CN105024815A - Office network file digit encryption transmission - Google Patents
Office network file digit encryption transmission Download PDFInfo
- Publication number
- CN105024815A CN105024815A CN201410171449.4A CN201410171449A CN105024815A CN 105024815 A CN105024815 A CN 105024815A CN 201410171449 A CN201410171449 A CN 201410171449A CN 105024815 A CN105024815 A CN 105024815A
- Authority
- CN
- China
- Prior art keywords
- file
- office
- encryption transmission
- network file
- office network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The digital office system brings convenience to a user while causing various safety problems. Concerning many safety hazards, the invention designs and realizes an office file encryption transmission method based on a DES algorithm and a chaotic algorithm, which solves the safe problems existing in the current traditional digital office system, compensates defects and shortcomings of the digital office, and enables the digital office to be safe and reliable.
Description
Technical field
The invention belongs to communication and automation field.
Background technology
At present, China's E-Government has also had a great development in the short time since carrying out " project of government's surfing the net ".Many administrative departments all successively establish external site for service.The application of electronic government affairs system can improve office efficiency, alleviate the work load of staff, save valuable office funds, improve traditional idea in management and management mode, improve the quality of government functionary and staff, realize that office is with no paper, resource informationization and the scientification of decision-making.
In electronic system, enable e-file, official document transmits safely, reliably, rapidly, adapting to the demand of current information networking, e-cooperative work, is problem demanding prompt solution.The opening of network brings very large facility to our work, also brings very large potential safety hazard to us simultaneously.
File encryption transmission and management system addresses that need just, the safeguard protection of the information that realizes in network system, transfer management and automatic monitoring, meets the demand of information networking, e-cooperative work between this department and other department, between our unit inside.
Summary of the invention
System can be encrypted operation to needing the file passed, and the concrete steps of encryption are as follows: file is found in the file address that 1. system is selected according to user.With the summary of MD5 algorithm calculation document, 2. user uses the RSA private key of oneself to sign to the summary info generated and 3. generates a string random code by system, 4. and then adopt chaos algorithm encrypt file to carry out double-encryption 5. to use the PKI of recipient to carry out RsA public key encryption to the random code that previous step generates calculate des encryption key according to random code, utilize encryption key to carry out des encryption 5. together with the summary info after encryption to original document.
After completing cryptographic operation, 5. 4. 3. system can walk generation with the Piece file mergence by the is a complete file, then calls file and sends process and send file.
After file arrives recipient, after file reception completes, system will carry out the decryption oprerations of file automatically.It is corresponding for deciphering with encryption.Concrete steps are as follows: the random code that the public key encryption 1. reading transmit leg use recipient according to the length information read from file is crossed, and the private key searching oneself is decrypted, 2. chaos decode key is calculated by the random code after deciphering, with decruption key, chaos decode is carried out to file and 3. calculate DES decruption key by the random code after deciphering, with decruption key, DES deciphering is carried out to file, 4. from the file after DES deciphering, read out the signature of transmit leg, namely the original document summary info of transmit leg encrypted private key is used, search the PKI of transmit leg and summary info is decrypted, 5. MD5 algorithm is used to calculate the summary info receiving file, the summary info obtained with deciphering compares, if identical, then receive file, if different, then suffered to distort in supporting paper transmitting procedure, notice transmit leg, and abandon the reception of file.
Claims (1)
- The digital encryption of the file that 1.DES algorithm and chaos algorithm combine transmits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410171449.4A CN105024815A (en) | 2014-04-22 | 2014-04-22 | Office network file digit encryption transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410171449.4A CN105024815A (en) | 2014-04-22 | 2014-04-22 | Office network file digit encryption transmission |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105024815A true CN105024815A (en) | 2015-11-04 |
Family
ID=54414551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410171449.4A Pending CN105024815A (en) | 2014-04-22 | 2014-04-22 | Office network file digit encryption transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105024815A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111861687A (en) * | 2020-06-12 | 2020-10-30 | 方欣科技有限公司 | Accounting method and system based on block chain |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867471A (en) * | 2010-06-11 | 2010-10-20 | 南京邮电大学 | Irrational number based DES authentication encryption algorithm |
CN103634100A (en) * | 2013-11-26 | 2014-03-12 | 中国广核集团有限公司 | Encryption method and device |
-
2014
- 2014-04-22 CN CN201410171449.4A patent/CN105024815A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867471A (en) * | 2010-06-11 | 2010-10-20 | 南京邮电大学 | Irrational number based DES authentication encryption algorithm |
CN103634100A (en) * | 2013-11-26 | 2014-03-12 | 中国广核集团有限公司 | Encryption method and device |
Non-Patent Citations (4)
Title |
---|
肖飞: "基于混沌理论的加密算法的研究与应用", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
钟荠芳: "基于混沌_DES混合加密算法的安全文件传输系统的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
陈帆: "公文流转系统的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
黄玮: "基于网络系统的文件安全数字签名的研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111861687A (en) * | 2020-06-12 | 2020-10-30 | 方欣科技有限公司 | Accounting method and system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103475478B (en) | Terminal safety protection method and equipment | |
JP2019502206A5 (en) | ||
CU20170033A7 (en) | METHODS AND APPLIANCE FOR THE AUTHENTICATION OF A SEVICIO NETWORK BY A USER TEAM (EU) USING CREDENTIALS OF A DOMESTIC NETWORK | |
CN105656624A (en) | Client side, server and data transmission method and system | |
RU2015118109A (en) | Wireless communication system | |
JP2016511620A5 (en) | ||
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
WO2016058259A1 (en) | Encryption transmission and verification method for power communication network field operation and maintenance data | |
MY201177A (en) | Access method, device and system for user equipment (ue) | |
CN101707767B (en) | Data transmission method and devices | |
WO2012087572A8 (en) | Wireless communication system and method | |
CN103441841B (en) | A kind of welding data is from encrypting and decrypting system and method | |
CN104468095A (en) | Data transmission method and device | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104202158A (en) | Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing | |
CN101931947A (en) | WSN (Wireless Sensor Network) data safety processing method based on searchable cryptograph | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN113595744B (en) | Network access method, device, electronic equipment and storage medium | |
RU2012148506A (en) | DEVICE AND ALARM METHOD FOR IMPROVED SECURITY CONTEXT FOR SESSIONAL ENCRYPTION KEYS AND INTEGRITY | |
CN208675215U (en) | Secure communication module | |
CN109005027A (en) | A kind of random data encryption and decryption method, apparatus and system | |
CN104394134A (en) | Visible light communication transmission encryption method for equipment operation monitoring inside transformer substation | |
CN103580859A (en) | Asymmetric encryption method for intelligent electricity using interaction | |
CN105024815A (en) | Office network file digit encryption transmission | |
CN106452754A (en) | Multiplayer online dynamic encryption method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151104 |
|
WD01 | Invention patent application deemed withdrawn after publication |