CN101894244A - System and method for enciphering electronic data - Google Patents
System and method for enciphering electronic data Download PDFInfo
- Publication number
- CN101894244A CN101894244A CN2009103024774A CN200910302477A CN101894244A CN 101894244 A CN101894244 A CN 101894244A CN 2009103024774 A CN2009103024774 A CN 2009103024774A CN 200910302477 A CN200910302477 A CN 200910302477A CN 101894244 A CN101894244 A CN 101894244A
- Authority
- CN
- China
- Prior art keywords
- character
- ascii character
- data
- conversion mechanism
- ascii
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses system and method for enciphering electronic data. The method for enciphering the electronic data comprises the following steps of: reading original data; receiving a group of cipher keys for enciphering the original data; converting each character in the original data into a corresponding ASCII (American Standard Code for Information Interchange) code according to an ASCII code conversion mechanism; converting each character of the cipher key into the corresponding ASCII code according to the ASCII code conversion mechanism; generating an algorithm; carrying out encryption algorithm on each character ASCII code in the original data and any ASCII code of the cipher key according to the algorithm and generating a corresponding arithmetic result; converting the arithmetic result into enciphered data according to an ASCII code inverse conversion mechanism; and storing the generated enciphered data into storage equipment. By implementing the invention, confidential data can be enciphered and protected, and cannot be easily deciphered even if an unauthorized person wants to acquire the confidential data, thereby effectively protecting the confidential data.
Description
Technical field
The present invention relates to a kind of protection system and method for electronic bits of data, particularly about a kind of electronic bits of data encryption system and method.
Background technology
Universal day by day along with electronic product, the capsule information of a lot of individuals, company or government be electronic digitalizing all, wherein has the data of secret character certainly.What these data were very frequent transmits in different media or storage, for example in Internet network or the storage medium.Therefore, the data of how carrying out is encrypted or peep-proof, prevents that those without authority from reading data content, has just become a very important problem.
In existing data encryption technology, major part all is to do data with cryptographic technique to encrypt, and therefore works as the user and wants to untie encrypted data, just must learn original setting code, for example this principle running of WinZIP software utilization.Yet this data encryption technology has individual shortcoming, is exactly that those without authority can repeatedly guess and password.That is to say,,, can guess easily in a short period of time password, and then crack encrypted data, thereby make encrypted data lose protection no matter use manually or computer software if Password Length is not enough or uncomplicated.
Summary of the invention
In view of above content, be necessary to provide a kind of electronic bits of data encryption system that confidential data is encrypted, can not be cracked easily even those without authority obtain this confidential data, thereby make confidential data obtain protection effectively.
In addition, also be necessary to provide a kind of electronic bits of data encryption method that confidential data is encrypted, can not be cracked easily, thereby make confidential data obtain protection effectively even those without authority obtain this confidential data.
A kind of electronic bits of data encryption system runs in the computing machine, and this computing machine comprises memory device and input equipment.Described electronic bits of data encryption system comprises: the data storage module is used for reading source book from memory device, and will be stored in the memory device through the encrypted data after encrypting; The key receiver module, be used to receive the user from the input equipment input be used for source book is carried out encrypted secret key; The data modular converter, being used for according to the ASCII character conversion mechanism is corresponding ASCII character with each character conversion of source book, and is corresponding ASCII character with each character conversion of key; The cryptographic calculation module, be used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to encrypted data according to the contrary conversion mechanism of ASCII character.
A kind of electronic bits of data encryption method is used for the source book that is stored in memory device is carried out encipherment protection, and this method comprises the steps: to read source book from described memory device; Receiving one group is used for source book is carried out encrypted secret key; Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book; Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key; Produce a kind of algorithm; According to this algorithm each character ASCII character of source book and any one ASCII character of key are made cryptographic calculation, and produce corresponding operation result; According to the contrary conversion mechanism of ASCII character operation result is converted to encrypted data; And the encrypted data that produces is stored in the memory device.
Compared to prior art; described electronic bits of data encryption system and method are because the key of user input is a character string arbitrarily; simultaneously to original confidential data and the computing of key process ASCII coding; tool is not in all senses for the resulting encrypted data; therefore even those without authority obtain encrypted data and can not be cracked easily; just do not have the risk of information leakage yet, thereby make original confidential data obtain protection effectively.
Description of drawings
Fig. 1 is the Organization Chart of electronic bits of data encryption system of the present invention preferred embodiment.
Fig. 2 is the process flow diagram of electronic bits of data encryption method of the present invention preferred embodiment.
Fig. 3 is the present invention carries out an instantiation of cryptographic calculation to source book a synoptic diagram.
Fig. 4 is the present invention carries out the another one instantiation of cryptographic calculation to source book a synoptic diagram.
Embodiment
As shown in Figure 1, be the Organization Chart of electronic bits of data encryption system 10 preferred embodiments of the present invention.In the present embodiment, described electronic bits of data encryption system 10 runs in the computing machine 1, and this computing machine 1 comprises memory device 20 and input equipment 30.Described memory device 20 is used to store source book, and through the encrypted data after encrypting.Described source book can be the data of text (TEXT) data, scale-of-two (Binary) data or other form, it combines by one or more character, and each character is formed in the tens digit between all available 0 to 255 on the memory device 20.Described input equipment 30 is used to import one group and is used for source book is carried out encrypted secret key, and this key can be the character string of the combination in any of letter, numeral or symbol.Described electronic bits of data encryption system 10 comprises data storage module 101, key receiver module 102, data modular converter 103 and cryptographic calculation module 104.
Described data storage module 101 is used for reading source book from memory device 20, and will be stored in the described memory device 20 through the encrypted data after encrypting.Described key receiver module 102 is used to receive the group key of user from input equipment 30 inputs.
It is corresponding ASCII character with each character conversion of source book that described data modular converter 103 is used for according to ASCII (American Standard Code for Information Interchange) sign indicating number conversion mechanism, and is corresponding ASCII character with each character conversion of key.Described ASCII character conversion mechanism is the information translation standard that the U.S. formulates, all corresponding a kind of specific ASCII character of its each character.In the present embodiment, with decimal system ASCII character is example, suppose that source book is " This is a sample ", data modular converter 103 is changed the mechanism according to ASCII character each character in the source book is converted to decimal system ASCII character successively, and it is respectively " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 ".It is " 1,2,3,4,5 " that key receiver module 102 receives a group key from input equipment 30, data modular converter 103 is changed the mechanism according to ASCII character each character in this group key is converted to decimal system ASCII character successively, and it is respectively " 49,50,51,52,53 ".
Described cryptographic calculation module 104 is used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character.Described algorithm can be for additive operation, subtraction a kind of, the perhaps combination in any of two kinds of operation methods.The contrary conversion mechanism of described ASCII character is a kind of inverse operation of ASCII character conversion mechanism, and it can reverse each ASCII character and be changed to corresponding characters.Wherein, how cryptographic calculation module 104 is carried out cryptographic calculation to the ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " of source book and is seen also down Fig. 3 and instantiation shown in Figure 4.
As shown in Figure 2, be the process flow diagram of electronic bits of data encryption method of the present invention preferred embodiment.In the present embodiment, computing machine 1 is carried out 10 pairs of source book that are stored in the memory device 20 of described electronic bits of data encryption system and is encrypted, and the encrypted data after will encrypting is stored in the memory device 20.
Step S21, data storage module 101 reads source book from memory device 20, and for example source book is " This is a sample ".Step S22, key receiver module 102 receives the group key of user from input equipment 30 inputs, and this key can be the character string of the combination in any of letter, numeral or symbol, and for example key is " 1,2,3,4,5 ".
Step S23, data modular converter 103 is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book, and for example data modular converter 103 is converted to decimal system ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " respectively with each character in the source book.Step S24, data modular converter 103 is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key, and for example data modular converter 103 is converted to decimal system ASCII character " 49,50,51,52,53 " respectively with each character of key " 1,2,3,4,5 ".
Step S25, cryptographic calculation module 104 produces a kind of algorithm, and what this algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.Step S26, cryptographic calculation module 104 is made cryptographic calculation according to the algorithm that produces with each character ASCII character of source book and any one ASCII character of key, and produces corresponding operation result.Step S27, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result.The contrary conversion mechanism of described ASCII character is a kind of inverse operation of ASCII character conversion mechanism, and it can reverse each ASCII character and be changed to corresponding characters.Wherein, how cryptographic calculation module 104 is carried out cryptographic calculation to the ASCII character sequence " 84,104,105,115,32,105,115,32,97,32,115,97,109,112,108,101 " of source book and is seen also down Fig. 3 and instantiation shown in Figure 4.
Step S28, data storage module 101 is stored in the encrypted data that produces in the described memory device 20.
As shown in Figure 3, be the present invention carries out an instantiation of cryptographic calculation to source book synoptic diagram.In the present embodiment, cryptographic calculation module 104 is utilized the decimal system ASCII character " 84; 104; 105; 115; 32; 105 of additive operation rule with each character of source book, 115,32,97,32,115,97,109,112,108,101 " respectively with the ASCII character sequence " 49 of key, 50,51,52,49,50,51,52,49,50,51,52,49,50,51,52 " make cryptographic calculation, the ASCII character sequence of the operation result of generation is " 133,154,156,167,81,155,166,84,146,82,166,149,158,162,159,153 ".Then, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result, its be respectively " ...,?,?, w, Q,?, |, T, ', R, v,?, m, ¢,?, TM ".
As shown in Figure 4, be the present invention carries out the another one instantiation of cryptographic calculation to source book synoptic diagram.In the present embodiment, cryptographic calculation module 104 utilizes addition and subtraction to replace the decimal system ASCII character " 84; 104; 105; 115; 32; 105 of algorithm with each character of source book, 115,32,97,32,115,97,109,112,108,101 " respectively with the ASCII character sequence " 49 of key, 50,51,52,49,50,51,52,49,50,51,52,49,50,51,52 " make cryptographic calculation, the ASCII character sequence of the operation result of generation is " 133,54,156,63,81,55,166,236,146,234,166,45,158,62,159,49 ".Then, cryptographic calculation module 104 is converted to corresponding encrypted data according to the contrary conversion mechanism of ASCII character with operation result, its be respectively " ..., 6,?,?, Q, 7, |, ì, ', ê, v ,-, m,>,?, 1 ".
In electronic bits of data encryption system of the present invention and method; because from the key of input equipment input is character string arbitrarily; simultaneously to original confidential data and the computing of key process ASCII coding; tool is not in all senses for the resulting encrypted data; therefore even those without authority obtain encrypted data and can not be cracked easily; just do not have the risk of information leakage yet, thereby make original confidential data obtain protection effectively.
Claims (10)
1. an electronic bits of data encryption system runs in the computing machine, and this computing machine comprises memory device and input equipment, it is characterized in that, described electronic bits of data encryption system comprises:
The data storage module is used for reading source book from memory device, and will be stored in the memory device through the encrypted data after encrypting;
The key receiver module, be used to receive the user from the input equipment input be used for source book is carried out encrypted secret key;
The data modular converter, being used for according to the ASCII character conversion mechanism is corresponding ASCII character with each character conversion of source book, and is corresponding ASCII character with each character conversion of key;
The cryptographic calculation module, be used to produce a kind of algorithm, according to this algorithm the ASCII character of each character of source book and any one ASCII character of key are made cryptographic calculation and produced corresponding operation result, and operation result is converted to encrypted data according to the contrary conversion mechanism of ASCII character.
2. electronic bits of data encryption system as claimed in claim 1 is characterized in that, described key is the character string of letter, numeral, symbol and combination in any thereof.
3. electronic bits of data encryption system as claimed in claim 1 is characterized in that, what described algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.
4. electronic bits of data encryption system as claimed in claim 1 is characterized in that, described ASCII character conversion mechanism is a kind of information translation standard, and it is used for each character all is converted to corresponding ASCII character.
5. electronic bits of data encryption system as claimed in claim 4 is characterized in that, the contrary conversion mechanism of described ASCII character is the inverse operation of ASCII character conversion mechanism, and it is used for each ASCII character reversed and is changed to corresponding characters.
6. an electronic bits of data encryption method is used for the source book that is stored in memory device is carried out encipherment protection, it is characterized in that this method comprises the steps:
From memory device, read source book;
Receiving one group is used for source book is carried out encrypted secret key;
Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion in the source book;
Is corresponding ASCII character according to the ASCII character conversion mechanism with each character conversion of key;
Produce a kind of algorithm;
According to this algorithm each character ASCII character of source book and any one ASCII character of key are made cryptographic calculation, and produce corresponding operation result;
According to the contrary conversion mechanism of ASCII character operation result is converted to encrypted data; And
The encrypted data that produces is stored in the described memory device.
7. electronic bits of data encryption method as claimed in claim 6 is characterized in that, described key is the character string of letter, numeral, symbol and combination in any thereof.
8. electronic bits of data encryption method as claimed in claim 6 is characterized in that, what described algorithm can be for additive operation, subtraction is a kind of, perhaps the combination in any of two kinds of operation methods.
9. electronic bits of data encryption method as claimed in claim 6 is characterized in that, described ASCII character conversion mechanism is a kind of information translation standard, and it is used for each character all is converted to corresponding ASCII character.
10. electronic bits of data encryption method as claimed in claim 9 is characterized in that, the contrary conversion mechanism of described ASCII character is the inverse operation of ASCII character conversion mechanism, and it is used for each ASCII character reversed and is changed to corresponding characters.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009103024774A CN101894244B (en) | 2009-05-20 | 2009-05-20 | System and method for enciphering electronic data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009103024774A CN101894244B (en) | 2009-05-20 | 2009-05-20 | System and method for enciphering electronic data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101894244A true CN101894244A (en) | 2010-11-24 |
CN101894244B CN101894244B (en) | 2012-11-21 |
Family
ID=43103434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009103024774A Expired - Fee Related CN101894244B (en) | 2009-05-20 | 2009-05-20 | System and method for enciphering electronic data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101894244B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571324A (en) * | 2011-12-31 | 2012-07-11 | 深圳市永达电子股份有限公司 | Method for building dynamic nonstandard character library, built character library, and system applying method and character library above |
WO2014089843A1 (en) * | 2012-12-14 | 2014-06-19 | 华为技术有限公司 | Method and device for data encryption and decryption |
CN104113410A (en) * | 2014-07-04 | 2014-10-22 | 北京思特奇信息技术股份有限公司 | Method and device for data encryption transmission based on multi-table encryption method |
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN105225155A (en) * | 2015-09-25 | 2016-01-06 | 中国人民财产保险股份有限公司 | A kind of insurance risk management-control method based on biological identification technology |
CN106788995A (en) * | 2016-12-07 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | File encrypting method and device |
CN110175462A (en) * | 2019-05-10 | 2019-08-27 | 中国银行股份有限公司 | A kind of cross-platform decryption method, device and storage medium |
CN110190947A (en) * | 2019-04-08 | 2019-08-30 | 努比亚技术有限公司 | Information encryption and decryption method, terminal and computer readable storage medium |
CN113806766A (en) * | 2021-08-12 | 2021-12-17 | 招银云创信息技术有限公司 | Data encryption method and device, computer equipment and storage medium |
CN114550316A (en) * | 2022-04-27 | 2022-05-27 | 广州商景网络科技有限公司 | One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB201400992D0 (en) * | 2014-01-21 | 2014-03-05 | Metaforic Ltd | Method of protecting dynamic cryptographic keys |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5425103A (en) * | 1994-03-14 | 1995-06-13 | Shaw; William Y. | Variable-key cryptography system |
CN1193538C (en) * | 2001-12-17 | 2005-03-16 | 北京兆日科技有限责任公司 | Electronic cipher formation and checking method |
CN100561546C (en) * | 2008-01-28 | 2009-11-18 | 和舰科技(苏州)有限公司 | Circle scattering migration code-transfer ciphering method |
-
2009
- 2009-05-20 CN CN2009103024774A patent/CN101894244B/en not_active Expired - Fee Related
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571324A (en) * | 2011-12-31 | 2012-07-11 | 深圳市永达电子股份有限公司 | Method for building dynamic nonstandard character library, built character library, and system applying method and character library above |
CN104040935B (en) * | 2012-12-14 | 2017-06-20 | 华为技术有限公司 | A kind of data encryption, the method and apparatus of decryption |
WO2014089843A1 (en) * | 2012-12-14 | 2014-06-19 | 华为技术有限公司 | Method and device for data encryption and decryption |
CN104040935A (en) * | 2012-12-14 | 2014-09-10 | 华为技术有限公司 | Method and device for data encryption and decryption |
CN104113410A (en) * | 2014-07-04 | 2014-10-22 | 北京思特奇信息技术股份有限公司 | Method and device for data encryption transmission based on multi-table encryption method |
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN105225155A (en) * | 2015-09-25 | 2016-01-06 | 中国人民财产保险股份有限公司 | A kind of insurance risk management-control method based on biological identification technology |
CN106788995A (en) * | 2016-12-07 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | File encrypting method and device |
CN110190947A (en) * | 2019-04-08 | 2019-08-30 | 努比亚技术有限公司 | Information encryption and decryption method, terminal and computer readable storage medium |
CN110190947B (en) * | 2019-04-08 | 2022-09-13 | 重庆葵海数字科技有限公司 | Information encryption and decryption method, terminal and computer readable storage medium |
CN110175462A (en) * | 2019-05-10 | 2019-08-27 | 中国银行股份有限公司 | A kind of cross-platform decryption method, device and storage medium |
CN113806766A (en) * | 2021-08-12 | 2021-12-17 | 招银云创信息技术有限公司 | Data encryption method and device, computer equipment and storage medium |
CN114550316A (en) * | 2022-04-27 | 2022-05-27 | 广州商景网络科技有限公司 | One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method |
CN114550316B (en) * | 2022-04-27 | 2022-08-05 | 广州商景网络科技有限公司 | One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method |
Also Published As
Publication number | Publication date |
---|---|
CN101894244B (en) | 2012-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101894244B (en) | System and method for enciphering electronic data | |
CN101295343B (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
US8892881B2 (en) | Split key secure access system | |
US20100202606A1 (en) | Two strings private key (symmetric) encryption and decryption method | |
CN104348625A (en) | Encryption and decryption device and encryption and decryption method thereof | |
CN103152362A (en) | Cloud-computing-based encrypted transmission method for large data files | |
Kumar et al. | A novel approach of symmetric key cryptography | |
Abraham et al. | An improved caesar cipher (icc) algorithm | |
Vinotha et al. | VLSI implementation of image encryption using DNA cryptography | |
JP2000115162A (en) | Secure communication equipment and storage device | |
Kasm et al. | Applications of Algebraic Geometry in Cryptography | |
Soni et al. | Key generation using genetic algorithm for image encryption | |
Choubey et al. | Cryptographic techniques in information security | |
CN101009548A (en) | Data encryption method based on encryption technology | |
CN111314270B (en) | Data encryption and decryption method based on validity period uniform distribution symmetric algorithm | |
Ahmad et al. | Protection of the texts using Base64 and MD5 | |
Manikandasaran et al. | MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage | |
Vijayan et al. | ASCII value based encryption system (AVB) | |
CN100359494C (en) | Electronic file characters internal code transformation encryption method | |
CN105450399B (en) | A kind of false proof retroactive method based on hyperelliptic password | |
CN108777622A (en) | A kind of binary stream hash modulus encrypting and decrypting method | |
Manz | Basics and History | |
Das et al. | Strange Number System: An Enhancing Tool for Data Encryption and Decryption. | |
Alregabo et al. | Proposed Method for Efficient Block Cipher Cryptography | |
Pawar et al. | Survey of cryptography techniques for data security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20121121 Termination date: 20150520 |
|
EXPY | Termination of patent right or utility model |