CN104022865A - Encrypted transmission method of network data - Google Patents

Encrypted transmission method of network data Download PDF

Info

Publication number
CN104022865A
CN104022865A CN201410176746.8A CN201410176746A CN104022865A CN 104022865 A CN104022865 A CN 104022865A CN 201410176746 A CN201410176746 A CN 201410176746A CN 104022865 A CN104022865 A CN 104022865A
Authority
CN
China
Prior art keywords
data
recipient
data block
hash codes
transmit leg
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410176746.8A
Other languages
Chinese (zh)
Inventor
普钢
张富华
孙银博
吕垚
余琳
张劲松
肖巧
李兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Power Grid Co Ltd
Tongfang Technology of Yunnan Power Grid Co Ltd
Original Assignee
Yunnan Power Grid Co Ltd
Tongfang Technology of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Power Grid Co Ltd, Tongfang Technology of Yunnan Power Grid Co Ltd filed Critical Yunnan Power Grid Co Ltd
Priority to CN201410176746.8A priority Critical patent/CN104022865A/en
Publication of CN104022865A publication Critical patent/CN104022865A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an encrypted transmission method of network data. One-dimensional byte data is converted into a three-dimensional data model in a mathematic method, a lot of random scrambling codes are added to the three-dimensional data model (according to measurement and calculation, the ratio of scrambling codes to effective codes is between 3 to 1 and 1.5 to 1), and the three-dimensional data model is returned to one-dimensional data for transmission. Thus, plaintext data is decomposed into fragments in the unit of byte, and the fragments are distributed in a cryptograph, thereby effectively avoiding violent decryption or decryption via guessing (the encryption combinatorial complexity exceeds 2^400); and due to full arithmetic operation, the method has the advantage that encryption and decryption are rapid.

Description

A kind of network data encryption transmission method
Technical field
The present invention is applicable to data encryption and safe transmission field.
Background technology
Be accompanied by network and start the every aspect that infiltration has influence on people's life; the diverse network business rapid rising such as ecommerce, digital cash, the Internet bank; the confidentiality of people in network activity requires also more and more higher, and how protected data makes it not safely to be stolen, is not tampered or the problem such as destruction is more and more subject to people's attention.The key addressing these problems is exactly data encryption technology.This encryption method is based on a kind of very ancient information encryption transmission method, ancient times, the offices and men of frontier juncture are by thickly dotted being wrapped on the different rod of a Gent of very narrow very narrow animal skin bar, then start rotating rod and on animal skin, write military situation confidential information, finally animal skin bar is taken off to (these words have just become desultory point one by one on animal skin bar, cannot its Chinese word of Direct Recognition), then allow soldier that animal skin bar is sent to imperial palace, imperial palace personnel are wrapped with animal skin bar just and can recover raw information with the duplicate waddy of offices and men with one.This cryptographic algorithm is exactly to adopt computer program to realize and improved improvement based on above principle.
Summary of the invention
The object of the invention is to provides a kind of safe and reliable efficient data ciphering method for network data transmission, utilize this encryption method, can realize fast the encryption of data, its secret key length and the random interference code generating are to Brute Force and guess that solution has good precaution.
A network data encryption transmission method, feature of the present invention is,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
The invention has the beneficial effects as follows, the possibility (secret key combines complicated intensity and surpassed 2^400) that can effectively take precautions against Brute Force or guess solution, due to full arithmetic operator, has advantages of that encryption/decryption speed is fast.
Accompanying drawing explanation
Fig. 1 is encryption and decryption operation and mutual schematic diagram.
Embodiment
As Fig. 1, a kind of network data encryption transmission method, feature of the present invention is,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
Embodiment
A kind of network data encryption transmission method of the present invention encryption section is realized according to following manner:
Generate random 128 character strings that long pure digi-tal forms, clear data is carried out to base64 coding and calculate cryptographic Hash, send to together recipient.
Clear data is carried out to base64 coding, then read into by numeral 0 and 1 bit stream forming by byte stream.
Get the first bit digital of secret key, be assumed to be n(and 0 and 1 need do special processing if), generate the two-dimensional array a (can be understood as the matrix of a n x n) of a n x n, then from the bit stream of the 2nd step, read 4x(n-1) individual bit, insert one by one successively the outermost of matrix, then the element of not inserting data in array is filled up with random 0 and 1, by certain rule, all elements in array is read out and is combined into a new bit stream again, this has just formed the first of encrypt data.
Get successively all the other positions of secret key, carry out the processing of the 3rd step, after all newly-generated bit stream being appended to the last bit stream producing at every turn.
If expressly shorter, the bitstream data generating is less, during to a certain position of secret key, data are all processed, still repeat the 4th step and start the data generator matrix that extracts 10 to 20 random lengths reciprocal from secret key ending, insert random number, guarantee that plaintext also can guarantee its ciphertext complexity (preventing from guessing solution with progressively lengthening length of the plaintext) in the time of shorter.If expressly long, cause bit flow data longer, after processing by the 4th step, still have bit flow data untreated, repeat the step of 3-4.If remaining bit stream is fewer after repeatedly processing, repeat 5 steps of randomly drawing secret key generator matrix, guarantee that the each ciphertext generating of same data is likely different.
The decryption portion of a kind of network data encryption transmission method of the present invention realizes according to following manner:
1. receive after encrypt data, the reverse process being encrypted according to secret key, extracts wherein effectively bit position and forms new bit stream, restores the character string of former base64 coding, then decodes by base64, restores preliminary plaintext;
2. calculate the Hash codes of the plaintext of the 1st step generation, if consistent with the Hash codes receiving, think and be reduced into correct plaintext, if inconsistent, by the last position of secret key, start generator matrix calculating bit length stream cipher is carried out to amputation, then regenerate Hash codes contrast, until Hash codes unanimously successfully restores expressly.

Claims (1)

1. a network data encryption transmission method, is characterized in that,
1) transmit leg generates the character strings that random 128 long pure digi-tal form, and clear data is calculated to a Hash codes by secure tunnel, sends to recipient together, and recipient receives and buffer memory;
2) transmit leg carries out plaintext base64 coding and changes into 0-1 byte stream, then according to cipher key feature, cuts into the not not isometric data block of determined number;
3) each data block that transmit leg generates the 2nd step according to cipher key feature generates an elongated two-dimensional array, and the bytecode of data block is write to array by certain rule, is not inserting the random number of inserting 0-1 in the array element of data, produces interference code;
4) each data block that comprises interference code is reconnected and forms encrypt data together, send to recipient;
5) recipient receives after encrypt data, and the secret key receiving by the first step is decrypted reduction to data, and the plaintext decrypting is calculated to the Hash codes that Hash codes and the first step receive contrasts, and whether effectively checks data.
CN201410176746.8A 2014-04-29 2014-04-29 Encrypted transmission method of network data Pending CN104022865A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410176746.8A CN104022865A (en) 2014-04-29 2014-04-29 Encrypted transmission method of network data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410176746.8A CN104022865A (en) 2014-04-29 2014-04-29 Encrypted transmission method of network data

Publications (1)

Publication Number Publication Date
CN104022865A true CN104022865A (en) 2014-09-03

Family

ID=51439451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410176746.8A Pending CN104022865A (en) 2014-04-29 2014-04-29 Encrypted transmission method of network data

Country Status (1)

Country Link
CN (1) CN104022865A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107861892A (en) * 2017-09-26 2018-03-30 大唐微电子技术有限公司 A kind of method and terminal for realizing data processing
CN108632197A (en) * 2017-03-15 2018-10-09 华为技术有限公司 A kind of content verification method and apparatus
CN113572786A (en) * 2021-08-05 2021-10-29 梁德群 Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1863042A (en) * 2005-12-13 2006-11-15 华为技术有限公司 Method for information encryption
US20080080709A1 (en) * 1999-04-27 2008-04-03 Antibody Software Inc. Method for encrypting information and device for realization of the method
CN102064936A (en) * 2010-11-29 2011-05-18 北京卓微天成科技咨询有限公司 Data encryption and decryption methods and devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080080709A1 (en) * 1999-04-27 2008-04-03 Antibody Software Inc. Method for encrypting information and device for realization of the method
CN1863042A (en) * 2005-12-13 2006-11-15 华为技术有限公司 Method for information encryption
CN102064936A (en) * 2010-11-29 2011-05-18 北京卓微天成科技咨询有限公司 Data encryption and decryption methods and devices

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孟凯、闫宏印: "《密文数据库的快速查询》", 《电脑开发与应用》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632197A (en) * 2017-03-15 2018-10-09 华为技术有限公司 A kind of content verification method and apparatus
CN107861892A (en) * 2017-09-26 2018-03-30 大唐微电子技术有限公司 A kind of method and terminal for realizing data processing
CN107861892B (en) * 2017-09-26 2021-08-03 大唐微电子技术有限公司 Method and terminal for realizing data processing
CN113572786A (en) * 2021-08-05 2021-10-29 梁德群 Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths
CN113572786B (en) * 2021-08-05 2023-04-18 梁德群 Method for encrypting and decrypting plaintext formed by binary intercepted words with different lengths

Similar Documents

Publication Publication Date Title
US9350544B2 (en) Apparatus for encrypting data
CN108964872B (en) Encryption method and device based on AES
CN110313146A (en) Fuzziness enhancing
CN109194461A (en) Single-track link table ordered encryption decryption method based on dual key stream cipher
CN109951268B (en) Encryption and decryption method and device based on bit permutation and bit permutation
CN109861810A (en) A kind of data ciphering method and decryption method based on chaos Tuber yield
CN104396182A (en) Method of encrypting data
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN104022865A (en) Encrypted transmission method of network data
CN110096851B (en) Byte code encryption method and system
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
CN103117850A (en) Cryptosystem based on random sequence database
Kumar et al. Performance evaluation of encryption/decryption mechanisms to enhance data security
CN103595524B (en) A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
Patel et al. A survey of information hiding techniques
CN108777611A (en) Doubly linked list ordered encryption decryption method based on dual key stream cipher
CN112149166B (en) Unconventional password protection method and intelligent bank machine
CN101159546A (en) E-mail encryption transmitting-receiving system
CN108777622B (en) Binary stream hash modular encryption and decryption method
Vijayan et al. ASCII value based encryption system (AVB)
CN111314052B (en) Data encryption and decryption method
JP2005114870A (en) Cryptocommunication system
CN111314053B (en) Data encryption and decryption method
AB et al. A New Security Mechanism for Secured Communications Using Steganography and CBA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140903