculation module 104 produces a kind of algorithm, and what this algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.Step S26, cryptographic calculation module 104 is made cryptographic calculation according to the algorithm that produces with each character ASCII character of source book and any one ASCII character of key, and produces corresponding operation result.Step S27, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result.The contrary conversion mechanism of described ASCII character is a kind of inverse operation of ASCII character conversion mechanism, and it can reverse each ASCII character and be changed to corresponding characters.Wherein, how cryptographic calculation module 104 is carried out cryptographic calculation to the ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " of source book and is seen also down Fig. 3 and instantiation shown in Figure 4.
Step S28, data storage module 101 is stored in the encrypted data that produces in the described memory device 20.
As shown in Figure 3, be the present invention carries out an instantiation of cryptographic calculation to source book synoptic diagram.In the present embodiment, cryptographic calculation module 104 is utilized the decimal system ASCII character " 84; 104; 105; 115; 32; 105 of additive operation rule with each character of source book, 115,32,97,32,115,97,109,112,108,101 " respectively with the ASCII character sequence " 49 of key, 50,51,52,49,50,51,52,49,50,51,52,49,50,51,52 " make cryptographic calculation, the ASCII character sequence of the operation result of generation is " 133,154,156,167,81,155,166,84,146,82,166,149,158,162,159,153 ".Then, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result, its be respectively " ...,?,?, w, Q,?, |, T, ', R, v,?, m, ¢,?, TM ".
As shown in Figure 4, be the present invention carries out the another one instantiation of cryptographic calculation to source book synoptic diagram.In the present embodiment, cryptographic calculation module 104 utilizes addition and subtraction to replace the decimal system ASCII character " 84; 104; 105; 115; 32; 105 of algorithm with each character of source book, 115,32,97,32,115,97,109,112,108,101 " respectively with the ASCII character sequence " 49 of key, 50,51,52,49,50,51,52,49,50,51,52,49,50,51,52 " make cryptographic calculation, the ASCII character sequence of the operation result of generation is " 133,54,156,63,81,55,166,236,146,234,166,45,158,62,159,49 ".Then, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result, its be respectively " ..., 6,?,?, Q, 7, |, ì, ', ê, v ,-, m,>,?, 1 ".
In electronic bits of data encryption system of the present invention and method; because from the key of input equipment input is character string arbitrarily; simultaneously to original confidential data and the computing of key process ASCII coding; tool is not in all senses for the resulting encrypted data; therefore even those without authority obtain encrypted data and can not be cracked easily; just do not have the risk of information leakage yet, thereby make original confidential data obtain protection effectively.

Claims (10)

1. an electronic bits of data encryption system runs in the computing machine, and this computing machine comprises memory device and input equipment, it is characterized in that, described electronic bits of data encryption system comprises:
The data storage module is used for reading source book from memory device, and will be stored in the memory device through the encrypted data after encrypting;
The key receiver module, be used to receive the user from the input equipment input be used for source book is carried out encrypted secret key;
The data modular converter, being used for according to the ASCII character conversion mechanism is corresponding ASCII character with each character conversion of source book, and is corresponding ASCII character with each character conversion of key;
The cryptographic calculation module, be used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to encrypted data according to the contrary conversion mechanism of ASCII character.
2. electronic bits of data encryption system as claimed in claim 1 is characterized in that, described key is the character string of letter, numeral, symbol and combination in any thereof.
3. electronic bits of data encryption system as claimed in claim 1 is characterized in that, what described algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.
4. electronic bits of data encryption system as claimed in claim 1 is characterized in that, described ASCII character conversion mechanism is a kind of information translation standard, and it is used for each character all is converted to corresponding ASCII character.
5. electronic bits of data encryption system as claimed in claim 4 is characterized in that, the contrary conversion mechanism of described ASCII character is the inverse operation of ASCII character conversion mechanism, and it is used for each ASCII character reversed and is changed to corresponding characters.
6. an electronic bits of data encryption method is used for the source book that is stored in memory device is carried out encipherment protection, it is characterized in that this method comprises the steps:
From memory device, read source book;
Receiving one group is used for source book is carried out encrypted secret key;
Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book;
Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key;
Produce a kind of algorithm;
According to this algorithm each character ASCII character of source book and any one ASCII character of key are made cryptographic calculation, and produce corresponding operation result;
According to the contrary conversion mechanism of ASCII character operation result is converted to encrypted data; And
The encrypted data that produces is stored in the described memory device.
7. electronic bits of data encryption method as claimed in claim 6 is characterized in that, described key is the character string of letter, numeral, symbol and combination in any thereof.
8. electronic bits of data encryption method as claimed in claim 6 is characterized in that, what described algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.
9. electronic bits of data encryption method as claimed in claim 6 is characterized in that, described ASCII character conversion mechanism is a kind of information translation standard, and it is used for each character all is converted to corresponding ASCII character.
10. electronic bits of data encryption method as claimed in claim 9 is characterized in that, the contrary conversion mechanism of described ASCII character is the inverse operation of ASCII character conversion mechanism, and it is used for each ASCII character reversed and is changed to corresponding characters.
CN2009103024774A 2009-05-20 2009-05-20 System and method for enciphering electronic data Expired - Fee Related CN101894244B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009103024774A CN101894244B (en) 2009-05-20 2009-05-20 System and method for enciphering electronic data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009103024774A CN101894244B (en) 2009-05-20 2009-05-20 System and method for enciphering electronic data

Publications (2)

Publication Number Publication Date
CN101894244A true CN101894244A (en) 2010-11-24
CN101894244B CN101894244B (en) 2012-11-21

Family

ID=43103434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009103024774A Expired - Fee Related CN101894244B (en) 2009-05-20 2009-05-20 System and method for enciphering electronic data

Country Status (1)

Country Link
CN (1) CN101894244B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571324A (en) * 2011-12-31 2012-07-11 深圳市永达电子股份有限公司 Method for building dynamic nonstandard character library, built character library, and system applying method and character library above
WO2014089843A1 (en) * 2012-12-14 2014-06-19 华为技术有限公司 Method and device for data encryption and decryption
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology
CN106788995A (en) * 2016-12-07 2017-05-31 武汉斗鱼网络科技有限公司 File encrypting method and device
CN110175462A (en) * 2019-05-10 2019-08-27 中国银行股份有限公司 A kind of cross-platform decryption method, device and storage medium
CN110190947A (en) * 2019-04-08 2019-08-30 努比亚技术有限公司 Information encryption and decryption method, terminal and computer readable storage medium
CN113806766A (en) * 2021-08-12 2021-12-17 招银云创信息技术有限公司 Data encryption method and device, computer equipment and storage medium
CN114550316A (en) * 2022-04-27 2022-05-27 广州商景网络科技有限公司 One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201400992D0 (en) * 2014-01-21 2014-03-05 Metaforic Ltd Method of protecting dynamic cryptographic keys

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1193538C (en) * 2001-12-17 2005-03-16 北京兆日科技有限责任公司 Electronic cipher formation and checking method
CN100561546C (en) * 2008-01-28 2009-11-18 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571324A (en) * 2011-12-31 2012-07-11 深圳市永达电子股份有限公司 Method for building dynamic nonstandard character library, built character library, and system applying method and character library above
CN104040935B (en) * 2012-12-14 2017-06-20 华为技术有限公司 A kind of data encryption, the method and apparatus of decryption
WO2014089843A1 (en) * 2012-12-14 2014-06-19 华为技术有限公司 Method and device for data encryption and decryption
CN104040935A (en) * 2012-12-14 2014-09-10 华为技术有限公司 Method and device for data encryption and decryption
CN104113410A (en) * 2014-07-04 2014-10-22 北京思特奇信息技术股份有限公司 Method and device for data encryption transmission based on multi-table encryption method
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology
CN106788995A (en) * 2016-12-07 2017-05-31 武汉斗鱼网络科技有限公司 File encrypting method and device
CN110190947A (en) * 2019-04-08 2019-08-30 努比亚技术有限公司 Information encryption and decryption method, terminal and computer readable storage medium
CN110190947B (en) * 2019-04-08 2022-09-13 重庆葵海数字科技有限公司 Information encryption and decryption method, terminal and computer readable storage medium
CN110175462A (en) * 2019-05-10 2019-08-27 中国银行股份有限公司 A kind of cross-platform decryption method, device and storage medium
CN113806766A (en) * 2021-08-12 2021-12-17 招银云创信息技术有限公司 Data encryption method and device, computer equipment and storage medium
CN114550316A (en) * 2022-04-27 2022-05-27 广州商景网络科技有限公司 One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method
CN114550316B (en) * 2022-04-27 2022-08-05 广州商景网络科技有限公司 One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method

Also Published As

Publication number Publication date
CN101894244B (en) 2012-11-21

Similar Documents

Publication Publication Date Title
CN101894244B (en) System and method for enciphering electronic data
CN101295343B (en) Two-dimensional code multi-enciphering anti-fake printing method
US8892881B2 (en) Split key secure access system
US20100202606A1 (en) Two strings private key (symmetric) encryption and decryption method
CN104348625A (en) Encryption and decryption device and encryption and decryption method thereof
CN103152362A (en) Cloud-computing-based encrypted transmission method for large data files
Kumar et al. A novel approach of symmetric key cryptography
Abraham et al. An improved caesar cipher (icc) algorithm
Vinotha et al. VLSI implementation of image encryption using DNA cryptography
JP2000115162A (en) Secure communication equipment and storage device
Kasm et al. Applications of Algebraic Geometry in Cryptography
Soni et al. Key generation using genetic algorithm for image encryption
Choubey et al. Cryptographic techniques in information security
CN101009548A (en) Data encryption method based on encryption technology
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
Ahmad et al. Protection of the texts using Base64 and MD5
Manikandasaran et al. MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
Vijayan et al. ASCII value based encryption system (AVB)
CN100359494C (en) Electronic file characters internal code transformation encryption method
CN105450399B (en) A kind of false proof retroactive method based on hyperelliptic password
CN108777622A (en) A kind of binary stream hash modulus encrypting and decrypting method
Manz Basics and History
Das et al. Strange Number System: An Enhancing Tool for Data Encryption and Decryption.
Alregabo et al. Proposed Method for Efficient Block Cipher Cryptography
Pawar et al. Survey of cryptography techniques for data security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121121

Termination date: 20150520

EXPY Termination of patent right or utility model