CN102968598B - The decryption method of digital document - Google Patents

The decryption method of digital document Download PDF

Info

Publication number
CN102968598B
CN102968598B CN201210442371.6A CN201210442371A CN102968598B CN 102968598 B CN102968598 B CN 102968598B CN 201210442371 A CN201210442371 A CN 201210442371A CN 102968598 B CN102968598 B CN 102968598B
Authority
CN
China
Prior art keywords
digital document
hash function
key
data
decryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210442371.6A
Other languages
Chinese (zh)
Other versions
CN102968598A (en
Inventor
陈奕冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongwei Technology Co Ltd
Original Assignee
Sichuan Hongwei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Hongwei Technology Co Ltd filed Critical Sichuan Hongwei Technology Co Ltd
Priority to CN201210442371.6A priority Critical patent/CN102968598B/en
Publication of CN102968598A publication Critical patent/CN102968598A/en
Application granted granted Critical
Publication of CN102968598B publication Critical patent/CN102968598B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to the decryption method of digital document, comprising: a. sets an encryption parameter, by hash function, an initial value is obtained to described encryption parameter; B. described initial value is produced at least two random data as input; C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key; D. the file key for digital document encryption is obtained by hash function after being connected successively by random data; E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.Method of the present invention; can realize using unique file key to be encrypted digital document; the object that multiple decruption key is decrypted must be used simultaneously; effectively to the notarization identification that private data participates in many ways; improve the intensity of safeguard protection, thus avoid the leakage of private data.

Description

The decryption method of digital document
Technical field
The present invention relates to the decryption method of digital document, is the method that secret key cryptography multi-key cipher is deciphered jointly concretely.
Background technology
Along with the development of digital information technology and computer technology, how to ensure that the safety of secret information data is paid close attention to more and more widely.At present, most security system is all man-to-man authentication encrypting and deciphering systems, and namely a codon pair answers a decruption key.But in the application scenario needing one-to-many, just there is certain defective.Such as, after certain company leader wishes oneself to be encrypted a file separately, by subordinate in many ways personage participate in deciphering simultaneously thus obtain the content of file, to reach the object of open notarization, tradition is just difficult to achieve to the mode that numerical information is deciphered one to one.
Summary of the invention
The invention provides a kind of decryption method of digital document, use unique file key to be encrypted digital document, and multiple decruption key must be provided simultaneously to be decrypted, ensure confidentiality and the security of digital document.
The decryption method of digital document of the present invention, comprising:
A. set an encryption parameter, by hash function, an initial value is obtained to described encryption parameter;
B. described initial value is produced at least two random data as input;
C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key;
D. the file key for digital document encryption is obtained by hash function after being connected successively by random data;
E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.
Single encryption parameter is expanded by impact resistant hash function, produce unidirectional Hash Value, and then obtain multiple random number by various algorithm and conversion, form multiple decruption key, thus use single key when achieving encryption, must use multi-key cipher during deciphering, and the consumption of hardware resource is very little simultaneously.Determine according to different application scenarios in the process and number of times of unidirectional Hash Value being carried out to linear transformation, use existing method.
Concrete, the stochastic flow at least comprising two random numbers is produced in step b by flow algorithm.Flow algorithm can obtain one group of stochastic flow data quickly and easily, also can use other various method that can produce random number.
Preferably, adopt symmetric block cipher method (DES) to be encrypted to digital document, adopt symmetrical packet deciphering method to be decrypted.The method of enciphering/deciphering also can adopt three-fold symmetry method for encryption/decryption (3DES) or meet the method for Advanced Encryption Standard (AES).
Preferably, described encryption parameter is 8bit.Succinct in order to what encrypt, encryption parameter needs both simple, and the decruption key of generation and file key are not easy again to crack, and through long-term test, the encryption parameter of 8bit is comparatively suitable, also can adopt the encryption parameter of other length.
The decryption method of digital document of the present invention; can realize using unique file key to be encrypted digital document; the object that multiple decruption key is decrypted must be used simultaneously; effectively to the notarization identification that private data participates in many ways; improve the intensity of safeguard protection, thus avoid the leakage of private data.
Below in conjunction with the embodiment of embodiment, foregoing of the present invention is described in further detail again.But this should be interpreted as that the scope of the above-mentioned theme of the present invention is only limitted to following example.Without departing from the idea case in the present invention described above, the various replacement made according to ordinary skill knowledge and customary means or change, all should comprise within the scope of the invention.
Embodiment
The decryption method of digital document of the present invention, comprising:
A. the encryption parameter Pkey of a 8bit is set, by hash function, initial value a: InitKey=SHA128 (Pkey) is obtained to encryption parameter Pkey, wherein SHA128 () represents SHA128 standard hash function, and InitKey is the constant of 128bit length;
B. { Stream0, Stream1...StreamN}, N are the natural number of > 1 described initial value InitKey to be produced by flow algorithm the stochastic flow at least comprising two random numbers as input;
C. by continuous print sequence number 0,1 ... each random data in N} and stochastic flow Stream0, Stream1...StreamN} one by one corresponding composition of vector to { 0, Stream0}, { 1, Stream1}...{N, StreamN}, successively by { 0, Stream0} as decruption key 1 { 1, Stream1} is as decruption key 2 { N, StreamN} are as decruption key n
D. by the data { Stream0 of stochastic flow, the file key for digital document encryption is obtained by hash function: DataKey=SHA128(Stream0||Stream1||Stream2||...||StreamN) after Stream1...StreamN} connects successively, wherein symbol || represent data series connection, i.e. data splicing, passes through symmetric block cipher method (DES) to digital file encryption by file key DataKey;
According to each decruption key when e. deciphering sequence number, take out corresponding data Stream0, Stream1...StreamN, by data Stream0, construct described file key by hash function after Stream1...StreamN connects successively: DataKey=SHA128(Stream0||Stream1||Stream2||...||StreamN), then be decrypted through symmetrical packet deciphering method.

