CN105187192B - The method for improving data transmission security in a computer network - Google Patents
The method for improving data transmission security in a computer network Download PDFInfo
- Publication number
- CN105187192B CN105187192B CN201510568061.2A CN201510568061A CN105187192B CN 105187192 B CN105187192 B CN 105187192B CN 201510568061 A CN201510568061 A CN 201510568061A CN 105187192 B CN105187192 B CN 105187192B
- Authority
- CN
- China
- Prior art keywords
- character
- numerical value
- digits
- digit
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of three-dimensional cipher code Encryption Algorithm, which is characterized in that includes the following steps:The character of encrypted content is decomposed, cycle obtains single character;XYZ is carried out to character and orderly encrypts calculation:X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character;Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then successively merge the result that xor operations obtain to form character string;Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string.The invention has the beneficial effects that:The Encryption Algorithm of the present invention is directly over algorithm to the encryption of each character and evolves, very long dictionary enquiring process need not be passed through, and after encrypting it is not no in all senses mess code, so being not easy to be cracked, it is not limited to Chinese character simultaneously, as long as system can show that correct character can be carried out encrypting.
Description
Technical field
The present invention relates to a kind of methods improving Information Security, and in particular to one kind improving data in a computer network
The method of transmission security belongs to computer network security technology field.
Background technology
Currently, the algorithm that three-dimensional cipher telegram code encryption uses is:The character of encrypted content is decomposed, four figures value is obtained
It indicates Chinese character and graphic character, code is then encrypted.It is specific as follows:
Chinese character and figure are arranged in 01-99 pages of square formation first, every page of ten rows ten row, then using the side looked up the dictionary
Formula is collected the corresponding page number of word, row code, row code, is finally encrypted.
There are three short slabs for such Encryption Algorithm:
One, it is easy to be guessed solution after collecting information, because Chinese character has corresponding position in every page;
Two, the mode looked up the dictionary is heavier, it is necessary to every page all inquired, until inquiring corresponding Chinese character,
Speed is slow, the time " very long ";
Three, three-dimensional cipher telegram code encryption is only effective to Chinese character, there is certain limitation.
Invention content
To solve the deficiencies in the prior art, the purpose of the present invention is to provide a kind of new raising numbers in a computer network
According to the method for transmission security, this method is not only not easy to be cracked, but also need not pass through slow query process, while not office
It is limited to Chinese character.
In order to realize that above-mentioned target, the present invention adopt the following technical scheme that:
A method of improving data transmission security in a computer network, which is characterized in that include the following steps:
Step 1: the character to encrypted content decomposes, cycle obtains single character;
Step 2: carrying out XYZ to character orderly encrypts calculation:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character;
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then
It successively merges the result that xor operations obtain to form character string;
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as
Mess code.
The method above-mentioned for improving data transmission security in a computer network, which is characterized in that single character is turned
The method for turning to the numerical value of 4 digits is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, respectively to byte sequence and 2 digits
Numerical value carries out the decimal system and turns binary system, is then added and obtains a new numerical value, then new numerical value is switched to the decimal system, to
To the numerical value of 4 digits.
The method above-mentioned for improving data transmission security in a computer network, which is characterized in that further include:Secret key ratio
To verification step,
The detailed process of aforementioned secret key comparison step is:Before the character to encrypted content decomposes, first pass
Could correctly the character of encrypted content be decomposed by entering correct key and comparing.
The invention has the beneficial effects that:The method of the present invention is to be directly over algorithm calculation to the encryption of each character
Out, it is not necessary to pass through very long dictionary enquiring process, and be not no in all senses mess code after encrypting, so be not easy by
It cracks, while being not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
Description of the drawings
Fig. 1 is the broad flow diagram of the method for improving data transmission security in a computer network of the present invention.
Specific implementation mode
Specific introduce is made to the present invention below in conjunction with the drawings and specific embodiments.
Embodiment 1
Referring to Fig.1, the method for improving data transmission security in a computer network of the invention comprising following two
Step:
Step 1
The character of encrypted content is decomposed, cycle obtains single character.
Step 2
XYZ is carried out to character and orderly encrypts calculation, detailed process is as follows:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character.
Single character is converted into the method that the numerical value of 4 digits specifically uses is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, represents Chinese character and graphic character, respectively
The decimal system is carried out to the numerical value of byte sequence and 2 digits and turns binary system, is then added and obtains a new numerical value, then new number
Value switchs to the decimal system, to obtain the numerical value of 4 digits.
The Encryption Algorithm of the present invention is directly over algorithm to the encryption of each character and evolves, it is not necessary to by unrestrained
Long dictionary enquiring process.
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then
It successively merges the result that xor operations obtain to form character string.
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as
Mess code.
Three-dimensional encrypted decrypting process is the reversion of encrypted code process.
The docking point for being required for last process is calculated since XYZ is orderly encrypted, encrypts orderly processing, so the present invention's adds
Close algorithm can be correctly completed encryption.
Again due to having used random factor in algorithm, so the mess code of display is no in all senses, therefore it is encrypted interior
Appearance is not easy to be cracked.
The Encryption Algorithm of the present invention is not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
The method for improving data transmission security in a computer network of the present invention, encrypted data size is constant, no
The burden of network can be increased, encrypted content is mess code, it is necessary to which specific corresponding decryption method can just decrypt, and improve data
The safety of transmission.
In addition, the method for improving data transmission security in a computer network of the present invention applies also for data and deposits
Storage, the method for the application present invention is encrypted before content is preserved, and does not carry out authorizing and checks that the behavior of data can only see nothing
Meaning mess code, the control that the advantageous data of this feature are checked.
Embodiment 2
In view of the method application scenarios of the present invention are various, we are also added into secret key comparison and test in the method for the invention
Demonstrate,prove step.I.e. the method for the present invention includes following three steps:
Step 1
There are one fixed keys for each encrypted component encapsulation, before the character to encrypted content decomposes, first
Could correctly the character of encrypted content be decomposed by being passed to correct key and comparing, and improve the safety of encryption and decryption in this way
Property, make encryption method more diversification.
Step 2
The character of encrypted content is decomposed, cycle obtains single character.
Step 3
XYZ is carried out to character and orderly encrypts calculation, algorithm is in the same manner as in Example 1.
It can be seen that the method for the present invention is directly over algorithm to the encryption of each character and evolves, it is not necessary to
By very long dictionary enquiring process, and it is mess code not in all senses after encrypting, is not easy with the inventive method
It is cracked, while being not limited to Chinese character, as long as system can show that correct character can be carried out encrypting.
It should be noted that the invention is not limited in any way for above-described embodiment, it is all to use equivalent replacement or equivalent change
The technical solution that the mode changed is obtained, all falls in protection scope of the present invention.
Claims (2)
1. the method for improving data transmission security in a computer network, which is characterized in that include the following steps:
Step 1: the character to encrypted content decomposes, cycle obtains single character;
Step 2: carrying out XYZ to character orderly encrypts calculation:
X:Single character is converted into the numerical value of 4 digits, cycle obtains the numerical value of corresponding 4 digit of each character, wherein
The method for single character being converted into the numerical value of 4 digits is:
Single character is converted into the numerical value of a byte sequence and two 2 digits, respectively to the numerical value of byte sequence and 2 digits
It carries out the decimal system and turns binary system, be then added and obtain a new numerical value, then new numerical value is switched to the decimal system, to obtain one
The numerical value of a 4 digit;
Y:One 0 to 32 random factor is taken, the numerical value and random factor for recycling each 4 digit carry out xor operations, then will
The result that xor operations obtain successively merges to form character string;
Z:The conversion that unicode characters are carried out to the character string formed after merging, obtains encrypted character string, is shown as disorderly
Code.
2. the method according to claim 1 for improving data transmission security in a computer network, which is characterized in that also
Including:Secret key comparison step,
The detailed process of the secret key comparison step is:Before the character to encrypted content decomposes, first it is passed to just
True key and comparison could correctly decompose the character of encrypted content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510568061.2A CN105187192B (en) | 2015-09-08 | 2015-09-08 | The method for improving data transmission security in a computer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510568061.2A CN105187192B (en) | 2015-09-08 | 2015-09-08 | The method for improving data transmission security in a computer network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105187192A CN105187192A (en) | 2015-12-23 |
CN105187192B true CN105187192B (en) | 2018-11-13 |
Family
ID=54909048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510568061.2A Active CN105187192B (en) | 2015-09-08 | 2015-09-08 | The method for improving data transmission security in a computer network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105187192B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110138555B (en) * | 2019-05-21 | 2020-11-20 | 长沙能川信息科技有限公司 | Encryption and decryption method for FBX format three-dimensional model |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096789A (en) * | 2011-02-23 | 2011-06-15 | 上海帝埃碧化学科技有限公司 | Electronic document security device |
CN102843372A (en) * | 2012-08-28 | 2012-12-26 | 西安交通大学 | Order-preserving encryption method based on random interval partition |
CN103067162A (en) * | 2012-11-15 | 2013-04-24 | 新浪技术(中国)有限公司 | Method and device of data transmission |
CN103259653A (en) * | 2012-12-12 | 2013-08-21 | 张立文 | Three-dimensional cipher code encryption method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5371289B2 (en) * | 2008-06-02 | 2013-12-18 | キヤノン株式会社 | Information processing apparatus, data processing method, and program |
-
2015
- 2015-09-08 CN CN201510568061.2A patent/CN105187192B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096789A (en) * | 2011-02-23 | 2011-06-15 | 上海帝埃碧化学科技有限公司 | Electronic document security device |
CN102843372A (en) * | 2012-08-28 | 2012-12-26 | 西安交通大学 | Order-preserving encryption method based on random interval partition |
CN103067162A (en) * | 2012-11-15 | 2013-04-24 | 新浪技术(中国)有限公司 | Method and device of data transmission |
CN103259653A (en) * | 2012-12-12 | 2013-08-21 | 张立文 | Three-dimensional cipher code encryption method |
Also Published As
Publication number | Publication date |
---|---|
CN105187192A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105530263B (en) | A kind of extra lightweight RFID mutual authentication methods based on tag ID | |
CN106850221B (en) | Information encryption and decryption method and device | |
CN102138300B (en) | Message authentication code pre-computation with applications to secure memory | |
CN104486073B (en) | A kind of encryption and decryption method of character type data | |
CN105099652B (en) | Data encryption, decryption method and device | |
CN108964872B (en) | Encryption method and device based on AES | |
CN116032474B (en) | Safety protection system based on big data computer network | |
CN104333446B (en) | A kind of novel ultra-light magnitude QTL block cipher implementation method | |
CN107579813A (en) | information encryption and decryption method and device | |
CN105324956A (en) | Method and apparatus to encrypt plaintext data | |
CN1936870A (en) | Hard-disc fan-area data enciphering and deciphering method and system | |
CN101996298A (en) | Encrypting method and decrypting method corresponding to same | |
CN106301759A (en) | A kind of method of data encryption, the method and device of deciphering | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN109194461A (en) | Single-track link table ordered encryption decryption method based on dual key stream cipher | |
CN106375083A (en) | Encryption-decryption method based on Base64 and device thereof | |
CN105939190A (en) | AES data encryption method for offline key generation based on FPGA | |
CN105916141A (en) | Self-synchronizing realization system and self-synchronizing realization method for Zu Chongzhi encryption and decryption algorithm | |
CN103746796A (en) | Coprocessor for realizing intelligent card SM4 password algorithm | |
CN105959100B (en) | A kind of AES data ciphering method of the online generation key based on FPGA | |
CN107483182A (en) | A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution | |
CN102932135A (en) | 3DES (triple data encrypt standard) encryption method | |
CN105117653B (en) | A kind of near infrared spectrum data encryption method | |
CN103595524B (en) | A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher | |
CN105187192B (en) | The method for improving data transmission security in a computer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |