CN104113410A - Method and device for data encryption transmission based on multi-table encryption method - Google Patents
Method and device for data encryption transmission based on multi-table encryption method Download PDFInfo
- Publication number
- CN104113410A CN104113410A CN201410317610.4A CN201410317610A CN104113410A CN 104113410 A CN104113410 A CN 104113410A CN 201410317610 A CN201410317610 A CN 201410317610A CN 104113410 A CN104113410 A CN 104113410A
- Authority
- CN
- China
- Prior art keywords
- character
- string
- key
- plaintext
- ascii
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention relates to a method and a device for data encryption transmission based on a multi-table encryption method. The method comprises the following steps: a client sends a key acquiring request to a server, and the server generates a key; when submitting form data to the server, the client receives the key sent by the server, converts to-be-encrypted information in the form data into a plaintext array, and converts the key into a key array; the client extracts a plaintext character string in the plaintext array and converts the plaintext character string into an ASCII code, and extracts a key character string in the key array and converts the key character string into an ASCII code; the client encrypts the to-be-encrypted information according to the ASCII code of the plaintext character string and the ASCII code of the key character string, and sends encrypted data obtained after encryption to the sever; and the server decrypts the encrypted data, and calls a back-end service according to a result obtained after decryption. By adopting the method and the device of the invention, uppercase and lowercase letters and figures can be decrypted, the safety of user data is ensured, and the encryption algorithm is expanded.
Description
Technical field
The present invention relates to data ciphering method, particularly the data encryption and transmission method based on multilist enciphered method and device.
Background technology
Current most website all adopts http agreement to data plaintext transmission, and transmitting procedure is without data encryption process, and this makes assailant can utilize the easy sensitive information (password) that will obtain user of attack tool, cannot guarantee user's data security.
Encryption technology explanation: if key is aperiodic infinite sequence, corresponding password is polyalphabetic cipher aperiodic.This class password, adopts different substitution lists to be encrypted to each plaintext letter, is referred to as one time cryptosystem (one-time pad cipher).This is a kind of unique in theory password that can not be broken.This password can be realized completely hidden for feature expressly, but is difficult to be widely used because the size of key of needs is identical with the length of cleartext information.
Multilist substitutes secret central principle, exactly plaintext and secret key is carried out to modulo operation by turn, utilizes 26 alphabetical periodic regular to reach the object of replacement.But this thought is only effective to letter, PSC is not encrypted numeral in encrypting, and cryptographic algorithm is still used expressly and represented, the fail safe of the ciphertext that so so relatively declined running in digital.
Such as, when system login, by requirement analysis instrument, can analyze and draw traditionally without cipher mode, can directly view user cipher, easily cause user profile to be stolen, and then cause user's interests to suffer a loss.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind ofly can carry out the data encryption and transmission method based on multilist enciphered method and the device of encryption and decryption to upper and lower case letter and numeral.
The technical scheme that the present invention solves the problems of the technologies described above is as follows: a kind of data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
The invention has the beneficial effects as follows: the present invention selects multilist encryption technology to be encrypted clear data, can carry out encryption and decryption to upper and lower case letter and numeral, when utilizing this kind of algorithm to carry out Data Encryption Transmission, use the common analysis tool can not deciphered data content, ensure secure user data, expanded cryptographic algorithm.
On the basis of technique scheme, the present invention can also do following improvement.
Further, described key string is the character string that a plurality of lowercases form.
Further, the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
Further, in described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, a kind of Data Encryption Transmission device based on multilist enciphered method, comprises client and server;
Described client, for sending and obtain key request to server, during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server,
Described server, for generating key, preserves key and key is sent to client; Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
Further, described key string is the character string that a plurality of lowercases form.
Further, the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
Further, in described client, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described server, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Accompanying drawing explanation
Fig. 1 is the inventive method flow chart of steps;
Fig. 2 is apparatus of the present invention structure chart.
In accompanying drawing, the list of parts of each label representative is as follows:
1, client, 2, server.
Embodiment
Below in conjunction with accompanying drawing, principle of the present invention and feature are described, example, only for explaining the present invention, is not intended to limit scope of the present invention.
As shown in Figure 1, be the inventive method flow chart of steps; Fig. 2 is apparatus of the present invention structure chart.
Embodiment 1
A data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
Described key string is the character string that a plurality of lowercases form.
The quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
In described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Further, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
A Data Encryption Transmission device based on multilist enciphered method, comprises client 1 and server 2;
Described client 1, for sending and obtain key request to server 2, during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server 2,
Described server 2, for generating key, preserves key and key is sent to client 1; Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
Described key string is the character string that a plurality of lowercases form.
The quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
In described client 1, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
In described server 2, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Multilist substitutes: the secret key that " table " in multilist just refers in fact, " multilist " so (because algorithm is expressly to replace by turn with secret key), when being expressly greater than secret key, secret key is automatically converted to next symmetric periodic, until completely corresponding with length expressly.
For example:
Original text: g f e t y u e w 4
Secret key: a b c a b c a b c
Original text: g f e t y u e w
Secret key: a b c a b c a b
Secret key is abc, and original text is gfetyuew4 and original text cryptographic calculation rule while being gfetyuew.
The generating algorithm of " table ": use the random class of java, from 26 alphabetical list, choose at random a position as list subscript from 0-25 at every turn, obtain corresponding letter by subscript.In this example for acquiescence is obtained the random key that a length is 10.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (10)
1. the data encryption and transmission method based on multilist enciphered method, is characterized in that, comprises the following steps:
Step 1: user end to server sends and obtains key request, and server generates key, preserves key and key is sent to client;
Step 2: during user end to server submission form data, the key that client server sends, is converted into expressly array by the information to be encrypted in form data, and key is converted into key array;
Step 3: client is taken out the plaintext character string in plaintext array, and plaintext character string is converted into ASCII character, takes out the key string in key array, and key string is converted into ASCII character;
Step 4: treat enciphered message according to the ASCII character of the ASCII character of plaintext character string and key string and be encrypted, the enciphered data obtaining after encrypting is sent to server;
Step 5: the key that server by utilizing is preserved adopts the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, calls back-end services.
2. data encryption and transmission method according to claim 1, is characterized in that: described key string is the character string that a plurality of lowercases form.
3. data encryption and transmission method according to claim 2, is characterized in that: the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
4. data encryption and transmission method according to claim 3, it is characterized in that, in described step 4, plaintext character string is carried out to bitwise encryption, when the character in plaintext character string is numeral, calculates in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
5. data encryption and transmission method according to claim 3, is characterized in that, in described step 5, enciphered data is deciphered by turn, when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
6. the Data Encryption Transmission device based on multilist enciphered method, is characterized in that: comprise client (1) and server (2);
Described client (1), for sending and obtain key request to server (2), during to service end submission form data, the key that client server sends, information to be encrypted in form data is converted into expressly array, key is converted into key array, client is taken out the plaintext character string in plaintext array, plaintext character string is converted into ASCII character, take out the key string in key array, key string is converted into ASCII character, according to the ASCII character of the ASCII character of plaintext character string and key string, treating enciphered message is encrypted, the enciphered data obtaining after encrypting is sent to server (2),
Described server (2), for generating key, preserves key and key is sent to client (1); Utilize the key of preserving to adopt the inverse process of encrypting to be decrypted enciphered data to enciphered data, and according to the result after deciphering, call back-end services.
7. Data Encryption Transmission device according to claim 6, is characterized in that: described key string is the character string that a plurality of lowercases form.
8. Data Encryption Transmission device according to claim 7, is characterized in that: the quantity of the character in described plaintext character string is less than the quantity of the character in key string, and expressly the character in character string is corresponding one by one with the character in key string;
The quantity of the character in described plaintext character string is greater than the quantity of the character in key string, at a new key string identical with original cipher key character string of tail end stack of key string, after stack, do not have the character in character string corresponding one by one with the character in plaintext character string.
