CN104022865A - Encrypted transmission method of network data - Google Patents
Encrypted transmission method of network data Download PDFInfo
- Publication number
- CN104022865A CN104022865A CN201410176746.8A CN201410176746A CN104022865A CN 104022865 A CN104022865 A CN 104022865A CN 201410176746 A CN201410176746 A CN 201410176746A CN 104022865 A CN104022865 A CN 104022865A
- Authority
- CN
- China
- Prior art keywords
- data
- recipient
- data block
- hash codes
- transmit leg
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to an encrypted transmission method of network data. One-dimensional byte data is converted into a three-dimensional data model in a mathematic method, a lot of random scrambling codes are added to the three-dimensional data model (according to measurement and calculation, the ratio of scrambling codes to effective codes is between 3 to 1 and 1.5 to 1), and the three-dimensional data model is returned to one-dimensional data for transmission. Thus, plaintext data is decomposed into fragments in the unit of byte, and the fragments are distributed in a cryptograph, thereby effectively avoiding violent decryption or decryption via guessing (the encryption combinatorial complexity exceeds 2^400); and due to full arithmetic operation, the method has the advantage that encryption and decryption are rapid.
Description
Technical field
The present invention is applicable to data encryption and safe transmission field.
Background technology
Be accompanied by network and start the every aspect that infiltration has influence on people's life; the diverse network business rapid rising such as ecommerce, digital cash, the Internet bank; the confidentiality of people in network activity requires also more and more higher, and how protected data makes it not safely to be stolen, is not tampered or the problem such as destruction is more and more subject to people's attention.The key addressing these problems is exactly data encryption technology.This encryption method is based on a kind of very ancient information encryption transmission method, ancient times, the offices and men of frontier juncture are by thickly dotted being wrapped on the different rod of a Gent of very narrow very narrow animal skin bar, then start rotating rod and on animal skin, write military situation confidential information, finally animal skin bar is taken off to (these words have just become desultory point one by one on animal skin bar, cannot its Chinese word of Direct Recognition), then allow soldier that animal skin bar is sent to imperial palace, imperial palace personnel are wrapped with animal skin bar just and can recover raw information with the duplicate waddy of offices and men with one.This cryptographic algorithm is exactly to adopt computer program to realize and improved improvement based on above principle.
Summary of the invention
The object of the invention is to provides a kind of safe and reliable efficient data ciphering method for network data transmission, utilize this encryption method, can realize fast the encryption of data, its secret key length and the random interference code generating are to Brute Force and guess that solution has good precaution.
A network data encryption transmission method, feature of the present invention is,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
The invention has the beneficial effects as follows, the possibility (secret key combines complicated intensity and surpassed 2^400) that can effectively take precautions against Brute Force or guess solution, due to full arithmetic operator, has advantages of that encryption/decryption speed is fast.
Accompanying drawing explanation
Fig. 1 is encryption and decryption operation and mutual schematic diagram.
Embodiment
As Fig. 1, a kind of network data encryption transmission method, feature of the present invention is,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
Embodiment
A kind of network data encryption transmission method of the present invention encryption section is realized according to following manner:
Generate random 128 character strings that long pure digi-tal forms, clear data is carried out to base64 coding and calculate cryptographic Hash, send to together recipient.
Clear data is carried out to base64 coding, then read into by numeral 0 and 1 bit stream forming by byte stream.
Get the first bit digital of secret key, be assumed to be n(and 0 and 1 need do special processing if), generate the two-dimensional array a (can be understood as the matrix of a n x n) of a n x n, then from the bit stream of the 2nd step, read 4x(n-1) individual bit, insert one by one successively the outermost of matrix, then the element of not inserting data in array is filled up with random 0 and 1, by certain rule, all elements in array is read out and is combined into a new bit stream again, this has just formed the first of encrypt data.
Get successively all the other positions of secret key, carry out the processing of the 3rd step, after all newly-generated bit stream being appended to the last bit stream producing at every turn.
If expressly shorter, the bitstream data generating is less, during to a certain position of secret key, data are all processed, still repeat the 4th step and start the data generator matrix that extracts 10 to 20 random lengths reciprocal from secret key ending, insert random number, guarantee that plaintext also can guarantee its ciphertext complexity (preventing from guessing solution with progressively lengthening length of the plaintext) in the time of shorter.If expressly long, cause bit flow data longer, after processing by the 4th step, still have bit flow data untreated, repeat the step of 3-4.If remaining bit stream is fewer after repeatedly processing, repeat 5 steps of randomly drawing secret key generator matrix, guarantee that the each ciphertext generating of same data is likely different.
The decryption portion of a kind of network data encryption transmission method of the present invention realizes according to following manner:
1. receive after encrypt data, the reverse process being encrypted according to secret key, extracts wherein effectively bit position and forms new bit stream, restores the character string of former base64 coding, then decodes by base64, restores preliminary plaintext;
2. calculate the Hash codes of the plaintext of the 1st step generation, if consistent with the Hash codes receiving, think and be reduced into correct plaintext, if inconsistent, by the last position of secret key, start generator matrix calculating bit length stream cipher is carried out to amputation, then regenerate Hash codes contrast, until Hash codes unanimously successfully restores expressly.
Claims (1)
1. a network data encryption transmission method, is characterized in that,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410176746.8A CN104022865A (en) | 2014-04-29 | 2014-04-29 | Encrypted transmission method of network data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410176746.8A CN104022865A (en) | 2014-04-29 | 2014-04-29 | Encrypted transmission method of network data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104022865A true CN104022865A (en) | 2014-09-03 |
Family
ID=51439451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410176746.8A Pending CN104022865A (en) | 2014-04-29 | 2014-04-29 | Encrypted transmission method of network data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104022865A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107861892A (en) * | 2017-09-26 | 2018-03-30 | 大唐微电子技术有限公司 | A kind of method and terminal for realizing data processing |
CN108632197A (en) * | 2017-03-15 | 2018-10-09 | 华为技术有限公司 | A kind of content verification method and apparatus |
CN113572786A (en) * | 2021-08-05 | 2021-10-29 | 梁德群 | Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1863042A (en) * | 2005-12-13 | 2006-11-15 | 华为技术有限公司 | Method for information encryption |
US20080080709A1 (en) * | 1999-04-27 | 2008-04-03 | Antibody Software Inc. | Method for encrypting information and device for realization of the method |
CN102064936A (en) * | 2010-11-29 | 2011-05-18 | 北京卓微天成科技咨询有限公司 | Data encryption and decryption methods and devices |
-
2014
- 2014-04-29 CN CN201410176746.8A patent/CN104022865A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080080709A1 (en) * | 1999-04-27 | 2008-04-03 | Antibody Software Inc. | Method for encrypting information and device for realization of the method |
CN1863042A (en) * | 2005-12-13 | 2006-11-15 | 华为技术有限公司 | Method for information encryption |
CN102064936A (en) * | 2010-11-29 | 2011-05-18 | 北京卓微天成科技咨询有限公司 | Data encryption and decryption methods and devices |
Non-Patent Citations (1)
Title |
---|
孟凯、闫宏印: "《密文数据库的快速查询》", 《电脑开发与应用》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632197A (en) * | 2017-03-15 | 2018-10-09 | 华为技术有限公司 | A kind of content verification method and apparatus |
CN107861892A (en) * | 2017-09-26 | 2018-03-30 | 大唐微电子技术有限公司 | A kind of method and terminal for realizing data processing |
CN107861892B (en) * | 2017-09-26 | 2021-08-03 | 大唐微电子技术有限公司 | Method and terminal for realizing data processing |
CN113572786A (en) * | 2021-08-05 | 2021-10-29 | 梁德群 | Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths |
CN113572786B (en) * | 2021-08-05 | 2023-04-18 | 梁德群 | Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9350544B2 (en) | Apparatus for encrypting data | |
CN108964872B (en) | Encryption method and device based on AES | |
CN110313146A (en) | Fuzziness enhancing | |
CN109194461A (en) | Single-track link table ordered encryption decryption method based on dual key stream cipher | |
CN109951268B (en) | Encryption and decryption method and device based on bit permutation and bit permutation | |
CN109861810A (en) | A kind of data ciphering method and decryption method based on chaos Tuber yield | |
CN104396182A (en) | Method of encrypting data | |
CN105282090A (en) | Public URL encryption coding method for preventing illegal access on internet | |
CN104022865A (en) | Encrypted transmission method of network data | |
CN110096851B (en) | Byte code encryption method and system | |
JP5992651B2 (en) | ENCRYPTION METHOD, PROGRAM, AND SYSTEM | |
CN103117850A (en) | Cryptosystem based on random sequence database | |
Kumar et al. | Performance evaluation of encryption/decryption mechanisms to enhance data security | |
CN103595524B (en) | A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher | |
CN111314270B (en) | Data encryption and decryption method based on validity period uniform distribution symmetric algorithm | |
Patel et al. | A survey of information hiding techniques | |
CN108777611A (en) | Doubly linked list ordered encryption decryption method based on dual key stream cipher | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
CN101159546A (en) | E-mail encryption transmitting-receiving system | |
CN108777622B (en) | Binary stream hash modular encryption and decryption method | |
Vijayan et al. | ASCII value based encryption system (AVB) | |
CN111314052B (en) | Data encryption and decryption method | |
JP2005114870A (en) | Cryptocommunication system | |
CN111314053B (en) | Data encryption and decryption method | |
AB et al. | A New Security Mechanism for Secured Communications Using Steganography and CBA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140903 |