CN104113410B - Method and device for data encryption transmission based on multi-table encryption method - Google Patents
Method and device for data encryption transmission based on multi-table encryption method Download PDFInfo
- Publication number
- CN104113410B CN104113410B CN201410317610.4A CN201410317610A CN104113410B CN 104113410 B CN104113410 B CN 104113410B CN 201410317610 A CN201410317610 A CN 201410317610A CN 104113410 B CN104113410 B CN 104113410B
- Authority
- CN
- China
- Prior art keywords
- character
- string
- key
- plaintext
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method and a device for data encryption transmission based on a multi-table encryption method. The method comprises the following steps: a client sends a key acquiring request to a server, and the server generates a key; when submitting form data to the server, the client receives the key sent by the server, converts to-be-encrypted information in the form data into a plaintext array, and converts the key into a key array; the client extracts a plaintext character string in the plaintext array and converts the plaintext character string into an ASCII code, and extracts a key character string in the key array and converts the key character string into an ASCII code; the client encrypts the to-be-encrypted information according to the ASCII code of the plaintext character string and the ASCII code of the key character string, and sends encrypted data obtained after encryption to the sever; and the server decrypts the encrypted data, and calls a back-end service according to a result obtained after decryption. By adopting the method and the device of the invention, uppercase and lowercase letters and figures can be decrypted, the safety of user data is ensured, and the encryption algorithm is expanded.
Description
Technical field
The present invention relates to data ciphering method, the data encryption and transmission method and dress more particularly to based on multilist enciphered method
Put.
Background technology
At present majority website all adopts http agreements to data plaintext transmission, transmitting procedure no data ciphering process, and this makes
Obtaining attacker can utilize the easy sensitive information (password) that will obtain user of attack tool, it is impossible to ensure the number of user
According to safety.
Encryption technology explanation:If key is aperiodic infinite sequence, corresponding password is that multilist replacement aperiodic is close
Code.This kind of password, is encrypted, referred to as one time cryptosystem (one- to each plaintext letter using different replacement tables
time pad cipher).This is a kind of password that uniquely can not be broken in theory.This password can be real for the characteristics of plaintext
It is now completely hidden, but be difficult to widely use because the size of key for needing is identical with the length of cleartext information.
It is exactly exactly plaintext to be carried out into modulo operation by turn with key that multilist substitutes secret central principle, using 26 words
Female periodic regular is reaching the purpose of replacement.But this thought is only effective to letter, numeral is not carried out in PSC encryptions
Encryption, AES is still indicated when numeral is run into using plaintext, then thus relative drop ciphertext
Safety.
Such as, in system login, can be analyzed by requirement analysis instrument draw it is traditional without cipher mode, can be direct
User cipher is viewed, user profile is easily caused and is stolen, and then cause the interests of user to suffer a loss.
The content of the invention
The technical problem to be solved is to provide and a kind of can carry out encryption and decryption to upper and lower case letter and numeral
Data encryption and transmission method and device based on multilist enciphered method.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of Data Encryption Transmission based on multilist enciphered method
Method, comprises the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and by key
It is sent to client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by list
Confidential information to be added in data is converted into plaintext array, and key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out
Key string in key array, by key string ASCII character is converted into;
Step 4:Treating encryption information according to the ASCII character of plaintext string and the ASCII character of key string carries out adding
It is close, the encryption data obtained after encryption is sent to into server;
Step 5:The key pair encryption data that server by utilizing is preserved are solved using the inverse process of encryption to encryption data
It is close, and according to the result after decryption, call back-end services.
The invention has the beneficial effects as follows:The present invention is encrypted from multilist encryption technology to clear data, can be to big
Lower case and numeral carry out encryption and decryption, when Data Encryption Transmission is carried out using this kind of algorithm, using common analytical tool
Can not deciphered data content, ensured secure user data, extend AES.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the key string is the character string of multiple lower case compositions.
Further, the quantity of the character in the quantity of the character in the plaintext string is less than key string, bright
Character in Chinese character string is corresponded with the character in key string;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character
The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string
Correspond with the character in plaintext string.
Further, bitwise encryption is carried out to plaintext string in the step 4, when the character in plaintext string is numeral
When, the ASCII character of corresponding character in encryption data is calculated in the following ways:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the step 5, when the character in encryption data is numeral,
Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
Further, a kind of Data Encryption Transmission device based on multilist enciphered method, including client and server;
The client, for sending to server key request, during to service end submission form data, client are obtained
The key that the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into into key
Array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out key array
In key string, key string is converted into into ASCII character, according to the ASCII character and key string of plaintext string
ASCII character treat encryption information and be encrypted, the encryption data obtained after encryption is sent to into server;
The server, for generating key, preserves key and key is sent to into client;Using the key pair for preserving
Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services.
Further, the key string is the character string of multiple lower case compositions.
Further, the quantity of the character in the quantity of the character in the plaintext string is less than key string, bright
Character in Chinese character string is corresponded with the character in key string;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character
The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string
Correspond with the character in plaintext string.
Further, bitwise encryption is carried out to plaintext string in the client, when the character in plaintext string is number
During word, the ASCII character of corresponding character in encryption data is calculated in the following ways:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the server, when the character in encryption data is numeral,
Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
Description of the drawings
Fig. 1 is the inventive method flow chart of steps;
Fig. 2 is apparatus of the present invention structure chart.
In accompanying drawing, the list of parts representated by each label is as follows:
1st, client, 2, server.
Specific embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and
It is non-for limiting the scope of the present invention.
As shown in figure 1, being the inventive method flow chart of steps;Fig. 2 is apparatus of the present invention structure chart.
Embodiment 1
A kind of data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and by key
It is sent to client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by list
Confidential information to be added in data is converted into plaintext array, and key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out
Key string in key array, by key string ASCII character is converted into;
Step 4:Treating encryption information according to the ASCII character of plaintext string and the ASCII character of key string carries out adding
It is close, the encryption data obtained after encryption is sent to into server;
Step 5:The key pair encryption data that server by utilizing is preserved are solved using the inverse process of encryption to encryption data
It is close, and according to the result after decryption, call back-end services.
The key string is the character string of multiple lower case compositions.
The quantity of the character in the quantity of the character in the plaintext string is less than key string, plaintext string
In character and key string in character correspond;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character
The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string
Correspond with the character in plaintext string.
Bitwise encryption is carried out to plaintext string in the step 4, when the character in plaintext string is numeral, is adopted
In the following manner calculates the ASCII character of corresponding character in encryption data:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the step 5, when the character in encryption data is numeral,
Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
A kind of Data Encryption Transmission device based on multilist enciphered method, including client 1 and server 2;
The client 1, for sending to server 2 key request, during to service end submission form data, client are obtained
The key that end the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into close
Key array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out cipher key number
Key string in group, by key string ASCII character is converted into, according to the ASCII character and key character of plaintext string
The ASCII character of string is treated encryption information and is encrypted, and the encryption data obtained after encryption is sent to into server 2;
The server 2, for generating key, preserves key and key is sent to into client 1;Using the key for preserving
Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services.
The key string is the character string of multiple lower case compositions.
The quantity of the character in the quantity of the character in the plaintext string is less than key string, plaintext string
In character and key string in character correspond;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character
The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string
Correspond with the character in plaintext string.
Bitwise encryption is carried out to plaintext string in the client 1, when the character in plaintext string is numeral, is adopted
The ASCII character of corresponding character in encryption data is calculated with the following methods:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text
The ASCII character of character string correspondence character.
Encryption data is decrypted by turn in the server 2, when the character in encryption data for numeral when, adopt with
Under type calculates corresponding character in plaintext:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
Multilist is substituted:The key that " table " in multilist is just referred in fact, then " multilist " is (because algorithm is plaintext and key
Be replaced by turn), when plaintext more than key when, key is automatically converted to next symmetric periodic, until completely with plaintext
Length correspondence.
For example:
Original text:g f e t y u e w 4
Key:a b c a b c a b c
Original text:g f e t y u e w
Key:a b c a b c a b
Key is abc, and cryptographic calculation is regular when original text is gfetyuew4 and original text is gfetyuew.
The generating algorithm of " table ":Using the random classes of java, from 26 alphabetical lists, select at random from 0-25 every time
A position is taken as list subscript, corresponding letter is obtained by subscript.It is 10 to obtain a length for acquiescence in this example
Random key.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (8)
1. a kind of data encryption and transmission method based on multilist enciphered method, it is characterised in that comprise the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and sends key
To client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by form data
In confidential information to be added be converted into plaintext array, key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out key
Key string in array, by key string ASCII character is converted into;
Step 4:Encryption information is treated according to the ASCII character of plaintext string and the ASCII character of key string to be encrypted, will
The encryption data obtained after encryption is sent to server;
Step 5:The key pair encryption data that server by utilizing is preserved are decrypted using the inverse process of encryption to encryption data, and
According to the result after decryption, back-end services are called, wherein, when the character in encryption data is numeral, count in the following ways
Corresponding character in calculating in plain text:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character.
2. data encryption and transmission method according to claim 1, it is characterised in that:The key string is multiple small letters
The character string of letter composition.
3. data encryption and transmission method according to claim 2, it is characterised in that:Character in the plaintext string
Quantity less than the character in key string quantity, the character in the character in plaintext string and key string is one by one
Correspondence;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key string
Tail end be superimposed one it is new with original cipher key character string identical key string, the character in key character string after superposition with it is bright
Character in Chinese character string is corresponded.
4. data encryption and transmission method according to claim 3, it is characterised in that to plaintext string in the step 4
Bitwise encryption is carried out, when the character in plaintext string is numeral, corresponding word in encryption data is calculated in the following ways
The ASCII character of symbol:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
5. a kind of Data Encryption Transmission device based on multilist enciphered method, it is characterised in that:Including client (1) and server
(2);
The client (1), for sending to server (2) key request, during to service end submission form data, client are obtained
The key that end the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into close
Key array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out cipher key number
Key string in group, by key string ASCII character is converted into, according to the ASCII character and key character of plaintext string
The ASCII character of string is treated encryption information and is encrypted, and the encryption data obtained after encryption is sent to into server (2);
The server (2), for generating key, preserves key and key is sent to into client (1);Using the key for preserving
Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services,
Wherein, when the server (2) is decrypted by turn to encryption data, and the character in encryption data for numeral when, adopt with
Under type calculates corresponding character in plaintext:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair
Answer the ASCII character of character.
6. Data Encryption Transmission device according to claim 5, it is characterised in that:The key string is multiple small letters
The character string of letter composition.
7. Data Encryption Transmission device according to claim 6, it is characterised in that:Character in the plaintext string
Quantity less than the character in key string quantity, the character in the character in plaintext string and key string is one by one
Correspondence;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key string
Tail end be superimposed one it is new with original cipher key character string identical key string, the character in key character string after superposition with it is bright
Character in Chinese character string is corresponded.
8. Data Encryption Transmission device according to claim 7, it is characterised in that:To plaintext word in the client (1)
Symbol string carries out bitwise encryption, when the character in plaintext string is numeral, correspondence in encryption data is calculated in the following ways
Character ASCII character:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways
ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character
The ASCII character of string correspondence character.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410317610.4A CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410317610.4A CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104113410A CN104113410A (en) | 2014-10-22 |
CN104113410B true CN104113410B (en) | 2017-05-17 |
Family
ID=51710049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410317610.4A Active CN104113410B (en) | 2014-07-04 | 2014-07-04 | Method and device for data encryption transmission based on multi-table encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104113410B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141631B (en) * | 2015-09-21 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | The methods, devices and systems that a kind of terminal, server and account safety log in |
CN107483193A (en) * | 2017-08-31 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method, encryption device and decryption device |
CN109474619B (en) * | 2018-12-17 | 2023-06-23 | 中国平安财产保险股份有限公司 | Data encryption reporting method and device and data decryption method and device |
CN112422494B (en) * | 2020-08-06 | 2022-09-23 | 上海幻电信息科技有限公司 | Data transmission method, data security verification method and data transmission system |
CN114076866A (en) * | 2021-11-08 | 2022-02-22 | 湖州市检验检测中心 | Electrical safety remote inspection system for electromechanical products |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data |
CN100561546C (en) * | 2008-01-28 | 2009-11-18 | 和舰科技(苏州)有限公司 | Circle scattering migration code-transfer ciphering method |
CN101894244B (en) * | 2009-05-20 | 2012-11-21 | 鸿富锦精密工业(深圳)有限公司 | System and method for enciphering electronic data |
CN102726028A (en) * | 2011-12-31 | 2012-10-10 | 华为技术有限公司 | Encryption method, decryption method, and corresponding device and system |
WO2014008403A1 (en) * | 2012-07-03 | 2014-01-09 | Visa International Service Association | Data protection hub |
CN103873250B (en) * | 2012-12-18 | 2017-06-20 | 中国移动通信集团河南有限公司 | A kind of ciphertext generation method, ciphertext decryption method and encrypting and decrypting device |
CN103825723B (en) * | 2014-01-24 | 2019-05-03 | 深圳市太和物联信息技术有限公司 | A kind of encryption method and device |
-
2014
- 2014-07-04 CN CN201410317610.4A patent/CN104113410B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN104113410A (en) | 2014-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106712946B (en) | Data safety transmission method | |
CN104113410B (en) | Method and device for data encryption transmission based on multi-table encryption method | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN102684877A (en) | Method and device for carrying out user information processing | |
JP2016528845A (en) | ID authentication system, apparatus, method, and ID authentication request apparatus | |
CN107294964B (en) | Information transmission method | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN104038336A (en) | Data encryption method based on 3DES | |
Kaur et al. | 3D (4 X 4 X 4)-Playfair Cipher | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN113300842B (en) | Method for improving security of symmetric encryption algorithm | |
CN109344627A (en) | A kind of novel Shannon perfection time slot scrambling | |
Kuppuswamy et al. | New Innovation of Arabic language Encryption Technique using New symmetric key algorithm | |
CN104038337A (en) | Data encryption method based on AES128 | |
CN108494554B (en) | Data symmetric encryption method based on double plaintexts | |
CN106604275B (en) | Information transmission encryption and decryption method and system based on mobile internet | |
CN111314052A (en) | Data encryption and decryption method based on uniformly distributed symmetric compression algorithm | |
CN102238150A (en) | Form registration method and server | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
CN111212068B (en) | Method for encrypting and decrypting characters by input method | |
Disina et al. | Enhanced caeser cipher to exclude repetition and withstand frequency cryptanalysis | |
CN111314053B (en) | Data encryption and decryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |