CN103117832A - High-intensity information encryption method - Google Patents
High-intensity information encryption method Download PDFInfo
- Publication number
- CN103117832A CN103117832A CN2013100484433A CN201310048443A CN103117832A CN 103117832 A CN103117832 A CN 103117832A CN 2013100484433 A CN2013100484433 A CN 2013100484433A CN 201310048443 A CN201310048443 A CN 201310048443A CN 103117832 A CN103117832 A CN 103117832A
- Authority
- CN
- China
- Prior art keywords
- file
- encryption method
- cryptogam
- character
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
A high-intensity information encryption method relates to an information encryption method. The information encryption method is characterized in that a transmitter and a receiver have the same password file, during encryption, information and a password file (also a messy code file) are added together to generate another messy code file which is transmitted to the receiver, namely the password file (the messy code file) serves as a carrier, and the information is filled into the password file (the messy code file) and then is transmitted to the receiver; and during decryption, the receiver subtracts the password file from the received messy code file, and restored information is obtained. The high-intensity information encryption method is extra high in encryption intensity, is just impossible to be decrypted, and accordingly can spread any information through mass communication paths (such as the internet).
Description
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of information ciphering method.
Background technology
Along with the development of the Internet, more and more by the Internet transmission of information, it is more and more important that the privacy problem of information just seems people.If a kind of relieved encryption method of people that can definitely allow is arranged, so just can utilize the Internet to transmit important information, comprise information that some are secret etc.
Look back password in World War II and the war of liberation problem that is decrypted, being mainly that encryption method or password are regular seeks, if encrypted file is the file of a completely random, so just can never be decrypted, such as the file that 1000 characters are arranged, each character is random, each intercharacter is without any relation, at this moment just can not be decrypted, the code breaker must guess and each character, in fact this be not to decode, but fabricate the file of 1000 characters, and this document is zero with similitude between encrypted file.
Summary of the invention
The purpose of this invention is to provide a kind of high-strength information encryption method, the method is that randomness (random degree) is more high better to the requirement of cryptogam content.The random number that produces as computer is may confusion degree high not enough, can also other arbitrarily file add to improve confusion degree, as audio file, image file etc.The additive process of file can only make the confusion degree of file more and more higher.
High-strength information encryption method concrete steps of the present invention are as follows:
1, sender and recipient hold same cryptogam.
When 2, encrypting, added together information and this cryptogam (being also the mess code file), generation be still a mess code file with file, this mess code file transfer to the recipient, namely use cryptogam (mess code file) as carrier, information is packed into wherein, then issue the recipient.
When 3, deciphering, the recipient cuts cryptogam from the mess code file that receives, and what obtain is exactly the information of reduction.
The first character of two files (ASC code) addition (carry is given up) during the file addition, the first character of conduct as a result and file, again second character (ASC code) addition (carry is given up) of two files, second character of conduct as a result and file, the rest may be inferred by analogy.If cryptogam is shorter, the time from the beginning added again adding the last character symbol that is over.The length of cryptogam just can be any like this, is exactly circular treatment but do like this, is exactly a kind of rule, for others' deciphering provides opportunity, therefore the length of cryptogam should be too not short.The commonly several characters to tens of the Password Length character that in daily life, we adopt, but here owing to being the processing of employing computer, so need not lie in the length of password, such as the length that adopts 10k, at this moment it is absolutely not wanting to decode. we can make long cryptogam certainly, make the repetitive operation that does not produce when encrypting cryptogam, cipher round results at this moment is best.Cryptogam is grown complexity more again, and also it doesn't matter, because we do not need content is wherein carried out identification, it is a character string that supplies computer operation.General available computers produces a long random number sequence, and each numerical value is between 0-255, then changed, is stored as a binary file and gets final product.
Encryption method of the present invention is mainly used in the transmission of information, passes loser and recipient and should have same cryptogam, passes the loser added together file and the cryptogam that will transmit, then transmission, after the recipient receives file, therefrom cut cryptogam, the file that is transmitted has just reduced.
This kind method also can be used for the transmission of audio frequency, walkie-talkie as army, speaker's sound directly is converted to mp3 file by the single-chip microcomputer in walkie-talkie, with gone out by antenna transmission after cryptogam addition in machine, therefrom cut the cryptogam in machine after receiver is received, then playing back is exactly sound after reducing.Can only be noise and other machine is received.
Because this kind method Cipher Strength is high, may not decode, so can use mass diffusion path (as internet) to propagate any information.
Embodiment
Below as an example, select in this article two sections words as the file addition of two confusion degree not high (but identification), the confusion degree of observation and file just knows that different file additions can only make the confusion degree of file improve.
File 1: " requirement to the cryptogam content is that randomness (random degree) is more high better.The random number that produces as computer is may confusion degree high not enough, can also other arbitrarily file add to improve confusion degree, as audio file, image file etc.The additive process of file can only make the confusion degree of file more and more higher.”
File 2: " be the first character of two files (ASC code) addition (carry is given up) during the file addition; the first character of conduct as a result and file; again second character (ASC code) addition (carry is given up) of two files; second character of conduct as a result and file, the rest may be inferred by analogy.If cryptogam is shorter, the time from the beginning added again adding the last character symbol that is over.”
After two file additions with file be: " the close Marvin's spare phase of ridge holds lamp and requires mixed summary degree (the clear degree of object for appreciation machine) the high key of paper of sugar good.Refined meter Sui machine produce marrow machine number the Liao Dynasty of collapsing can live random journey irrigate also enough high ガ of step also gram carry lamb confusion dike degree with the foot of a hill or mountain that the heart spare cheek of its sword meaning of wriggling is entered. as civilian in the sound magpie, figure ulcer literary composition etc.Heart spare lamp phase accretion journey paper can make the chaotic dike degree of heart spare lamp key come more ".
The confusion degree of visible mutation has had very large increase, seems to have a mess code, but random not enough, and is more random better.
If select a file 3 that confusion degree is higher, as:
File 1 and file 3 additions, obtain file 4 and be:
File 4 has become mess code thoroughly, and anyone also can't therefrom extract Useful Information, but for grasping the people that cryptogam 3 is arranged in hand, from file 4, file 3 is cut and just recovered file 1.
Claims (6)
1. high-strength information encryption method is characterized in that described encryption method is as follows:
(1) sender and recipient hold same cryptogam;
When (2) encrypting, added together information and this cryptogam, generation with file be a mess code file, this mess code file transfer to the recipient;
When (3) deciphering, the recipient cuts cryptogam from the mess code file that receives, and what obtain is exactly the information of reduction.
2. high-strength information encryption method according to claim 1, is characterized in that described cryptogam is the mess code file.
3. high-strength information encryption method according to claim 1 and 2, when it is characterized in that described file addition, the first character addition of information and two files of cryptogam, carry is given up, the first character of conduct as a result and file, then second character addition of two files, carry is given up, second character of conduct as a result and file, by that analogy.
4. high-strength information encryption method according to claim 3, is characterized in that described character is the ASC code.
5. from the beginning high-strength information encryption method according to claim 3 if it is characterized in that cryptogam is shorter, has added when being over the last character symbol adding again.
6. high-strength information encryption method according to claim 1 and 2, is characterized in that described cryptogam available computers produces a long random number sequence, and each numerical value is between 0-255, then changed, is stored as a binary file and gets final product.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100484433A CN103117832A (en) | 2013-02-07 | 2013-02-07 | High-intensity information encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100484433A CN103117832A (en) | 2013-02-07 | 2013-02-07 | High-intensity information encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103117832A true CN103117832A (en) | 2013-05-22 |
Family
ID=48416115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013100484433A Pending CN103117832A (en) | 2013-02-07 | 2013-02-07 | High-intensity information encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103117832A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1992002089A1 (en) * | 1990-07-20 | 1992-02-06 | Ericsson Ge Mobile Communications Holding Inc. | Encryption system for digital cellular communications |
US20060029230A1 (en) * | 1999-03-03 | 2006-02-09 | Nobuyuki Kihara | Recording apparatus, recording method, reproducing apparatus, and reproducing method |
CN101461173A (en) * | 2005-07-28 | 2009-06-17 | 朗迅科技公司 | Method of symmetric key data encryption |
CN101533435A (en) * | 2009-04-16 | 2009-09-16 | 北京水晶石数字科技有限公司 | Methods for generating and verifying serial numbers |
CN102904711A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
-
2013
- 2013-02-07 CN CN2013100484433A patent/CN103117832A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1992002089A1 (en) * | 1990-07-20 | 1992-02-06 | Ericsson Ge Mobile Communications Holding Inc. | Encryption system for digital cellular communications |
US20060029230A1 (en) * | 1999-03-03 | 2006-02-09 | Nobuyuki Kihara | Recording apparatus, recording method, reproducing apparatus, and reproducing method |
CN101461173A (en) * | 2005-07-28 | 2009-06-17 | 朗迅科技公司 | Method of symmetric key data encryption |
CN101533435A (en) * | 2009-04-16 | 2009-09-16 | 北京水晶石数字科技有限公司 | Methods for generating and verifying serial numbers |
CN102904711A (en) * | 2011-07-25 | 2013-01-30 | 深圳市金溢科技有限公司 | Information encrypting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104052658A (en) | Privacy protection system and method based on social network | |
EP3178190B1 (en) | Encoder, decoder and method | |
CN102546181A (en) | Cloud storage encrypting and deciphering method based on secret key pool | |
US20140270165A1 (en) | Cryptographic system based on reproducible random sequences | |
CN103634100B (en) | Encryption method and device | |
CN106254074A (en) | A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
Rachmawati et al. | Hybrid cryptosystem using tiny encryption algorithm and LUC algorithm | |
Ghosh et al. | Hiding based message communication techniques depends on divide and conquer approach | |
CN106936763A (en) | Data encryption and the method and apparatus of decryption | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
Bangera et al. | Multilayer security using RSA cryptography and dual audio steganography | |
Yahaya et al. | Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN106161036B (en) | A kind of mobile station (MS) state transition method and system of credit | |
Kadam et al. | Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique | |
CN104159118A (en) | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm | |
JP2017527225A (en) | Cryptographic system reproducible random sequence | |
CN116566597A (en) | Controllable security level covert communication method based on bit coin address confusion ciphertext | |
CN103117832A (en) | High-intensity information encryption method | |
US11212097B2 (en) | Mixed unary cryptography | |
Alqahtani et al. | New approach of Arabic encryption/decryption technique using Vigenere cipher on mod 39 | |
CN108777611A (en) | Doubly linked list ordered encryption decryption method based on dual key stream cipher | |
CN104022865A (en) | Encrypted transmission method of network data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130522 |