CN104113410A - Method and device for data encryption transmission based on multi-table encryption method - Google Patents

Method and device for data encryption transmission based on multi-table encryption method Download PDF

Info

Publication number
CN104113410A
CN104113410A CN201410317610.4A CN201410317610A CN104113410A CN 104113410 A CN104113410 A CN 104113410A CN 201410317610 A CN201410317610 A CN 201410317610A CN 104113410 A CN104113410 A CN 104113410A
Authority
CN
China
Prior art keywords
character
string
key
plaintext
ascii
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410317610.4A
Other languages
Chinese (zh)
Other versions
CN104113410B (en
Inventor
杨春明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN201410317610.4A priority Critical patent/CN104113410B/en
Publication of CN104113410A publication Critical patent/CN104113410A/en
Application granted granted Critical
Publication of CN104113410B publication Critical patent/CN104113410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a method and a device for data encryption transmission based on a multi-table encryption method. The method comprises the following steps: a client sends a key acquiring request to a server, and the server generates a key; when submitting form data to the server, the client receives the key sent by the server, converts to-be-encrypted information in the form data into a plaintext array, and converts the key into a key array; the client extracts a plaintext character string in the plaintext array and converts the plaintext character string into an ASCII code, and extracts a key character string in the key array and converts the key character string into an ASCII code; the client encrypts the to-be-encrypted information according to the ASCII code of the plaintext character string and the ASCII code of the key character string, and sends encrypted data obtained after encryption to the sever; and the server decrypts the encrypted data, and calls a back-end service according to a result obtained after decryption. By adopting the method and the device of the invention, uppercase and lowercase letters and figures can be decrypted, the safety of user data is ensured, and the encryption algorithm is expanded.

Description

A kind of data encryption and transmission method and device based on multilist enciphered method
Technical field
The present invention relates to data ciphering method, particularly the data encryption and transmission method based on multilist enciphered method and device.
Background technology
Current most website all adopts http agreement to data plaintext transmission, and transmitting procedure is without data encryption process, and this makes assailant can utilize the easy sensitive information (password) that will obtain user of attack tool, cannot guarantee user's data security.
Encryption technology explanation: if key is aperiodic infinite sequence, corresponding password is polyalphabetic cipher aperiodic.This class password, adopts different substitution lists to be encrypted to each plaintext letter, is referred to as one time cryptosystem (one-time pad cipher).This is a kind of unique in theory password that can not be broken.This password can be realized completely hidden for feature expressly, but is difficult to be widely used because the size of key of needs is identical with the length of cleartext information.
Multilist substitutes secret central principle, exactly plaintext and secret key is carried out to modulo operation by turn, utilizes 26 alphabetical periodic regular to reach the object of replacement.But this thought is only effective to letter, PSC is not encrypted numeral in encrypting, and cryptographic algorithm is still used expressly and represented, the fail safe of the ciphertext that so so relatively declined running in digital.
Such as, when system login, by requirement analysis instrument, can analyze and draw traditionally without cipher mode, can directly view user cipher, easily cause user profile to be stolen, and then cause user's interests to suffer a loss.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind ofly can carry out the data encryption and transmission method based on multilist enciphered method and the device of encryption and decryption to upper and lower case letter and numeral.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
The invention has the beneficial effects as follows: the present invention selects multilist encryption technology to be encrypted clear data, can carry out encryption and decryption to upper and lower case letter and numeral, when utilizing this kind of algorithm to carry out Data Encryption Transmission, use the common analysis tool can not deciphered data content, ensure secure user data, expanded cryptographic algorithm.
On the basis of technique scheme, the present invention can also do following improvement.
Further, described key string is the character string that a plurality of lowercases form.
Further, the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
Further, in described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, a kind of Data Encryption Transmission device based on multilist enciphered method, comprises client and server;
Described client, for sending and obtain key request to server, during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server,
Described server, for generating key, preserves key and key is sent to client; Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
Further, described key string is the character string that a plurality of lowercases form.
Further, the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
Further, in described client, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described server, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Accompanying drawing explanation
Fig. 1 is the inventive method flow chart of steps;
Fig. 2 is apparatus of the present invention structure chart.
In accompanying drawing, the list of parts of each label representative is as follows:
1, client, 2, server.
Embodiment
Below in conjunction with accompanying drawing, principle of the present invention and feature are described, example, only for explaining the present invention, is not intended to limit scope of the present invention.
As shown in Figure 1, be the inventive method flow chart of steps; Fig. 2 is apparatus of the present invention structure chart.
Embodiment 1
A data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
Described key string is the character string that a plurality of lowercases form.
The quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
In described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
A Data Encryption Transmission device based on multilist enciphered method, comprises client 1 and server 2;
Described client 1, for sending and obtain key request to server 2, during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server 2,
Described server 2, for generating key, preserves key and key is sent to client 1; Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
Described key string is the character string that a plurality of lowercases form.
The quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
In described client 1, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
In described server 2, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Multilist substitutes: the secret key that " table " in multilist just refers in fact, " multilist " so (because algorithm is expressly to replace by turn with secret key), when being expressly greater than secret key, secret key is automatically converted to next symmetric periodic, until completely corresponding with length expressly.
For example:
Original text: g f e t y u e w 4
Secret key: a b c a b c a b c
Original text: g f e t y u e w
Secret key: a b c a b c a b
Secret key is abc, and original text is gfetyuew4 and original text cryptographic calculation rule while being gfetyuew.
The generating algorithm of " table ": use the random class of java, from 26 alphabetical list, choose at random a position as list subscript from 0-25 at every turn, obtain corresponding letter by subscript.In this example for acquiescence is obtained the random key that a length is 10.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. the data encryption and transmission method based on multilist enciphered method, is characterized in that, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
2. data encryption and transmission method according to claim 1, is characterized in that: described key string is the character string that a plurality of lowercases form.
3. data encryption and transmission method according to claim 2, is characterized in that: the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
4. data encryption and transmission method according to claim 3, it is characterized in that, in described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
5. data encryption and transmission method according to claim 3, is characterized in that, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
6. the Data Encryption Transmission device based on multilist enciphered method, is characterized in that: comprise client (1) and server (2);
Described client (1), for sending and obtain key request to server (2), during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server (2),
Described server (2), for generating key, preserves key and key is sent to client (1); Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
7. Data Encryption Transmission device according to claim 6, is characterized in that: described key string is the character string that a plurality of lowercases form.
8. Data Encryption Transmission device according to claim 7, is characterized in that: the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
9. Data Encryption Transmission device according to claim 8, it is characterized in that: described client is carried out bitwise encryption to plaintext character string in (1), when the character in plaintext character string is numeral, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
10. Data Encryption Transmission device according to claim 6, is characterized in that: described server is deciphered by turn to enciphered data in (2), when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
CN201410317610.4A 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method Active CN104113410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410317610.4A CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410317610.4A CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Publications (2)

Publication Number Publication Date
CN104113410A true CN104113410A (en) 2014-10-22
CN104113410B CN104113410B (en) 2017-05-17

Family

ID=51710049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410317610.4A Active CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Country Status (1)

Country Link
CN (1) CN104113410B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN107483193A (en) * 2017-08-31 2017-12-15 郑州云海信息技术有限公司 A kind of encryption method, decryption method, encryption device and decryption device
CN109474619A (en) * 2018-12-17 2019-03-15 中国平安财产保险股份有限公司 Data encryption report method and device, data decryption method and device
CN112422494A (en) * 2020-08-06 2021-02-26 上海幻电信息科技有限公司 Data transmission method, data security verification method and data transmission system
CN114076866A (en) * 2021-11-08 2022-02-22 湖州市检验检测中心 Electrical safety remote inspection system for electromechanical products

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030174840A1 (en) * 2002-03-12 2003-09-18 Bogan William B. Encryption method for preventing unauthorized dissemination of protected data
CN101226705A (en) * 2008-01-28 2008-07-23 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102726028A (en) * 2011-12-31 2012-10-10 华为技术有限公司 Encryption method, decryption method, and corresponding device and system
US20140013452A1 (en) * 2012-07-03 2014-01-09 Selim Aissi Data protection hub
CN103825723A (en) * 2014-01-24 2014-05-28 深圳市太和物联信息技术有限公司 Encryption method and device
CN103873250A (en) * 2012-12-18 2014-06-18 中国移动通信集团河南有限公司 Ciphertext generation method, ciphertext decryption method and encryption/ decryption device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030174840A1 (en) * 2002-03-12 2003-09-18 Bogan William B. Encryption method for preventing unauthorized dissemination of protected data
CN101226705A (en) * 2008-01-28 2008-07-23 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method
CN101894244A (en) * 2009-05-20 2010-11-24 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102726028A (en) * 2011-12-31 2012-10-10 华为技术有限公司 Encryption method, decryption method, and corresponding device and system
US20140013452A1 (en) * 2012-07-03 2014-01-09 Selim Aissi Data protection hub
CN103873250A (en) * 2012-12-18 2014-06-18 中国移动通信集团河南有限公司 Ciphertext generation method, ciphertext decryption method and encryption/ decryption device
CN103825723A (en) * 2014-01-24 2014-05-28 深圳市太和物联信息技术有限公司 Encryption method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN107483193A (en) * 2017-08-31 2017-12-15 郑州云海信息技术有限公司 A kind of encryption method, decryption method, encryption device and decryption device
CN109474619A (en) * 2018-12-17 2019-03-15 中国平安财产保险股份有限公司 Data encryption report method and device, data decryption method and device
CN109474619B (en) * 2018-12-17 2023-06-23 中国平安财产保险股份有限公司 Data encryption reporting method and device and data decryption method and device
CN112422494A (en) * 2020-08-06 2021-02-26 上海幻电信息科技有限公司 Data transmission method, data security verification method and data transmission system
CN114076866A (en) * 2021-11-08 2022-02-22 湖州市检验检测中心 Electrical safety remote inspection system for electromechanical products

Also Published As

Publication number Publication date
CN104113410B (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN107086915B (en) Data transmission method, data sending end and data receiving end
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
TWI536790B (en) Communication method using fingerprint information authentication
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
WO2010099603A1 (en) Split key secure access system
CN102684877A (en) Method and device for carrying out user information processing
CN104113410B (en) Method and device for data encryption transmission based on multi-table encryption method
CN108234458A (en) Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN104378198A (en) Voice encryption method based on block cipher system
CN108090370A (en) Instant messaging encryption method and system based on index
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN104038336A (en) Data encryption method based on 3DES
US20130198513A1 (en) Encryption method and system for network communication
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN105187418B (en) Weak signature algorithm
CN102882675A (en) Password encryption method for social network sites
CN106452754B (en) Multi-user online dynamic encryption method and device
CN104038337A (en) Data encryption method based on AES128
CN112149166B (en) Unconventional password protection method and intelligent bank machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant