CN103117832A - High-intensity information encryption method - Google Patents

High-intensity information encryption method Download PDF

Info

Publication number
CN103117832A
CN103117832A CN2013100484433A CN201310048443A CN103117832A CN 103117832 A CN103117832 A CN 103117832A CN 2013100484433 A CN2013100484433 A CN 2013100484433A CN 201310048443 A CN201310048443 A CN 201310048443A CN 103117832 A CN103117832 A CN 103117832A
Authority
CN
China
Prior art keywords
file
encryption method
cryptogam
character
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100484433A
Other languages
Chinese (zh)
Inventor
李洪涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN2013100484433A priority Critical patent/CN103117832A/en
Publication of CN103117832A publication Critical patent/CN103117832A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A high-intensity information encryption method relates to an information encryption method. The information encryption method is characterized in that a transmitter and a receiver have the same password file, during encryption, information and a password file (also a messy code file) are added together to generate another messy code file which is transmitted to the receiver, namely the password file (the messy code file) serves as a carrier, and the information is filled into the password file (the messy code file) and then is transmitted to the receiver; and during decryption, the receiver subtracts the password file from the received messy code file, and restored information is obtained. The high-intensity information encryption method is extra high in encryption intensity, is just impossible to be decrypted, and accordingly can spread any information through mass communication paths (such as the internet).

Description

The high-strength information encryption method
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of information ciphering method.
Background technology
Along with the development of the Internet, more and more by the Internet transmission of information, it is more and more important that the privacy problem of information just seems people.If a kind of relieved encryption method of people that can definitely allow is arranged, so just can utilize the Internet to transmit important information, comprise information that some are secret etc.
Look back password in World War II and the war of liberation problem that is decrypted, being mainly that encryption method or password are regular seeks, if encrypted file is the file of a completely random, so just can never be decrypted, such as the file that 1000 characters are arranged, each character is random, each intercharacter is without any relation, at this moment just can not be decrypted, the code breaker must guess and each character, in fact this be not to decode, but fabricate the file of 1000 characters, and this document is zero with similitude between encrypted file.
Summary of the invention
The purpose of this invention is to provide a kind of high-strength information encryption method, the method is that randomness (random degree) is more high better to the requirement of cryptogam content.The random number that produces as computer is may confusion degree high not enough, can also other arbitrarily file add to improve confusion degree, as audio file, image file etc.The additive process of file can only make the confusion degree of file more and more higher.
High-strength information encryption method concrete steps of the present invention are as follows:
1, sender and recipient hold same cryptogam.
When 2, encrypting, added together information and this cryptogam (being also the mess code file), generation be still a mess code file with file, this mess code file transfer to the recipient, namely use cryptogam (mess code file) as carrier, information is packed into wherein, then issue the recipient.
When 3, deciphering, the recipient cuts cryptogam from the mess code file that receives, and what obtain is exactly the information of reduction.
The first character of two files (ASC code) addition (carry is given up) during the file addition, the first character of conduct as a result and file, again second character (ASC code) addition (carry is given up) of two files, second character of conduct as a result and file, the rest may be inferred by analogy.If cryptogam is shorter, the time from the beginning added again adding the last character symbol that is over.The length of cryptogam just can be any like this, is exactly circular treatment but do like this, is exactly a kind of rule, for others' deciphering provides opportunity, therefore the length of cryptogam should be too not short.The commonly several characters to tens of the Password Length character that in daily life, we adopt, but here owing to being the processing of employing computer, so need not lie in the length of password, such as the length that adopts 10k, at this moment it is absolutely not wanting to decode. we can make long cryptogam certainly, make the repetitive operation that does not produce when encrypting cryptogam, cipher round results at this moment is best.Cryptogam is grown complexity more again, and also it doesn't matter, because we do not need content is wherein carried out identification, it is a character string that supplies computer operation.General available computers produces a long random number sequence, and each numerical value is between 0-255, then changed, is stored as a binary file and gets final product.
Encryption method of the present invention is mainly used in the transmission of information, passes loser and recipient and should have same cryptogam, passes the loser added together file and the cryptogam that will transmit, then transmission, after the recipient receives file, therefrom cut cryptogam, the file that is transmitted has just reduced.
This kind method also can be used for the transmission of audio frequency, walkie-talkie as army, speaker's sound directly is converted to mp3 file by the single-chip microcomputer in walkie-talkie, with gone out by antenna transmission after cryptogam addition in machine, therefrom cut the cryptogam in machine after receiver is received, then playing back is exactly sound after reducing.Can only be noise and other machine is received.
Because this kind method Cipher Strength is high, may not decode, so can use mass diffusion path (as internet) to propagate any information.
Embodiment
Below as an example, select in this article two sections words as the file addition of two confusion degree not high (but identification), the confusion degree of observation and file just knows that different file additions can only make the confusion degree of file improve.
File 1: " requirement to the cryptogam content is that randomness (random degree) is more high better.The random number that produces as computer is may confusion degree high not enough, can also other arbitrarily file add to improve confusion degree, as audio file, image file etc.The additive process of file can only make the confusion degree of file more and more higher.”
File 2: " be the first character of two files (ASC code) addition (carry is given up) during the file addition; the first character of conduct as a result and file; again second character (ASC code) addition (carry is given up) of two files; second character of conduct as a result and file, the rest may be inferred by analogy.If cryptogam is shorter, the time from the beginning added again adding the last character symbol that is over.”
After two file additions with file be: " the close Marvin's spare phase of ridge holds lamp and requires mixed summary degree (the clear degree of object for appreciation machine) the high key of paper of sugar good.Refined meter Sui machine produce marrow machine number the Liao Dynasty of collapsing can live random journey irrigate also enough high ガ of step also gram carry lamb confusion dike degree with the foot of a hill or mountain that the heart spare cheek of its sword meaning of wriggling is entered. as civilian in the sound magpie, figure ulcer literary composition etc.Heart spare lamp phase accretion journey paper can make the chaotic dike degree of heart spare lamp key come more ".
The confusion degree of visible mutation has had very large increase, seems to have a mess code, but random not enough, and is more random better.
If select a file 3 that confusion degree is higher, as:
File 1 and file 3 additions, obtain file 4 and be:
Figure 2013100484433100002DEST_PATH_IMAGE004
File 4 has become mess code thoroughly, and anyone also can't therefrom extract Useful Information, but for grasping the people that cryptogam 3 is arranged in hand, from file 4, file 3 is cut and just recovered file 1.

Claims (6)

1. high-strength information encryption method is characterized in that described encryption method is as follows:
(1) sender and recipient hold same cryptogam;
When (2) encrypting, added together information and this cryptogam, generation with file be a mess code file, this mess code file transfer to the recipient;
When (3) deciphering, the recipient cuts cryptogam from the mess code file that receives, and what obtain is exactly the information of reduction.
2. high-strength information encryption method according to claim 1, is characterized in that described cryptogam is the mess code file.
3. high-strength information encryption method according to claim 1 and 2, when it is characterized in that described file addition, the first character addition of information and two files of cryptogam, carry is given up, the first character of conduct as a result and file, then second character addition of two files, carry is given up, second character of conduct as a result and file, by that analogy.
4. high-strength information encryption method according to claim 3, is characterized in that described character is the ASC code.
5. from the beginning high-strength information encryption method according to claim 3 if it is characterized in that cryptogam is shorter, has added when being over the last character symbol adding again.
6. high-strength information encryption method according to claim 1 and 2, is characterized in that described cryptogam available computers produces a long random number sequence, and each numerical value is between 0-255, then changed, is stored as a binary file and gets final product.
CN2013100484433A 2013-02-07 2013-02-07 High-intensity information encryption method Pending CN103117832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100484433A CN103117832A (en) 2013-02-07 2013-02-07 High-intensity information encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100484433A CN103117832A (en) 2013-02-07 2013-02-07 High-intensity information encryption method

Publications (1)

Publication Number Publication Date
CN103117832A true CN103117832A (en) 2013-05-22

Family

ID=48416115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100484433A Pending CN103117832A (en) 2013-02-07 2013-02-07 High-intensity information encryption method

Country Status (1)

Country Link
CN (1) CN103117832A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1992002089A1 (en) * 1990-07-20 1992-02-06 Ericsson Ge Mobile Communications Holding Inc. Encryption system for digital cellular communications
US20060029230A1 (en) * 1999-03-03 2006-02-09 Nobuyuki Kihara Recording apparatus, recording method, reproducing apparatus, and reproducing method
CN101461173A (en) * 2005-07-28 2009-06-17 朗迅科技公司 Method of symmetric key data encryption
CN101533435A (en) * 2009-04-16 2009-09-16 北京水晶石数字科技有限公司 Methods for generating and verifying serial numbers
CN102904711A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1992002089A1 (en) * 1990-07-20 1992-02-06 Ericsson Ge Mobile Communications Holding Inc. Encryption system for digital cellular communications
US20060029230A1 (en) * 1999-03-03 2006-02-09 Nobuyuki Kihara Recording apparatus, recording method, reproducing apparatus, and reproducing method
CN101461173A (en) * 2005-07-28 2009-06-17 朗迅科技公司 Method of symmetric key data encryption
CN101533435A (en) * 2009-04-16 2009-09-16 北京水晶石数字科技有限公司 Methods for generating and verifying serial numbers
CN102904711A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Information encrypting method

Similar Documents

Publication Publication Date Title
CN104052658A (en) Privacy protection system and method based on social network
EP3178190B1 (en) Encoder, decoder and method
CN102546181A (en) Cloud storage encrypting and deciphering method based on secret key pool
US20140270165A1 (en) Cryptographic system based on reproducible random sequences
CN103634100B (en) Encryption method and device
CN106254074A (en) A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption
CN110704854B (en) Stream type encryption method aiming at text data reserved format
Rachmawati et al. Hybrid cryptosystem using tiny encryption algorithm and LUC algorithm
Ghosh et al. Hiding based message communication techniques depends on divide and conquer approach
CN106936763A (en) Data encryption and the method and apparatus of decryption
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
CN103338106A (en) Methods and devices for ciphering and deciphering file
Bangera et al. Multilayer security using RSA cryptography and dual audio steganography
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN106161036B (en) A kind of mobile station (MS) state transition method and system of credit
Kadam et al. Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique
CN104159118A (en) Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
JP2017527225A (en) Cryptographic system reproducible random sequence
CN116566597A (en) Controllable security level covert communication method based on bit coin address confusion ciphertext
CN103117832A (en) High-intensity information encryption method
US11212097B2 (en) Mixed unary cryptography
Alqahtani et al. New approach of Arabic encryption/decryption technique using Vigenere cipher on mod 39
CN108777611A (en) Doubly linked list ordered encryption decryption method based on dual key stream cipher
CN104022865A (en) Encrypted transmission method of network data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130522