CN104113410B - Method and device for data encryption transmission based on multi-table encryption method - Google Patents

Method and device for data encryption transmission based on multi-table encryption method Download PDF

Info

Publication number
CN104113410B
CN104113410B CN201410317610.4A CN201410317610A CN104113410B CN 104113410 B CN104113410 B CN 104113410B CN 201410317610 A CN201410317610 A CN 201410317610A CN 104113410 B CN104113410 B CN 104113410B
Authority
CN
China
Prior art keywords
character
string
key
plaintext
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410317610.4A
Other languages
Chinese (zh)
Other versions
CN104113410A (en
Inventor
杨春明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN201410317610.4A priority Critical patent/CN104113410B/en
Publication of CN104113410A publication Critical patent/CN104113410A/en
Application granted granted Critical
Publication of CN104113410B publication Critical patent/CN104113410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a method and a device for data encryption transmission based on a multi-table encryption method. The method comprises the following steps: a client sends a key acquiring request to a server, and the server generates a key; when submitting form data to the server, the client receives the key sent by the server, converts to-be-encrypted information in the form data into a plaintext array, and converts the key into a key array; the client extracts a plaintext character string in the plaintext array and converts the plaintext character string into an ASCII code, and extracts a key character string in the key array and converts the key character string into an ASCII code; the client encrypts the to-be-encrypted information according to the ASCII code of the plaintext character string and the ASCII code of the key character string, and sends encrypted data obtained after encryption to the sever; and the server decrypts the encrypted data, and calls a back-end service according to a result obtained after decryption. By adopting the method and the device of the invention, uppercase and lowercase letters and figures can be decrypted, the safety of user data is ensured, and the encryption algorithm is expanded.

Description

A kind of data encryption and transmission method and device based on multilist enciphered method
Technical field
The present invention relates to data ciphering method, the data encryption and transmission method and dress more particularly to based on multilist enciphered method Put.
Background technology
At present majority website all adopts http agreements to data plaintext transmission, transmitting procedure no data ciphering process, and this makes Obtaining attacker can utilize the easy sensitive information (password) that will obtain user of attack tool, it is impossible to ensure the number of user According to safety.
Encryption technology explanation:If key is aperiodic infinite sequence, corresponding password is that multilist replacement aperiodic is close Code.This kind of password, is encrypted, referred to as one time cryptosystem (one- to each plaintext letter using different replacement tables time pad cipher).This is a kind of password that uniquely can not be broken in theory.This password can be real for the characteristics of plaintext It is now completely hidden, but be difficult to widely use because the size of key for needing is identical with the length of cleartext information.
It is exactly exactly plaintext to be carried out into modulo operation by turn with key that multilist substitutes secret central principle, using 26 words Female periodic regular is reaching the purpose of replacement.But this thought is only effective to letter, numeral is not carried out in PSC encryptions Encryption, AES is still indicated when numeral is run into using plaintext, then thus relative drop ciphertext Safety.
Such as, in system login, can be analyzed by requirement analysis instrument draw it is traditional without cipher mode, can be direct User cipher is viewed, user profile is easily caused and is stolen, and then cause the interests of user to suffer a loss.
The content of the invention
The technical problem to be solved is to provide and a kind of can carry out encryption and decryption to upper and lower case letter and numeral Data encryption and transmission method and device based on multilist enciphered method.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of Data Encryption Transmission based on multilist enciphered method Method, comprises the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and by key It is sent to client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by list Confidential information to be added in data is converted into plaintext array, and key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out Key string in key array, by key string ASCII character is converted into;
Step 4:Treating encryption information according to the ASCII character of plaintext string and the ASCII character of key string carries out adding It is close, the encryption data obtained after encryption is sent to into server;
Step 5:The key pair encryption data that server by utilizing is preserved are solved using the inverse process of encryption to encryption data It is close, and according to the result after decryption, call back-end services.
The invention has the beneficial effects as follows:The present invention is encrypted from multilist encryption technology to clear data, can be to big Lower case and numeral carry out encryption and decryption, when Data Encryption Transmission is carried out using this kind of algorithm, using common analytical tool Can not deciphered data content, ensured secure user data, extend AES.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the key string is the character string of multiple lower case compositions.
Further, the quantity of the character in the quantity of the character in the plaintext string is less than key string, bright Character in Chinese character string is corresponded with the character in key string;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string Correspond with the character in plaintext string.
Further, bitwise encryption is carried out to plaintext string in the step 4, when the character in plaintext string is numeral When, the ASCII character of corresponding character in encryption data is calculated in the following ways:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the step 5, when the character in encryption data is numeral, Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
Further, a kind of Data Encryption Transmission device based on multilist enciphered method, including client and server;
The client, for sending to server key request, during to service end submission form data, client are obtained The key that the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into into key Array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out key array In key string, key string is converted into into ASCII character, according to the ASCII character and key string of plaintext string ASCII character treat encryption information and be encrypted, the encryption data obtained after encryption is sent to into server;
The server, for generating key, preserves key and key is sent to into client;Using the key pair for preserving Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services.
Further, the key string is the character string of multiple lower case compositions.
Further, the quantity of the character in the quantity of the character in the plaintext string is less than key string, bright Character in Chinese character string is corresponded with the character in key string;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string Correspond with the character in plaintext string.
Further, bitwise encryption is carried out to plaintext string in the client, when the character in plaintext string is number During word, the ASCII character of corresponding character in encryption data is calculated in the following ways:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the server, when the character in encryption data is numeral, Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
Description of the drawings
Fig. 1 is the inventive method flow chart of steps;
Fig. 2 is apparatus of the present invention structure chart.
In accompanying drawing, the list of parts representated by each label is as follows:
1st, client, 2, server.
Specific embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and It is non-for limiting the scope of the present invention.
As shown in figure 1, being the inventive method flow chart of steps;Fig. 2 is apparatus of the present invention structure chart.
Embodiment 1
A kind of data encryption and transmission method based on multilist enciphered method, comprises the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and by key It is sent to client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by list Confidential information to be added in data is converted into plaintext array, and key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out Key string in key array, by key string ASCII character is converted into;
Step 4:Treating encryption information according to the ASCII character of plaintext string and the ASCII character of key string carries out adding It is close, the encryption data obtained after encryption is sent to into server;
Step 5:The key pair encryption data that server by utilizing is preserved are solved using the inverse process of encryption to encryption data It is close, and according to the result after decryption, call back-end services.
The key string is the character string of multiple lower case compositions.
The quantity of the character in the quantity of the character in the plaintext string is less than key string, plaintext string In character and key string in character correspond;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string Correspond with the character in plaintext string.
Bitwise encryption is carried out to plaintext string in the step 4, when the character in plaintext string is numeral, is adopted In the following manner calculates the ASCII character of corresponding character in encryption data:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character.
Further, encryption data is decrypted by turn in the step 5, when the character in encryption data is numeral, Corresponding character in calculating in plain text in the following ways:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
A kind of Data Encryption Transmission device based on multilist enciphered method, including client 1 and server 2;
The client 1, for sending to server 2 key request, during to service end submission form data, client are obtained The key that end the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into close Key array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out cipher key number Key string in group, by key string ASCII character is converted into, according to the ASCII character and key character of plaintext string The ASCII character of string is treated encryption information and is encrypted, and the encryption data obtained after encryption is sent to into server 2;
The server 2, for generating key, preserves key and key is sent to into client 1;Using the key for preserving Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services.
The key string is the character string of multiple lower case compositions.
The quantity of the character in the quantity of the character in the plaintext string is less than key string, plaintext string In character and key string in character correspond;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key character The tail end of string be superimposed one it is new with original cipher key character string identical key string, after superposition without the character in character string Correspond with the character in plaintext string.
Bitwise encryption is carried out to plaintext string in the client 1, when the character in plaintext string is numeral, is adopted The ASCII character of corresponding character in encryption data is calculated with the following methods:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plain text The ASCII character of character string correspondence character.
Encryption data is decrypted by turn in the server 2, when the character in encryption data for numeral when, adopt with Under type calculates corresponding character in plaintext:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
Multilist is substituted:The key that " table " in multilist is just referred in fact, then " multilist " is (because algorithm is plaintext and key Be replaced by turn), when plaintext more than key when, key is automatically converted to next symmetric periodic, until completely with plaintext Length correspondence.
For example:
Original text:g f e t y u e w 4
Key:a b c a b c a b c
Original text:g f e t y u e w
Key:a b c a b c a b
Key is abc, and cryptographic calculation is regular when original text is gfetyuew4 and original text is gfetyuew.
The generating algorithm of " table ":Using the random classes of java, from 26 alphabetical lists, select at random from 0-25 every time A position is taken as list subscript, corresponding letter is obtained by subscript.It is 10 to obtain a length for acquiescence in this example Random key.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (8)

1. a kind of data encryption and transmission method based on multilist enciphered method, it is characterised in that comprise the following steps:
Step 1:User end to server sends and obtains key request, and server generates key, preserves key and sends key To client;
Step 2:During user end to server submission form data, the key that client the reception server sends, by form data In confidential information to be added be converted into plaintext array, key is converted into into key array;
Step 3:Client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out key Key string in array, by key string ASCII character is converted into;
Step 4:Encryption information is treated according to the ASCII character of plaintext string and the ASCII character of key string to be encrypted, will The encryption data obtained after encryption is sent to server;
Step 5:The key pair encryption data that server by utilizing is preserved are decrypted using the inverse process of encryption to encryption data, and According to the result after decryption, back-end services are called, wherein, when the character in encryption data is numeral, count in the following ways Corresponding character in calculating in plain text:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character.
2. data encryption and transmission method according to claim 1, it is characterised in that:The key string is multiple small letters The character string of letter composition.
3. data encryption and transmission method according to claim 2, it is characterised in that:Character in the plaintext string Quantity less than the character in key string quantity, the character in the character in plaintext string and key string is one by one Correspondence;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key string Tail end be superimposed one it is new with original cipher key character string identical key string, the character in key character string after superposition with it is bright Character in Chinese character string is corresponded.
4. data encryption and transmission method according to claim 3, it is characterised in that to plaintext string in the step 4 Bitwise encryption is carried out, when the character in plaintext string is numeral, corresponding word in encryption data is calculated in the following ways The ASCII character of symbol:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
5. a kind of Data Encryption Transmission device based on multilist enciphered method, it is characterised in that:Including client (1) and server (2);
The client (1), for sending to server (2) key request, during to service end submission form data, client are obtained The key that end the reception server sends, by the confidential information to be added in form data plaintext array is converted into, and key is converted into close Key array, client takes out the plaintext string in plaintext array, and plaintext string is converted into into ASCII character, takes out cipher key number Key string in group, by key string ASCII character is converted into, according to the ASCII character and key character of plaintext string The ASCII character of string is treated encryption information and is encrypted, and the encryption data obtained after encryption is sent to into server (2);
The server (2), for generating key, preserves key and key is sent to into client (1);Using the key for preserving Encryption data is decrypted using the inverse process of encryption to encryption data, and according to the result after decryption, calls back-end services, Wherein, when the server (2) is decrypted by turn to encryption data, and the character in encryption data for numeral when, adopt with Under type calculates corresponding character in plaintext:
Reslult=48+ ((((x-48) -10)-y) %10);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character, wherein y≤10, work as y>When 10, y=10;
When the character in encryption data is lower case, corresponding character in calculating in plain text in the following ways:
Result=97+ ((((x-97) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character;
When the character in encryption data is capitalization, corresponding character in calculating in plain text in the following ways:
Result=65+ ((((x-65) -26)-y) %26);
Wherein, x represents the ASCII character of character in encryption data, y=m -97, m represent in key string with plaintext string pair Answer the ASCII character of character.
6. Data Encryption Transmission device according to claim 5, it is characterised in that:The key string is multiple small letters The character string of letter composition.
7. Data Encryption Transmission device according to claim 6, it is characterised in that:Character in the plaintext string Quantity less than the character in key string quantity, the character in the character in plaintext string and key string is one by one Correspondence;
The quantity of the character in the quantity of the character in the plaintext string is more than key string, in key string Tail end be superimposed one it is new with original cipher key character string identical key string, the character in key character string after superposition with it is bright Character in Chinese character string is corresponded.
8. Data Encryption Transmission device according to claim 7, it is characterised in that:To plaintext word in the client (1) Symbol string carries out bitwise encryption, when the character in plaintext string is numeral, correspondence in encryption data is calculated in the following ways Character ASCII character:
Reslult=48+ (((x-48)+y) %10);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character, wherein y≤10, work as y>When 10, y=10;
When the character in plaintext string is lower case, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=97+ (((x-97)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character;
When the character in plaintext string is capitalization, corresponding character in encryption data is calculated in the following ways ASCII character:
Reslult=65+ (((x-65)+y) %26);
Wherein, x represents the ASCII character of the character in plaintext string, y=m -97, m represent in key string with plaintext character The ASCII character of string correspondence character.
CN201410317610.4A 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method Active CN104113410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410317610.4A CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410317610.4A CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Publications (2)

Publication Number Publication Date
CN104113410A CN104113410A (en) 2014-10-22
CN104113410B true CN104113410B (en) 2017-05-17

Family

ID=51710049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410317610.4A Active CN104113410B (en) 2014-07-04 2014-07-04 Method and device for data encryption transmission based on multi-table encryption method

Country Status (1)

Country Link
CN (1) CN104113410B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141631B (en) * 2015-09-21 2019-06-11 宇龙计算机通信科技(深圳)有限公司 The methods, devices and systems that a kind of terminal, server and account safety log in
CN107483193A (en) * 2017-08-31 2017-12-15 郑州云海信息技术有限公司 A kind of encryption method, decryption method, encryption device and decryption device
CN109474619B (en) * 2018-12-17 2023-06-23 中国平安财产保险股份有限公司 Data encryption reporting method and device and data decryption method and device
CN112422494B (en) * 2020-08-06 2022-09-23 上海幻电信息科技有限公司 Data transmission method, data security verification method and data transmission system
CN114076866A (en) * 2021-11-08 2022-02-22 湖州市检验检测中心 Electrical safety remote inspection system for electromechanical products

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030174840A1 (en) * 2002-03-12 2003-09-18 Bogan William B. Encryption method for preventing unauthorized dissemination of protected data
CN100561546C (en) * 2008-01-28 2009-11-18 和舰科技(苏州)有限公司 Circle scattering migration code-transfer ciphering method
CN101894244B (en) * 2009-05-20 2012-11-21 鸿富锦精密工业(深圳)有限公司 System and method for enciphering electronic data
CN102726028A (en) * 2011-12-31 2012-10-10 华为技术有限公司 Encryption method, decryption method, and corresponding device and system
WO2014008403A1 (en) * 2012-07-03 2014-01-09 Visa International Service Association Data protection hub
CN103873250B (en) * 2012-12-18 2017-06-20 中国移动通信集团河南有限公司 A kind of ciphertext generation method, ciphertext decryption method and encrypting and decrypting device
CN103825723B (en) * 2014-01-24 2019-05-03 深圳市太和物联信息技术有限公司 A kind of encryption method and device

Also Published As

Publication number Publication date
CN104113410A (en) 2014-10-22

Similar Documents

Publication Publication Date Title
CN104113410B (en) Method and device for data encryption transmission based on multi-table encryption method
CN106712946B (en) Data safety transmission method
CN108090370B (en) Instant communication encryption method and system based on index
CN102684877A (en) Method and device for carrying out user information processing
JP2016528845A (en) ID authentication system, apparatus, method, and ID authentication request apparatus
CN107294964B (en) Information transmission method
CN104378198A (en) Voice encryption method based on block cipher system
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN104038336A (en) Data encryption method based on 3DES
Kaur et al. 3D (4 X 4 X 4)-Playfair Cipher
CN104486756B (en) A kind of encryption and decryption method and system of close writing paper short message
CN106357608A (en) Method for encrypting and decrypting private data for personal healthcare data
CN113300842B (en) Method for improving security of symmetric encryption algorithm
US20160241387A1 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN110336839A (en) Cloud Server login method and device based on image encryption
CN109344627A (en) A kind of novel Shannon perfection time slot scrambling
Kuppuswamy et al. New Innovation of Arabic language Encryption Technique using New symmetric key algorithm
CN104038337A (en) Data encryption method based on AES128
CN108494554B (en) Data symmetric encryption method based on double plaintexts
CN102238150A (en) Form registration method and server
CN112149166B (en) Unconventional password protection method and intelligent bank machine
CN111212068B (en) Method for encrypting and decrypting characters by input method
Disina et al. Enhanced caeser cipher to exclude repetition and withstand frequency cryptanalysis
CN111314053B (en) Data encryption and decryption method
Sharma et al. A performance test on symmetric encryption algorithms-RC2 Vs rijndael

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant