CN102968598B - The decryption method of digital document - Google Patents
The decryption method of digital document Download PDFInfo
- Publication number
- CN102968598B CN102968598B CN201210442371.6A CN201210442371A CN102968598B CN 102968598 B CN102968598 B CN 102968598B CN 201210442371 A CN201210442371 A CN 201210442371A CN 102968598 B CN102968598 B CN 102968598B
- Authority
- CN
- China
- Prior art keywords
- digital document
- hash function
- key
- data
- decryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to the decryption method of digital document, comprising: a. sets an encryption parameter, by hash function, an initial value is obtained to described encryption parameter; B. described initial value is produced at least two random data as input; C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key; D. the file key for digital document encryption is obtained by hash function after being connected successively by random data; E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.Method of the present invention; can realize using unique file key to be encrypted digital document; the object that multiple decruption key is decrypted must be used simultaneously; effectively to the notarization identification that private data participates in many ways; improve the intensity of safeguard protection, thus avoid the leakage of private data.
Description
Technical field
The present invention relates to the decryption method of digital document, is the method that secret key cryptography multi-key cipher is deciphered jointly concretely.
Background technology
Along with the development of digital information technology and computer technology, how to ensure that the safety of secret information data is paid close attention to more and more widely.At present, most security system is all man-to-man authentication encrypting and deciphering systems, and namely a codon pair answers a decruption key.But in the application scenario needing one-to-many, just there is certain defective.Such as, after certain company leader wishes oneself to be encrypted a file separately, by subordinate in many ways personage participate in deciphering simultaneously thus obtain the content of file, to reach the object of open notarization, tradition is just difficult to achieve to the mode that numerical information is deciphered one to one.
Summary of the invention
The invention provides a kind of decryption method of digital document, use unique file key to be encrypted digital document, and multiple decruption key must be provided simultaneously to be decrypted, ensure confidentiality and the security of digital document.
The decryption method of digital document of the present invention, comprising:
A. set an encryption parameter, by hash function, an initial value is obtained to described encryption parameter;
B. described initial value is produced at least two random data as input;
C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key;
D. the file key for digital document encryption is obtained by hash function after being connected successively by random data;
E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.
Single encryption parameter is expanded by impact resistant hash function, produce unidirectional Hash Value, and then obtain multiple random number by various algorithm and conversion, form multiple decruption key, thus use single key when achieving encryption, must use multi-key cipher during deciphering, and the consumption of hardware resource is very little simultaneously.Determine according to different application scenarios in the process and number of times of unidirectional Hash Value being carried out to linear transformation, use existing method.
Concrete, the stochastic flow at least comprising two random numbers is produced in step b by flow algorithm.Flow algorithm can obtain one group of stochastic flow data quickly and easily, also can use other various method that can produce random number.
Preferably, adopt symmetric block cipher method (DES) to be encrypted to digital document, adopt symmetrical packet deciphering method to be decrypted.The method of enciphering/deciphering also can adopt three-fold symmetry method for encryption/decryption (3DES) or meet the method for Advanced Encryption Standard (AES).
Preferably, described encryption parameter is 8bit.Succinct in order to what encrypt, encryption parameter needs both simple, and the decruption key of generation and file key are not easy again to crack, and through long-term test, the encryption parameter of 8bit is comparatively suitable, also can adopt the encryption parameter of other length.
The decryption method of digital document of the present invention; can realize using unique file key to be encrypted digital document; the object that multiple decruption key is decrypted must be used simultaneously; effectively to the notarization identification that private data participates in many ways; improve the intensity of safeguard protection, thus avoid the leakage of private data.
Below in conjunction with the embodiment of embodiment, foregoing of the present invention is described in further detail again.But this should be interpreted as that the scope of the above-mentioned theme of the present invention is only limitted to following example.Without departing from the idea case in the present invention described above, the various replacement made according to ordinary skill knowledge and customary means or change, all should comprise within the scope of the invention.
Embodiment
The decryption method of digital document of the present invention, comprising:
A. the encryption parameter Pkey of a 8bit is set, by hash function, initial value a: InitKey=SHA128 (Pkey) is obtained to encryption parameter Pkey, wherein SHA128 () represents SHA128 standard hash function, and InitKey is the constant of 128bit length;
B. { Stream0, Stream1...StreamN}, N are the natural number of > 1 described initial value InitKey to be produced by flow algorithm the stochastic flow at least comprising two random numbers as input;
C. by continuous print sequence number 0,1 ... each random data in N} and stochastic flow Stream0, Stream1...StreamN} one by one corresponding composition of vector to { 0, Stream0}, { 1, Stream1}...{N, StreamN}, successively by { 0, Stream0} as decruption key 1
{ 1, Stream1} is as decruption key 2
{ N, StreamN} are as decruption key n
D. by the data { Stream0 of stochastic flow, the file key for digital document encryption is obtained by hash function: DataKey=SHA128(Stream0||Stream1||Stream2||...||StreamN) after Stream1...StreamN} connects successively, wherein symbol || represent data series connection, i.e. data splicing, passes through symmetric block cipher method (DES) to digital file encryption by file key DataKey;
According to each decruption key when e. deciphering
sequence number, take out corresponding data Stream0, Stream1...StreamN, by data Stream0, construct described file key by hash function after Stream1...StreamN connects successively: DataKey=SHA128(Stream0||Stream1||Stream2||...||StreamN), then be decrypted through symmetrical packet deciphering method.
Claims (4)
1. the decryption method of digital document, its feature comprises:
A. set an encryption parameter, by hash function, an initial value is obtained to described encryption parameter;
B. described initial value is produced at least two random data as input;
C. by continuous print sequence number and each random data corresponding composition of vector pair one by one, each vector is to being a decruption key;
D. the file key for digital document encryption is obtained by hash function after being connected successively by random data;
E. construct described file key by hash function after the data in each decruption key being connected successively during deciphering, then be decrypted through the inverse operation of cryptographic algorithm.
2. the decryption method of digital document as claimed in claim 1, be is characterized by: produced the stochastic flow at least comprising two random numbers in step b by flow algorithm.
3. the decryption method of digital document as claimed in claim 1, is characterized by: adopt symmetric block cipher method to be encrypted to digital document, adopt symmetrical packet deciphering method to be decrypted.
4. the decryption method of the digital document as described in one of claims 1 to 3, is characterized by: described encryption parameter is 8bit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210442371.6A CN102968598B (en) | 2012-11-08 | 2012-11-08 | The decryption method of digital document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210442371.6A CN102968598B (en) | 2012-11-08 | 2012-11-08 | The decryption method of digital document |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102968598A CN102968598A (en) | 2013-03-13 |
CN102968598B true CN102968598B (en) | 2015-09-30 |
Family
ID=47798734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210442371.6A Active CN102968598B (en) | 2012-11-08 | 2012-11-08 | The decryption method of digital document |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102968598B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109962776B (en) * | 2017-12-25 | 2022-02-08 | 亚旭电脑股份有限公司 | Encryption method and decryption method |
CN109086063A (en) * | 2018-07-27 | 2018-12-25 | 中国联合网络通信集团有限公司 | Oftware updating method, file encrypting method, device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242275A (en) * | 2008-03-07 | 2008-08-13 | 四川虹微技术有限公司 | Secure transmission method based on stream password encryption |
CN101882991A (en) * | 2009-05-06 | 2010-11-10 | 上海华虹集成电路有限责任公司 | Communication data stream encryption method based on block cipher |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10345457A1 (en) * | 2003-09-30 | 2005-04-28 | Infineon Technologies Ag | Data encrypting and decrypting device for protecting contents of e.g. smart card, against unauthorized reading, applies part of data to encryption input and part to decryption input |
-
2012
- 2012-11-08 CN CN201210442371.6A patent/CN102968598B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242275A (en) * | 2008-03-07 | 2008-08-13 | 四川虹微技术有限公司 | Secure transmission method based on stream password encryption |
CN101882991A (en) * | 2009-05-06 | 2010-11-10 | 上海华虹集成电路有限责任公司 | Communication data stream encryption method based on block cipher |
Also Published As
Publication number | Publication date |
---|---|
CN102968598A (en) | 2013-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105681025B (en) | A kind of safe whitepack implementation method and device of country password standard algorithm SM4 | |
CN102594548B (en) | Method capable of achieving data sectional encryption and decryption | |
CN102710414B (en) | Randomized document block encryption method | |
CN109245881A (en) | A kind of photograph video cloud encryption storage method | |
CN103716157A (en) | Grouped multiple-key encryption method and grouped multiple-key encryption device | |
CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
CN101447870A (en) | Safe storage method of private key based on technology of distributed password | |
TW201251412A (en) | Encryption processing device, encryption processing method, and programme | |
CN106067878A (en) | A kind of network data encryption transmission method | |
CN102833075A (en) | Identity authentication and digital signature method based on three-layered overlapping type key management technology | |
CN102594549B (en) | Multistage data encryption and decryption methods | |
CN101938353B (en) | Method for remotely resetting personal identification number (PIN) of key device | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
CN103501220B (en) | encryption method and device | |
CN105915345B (en) | The implementation method of licensed-type production and restructuring in a kind of family gateway equipment production test | |
Ojha et al. | An Innovative Approach to Enhance the Security of Data Encryption Scheme | |
CN102968598B (en) | The decryption method of digital document | |
Tang et al. | A one-time pad encryption algorithm based on one-way hash and conventional block cipher | |
CN107493287A (en) | Industry control network data security system | |
CN107342865A (en) | A kind of authentication encryption algorithm and decipherment algorithm based on SM4 | |
CN109150505A (en) | A kind of information transferring method and device for SAP system | |
CN102546152B (en) | Method for achieving multi-stage encryption and decryption of data | |
CN111010386B (en) | Privacy protection and data supervision control method based on shared account book | |
CN103746793B (en) | A kind of number form literary composition carries encryption and decryption approaches |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |