CN104125056A - Data encryption and decryption method - Google Patents
Data encryption and decryption method Download PDFInfo
- Publication number
- CN104125056A CN104125056A CN201410383859.5A CN201410383859A CN104125056A CN 104125056 A CN104125056 A CN 104125056A CN 201410383859 A CN201410383859 A CN 201410383859A CN 104125056 A CN104125056 A CN 104125056A
- Authority
- CN
- China
- Prior art keywords
- data
- successively
- b1pn
- ciphertext
- bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of computer information processing, and relates to a data encryption and decryption method. The encryption process of the data encryption and decryption method comprises the following steps: a1, resolving clear data into B1, and partitioning B1 into a first portion B1P1...an Nth portion B1PN in sequence in the unit of eight bits; a2, distributing a storage region B2, and partitioning the storage region B2 into portions of eight bits, namely, a first portion B2P1...an eighth portion B2P8 respectively; a3, reading first bits in B2P1...B2P8 respectively, writing into B2P1,...in sequence, and writing eighth bits in B2P1, ..., B1PN into B2P8 in sequence, wherein all data in the storage area B2 is a cipher text D2; a4, encrypting the cipher text D2 by using an encryption algorithm R1 to form a cipher text D3. The decryption process is reserve to the encryption process. The cipher text D2 formed by encryption is completely different from a plain text D1, and any information in the plain text D1 cannot be restored even the cipher text D3 is decoded into the cipher text D2, thereby effectively enhancing the reliability of data encryption.
Description
Technical field
The invention belongs to technical field of computer information processing, particularly data encryption/decryption method.
Background technology
Conventional data encryption technology is that priority extraction portion divided data is encrypted respectively in one piece of data at present, and total data becomes ciphertext the most at last.Thereby can find one piece of data in encrypt data, be exactly the partial data in initial data by the plaintext obtaining after this segment data deciphering.
Summary of the invention
The object of the invention is: provide one to overcome prior art deficiency, guarantee the encipher-decipher method to all drawing initial data after any one piece of data deciphering in encrypt data, improve the reliability of data confidentiality.
Technical scheme of the present invention is: a kind of data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.
Utilize the present invention to encrypt formed ciphertext D2 and expressly D1 is completely different, even thereby ciphertext D3 is decoded as ciphertext D2, still can not reduce expressly any information of D1, thereby effectively improve the reliability of data encryption.
Brief description of the drawings
Accompanying drawing 1 is ciphering process flow chart in the present invention;
Accompanying drawing 2 is decrypting process flow chart in the present invention.
Embodiment
Referring to accompanying drawing 1,2, a kind of data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.
Claims (1)
1. a data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410383859.5A CN104125056A (en) | 2014-08-07 | 2014-08-07 | Data encryption and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410383859.5A CN104125056A (en) | 2014-08-07 | 2014-08-07 | Data encryption and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104125056A true CN104125056A (en) | 2014-10-29 |
Family
ID=51770329
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410383859.5A Pending CN104125056A (en) | 2014-08-07 | 2014-08-07 | Data encryption and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104125056A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109347622A (en) * | 2018-09-26 | 2019-02-15 | 浙江万朋教育科技股份有限公司 | A method of the reversible anti-tamper encryption and decryption data based on encryption and digest algorithm |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6631491B1 (en) * | 1997-11-10 | 2003-10-07 | Ntt Mobile Communications Network, Inc. | Interleaving method, interleaving apparatus, and recording medium in which interleave pattern generating program is recorded |
CN103500294A (en) * | 2013-09-23 | 2014-01-08 | 北京荣之联科技股份有限公司 | Document encrypting and decrypting method and device |
-
2014
- 2014-08-07 CN CN201410383859.5A patent/CN104125056A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6631491B1 (en) * | 1997-11-10 | 2003-10-07 | Ntt Mobile Communications Network, Inc. | Interleaving method, interleaving apparatus, and recording medium in which interleave pattern generating program is recorded |
CN103500294A (en) * | 2013-09-23 | 2014-01-08 | 北京荣之联科技股份有限公司 | Document encrypting and decrypting method and device |
Non-Patent Citations (2)
Title |
---|
陈柯欣: ""基于交织法与现代密码学的加密技术研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
雷旭 等: ""一种采用交织的新型对称分组密码算法"", 《小型微型计算机系统》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109347622A (en) * | 2018-09-26 | 2019-02-15 | 浙江万朋教育科技股份有限公司 | A method of the reversible anti-tamper encryption and decryption data based on encryption and digest algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2544672A (en) | PUF and address dependent data encryption | |
WO2013068843A3 (en) | Multi-key cryptography for encrypting file system acceleration | |
JP6345237B2 (en) | Method and apparatus for encrypting plaintext data | |
JP2019505924A5 (en) | ||
US20160204931A1 (en) | Self-encrypting flash drive | |
WO2016053405A3 (en) | Encryption method for execute-in-place memories | |
PH12018502160A1 (en) | Systems and methods for secure storage of user information in a user profile | |
CN108432178B (en) | Method for securing recording of multimedia content in a storage medium | |
CN103488915B (en) | The resource encryption decryption method of the double secret key encryption that a kind of software and hardware combines | |
TW200639634A (en) | Information processing apparatus and method, information recording medium manufacturing apparatus, information recording medium, computer program, and data structure | |
CN102546156A (en) | Method, system and device for grouping encryption | |
CN102983972A (en) | Dynamic encryption and decryption method based on stream cipher | |
CN104518865A (en) | Data encryption method based on password book | |
US9419952B2 (en) | Memory encryption method compatible with a memory interleaved system and corresponding system | |
WO2016053407A3 (en) | Speculative cryptographic processing for out of order data | |
JP2008306395A5 (en) | ||
JP2016525836A5 (en) | ||
CN104125056A (en) | Data encryption and decryption method | |
US9621345B2 (en) | Countering server-based attacks on encrypted content | |
JP6203387B2 (en) | Encryption device, storage system, decryption device, encryption method, decryption method, encryption program, and decryption program | |
CN106357391B (en) | Secure information decentralized encryption algorithm | |
CN102098293B (en) | Method for previewing encrypted email | |
KR20170103321A (en) | Order preserving encryption method and apparatus with enhanced security | |
CN109286484A (en) | A kind of quick data processing method improving data encrypting and deciphering speed | |
CN105516763B (en) | Encipher-decipher method, device and the digital program system of certificate granting card identification information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141029 |
|
WD01 | Invention patent application deemed withdrawn after publication |