Claims (4)

1. the decryption method of digital document, its feature comprises:
A. set an encryption parameter, by hash function, an initial value is obtained to described encryption parameter;
B. described initial value is produced at least two random data as input;
C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key;
D. the file key for digital document encryption is obtained by hash function after being connected successively by random data;
E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.
2. the decryption method of digital document as claimed in claim 1, be is characterized by: produced the stochastic flow at least comprising two random numbers in step b by flow algorithm.
3. the decryption method of digital document as claimed in claim 1, is characterized by: adopt symmetric block cipher method to be encrypted to digital document, adopt symmetrical packet deciphering method to be decrypted.
4. the decryption method of the digital document as described in one of claims 1 to 3, is characterized by: described encryption parameter is 8bit.
CN201210442371.6A 2012-11-08 2012-11-08 The decryption method of digital document Active CN102968598B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210442371.6A CN102968598B (en) 2012-11-08 2012-11-08 The decryption method of digital document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210442371.6A CN102968598B (en) 2012-11-08 2012-11-08 The decryption method of digital document

Publications (2)

Publication Number Publication Date
CN102968598A CN102968598A (en) 2013-03-13
CN102968598B true CN102968598B (en) 2015-09-30

Family

ID=47798734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210442371.6A Active CN102968598B (en) 2012-11-08 2012-11-08 The decryption method of digital document

Country Status (1)

Country Link
CN (1) CN102968598B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109962776B (en) * 2017-12-25 2022-02-08 亚旭电脑股份有限公司 Encryption method and decryption method
CN109086063A (en) * 2018-07-27 2018-12-25 中国联合网络通信集团有限公司 Oftware updating method, file encrypting method, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242275A (en) * 2008-03-07 2008-08-13 四川虹微技术有限公司 Secure transmission method based on stream password encryption
CN101882991A (en) * 2009-05-06 2010-11-10 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10345457A1 (en) * 2003-09-30 2005-04-28 Infineon Technologies Ag Data encrypting and decrypting device for protecting contents of e.g. smart card, against unauthorized reading, applies part of data to encryption input and part to decryption input

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242275A (en) * 2008-03-07 2008-08-13 四川虹微技术有限公司 Secure transmission method based on stream password encryption
CN101882991A (en) * 2009-05-06 2010-11-10 上海华虹集成电路有限责任公司 Communication data stream encryption method based on block cipher

Also Published As

Publication number Publication date
CN102968598A (en) 2013-03-13

Similar Documents

Publication Publication Date Title
CN105681025B (en) A kind of safe whitepack implementation method and device of country password standard algorithm SM4
CN102594548B (en) Method capable of achieving data sectional encryption and decryption
CN102710414B (en) Randomized document block encryption method
CN109245881A (en) A kind of photograph video cloud encryption storage method
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
CN101447870A (en) Safe storage method of private key based on technology of distributed password
TW201251412A (en) Encryption processing device, encryption processing method, and programme
CN106067878A (en) A kind of network data encryption transmission method
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN102594549B (en) Multistage data encryption and decryption methods
CN101938353B (en) Method for remotely resetting personal identification number (PIN) of key device
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
CN103501220B (en) encryption method and device
CN105915345B (en) The implementation method of licensed-type production and restructuring in a kind of family gateway equipment production test
Ojha et al. An Innovative Approach to Enhance the Security of Data Encryption Scheme
CN102968598B (en) The decryption method of digital document
Tang et al. A one-time pad encryption algorithm based on one-way hash and conventional block cipher
CN107493287A (en) Industry control network data security system
CN107342865A (en) A kind of authentication encryption algorithm and decipherment algorithm based on SM4
CN109150505A (en) A kind of information transferring method and device for SAP system
CN102546152B (en) Method for achieving multi-stage encryption and decryption of data
CN111010386B (en) Privacy protection and data supervision control method based on shared account book
CN103746793B (en) A kind of number form literary composition carries encryption and decryption approaches

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant