CN104125056A - Data encryption and decryption method - Google Patents

Data encryption and decryption method Download PDF

Info

Publication number
CN104125056A
CN104125056A CN201410383859.5A CN201410383859A CN104125056A CN 104125056 A CN104125056 A CN 104125056A CN 201410383859 A CN201410383859 A CN 201410383859A CN 104125056 A CN104125056 A CN 104125056A
Authority
CN
China
Prior art keywords
data
successively
b1pn
ciphertext
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410383859.5A
Other languages
Chinese (zh)
Inventor
肖龙旭
张凯
丁凯
陈炫
孙其峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING CHERILEAD TECH Co Ltd
Original Assignee
BEIJING CHERILEAD TECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING CHERILEAD TECH Co Ltd filed Critical BEIJING CHERILEAD TECH Co Ltd
Priority to CN201410383859.5A priority Critical patent/CN104125056A/en
Publication of CN104125056A publication Critical patent/CN104125056A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of computer information processing, and relates to a data encryption and decryption method. The encryption process of the data encryption and decryption method comprises the following steps: a1, resolving clear data into B1, and partitioning B1 into a first portion B1P1...an Nth portion B1PN in sequence in the unit of eight bits; a2, distributing a storage region B2, and partitioning the storage region B2 into portions of eight bits, namely, a first portion B2P1...an eighth portion B2P8 respectively; a3, reading first bits in B2P1...B2P8 respectively, writing into B2P1,...in sequence, and writing eighth bits in B2P1, ..., B1PN into B2P8 in sequence, wherein all data in the storage area B2 is a cipher text D2; a4, encrypting the cipher text D2 by using an encryption algorithm R1 to form a cipher text D3. The decryption process is reserve to the encryption process. The cipher text D2 formed by encryption is completely different from a plain text D1, and any information in the plain text D1 cannot be restored even the cipher text D3 is decoded into the cipher text D2, thereby effectively enhancing the reliability of data encryption.

Description

A kind of data encryption/decryption method
Technical field
The invention belongs to technical field of computer information processing, particularly data encryption/decryption method.
Background technology
Conventional data encryption technology is that priority extraction portion divided data is encrypted respectively in one piece of data at present, and total data becomes ciphertext the most at last.Thereby can find one piece of data in encrypt data, be exactly the partial data in initial data by the plaintext obtaining after this segment data deciphering.
Summary of the invention
The object of the invention is: provide one to overcome prior art deficiency, guarantee the encipher-decipher method to all drawing initial data after any one piece of data deciphering in encrypt data, improve the reliability of data confidentiality.
Technical scheme of the present invention is: a kind of data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.
Utilize the present invention to encrypt formed ciphertext D2 and expressly D1 is completely different, even thereby ciphertext D3 is decoded as ciphertext D2, still can not reduce expressly any information of D1, thereby effectively improve the reliability of data encryption.
Brief description of the drawings
Accompanying drawing 1 is ciphering process flow chart in the present invention;
Accompanying drawing 2 is decrypting process flow chart in the present invention.
Embodiment
Referring to accompanying drawing 1,2, a kind of data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.

Claims (1)

1. a data encryption/decryption method, comprises ciphering process and decrypting process;
Described ciphering process comprises the following steps:
A1, the clear data D1 that needs are encrypted resolve to binary stream B1 by byte successively from data head to tail; And by B1 by byte taking 8 bits as unit, be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
A2, distribute a storage area B2 onesize with B1, and to be divided into 8 N bits be big or small part, be respectively part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
A3, respectively read B1P1, B1P2 ..., in B1PN the 1st amount to N Bit data and write successively B2P1, read respectively B1P1, B1P2 ..., in B1PN the 2nd amount to N Bit data and write successively B2P2,, read respectively B1P1, B1P2 ..., in B1PN the 8th amount to N Bit data and write successively B2P8; Storage area B2 total data is ciphertext D2;
A4, use cryptographic algorithm R1 are encrypted ciphertext D2, form ciphertext D3;
Described decrypting process comprises the following steps:
B1, use cryptographic algorithm R1 are decrypted ciphertext D3, form ciphertext D2;
B2, by ciphertext D2 from first to last by N bit size be divided into successively 8 parts: part 1 B2P1, part 2 B2P2 ..., the 8th part B2P8;
B3, distribute a storage area B1 onesize with binary stream D2, and by byte be 8 bits be unit be divided into successively part 1 B1P1, part 2 B1P2 ..., N part B1PN;
B4, by B2P1, B2P2 ..., the 1st of B2P8 deposit successively B1P1 in, by B2P1, B2P2 ..., the 2nd of B2P8 deposit successively B1P2 in ..., by B2P1, B2P2 ..., B2P8 N position deposit successively B1PN in; Storage area B1 total data is reduced to expressly D1.
CN201410383859.5A 2014-08-07 2014-08-07 Data encryption and decryption method Pending CN104125056A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410383859.5A CN104125056A (en) 2014-08-07 2014-08-07 Data encryption and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410383859.5A CN104125056A (en) 2014-08-07 2014-08-07 Data encryption and decryption method

Publications (1)

Publication Number Publication Date
CN104125056A true CN104125056A (en) 2014-10-29

Family

ID=51770329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410383859.5A Pending CN104125056A (en) 2014-08-07 2014-08-07 Data encryption and decryption method

Country Status (1)

Country Link
CN (1) CN104125056A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347622A (en) * 2018-09-26 2019-02-15 浙江万朋教育科技股份有限公司 A method of the reversible anti-tamper encryption and decryption data based on encryption and digest algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6631491B1 (en) * 1997-11-10 2003-10-07 Ntt Mobile Communications Network, Inc. Interleaving method, interleaving apparatus, and recording medium in which interleave pattern generating program is recorded
CN103500294A (en) * 2013-09-23 2014-01-08 北京荣之联科技股份有限公司 Document encrypting and decrypting method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6631491B1 (en) * 1997-11-10 2003-10-07 Ntt Mobile Communications Network, Inc. Interleaving method, interleaving apparatus, and recording medium in which interleave pattern generating program is recorded
CN103500294A (en) * 2013-09-23 2014-01-08 北京荣之联科技股份有限公司 Document encrypting and decrypting method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陈柯欣: ""基于交织法与现代密码学的加密技术研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
雷旭 等: ""一种采用交织的新型对称分组密码算法"", 《小型微型计算机系统》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347622A (en) * 2018-09-26 2019-02-15 浙江万朋教育科技股份有限公司 A method of the reversible anti-tamper encryption and decryption data based on encryption and digest algorithm

Similar Documents

Publication Publication Date Title
GB2544672A (en) PUF and address dependent data encryption
WO2013068843A3 (en) Multi-key cryptography for encrypting file system acceleration
JP6345237B2 (en) Method and apparatus for encrypting plaintext data
JP2019505924A5 (en)
US20160204931A1 (en) Self-encrypting flash drive
WO2016053405A3 (en) Encryption method for execute-in-place memories
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
CN108432178B (en) Method for securing recording of multimedia content in a storage medium
CN103488915B (en) The resource encryption decryption method of the double secret key encryption that a kind of software and hardware combines
TW200639634A (en) Information processing apparatus and method, information recording medium manufacturing apparatus, information recording medium, computer program, and data structure
CN102546156A (en) Method, system and device for grouping encryption
CN102983972A (en) Dynamic encryption and decryption method based on stream cipher
CN104518865A (en) Data encryption method based on password book
US9419952B2 (en) Memory encryption method compatible with a memory interleaved system and corresponding system
WO2016053407A3 (en) Speculative cryptographic processing for out of order data
JP2008306395A5 (en)
JP2016525836A5 (en)
CN104125056A (en) Data encryption and decryption method
US9621345B2 (en) Countering server-based attacks on encrypted content
JP6203387B2 (en) Encryption device, storage system, decryption device, encryption method, decryption method, encryption program, and decryption program
CN106357391B (en) Secure information decentralized encryption algorithm
CN102098293B (en) Method for previewing encrypted email
KR20170103321A (en) Order preserving encryption method and apparatus with enhanced security
CN109286484A (en) A kind of quick data processing method improving data encrypting and deciphering speed
CN105516763B (en) Encipher-decipher method, device and the digital program system of certificate granting card identification information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141029

WD01 Invention patent application deemed withdrawn after publication