CN103684750B - The encryption and decryption approaches of file transmission - Google Patents

The encryption and decryption approaches of file transmission Download PDF

Info

Publication number
CN103684750B
CN103684750B CN201310636497.1A CN201310636497A CN103684750B CN 103684750 B CN103684750 B CN 103684750B CN 201310636497 A CN201310636497 A CN 201310636497A CN 103684750 B CN103684750 B CN 103684750B
Authority
CN
China
Prior art keywords
encryption
ciphertext
version number
file
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310636497.1A
Other languages
Chinese (zh)
Other versions
CN103684750A (en
Inventor
田雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Miles Intelligent Traffic Technology Co Ltd
Original Assignee
Wuhan Miles Intelligent Traffic Technology Co Ltd
Filing date
Publication date
Application filed by Wuhan Miles Intelligent Traffic Technology Co Ltd filed Critical Wuhan Miles Intelligent Traffic Technology Co Ltd
Priority to CN201310636497.1A priority Critical patent/CN103684750B/en
Publication of CN103684750A publication Critical patent/CN103684750A/en
Application granted granted Critical
Publication of CN103684750B publication Critical patent/CN103684750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the encryption and decryption approaches of a kind of file transmission, the method comprises the following steps: generate fileversion number;Fileversion number hash function encryption is produced version number's ciphertext;Version number's ciphertext is produced by iteration function iteration the initial key of file encryption;Version number is put in file, by Advanced Encryption Standard, file is encrypted;File cipher text and version number's ciphertext are issued recipient;Recipient is decrypted by input version number ciphertext.And implant in movable storage device by encrypting and decrypting program is encrypted and deciphered corresponding program; even if making decryption software stolen; ciphertext is stolen still cannot be carried out decryption oprerations, and the present invention is applied to the protection in LAN in file transmission, copy, can stop the illegal operation of file.

Description

The encryption and decryption approaches of file transmission
Technical field
The present invention relates to encryption and deciphering, the encryption transmitted in particular to a kind of file and the deciphering of file transmission Method.
Background technology
Growing along with hacking technique and Trojan Horse Technique, the transmission of enterprises file is very easy to be stolen, Thus bringing immeasurable loss to enterprise, it is therefore desirable in local area network, the transmission of file is encrypted guarantor Protect.
In existing LAN, file transmission encryption technology includes single channel encryption and encrypts on the local computer. Single channel encryption safety is high, is generally used in politics, military affairs, but its somewhat expensive is not suitable for ordinary enterprises. Local file encryption technology needs to carry out on the local computer, if hacker enter it is possible to steal ciphertext, The information such as key and software, encrypts file consequently, it is possible to crack, and brings hidden danger to file security, threatens enterprise The normal operation of industry.
Summary of the invention
Present invention aim to overcome that above-mentioned the deficiencies in the prior art and the encryption providing a kind of file to transmit is conciliate Decryption method.
Realize the encryption and decryption approaches that the object of the invention the technical scheme is that a kind of file transmits, bag Include:
Original document D is encrypted and obtains ciphertext;
The decryption program corresponding with described encryption is stored in mobile memory storage devices;
Described ciphertext is sent to recipient, and by movable storage device to recipient;
The decryption program in described movable storage device decryption software on local computer is combined by recipient Afterwards described ciphertext is decrypted.
In technique scheme, encryption includes:
Produce sequence version number A as original document D with random function, by described version number A and Described original document D sets up corresponding relation storage;
Described version number A MD5 is encrypted and obtains version number's ciphertext B;
Described version number ciphertext B is iterated with dissipating non-reversible function Fun, produces 128 AES and add The initial key C of close algorithm;
Described version number A is joined original document D obtains file E=(A, D) to be encrypted;
AES encryption algorithm is used to be encrypted, after being encrypted described file E=(A, D) to be encrypted File cipher text F=(A ', D ').
In technique scheme, deciphering includes:
After recipient receives described file cipher text F=(A ', D ') and version number's ciphertext B, input version number is close Literary composition B is in decryption software;
Described version number ciphertext B is iterated with dissipating non-reversible function Fun, after iteration, produces 128 The initial key C1 of AES encryption algorithm;
With described initial key C1 as the initial password of AES, decipher the version number A1 after A ' is deciphered;
Version number A1 MD5 after described deciphering is encrypted, obtains an encryption version to be verified Number ciphertext B1;
Version number's ciphertext B and encryption version ciphertext B1 to be verified are contrasted, if both are equal, then Being proved to be successful, continuation as the initial password deciphering D ' of AES, obtains original document D with initial key C1; If both are unequal, then exit decryption program, authentication failed.
The invention have the advantages that
1, the decryption program of decryption software is stored by movable storage device, when deployed, only Deciphering could be started after the decryption program in movable storage device decryption program on local computer being combined Software is decrypted, and otherwise cannot start decryption software.
2, the version number A of original document D is encrypted respectively by the inventive method with original document D, and to good Good person is associated, and only could be decrypted the ciphertext of original document after version number's successful decryption, increases Add the deciphering difficulty of cracker, add the cryptographic security of file.
3, the inventive method is in encryption and decryption processes, uses hash algorithm MD5 and senior AES encryption Version number A is encrypted by algorithm, can not cracking by dissipate that non-reversible function strengthens AES.
Accompanying drawing explanation
Fig. 1 is the flow chart of the encryption and decryption approaches of file of the present invention transmission.
Fig. 2 is the flow chart of encryption method in Fig. 1.
Fig. 3 is the flow chart of decryption method in Fig. 2.
Detailed description of the invention
With specific embodiment, the inventive method is described in further detail below in conjunction with the accompanying drawings.
As it is shown in figure 1, the encryption and decryption approaches of file transmission comprises the following steps:
Step S100, original document D is encrypted obtains ciphertext.
The present embodiment encryption method is as in figure 2 it is shown, specifically include following steps:
S101, produce sequence version number A as original document D with random function, by version number A Set up in the ciphering computer that corresponding relation is stored in this locality with original document D.
S102, being encrypted version number A MD5 and obtain version number's ciphertext B, the present embodiment is with Hash letter Number carries out md5 encryption and illustrates.
S103, version number's ciphertext B is iterated with dissipating non-reversible function Fun, produces 128 AES The initial key C of AES.
S104, version number A is joined original document D obtains file E=(A, D) to be encrypted.
S105, file E to be encrypted use AES encryption algorithm be encrypted, the file after being encrypted Ciphertext F=(A ', D ').
Step S200, by with step S100 encrypted corresponding decryption program be stored in mobile memory storage devices In.
Owing to encryption and deciphering are reverse engineerings, the program therefore encrypted and decipher has common portion Point, the program of this common part is stored in movable storage device, will be with decryption program corresponding to encryption It is stored in mobile memory storage devices, finally movable storage device is given to recipient, effectively increase solution The safety that close program starts.
Step S300, will file cipher text F=(A ', D ') after encryption and version number's ciphertext B in step S100 Pass to recipient.
Step S400, recipient are by the decryption program in movable storage device and the solution on local deciphering computer Close software could start decryption software after combining, and is decrypted described ciphertext.
The present embodiment decryption method is as it is shown on figure 3, specifically include following steps:
After S401, recipient receive file cipher text F=after encryption (A ', D ') and version number's ciphertext B, defeated Enter version number's ciphertext B in decryption software.
S402, version number's ciphertext B is iterated with dissipating non-reversible function Fun, after iteration, produces 128 The initial key C1 of position AES encryption algorithm.
S403, use initial key C1, as the initial password of AES, decipher the version number after A ' is deciphered A1。
S404, the version number A1 MD5 decrypted is encrypted, obtains an encrypted version to be verified This number ciphertext B1.Consistent with above-mentioned ciphering process, this step also carries out md5 encryption with hash function.
S405, version number's ciphertext B and encryption version ciphertext B1 to be verified are contrasted, if B and B1 is equal, then be proved to be successful, and continuation, obtains as the initial password deciphering D ' of AES with initial key C1 Original document D.
If S406 B with B1 is unequal, then exit decryption program, authentication failed.
The inventive method combines hash algorithm MD5 and senior AES encryption algorithm, non-reversible by dissipating What function strengthened AES can not be completely absent AES key information in cracking, and ciphertext, and will Encrypting and decrypting program is encrypted and is deciphered corresponding program implant in movable storage device, though decryption software Stolen, but owing to lacking the program of deciphering, thus also with the decryption software stolen, ciphertext cannot be solved Close operation, so that the transmission of file is more safe and reliable in LAN.Therefore, the inventive method is especially It is applicable to the transmission of file in LAN, it can be ensured that the safety of file transmission.

Claims (5)

1. the encryption and decryption approaches of file transmission in a LAN, it is characterised in that including:
Original document D is encrypted and obtains ciphertext;
The decryption program corresponding with described encryption is stored in movable storage device;
Described ciphertext is sent to recipient, and by movable storage device to recipient;
Described ciphertext is decrypted after being combined by the decryption software on local computer of the decryption program in described movable storage device by recipient;
Described encryption includes:
Produce the sequence version number A as original document D with random function, described version number A and described original document D is set up corresponding relation storage;
Described version number A MD5 is encrypted and obtains version number's ciphertext B;
Described version number ciphertext B is iterated with dissipating non-reversible function Fun, produces the initial key C of 128 AES encryption algorithms;
Described version number A is joined original document D obtains file E=(A, D) to be encrypted;
AES encryption algorithm is used to be encrypted described file E=(A, D) to be encrypted, file cipher text F=after being encrypted (A ', D ').
The encryption and decryption approaches of file transmission in LAN the most according to claim 1, it is characterised in that: by network, file cipher text F after described encryption and version number's ciphertext B are passed to recipient.
The encryption and decryption approaches of file transmission in LAN the most according to claim 1 or claim 2, it is characterised in that:
Version number's A hash function of described file is carried out md5 encryption and obtains version number's ciphertext B.
The encryption and decryption approaches of file transmission in LAN the most according to claim 2, it is characterised in that:
After recipient receives described file cipher text F=(A ', D ') and version number's ciphertext B, in input version number ciphertext B to decryption software;
Described version number ciphertext B is iterated with dissipating non-reversible function Fun, after iteration, produces the initial key C1 of 128 AES encryption algorithms;
With described initial key C1 as the initial password of AES, decipher the version number A1 after A ' is deciphered;
Version number A1 MD5 after described deciphering is encrypted, obtains encryption version ciphertext B1 to be verified;
Version number's ciphertext B and encryption version ciphertext B1 to be verified being contrasted, if both are equal, be then proved to be successful, continuation as the initial password deciphering D ' of AES, obtains original document D with initial key C1;If both are unequal, then exit decryption program, authentication failed.
The encryption and decryption approaches of file transmission in LAN the most according to claim 4, it is characterised in that:
Version number's A1 hash function after described deciphering is carried out md5 encryption and obtains encryption version ciphertext B1 to be verified.
CN201310636497.1A 2013-11-27 The encryption and decryption approaches of file transmission Active CN103684750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310636497.1A CN103684750B (en) 2013-11-27 The encryption and decryption approaches of file transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310636497.1A CN103684750B (en) 2013-11-27 The encryption and decryption approaches of file transmission

Publications (2)

Publication Number Publication Date
CN103684750A CN103684750A (en) 2014-03-26
CN103684750B true CN103684750B (en) 2016-11-30

Family

ID=

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN101122942A (en) * 2007-09-21 2008-02-13 北京飞天诚信科技有限公司 Data safe reading method and its safe storage device
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN101561751A (en) * 2009-04-30 2009-10-21 苏州国芯科技有限公司 USB encryption and decryption bridging chip
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN102547620A (en) * 2010-12-30 2012-07-04 同方股份有限公司 Mobile payment system and method for updating key
CN102722670A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Mobile storage equipment-based file protection method, equipment and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN101122942A (en) * 2007-09-21 2008-02-13 北京飞天诚信科技有限公司 Data safe reading method and its safe storage device
CN101561751A (en) * 2009-04-30 2009-10-21 苏州国芯科技有限公司 USB encryption and decryption bridging chip
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN102547620A (en) * 2010-12-30 2012-07-04 同方股份有限公司 Mobile payment system and method for updating key
CN102722670A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Mobile storage equipment-based file protection method, equipment and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Research on a Normal File Encryption and Decryption";Harouna Aboubacar;《中国优秀硕士学位论文全文数据库信息科技辑》;20100115;第I138-24页 *
"基于滚动自加密的安全存储技术";徐燕;《中国优秀硕士学位论文全文数据库信息科技辑》;20101015;第I137-19页 *
"文档防泄密系统中密钥管理和数据审计技术的研究与实现";温翔;《中国优秀硕士学位论文全文数据库信息科技辑》;20090115;第I139-258页 *

Similar Documents

Publication Publication Date Title
CN107294937B (en) Data transmission method based on network communication, client and server
CN103618607B (en) A kind of Security Data Transmission and key exchange method
CN101115060B (en) Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN103595721A (en) Safe sharing method, sharing device and sharing system for files of network disk
WO2014055148A2 (en) Cryptography and key management device and architecture
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
JP7160605B2 (en) Method and system for secure data transfer
CN107453880B (en) Cloud data secure storage method and system
GB2607846A (en) Dongle for ciphering data
CN110298186B (en) Non-key data encryption and decryption method based on dynamic reconfigurable cipher chip
CN103560892A (en) Secret key generation method and secret key generation device
CN113811874A (en) Encrypted data verification method
CN104243493A (en) Network identity authentication method and system
CN104239808A (en) Method and device for encryption transmission of data
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN102811124B (en) Based on the system Authentication method of two card trigram technology
CN102594549A (en) Multistage data encryption and decryption methods
CN112385175A (en) Device for data encryption and integrity
CN104866738A (en) Program code protection method and device
CN101325486B (en) Method and apparatus for transferring field permission cryptographic key
CN102546151A (en) Data encryption and decryption method
CN103684750B (en) The encryption and decryption approaches of file transmission
CN111541652B (en) System for improving security of secret information keeping and transmission
GB2579884A (en) Methods and systems of securely transferring data

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Tian Yu

Inventor before: Luo Jianguo

Inventor before: Zhang Xiaogang

Inventor before: Chen Jun

TA01 Transfer of patent application right

Effective date of registration: 20160926

Address after: 430062, 1-517, creative garden, No. two, 2 East Road, Wuchang District, Hubei, Wuhan

Applicant after: Wuhan miles Intelligent Traffic Technology Co., Ltd.

Address before: 430071 No. two, No. 28, democracy Road, Wuchang District, Hubei, Wuhan

Applicant before: the Science and Technology Research Institute of Wuhan Railway Administration

GR01 Patent grant