CN104125060B - It is a kind of without fixed algorithm key encryption technical method - Google Patents
It is a kind of without fixed algorithm key encryption technical method Download PDFInfo
- Publication number
- CN104125060B CN104125060B CN201310149817.0A CN201310149817A CN104125060B CN 104125060 B CN104125060 B CN 104125060B CN 201310149817 A CN201310149817 A CN 201310149817A CN 104125060 B CN104125060 B CN 104125060B
- Authority
- CN
- China
- Prior art keywords
- computing
- file
- usbkey
- stochastic arithmetic
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 12
- 238000005516 engineering process Methods 0.000 description 10
- 230000007812 deficiency Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of without fixed algorithm key encryption technical method, it is comprising step used below:Random disorder code is generated using USBKEY to initial data, and random disorder code is saved as into random disorder code file;Random disorder code file is generated by USBKEY by operator table at random again;Accidental enciphering document location is generated by USBKEY;User password is inputted, user password accords with table and timestamp computing by stochastic arithmetic, and female secret key is generated by USBKEY;Initial data is accorded with into table using stochastic arithmetic again and random disorder code carries out computing, generates mixed file;Mixed file, by female secret key computing, generates ciphertext using stochastic arithmetic symbol table;By accidental enciphering document location, ciphertext encrypted location is selected;Encrypted location and user password carry out computing to ciphertext, generate final encryption file.The data file encryption that the present invention generates is not easy to be cracked, and safety coefficient is high.
Description
Technical field
Patent of the present invention is related to encryption technology field, is specifically related to a kind of without fixed algorithm key encryption technology.
Background technology
In the hyundai electronics epoch, the storage and exchange of data, it usually needs encryption, to prevent in unauthorized feelings
Other people do not access under condition.Encryption is to change original information data with certain special algorithm so that even if the user of unauthorized
Encrypted information, but the method because not knowing decryption are obtained, still can not understand the content of information.
Existing encryption technology will rely on fixed Encryption Algorithm, such as AES and MD5 etc..Encryption Algorithm namely into
A kind of encrypted method of row, is widely used in various encryption technologies!The basic process of existing data encryption is:To being bright originally
The file or data of text are handled by certain algorithm, become one section of unreadable code, commonly referred to as " ciphertext ", make it
Original content can only can be just shown after corresponding key is inputted, approach in this way protects data not by not to reach
The purpose that licensed people steals, reads.The inverse process of the process for decryption, will the coding information be converted into its original data
Process.
Existing encryption technology is stored with these algorithms all there are basic secret key and algorithm inside encryption software,
Once algorithm is revealed or software is cracked, data will have the risk accessed by people without approval;In addition, existing encryption
Most of technology can be by Brute Force, although very long the time required to current Brute Force, the cost is higher,
The appearance of quantum computer will break this general layout so that Brute Force becomes more and more easily, therefore existing data add
Secret skill art security cannot get certain guarantee.
The content of the invention
For overcome the deficiencies in the prior art, the present invention provides one kind and is not easy to be cracked, and security performance is high without fixed algorithm
Key encryption technology.
The technical solution adopted by the present invention to solve the technical problems is:
It is a kind of without fixed algorithm key encryption technical method, which is characterized in that it is described without fixed algorithm key encryption skill
Art includes step used below:
(1)Random disorder code is generated using USBKEY, and random disorder code is saved as into random mess code file;
(2)Using USBKEY generation stochastic arithmetic symbol tables, and stochastic arithmetic symbol table is saved as into stochastic arithmetic symbol list file;
(3)Using USBKEY generations file accidental enciphering position, and it is random that file accidental enciphering position is saved as file
Encrypted location file;
(4)User inputs password, and password is accorded with table and timestamp computing by stochastic arithmetic(Computing mode is low level pair
Together, high-order insufficient digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically beyond digit).Into
The female secret key of generation;
(5)Initial data is accorded with into table using stochastic arithmetic and random disorder code file carries out computing(Take not-carry but guarantor
Stay the computing mode of carry digit), generate mixed file;
(6)Mixed file passes through female secret key computing using stochastic arithmetic symbol table(Take not-carry but partial carry number
Computing mode), generate ciphertext(7)By accidental enciphering document location, ciphertext position is selected;
(8)It encrypts file and user password and computing is carried out to ciphertext(Take not-carry but partial carry number, low level pair
Together),(Choose position that initial data is taken to participate in computing, unselected position data is constant, is not involved in computing, and operator table is same,
Position is chosen to participate in computing, unselected position is not involved in computing), final encryption file is generated, and is supplied to user;
(9)Out of order code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit
In USBKEY, initial data encryption is completed.
The beneficial effects of the invention are as follows:In the encryption technology of the present invention, any Encryption Algorithm is not stored in the data file
Or secret key, also without fixed algorithm and basic secret key, therefore even if encryption software is cracked or dis-assembling will not be right
Data safety generates threat, does not also possess the necessary condition of Brute Force, and the data file encryption that the present invention generates is not easy to be broken
Solution, safety coefficient are high.
Description of the drawings
Fig. 1 is the FB(flow block) of the present invention.
Fig. 2 is the example schematic of the present invention.
Specific embodiment
With reference to specific embodiment, the present invention is further explained.It is to be understood that these embodiments are merely to illustrate the present invention
Rather than the scope of application of the limitation present invention.In addition, it should also be understood that, after reading the content taught by the present invention, this field skill
Art personnel can make various changes or modifications the present invention, and such equivalent forms also fall within application the appended claims and limited
Fixed scope.
As shown in Figure 1, it is a kind of without fixed algorithm key encryption technology, be comprising step used below:To initial data profit
Random disorder code is generated with USBKEY, and random disorder code is saved as into random disorder code file;It is given birth at random again by USBKEY
Into operator table, and save as stochastic arithmetic symbol list file;Accidental enciphering document location is generated by USBKEY, and saves as text
Part accidental enciphering position paper;User password is inputted, user password accords with table and timestamp computing by stochastic arithmetic(Computing mode
It aligns for low level, high-order deficiency digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically and exceeds
Digit),;Initial data is accorded with into table using stochastic arithmetic again and random disorder code carries out computing(Take not-carry but partial carry
The computing mode of number), generate mixed file;Mixed file passes through random female secret key computing using stochastic arithmetic symbol table(It takes
Not-carry but the computing mode of partial carry number), generate ciphertext;By accidental enciphering document location, ciphertext encrypted bits are selected
It puts;Encrypted location and user password carry out computing to ciphertext(Take not-carry but partial carry number, low level alignment),(It chooses
Position takes initial data to participate in computing, and unselected position data is constant, is not involved in computing, operator table is same, chooses position
Computing is participated in, unselected position is not involved in computing), final encryption file is generated, ciphertext is saved as file and is supplied to user;It will
Random disorder code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit USBKEY
In, complete initial data encryption.
Fig. 2 is the example schematic of the present invention.Citing such as initial data is 1287, and random disorder code is generated using USBKEY
3612, and random disorder code is saved as into random disorder code file;Generate stochastic arithmetic at random again by USBKEY and accord with table ++ -+,
And save as stochastic arithmetic symbol list file;Accidental enciphering document location is generated by USBKEY(First row first the 4th
Position), and save as file accidental enciphering position paper;User inputs password 1234, and user password 1234 is passed through stochastic arithmetic
Accord with table ++ -+and timestamp 11:11 computings draw 2325(Computing mode is alignd for low level, and high-order deficiency digit is alignd according to low level
Mode carry out computing again, if a high position exceeds, remove automatically beyond digit);Initial data 1287 is utilized into stochastic arithmetic again
Accord with table ++ -+and the progress computing of random disorder code 3612(Take the computing mode of not-carry but partial carry number), generation mixing
File 4879;Mixed file accords with table using stochastic arithmetic ++ and -+passes through 3612 computing of random female secret key(Take not-carry but reservation
The computing mode of carry digit), generate ciphertext 611512;Pass through accidental enciphering document location(First row first the 4th
Position)And the position of operator table(First row first+the four+);With user password 1234(First row first 1
4th 4)Computing is carried out to ciphertext 611512(Take not-carry but partial carry number, low level alignment),(Position is chosen to take original
Beginning data participate in computing, and unselected position data is constant, is not involved in computing, and operator table is same, and position is chosen to participate in computing,
Unselected position is not involved in computing), final encryption file 711912 is generated, ciphertext is saved as file and is supplied to user;It will be with
The out of order code file of machine, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied in user or deposit USBKEY,
Complete initial data encryption.
Claims (1)
- It is 1. a kind of without fixed algorithm key encryption technical method, which is characterized in that the method comprises the steps of:(1)Random disorder code is generated using USBKEY, and random disorder code is saved as into random mess code file;(2)Using USBKEY generation stochastic arithmetic symbol tables, and stochastic arithmetic symbol table is saved as into stochastic arithmetic symbol list file;(3)Using USBKEY generation file accidental encipherings position, and file accidental enciphering position is saved as into file accidental enciphering Position paper;(4)User inputs password, password is accorded with table and timestamp computing by stochastic arithmetic, computing mode is alignd for low level, high Position is insufficient, and digit carries out computing again according to the mode that low level aligns, and if a high position exceeds, removes automatically beyond digit, passes through The female secret key of USBKEY generations;(5)Initial data is accorded with into table and random disorder code file using stochastic arithmetic and carries out computing, take not-carry but retain into The computing mode of bit digital generates mixed file;(6)Mixed file accords with table by female secret key computing using stochastic arithmetic, takes not-carry but the computing of partial carry number Mode generates ciphertext;(7)By accidental enciphering document location, ciphertext position is selected;(8)Ciphertext is carried out by the operator corresponding to encrypted location in encrypted location, stochastic arithmetic symbol table and user password Computing, takes not-carry but partial carry number, and low level alignment chooses position that initial data is taken to participate in computing, unselected position Data are constant, are not involved in computing, and operator table is same, and position is chosen to participate in computing, and unselected position is not involved in computing, generate Final encryption file, and it is supplied to user;(9)Out of order code file, stochastic arithmetic symbol table, female secret key, accidental enciphering position paper are supplied to user or deposit In USBKEY, initial data encryption is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310149817.0A CN104125060B (en) | 2013-04-26 | 2013-04-26 | It is a kind of without fixed algorithm key encryption technical method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310149817.0A CN104125060B (en) | 2013-04-26 | 2013-04-26 | It is a kind of without fixed algorithm key encryption technical method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104125060A CN104125060A (en) | 2014-10-29 |
CN104125060B true CN104125060B (en) | 2018-06-01 |
Family
ID=51770333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310149817.0A Active CN104125060B (en) | 2013-04-26 | 2013-04-26 | It is a kind of without fixed algorithm key encryption technical method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104125060B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101552666A (en) * | 2009-05-07 | 2009-10-07 | 杭州威威网络科技有限公司 | Real time media stream encryption transmission method |
-
2013
- 2013-04-26 CN CN201310149817.0A patent/CN104125060B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101552666A (en) * | 2009-05-07 | 2009-10-07 | 杭州威威网络科技有限公司 | Real time media stream encryption transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN104125060A (en) | 2014-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109474423B (en) | Data encryption and decryption method, server and storage medium | |
CN106250721A (en) | A kind of electronic copyright protection method based on block chain | |
Zhang et al. | Image encryption algorithm based on dynamic DNA coding and Chen’s hyperchaotic system | |
CN103906054A (en) | Method and system for authorization of software function modules of internet of things | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN104468615A (en) | Data sharing based file access and permission change control method | |
CN103457727A (en) | Method, device and system for processing media data | |
Niu et al. | Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database | |
CN105468990A (en) | Sensitive information management control method and apparatus | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN104919511A (en) | Data decoding device, attribute-based encryption system, random number element removing device, randomized secret key generation device, data decoding method, and data decoding program | |
CN103345609A (en) | Method and device for text encryption and decryption | |
CN106888081A (en) | The coding wide of median in whitepack embodiment | |
CN108494546A (en) | A kind of whitepack encryption method, device and storage medium | |
CN103731423A (en) | Safe method for repeated data deleting | |
CN102222188A (en) | Information system user password generation method | |
CN102833077A (en) | Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card | |
CN102236767B (en) | In conjunction with the file encrypting method of cryptographic hash | |
KR101559380B1 (en) | Apparatus and method for obfuscating contents | |
CN104023009B (en) | A kind of Web system license validation method | |
CN106656472A (en) | Transaction data encryption method and system | |
CN104392153B (en) | A kind of method for protecting software and system | |
Yang | [Retracted] Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card | |
CN100543762C (en) | Computer-aided design data encryption protecting method based on hardware environment | |
CN107493287A (en) | Industry control network data security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201123 Address after: Room 1008, block B, Kechuang headquarters building, No. 320, pubin Road, Nanjing area, Jiangsu Free Trade Zone, Nanjing City, Jiangsu Province Patentee after: Nanjing Shifang Network Technology Co., Ltd Address before: Street dates 400000 Chongqing District of Yuzhong City Lan Wu No. 8 2-6 Patentee before: Yu Chengtai |
|
TR01 | Transfer of patent right |