9. Data Encryption Transmission device according to claim 8, it is characterized in that: described client is carried out bitwise encryption to plaintext character string in (1), when the character in plaintext character string is numeral, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=48+(((x-48)+y)%10);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in plaintext character string is lowercase, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=97+(((x-97)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in plaintext character string is capitalization, calculate in the following ways the ASCII character of character corresponding in enciphered data:
reslult=65+(((x-65)+y)%26);
Wherein, x represents the ASCII character of the character in character string expressly, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
10. Data Encryption Transmission device according to claim 6, is characterized in that: described server is deciphered by turn to enciphered data in (2), when the character in enciphered data is numeral, calculates in the following ways character corresponding in plaintext:
reslult=48+((((x-48)-10)-y)%10);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string, y≤10 wherein, when y>10, y=10;
When the character in enciphered data is lowercase, calculate in the following ways character corresponding in plaintext:
result=97+((((x-97)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string;
When the character in enciphered data is capitalization, calculate in the following ways character corresponding in plaintext:
result=65+((((x-65)-26)-y)%26);
Wherein, x represents the ASCII character of character in enciphered data, y=m – 97, and m represents in key string the ASCII character with the corresponding character of plaintext character string.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410317610.4A CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410317610.4A CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104113410A true CN104113410A (en) | 2014-10-22 |
CN104113410B CN104113410B (en) | 2017-05-17 |
Family
ID=51710049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410317610.4A Active CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104113410B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN107483193A (en) * | 2017-08-31 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method, encryption device and decryption device |
CN109474619A (en) * | 2018-12-17 | 2019-03-15 | 中国平安财产保险股份有限公司 | Data encryption report method and device, data decryption method and device |
CN112422494A (en) * | 2020-08-06 | 2021-02-26 | 上海幻电信息科技有限公司 | Data transmission method, data security verification method and data transmission system |
CN114076866A (en) * | 2021-11-08 | 2022-02-22 | 湖州市检验检测中心 | Electrical safety remote inspection system for electromechanical products |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data |
CN101226705A (en) * | 2008-01-28 | 2008-07-23 | 和舰科技(苏州)有限公司 | Circle scattering migration code-transfer ciphering method |
CN101894244A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN102726028A (en) * | 2011-12-31 | 2012-10-10 | 华为技术有限公司 | Encryption method, decryption method, and corresponding device and system |
US20140013452A1 (en) * | 2012-07-03 | 2014-01-09 | Selim Aissi | Data protection hub |
CN103825723A (en) * | 2014-01-24 | 2014-05-28 | 深圳市太和物联信息技术有限公司 | Encryption method and device |
CN103873250A (en) * | 2012-12-18 | 2014-06-18 | 中国移动通信集团河南有限公司 | Ciphertext generation method, ciphertext decryption method and encryption/ decryption device |
-
2014
- 2014-07-04 CN CN201410317610.4A patent/CN104113410B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data |
CN101226705A (en) * | 2008-01-28 | 2008-07-23 | 和舰科技(苏州)有限公司 | Circle scattering migration code-transfer ciphering method |
CN101894244A (en) * | 2009-05-20 | 2010-11-24 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN102726028A (en) * | 2011-12-31 | 2012-10-10 | 华为技术有限公司 | Encryption method, decryption method, and corresponding device and system |
US20140013452A1 (en) * | 2012-07-03 | 2014-01-09 | Selim Aissi | Data protection hub |
CN103873250A (en) * | 2012-12-18 | 2014-06-18 | 中国移动通信集团河南有限公司 | Ciphertext generation method, ciphertext decryption method and encryption/ decryption device |
CN103825723A (en) * | 2014-01-24 | 2014-05-28 | 深圳市太和物联信息技术有限公司 | Encryption method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141631A (en) * | 2015-09-21 | 2015-12-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal, server and account security login method, device and system |
CN107483193A (en) * | 2017-08-31 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method, encryption device and decryption device |
CN109474619A (en) * | 2018-12-17 | 2019-03-15 | 中国平安财产保险股份有限公司 | Data encryption report method and device, data decryption method and device |
CN109474619B (en) * | 2018-12-17 | 2023-06-23 | 中国平安财产保险股份有限公司 | Data encryption reporting method and device and data decryption method and device |
CN112422494A (en) * | 2020-08-06 | 2021-02-26 | 上海幻电信息科技有限公司 | Data transmission method, data security verification method and data transmission system |
CN114076866A (en) * | 2021-11-08 | 2022-02-22 | 湖州市检验检测中心 | Electrical safety remote inspection system for electromechanical products |
Also Published As
Publication number | Publication date |
---|---|
CN104113410B (en) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107086915B (en) | Data transmission method, data sending end and data receiving end | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
TWI536790B (en) | Communication method using fingerprint information authentication | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
WO2010099603A1 (en) | Split key secure access system | |
CN102684877A (en) | Method and device for carrying out user information processing | |
CN104113410B (en) | Method and device for data encryption transmission based on multi-table encryption method | |
CN108234458A (en) | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN113726725A (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN111404953A (en) | Message encryption method, message decryption method, related devices and related systems | |
CN104038336A (en) | Data encryption method based on 3DES | |
US20130198513A1 (en) | Encryption method and system for network communication | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN105187418B (en) | Weak signature algorithm | |
CN102882675A (en) | Password encryption method for social network sites | |
CN106452754B (en) | Multi-user online dynamic encryption method and device | |
CN104038337A (en) | Data encryption method based on AES128 | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |