CN104125060B - It is a kind of without fixed algorithm key encryption technical method - Google Patents

It is a kind of without fixed algorithm key encryption technical method Download PDF

Info

Publication number
CN104125060B
CN104125060B CN201310149817.0A CN201310149817A CN104125060B CN 104125060 B CN104125060 B CN 104125060B CN 201310149817 A CN201310149817 A CN 201310149817A CN 104125060 B CN104125060 B CN 104125060B
Authority
CN
China
Prior art keywords
computing
file
usbkey
stochastic arithmetic
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310149817.0A
Other languages
Chinese (zh)
Other versions
CN104125060A (en
Inventor
余承泰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Shifang Network Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310149817.0A priority Critical patent/CN104125060B/en
Publication of CN104125060A publication Critical patent/CN104125060A/en
Application granted granted Critical
Publication of CN104125060B publication Critical patent/CN104125060B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of without fixed algorithm key encryption technical method, it is comprising step used below:Random disorder code is generated using USBKEY to initial data, and random disorder code is saved as into random disorder code file;Random disorder code file is generated by USBKEY by operator table at random again;Accidental enciphering document location is generated by USBKEY;User password is inputted, user password accords with table and timestamp computing by stochastic arithmetic, and female secret key is generated by USBKEY;Initial data is accorded with into table using stochastic arithmetic again and random disorder code carries out computing, generates mixed file;Mixed file, by female secret key computing, generates ciphertext using stochastic arithmetic symbol table;By accidental enciphering document location, ciphertext encrypted location is selected;Encrypted location and user password carry out computing to ciphertext, generate final encryption file.The data file encryption that the present invention generates is not easy to be cracked, and safety coefficient is high.

Description

It is a kind of without fixed algorithm key encryption technical method
Technical field
Patent of the present invention is related to encryption technology field, is specifically related to a kind of without fixed algorithm key encryption technology.
Background technology
In the hyundai electronics epoch, the storage and exchange of data, it usually needs encryption, to prevent in unauthorized feelings Other people do not access under condition.Encryption is to change original information data with certain special algorithm so that even if the user of unauthorized Encrypted information, but the method because not knowing decryption are obtained, still can not understand the content of information.
Existing encryption technology will rely on fixed Encryption Algorithm, such as AES and MD5 etc..Encryption Algorithm namely into A kind of encrypted method of row, is widely used in various encryption technologies!The basic process of existing data encryption is:To being bright originally The file or data of text are handled by certain algorithm, become one section of unreadable code, commonly referred to as " ciphertext ", make it Original content can only can be just shown after corresponding key is inputted, approach in this way protects data not by not to reach The purpose that licensed people steals, reads.The inverse process of the process for decryption, will the coding information be converted into its original data Process.
Existing encryption technology is stored with these algorithms all there are basic secret key and algorithm inside encryption software, Once algorithm is revealed or software is cracked, data will have the risk accessed by people without approval;In addition, existing encryption Most of technology can be by Brute Force, although very long the time required to current Brute Force, the cost is higher, The appearance of quantum computer will break this general layout so that Brute Force becomes more and more easily, therefore existing data add Secret skill art security cannot get certain guarantee.
The content of the invention
For overcome the deficiencies in the prior art, the present invention provides one kind and is not easy to be cracked, and security performance is high without fixed algorithm Key encryption technology.
The technical solution adopted by the present invention to solve the technical problems is:
It is a kind of without fixed algorithm key encryption technical method, which is characterized in that it is described without fixed algorithm key encryption skill Art includes step used below:
(1)Random disorder code is generated using USBKEY, and random disorder code is saved as into random mess code file;
(2)Using USBKEY generation stochastic arithmetic symbol tables, and stochastic arithmetic symbol table is saved as into stochastic arithmetic symbol list file;
(3)Using USBKEY generations file accidental enciphering position, and it is random that file accidental enciphering position is saved as file Encrypted location file;
(4)User inputs password, and password is accorded with table and timestamp computing by stochastic arithmetic(Computing mode is low level pair Together, high-order insufficient digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically beyond digit).Into The female secret key of generation;
(5)Initial data is accorded with into table using stochastic arithmetic and random disorder code file carries out computing(Take not-carry but guarantor Stay the computing mode of carry digit), generate mixed file;
(6)Mixed file passes through female secret key computing using stochastic arithmetic symbol table(Take not-carry but partial carry number Computing mode), generate ciphertext(7)By accidental enciphering document location, ciphertext position is selected;
(8)It encrypts file and user password and computing is carried out to ciphertext(Take not-carry but partial carry number, low level pair Together),(Choose position that initial data is taken to participate in computing, unselected position data is constant, is not involved in computing, and operator table is same, Position is chosen to participate in computing, unselected position is not involved in computing), final encryption file is generated, and is supplied to user;
(9)Out of order code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit In USBKEY, initial data encryption is completed.
The beneficial effects of the invention are as follows:In the encryption technology of the present invention, any Encryption Algorithm is not stored in the data file Or secret key, also without fixed algorithm and basic secret key, therefore even if encryption software is cracked or dis-assembling will not be right Data safety generates threat, does not also possess the necessary condition of Brute Force, and the data file encryption that the present invention generates is not easy to be broken Solution, safety coefficient are high.
Description of the drawings
Fig. 1 is the FB(flow block) of the present invention.
Fig. 2 is the example schematic of the present invention.
Specific embodiment
With reference to specific embodiment, the present invention is further explained.It is to be understood that these embodiments are merely to illustrate the present invention Rather than the scope of application of the limitation present invention.In addition, it should also be understood that, after reading the content taught by the present invention, this field skill Art personnel can make various changes or modifications the present invention, and such equivalent forms also fall within application the appended claims and limited Fixed scope.
As shown in Figure 1, it is a kind of without fixed algorithm key encryption technology, be comprising step used below:To initial data profit Random disorder code is generated with USBKEY, and random disorder code is saved as into random disorder code file;It is given birth at random again by USBKEY Into operator table, and save as stochastic arithmetic symbol list file;Accidental enciphering document location is generated by USBKEY, and saves as text Part accidental enciphering position paper;User password is inputted, user password accords with table and timestamp computing by stochastic arithmetic(Computing mode It aligns for low level, high-order deficiency digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically and exceeds Digit),;Initial data is accorded with into table using stochastic arithmetic again and random disorder code carries out computing(Take not-carry but partial carry The computing mode of number), generate mixed file;Mixed file passes through random female secret key computing using stochastic arithmetic symbol table(It takes Not-carry but the computing mode of partial carry number), generate ciphertext;By accidental enciphering document location, ciphertext encrypted bits are selected It puts;Encrypted location and user password carry out computing to ciphertext(Take not-carry but partial carry number, low level alignment),(It chooses Position takes initial data to participate in computing, and unselected position data is constant, is not involved in computing, operator table is same, chooses position Computing is participated in, unselected position is not involved in computing), final encryption file is generated, ciphertext is saved as file and is supplied to user;It will Random disorder code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit USBKEY In, complete initial data encryption.
Fig. 2 is the example schematic of the present invention.Citing such as initial data is 1287, and random disorder code is generated using USBKEY 3612, and random disorder code is saved as into random disorder code file;Generate stochastic arithmetic at random again by USBKEY and accord with table ++ -+, And save as stochastic arithmetic symbol list file;Accidental enciphering document location is generated by USBKEY(First row first the 4th Position), and save as file accidental enciphering position paper;User inputs password 1234, and user password 1234 is passed through stochastic arithmetic Accord with table ++ -+and timestamp 11:11 computings draw 2325(Computing mode is alignd for low level, and high-order deficiency digit is alignd according to low level Mode carry out computing again, if a high position exceeds, remove automatically beyond digit);Initial data 1287 is utilized into stochastic arithmetic again Accord with table ++ -+and the progress computing of random disorder code 3612(Take the computing mode of not-carry but partial carry number), generation mixing File 4879;Mixed file accords with table using stochastic arithmetic ++ and -+passes through 3612 computing of random female secret key(Take not-carry but reservation The computing mode of carry digit), generate ciphertext 611512;Pass through accidental enciphering document location(First row first the 4th Position)And the position of operator table(First row first+the four+);With user password 1234(First row first 1 4th 4)Computing is carried out to ciphertext 611512(Take not-carry but partial carry number, low level alignment),(Position is chosen to take original Beginning data participate in computing, and unselected position data is constant, is not involved in computing, and operator table is same, and position is chosen to participate in computing, Unselected position is not involved in computing), final encryption file 711912 is generated, ciphertext is saved as file and is supplied to user;It will be with The out of order code file of machine, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied in user or deposit USBKEY, Complete initial data encryption.

Claims (1)

  1. It is 1. a kind of without fixed algorithm key encryption technical method, which is characterized in that the method comprises the steps of:
    (1)Random disorder code is generated using USBKEY, and random disorder code is saved as into random mess code file;
    (2)Using USBKEY generation stochastic arithmetic symbol tables, and stochastic arithmetic symbol table is saved as into stochastic arithmetic symbol list file;
    (3)Using USBKEY generation file accidental encipherings position, and file accidental enciphering position is saved as into file accidental enciphering Position paper;
    (4)User inputs password, password is accorded with table and timestamp computing by stochastic arithmetic, computing mode is alignd for low level, high Position is insufficient, and digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically beyond digit, passes through The female secret key of USBKEY generations;
    (5)Initial data is accorded with into table and random disorder code file using stochastic arithmetic and carries out computing, take not-carry but retain into The computing mode of bit digital generates mixed file;
    (6)Mixed file accords with table by female secret key computing using stochastic arithmetic, takes not-carry but the computing of partial carry number Mode generates ciphertext;
    (7)By accidental enciphering document location, ciphertext position is selected;
    (8)Ciphertext is carried out by the operator corresponding to encrypted location in encrypted location, stochastic arithmetic symbol table and user password Computing, takes not-carry but partial carry number, and low level alignment chooses position that initial data is taken to participate in computing, unselected position Data are constant, are not involved in computing, and operator table is same, and position is chosen to participate in computing, and unselected position is not involved in computing, generate Final encryption file, and it is supplied to user;
    (9)Out of order code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit In USBKEY, initial data encryption is completed.
CN201310149817.0A 2013-04-26 2013-04-26 It is a kind of without fixed algorithm key encryption technical method Active CN104125060B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310149817.0A CN104125060B (en) 2013-04-26 2013-04-26 It is a kind of without fixed algorithm key encryption technical method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310149817.0A CN104125060B (en) 2013-04-26 2013-04-26 It is a kind of without fixed algorithm key encryption technical method

Publications (2)

Publication Number Publication Date
CN104125060A CN104125060A (en) 2014-10-29
CN104125060B true CN104125060B (en) 2018-06-01

Family

ID=51770333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310149817.0A Active CN104125060B (en) 2013-04-26 2013-04-26 It is a kind of without fixed algorithm key encryption technical method

Country Status (1)

Country Link
CN (1) CN104125060B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552666A (en) * 2009-05-07 2009-10-07 杭州威威网络科技有限公司 Real time media stream encryption transmission method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552666A (en) * 2009-05-07 2009-10-07 杭州威威网络科技有限公司 Real time media stream encryption transmission method

Also Published As

Publication number Publication date
CN104125060A (en) 2014-10-29

Similar Documents

Publication Publication Date Title
CN109474423B (en) Data encryption and decryption method, server and storage medium
CN106250721A (en) A kind of electronic copyright protection method based on block chain
Zhang et al. Image encryption algorithm based on dynamic DNA coding and Chen’s hyperchaotic system
CN103906054A (en) Method and system for authorization of software function modules of internet of things
CN107948152A (en) Information storage means, acquisition methods, device and equipment
CN104468615A (en) Data sharing based file access and permission change control method
CN103457727A (en) Method, device and system for processing media data
Niu et al. Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database
CN105468990A (en) Sensitive information management control method and apparatus
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN104919511A (en) Data decoding device, attribute-based encryption system, random number element removing device, randomized secret key generation device, data decoding method, and data decoding program
CN103345609A (en) Method and device for text encryption and decryption
CN106888081A (en) The coding wide of median in whitepack embodiment
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
CN103731423A (en) Safe method for repeated data deleting
CN102222188A (en) Information system user password generation method
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN102236767B (en) In conjunction with the file encrypting method of cryptographic hash
KR101559380B1 (en) Apparatus and method for obfuscating contents
CN104023009B (en) A kind of Web system license validation method
CN106656472A (en) Transaction data encryption method and system
CN104392153B (en) A kind of method for protecting software and system
Yang [Retracted] Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card
CN100543762C (en) Computer-aided design data encryption protecting method based on hardware environment
CN107493287A (en) Industry control network data security system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201123

Address after: Room 1008, block B, Kechuang headquarters building, No. 320, pubin Road, Nanjing area, Jiangsu Free Trade Zone, Nanjing City, Jiangsu Province

Patentee after: Nanjing Shifang Network Technology Co., Ltd

Address before: Street dates 400000 Chongqing District of Yuzhong City Lan Wu No. 8 2-6

Patentee before: Yu Chengtai

TR01 Transfer of patent right