CN105187192B - The method for improving data transmission security in a computer network - Google Patents

The method for improving data transmission security in a computer network Download PDF

Info

Publication number
CN105187192B
CN105187192B CN201510568061.2A CN201510568061A CN105187192B CN 105187192 B CN105187192 B CN 105187192B CN 201510568061 A CN201510568061 A CN 201510568061A CN 105187192 B CN105187192 B CN 105187192B
Authority
CN
China
Prior art keywords
character
numerical value
digits
digit
computer network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510568061.2A
Other languages
Chinese (zh)
Other versions
CN105187192A (en
Inventor
李红星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Liumi Network Technology Co Ltd
Original Assignee
Guangzhou Liumi Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Liumi Network Technology Co Ltd filed Critical Guangzhou Liumi Network Technology Co Ltd
Priority to CN201510568061.2A priority Critical patent/CN105187192B/en
Publication of CN105187192A publication Critical patent/CN105187192A/en
Application granted granted Critical
Publication of CN105187192B publication Critical patent/CN105187192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of three-dimensional cipher code Encryption Algorithm, which is characterized in that includes the following steps:The character of encrypted content is decomposed, cycle obtains single character;XYZ is carried out to character and orderly encrypts calculation:X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character;Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then successively merge the result that xor operations obtain to form character string;Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string.The invention has the beneficial effects that:The Encryption Algorithm of the present invention is directly over algorithm to the encryption of each character and evolves, very long dictionary enquiring process need not be passed through, and after encrypting it is not no in all senses mess code, so being not easy to be cracked, it is not limited to Chinese character simultaneously, as long as system can show that correct character can be carried out encrypting.

Description

The method for improving data transmission security in a computer network
Technical field
The present invention relates to a kind of methods improving Information Security, and in particular to one kind improving data in a computer network The method of transmission security belongs to computer network security technology field.
Background technology
Currently, the algorithm that three-dimensional cipher telegram code encryption uses is:The character of encrypted content is decomposed, four figures value is obtained It indicates Chinese character and graphic character, code is then encrypted.It is specific as follows:
Chinese character and figure are arranged in 01-99 pages of square formation first, every page of ten rows ten row, then using the side looked up the dictionary Formula is collected the corresponding page number of word, row code, row code, is finally encrypted.
There are three short slabs for such Encryption Algorithm:
One, it is easy to be guessed solution after collecting information, because Chinese character has corresponding position in every page;
Two, the mode looked up the dictionary is heavier, it is necessary to every page all inquired, until inquiring corresponding Chinese character, Speed is slow, the time " very long ";
Three, three-dimensional cipher telegram code encryption is only effective to Chinese character, there is certain limitation.
Invention content
To solve the deficiencies in the prior art, the purpose of the present invention is to provide a kind of new raising numbers in a computer network According to the method for transmission security, this method is not only not easy to be cracked, but also need not pass through slow query process, while not office It is limited to Chinese character.
In order to realize that above-mentioned target, the present invention adopt the following technical scheme that:
A method of improving data transmission security in a computer network, which is characterized in that include the following steps:
Step 1: the character to encrypted content decomposes, cycle obtains single character;
Step 2: carrying out XYZ to character orderly encrypts calculation:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character;
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then It successively merges the result that xor operations obtain to form character string;
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as Mess code.
The method above-mentioned for improving data transmission security in a computer network, which is characterized in that single character is turned The method for turning to the numerical value of 4 digits is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, respectively to byte sequence and 2 digits Numerical value carries out the decimal system and turns binary system, is then added and obtains a new numerical value, then new numerical value is switched to the decimal system, to To the numerical value of 4 digits.
The method above-mentioned for improving data transmission security in a computer network, which is characterized in that further include:Secret key ratio To verification step,
The detailed process of aforementioned secret key comparison step is:Before the character to encrypted content decomposes, first pass Could correctly the character of encrypted content be decomposed by entering correct key and comparing.
The invention has the beneficial effects that:The method of the present invention is to be directly over algorithm calculation to the encryption of each character Out, it is not necessary to pass through very long dictionary enquiring process, and be not no in all senses mess code after encrypting, so be not easy by It cracks, while being not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
Description of the drawings
Fig. 1 is the broad flow diagram of the method for improving data transmission security in a computer network of the present invention.
Specific implementation mode
Specific introduce is made to the present invention below in conjunction with the drawings and specific embodiments.
Embodiment 1
Referring to Fig.1, the method for improving data transmission security in a computer network of the invention comprising following two Step:
Step 1
The character of encrypted content is decomposed, cycle obtains single character.
Step 2
XYZ is carried out to character and orderly encrypts calculation, detailed process is as follows:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character.
Single character is converted into the method that the numerical value of 4 digits specifically uses is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, represents Chinese character and graphic character, respectively The decimal system is carried out to the numerical value of byte sequence and 2 digits and turns binary system, is then added and obtains a new numerical value, then new number Value switchs to the decimal system, to obtain the numerical value of 4 digits.
The Encryption Algorithm of the present invention is directly over algorithm to the encryption of each character and evolves, it is not necessary to by unrestrained Long dictionary enquiring process.
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then It successively merges the result that xor operations obtain to form character string.
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as Mess code.
Three-dimensional encrypted decrypting process is the reversion of encrypted code process.
The docking point for being required for last process is calculated since XYZ is orderly encrypted, encrypts orderly processing, so the present invention's adds Close algorithm can be correctly completed encryption.
Again due to having used random factor in algorithm, so the mess code of display is no in all senses, therefore it is encrypted interior Appearance is not easy to be cracked.
The Encryption Algorithm of the present invention is not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
The method for improving data transmission security in a computer network of the present invention, encrypted data size is constant, no The burden of network can be increased, encrypted content is mess code, it is necessary to which specific corresponding decryption method can just decrypt, and improve data The safety of transmission.
In addition, the method for improving data transmission security in a computer network of the present invention applies also for data and deposits Storage, the method for the application present invention is encrypted before content is preserved, and does not carry out authorizing and checks that the behavior of data can only see nothing Meaning mess code, the control that the advantageous data of this feature are checked.
Embodiment 2
In view of the method application scenarios of the present invention are various, we are also added into secret key comparison and test in the method for the invention Demonstrate,prove step.I.e. the method for the present invention includes following three steps:
Step 1
There are one fixed keys for each encrypted component encapsulation, before the character to encrypted content decomposes, first Could correctly the character of encrypted content be decomposed by being passed to correct key and comparing, and improve the safety of encryption and decryption in this way Property, make encryption method more diversification.
Step 2
The character of encrypted content is decomposed, cycle obtains single character.
Step 3
XYZ is carried out to character and orderly encrypts calculation, algorithm is in the same manner as in Example 1.
It can be seen that the method for the present invention is directly over algorithm to the encryption of each character and evolves, it is not necessary to By very long dictionary enquiring process, and it is mess code not in all senses after encrypting, is not easy with the inventive method It is cracked, while being not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
It should be noted that the invention is not limited in any way for above-described embodiment, it is all to use equivalent replacement or equivalent change The technical solution that the mode changed is obtained, all falls in protection scope of the present invention.

Claims (2)

1. the method for improving data transmission security in a computer network, which is characterized in that include the following steps:
Step 1: the character to encrypted content decomposes, cycle obtains single character;
Step 2: carrying out XYZ to character orderly encrypts calculation:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character, wherein The method for single character being converted into the numerical value of 4 digits is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, respectively to the numerical value of byte sequence and 2 digits It carries out the decimal system and turns binary system, be then added and obtain a new numerical value, then new numerical value is switched to the decimal system, to obtain one The numerical value of a 4 digit;
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then will The result that xor operations obtain successively merges to form character string;
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as disorderly Code.
2. the method according to claim 1 for improving data transmission security in a computer network, which is characterized in that also Including:Secret key comparison step,
The detailed process of the secret key comparison step is:Before the character to encrypted content decomposes, first it is passed to just True key and comparison could correctly decompose the character of encrypted content.
CN201510568061.2A 2015-09-08 2015-09-08 The method for improving data transmission security in a computer network Active CN105187192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510568061.2A CN105187192B (en) 2015-09-08 2015-09-08 The method for improving data transmission security in a computer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510568061.2A CN105187192B (en) 2015-09-08 2015-09-08 The method for improving data transmission security in a computer network

Publications (2)

Publication Number Publication Date
CN105187192A CN105187192A (en) 2015-12-23
CN105187192B true CN105187192B (en) 2018-11-13

Family

ID=54909048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510568061.2A Active CN105187192B (en) 2015-09-08 2015-09-08 The method for improving data transmission security in a computer network

Country Status (1)

Country Link
CN (1) CN105187192B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138555B (en) * 2019-05-21 2020-11-20 长沙能川信息科技有限公司 Encryption and decryption method for FBX format three-dimensional model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096789A (en) * 2011-02-23 2011-06-15 上海帝埃碧化学科技有限公司 Electronic document security device
CN102843372A (en) * 2012-08-28 2012-12-26 西安交通大学 Order-preserving encryption method based on random interval partition
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN103259653A (en) * 2012-12-12 2013-08-21 张立文 Three-dimensional cipher code encryption method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5371289B2 (en) * 2008-06-02 2013-12-18 キヤノン株式会社 Information processing apparatus, data processing method, and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096789A (en) * 2011-02-23 2011-06-15 上海帝埃碧化学科技有限公司 Electronic document security device
CN102843372A (en) * 2012-08-28 2012-12-26 西安交通大学 Order-preserving encryption method based on random interval partition
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN103259653A (en) * 2012-12-12 2013-08-21 张立文 Three-dimensional cipher code encryption method

Also Published As

Publication number Publication date
CN105187192A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
CN105530263B (en) A kind of extra lightweight RFID mutual authentication methods based on tag ID
CN106850221B (en) Information encryption and decryption method and device
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN104486073B (en) A kind of encryption and decryption method of character type data
CN105099652B (en) Data encryption, decryption method and device
CN108964872B (en) Encryption method and device based on AES
CN116032474B (en) Safety protection system based on big data computer network
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN107579813A (en) information encryption and decryption method and device
CN105324956A (en) Method and apparatus to encrypt plaintext data
CN1936870A (en) Hard-disc fan-area data enciphering and deciphering method and system
CN101996298A (en) Encrypting method and decrypting method corresponding to same
CN106301759A (en) A kind of method of data encryption, the method and device of deciphering
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN109194461A (en) Single-track link table ordered encryption decryption method based on dual key stream cipher
CN106375083A (en) Encryption-decryption method based on Base64 and device thereof
CN105939190A (en) AES data encryption method for offline key generation based on FPGA
CN105916141A (en) Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm
CN103746796A (en) Coprocessor for realizing intelligent card SM4 password algorithm
CN105959100B (en) A kind of AES data ciphering method of the online generation key based on FPGA
CN107483182A (en) A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution
CN102932135A (en) 3DES (triple data encrypt standard) encryption method
CN105117653B (en) A kind of near infrared spectrum data encryption method
CN103595524B (en) A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher
CN105187192B (en) The method for improving data transmission security in a computer network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant