CN105635150B - Encryption method, decryption method and its device and terminal - Google Patents
Encryption method, decryption method and its device and terminal Download PDFInfo
- Publication number
- CN105635150B CN105635150B CN201511028284.6A CN201511028284A CN105635150B CN 105635150 B CN105635150 B CN 105635150B CN 201511028284 A CN201511028284 A CN 201511028284A CN 105635150 B CN105635150 B CN 105635150B
- Authority
- CN
- China
- Prior art keywords
- data
- length
- decrypted
- encrypted
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 241001269238 Data Species 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 20
- 230000001351 cycling effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention proposes a kind of encryption method, decryption method and its device and terminal, the encryption method includes: to obtain data length, predetermined encryption length and the initial encryption position of be-encrypted data;Judge whether the predetermined encryption length is less than the data length of the be-encrypted data;If the predetermined encryption length is less than the data length of the be-encrypted data, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.According to the technical solution of the present invention, by carrying out local cypher to data, the efficiency encrypted to data can be improved, in this way when the data of the local cypher are decrypted, it can also be improved the efficiency that the data of encryption are decrypted, so as to shorten the time for encrypting and decrypting.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of encryption method, a kind of decryption method, Yi Zhongjia
Close device, a kind of decryption device and a kind of terminal.
Background technique
Currently, being all to be encrypted to data, but encrypted to the whole of data when being encrypted to data
When encryption times it is longer, and when the data of encryption are decrypted, it is also desirable to the long time, also result in logarithm
It is very low according to the efficiency being encrypted and decrypted.
Therefore, how to improve the efficiency for being encrypted and being decrypted to data, so as to shorten the time for encrypting and decrypting at
For urgent problem to be solved.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, by carrying out local cypher to data,
The efficiency encrypted to data can be improved, and when the data of the local cypher are decrypted, can also be improved pair
The efficiency that the data of encryption are decrypted, so as to shorten the time for encrypting and decrypting.
In view of this, the first aspect of the present invention proposes a kind of encryption method, comprising: obtain the data of be-encrypted data
Length, predetermined encryption length and initial encryption position;Judge whether the predetermined encryption length is less than the be-encrypted data
Data length;If the predetermined encryption length is less than the data length of the be-encrypted data, according to predetermined encryption rule from institute
Initial encryption position is stated to encrypt the be-encrypted data.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption
Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption
According to (i.e. clear data) and encryption data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and
And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and
The time of decryption.
In the above-mentioned technical solutions, it is preferable that it is described according to predetermined encryption rule from the initial encryption position to described
The step of be-encrypted data is encrypted specifically includes: using the predetermined encryption length as current crypto length;Processing step
It is rapid: the be-encrypted data is encrypted according to the initial encryption position and the predetermined encryption length, judgement it is described to
It whether there is untreatment data in encryption data;It, will be described untreated there are when untreatment data in the be-encrypted data
Data are updated the initial encryption position and the current crypto length, as be-encrypted data according to updated
Initial encryption position and current crypto length execute the processing step, until determining that there is no described in the be-encrypted data
Until untreatment data;Otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained
To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption,
As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it
One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining
There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data,
To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to
Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or
Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data
Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement be-encrypted data
According to the step of, specifically include: obtaining default length of the plaintext, and judge to whether there is in the be-encrypted data by following formula
The untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates
The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data
Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and
The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero,
If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small
Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that described to judge whether the predetermined encryption length is less than described to be added
After the data length of ciphertext data, further includes: if it is determined that the predetermined encryption length is greater than or equal to the be-encrypted data
Data length, then reset predetermined encryption length, and the predetermined encryption length reset is less than the be-encrypted data
Data length.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again
The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted
According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted
The local cypher of data.
The second aspect of the present invention proposes a kind of decryption method, comprising: obtains the data length of data to be decrypted, presets
Decrypt length and starting decrypted positions;Judge whether the default decryption length is less than the data length of the data to be decrypted;
If the default decryption length is less than the data length of the data to be decrypted, decrypted according to default decryption rule from the starting
The data to be decrypted are decrypted in position.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule
Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have
Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into
Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length
When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that it is described according to default decryption rule from the starting decrypted positions to described
The step of data to be decrypted are decrypted, specifically includes: using the default decryption length as current decryption length;Processing step
It is rapid: the data to be decrypted are decrypted according to the starting decrypted positions and the default decryption length, judgement it is described to
It whether there is untreatment data in ciphertext data;There are when the untreatment data in the data to be decrypted, general is described not
Data are handled as the data to be decrypted, the starting decrypted positions and the current decryption length are updated, according to
Updated starting decrypted positions and current decryption length execute the processing step, until determining in the data to be decrypted not
There are until the untreatment data;Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement data to be decrypted
According to the step of, specifically include: obtaining the default length of the plaintext of the data to be decrypted, and by described in following formula judgement wait solve
It whether there is the untreatment data in ciphertext data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates
The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted
Data.
In any of the above-described technical solution, it is preferable that described to judge the default decryption length described in whether being less than wait solve
After the data length of ciphertext data, further includes: if it is determined that the default decryption length is greater than or equal to the data to be decrypted
Data length, then reset default decryption length, and the default decryption length reset is less than the data to be decrypted
Data length.
The third aspect of the present invention proposes a kind of encryption device, comprising: acquiring unit, for obtaining be-encrypted data
Data length, predetermined encryption length and initial encryption position;First judging unit, for whether judging the predetermined encryption length
Less than the data length of the be-encrypted data;Encryption unit, when being for the judging result in first judging unit,
The be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption
Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption
According to (i.e. clear data) and ciphertext data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and
And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and
The time of decryption.
In the above-mentioned technical solutions, it is preferable that the encryption unit is specifically used for, using the predetermined encryption length as working as
Preceding encryption length, and execute processing step: according to the initial encryption position and the predetermined encryption length to described to be added
Ciphertext data is encrypted, and is judged in the be-encrypted data with the presence or absence of untreatment data;Updating unit, in the encryption
The judging result of unit is when being, using the untreatment data as be-encrypted data, to the initial encryption position and described
Current crypto length is updated;The encryption unit is also used to, long according to updated initial encryption position and current crypto
Degree executes the processing step, until determining that the untreatment data is not present in the be-encrypted data, otherwise, terminates
Encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained
To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption,
As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it
One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining
There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data,
To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to
Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or
Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data
Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that the encryption unit includes: second judgment unit, pre- for obtaining
If length of the plaintext, and judge to whether there is the untreatment data in the be-encrypted data by following formula,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates
The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data
Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and
The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero,
If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small
Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that further include: setting unit, for if it is determined that the predetermined encryption is long
Degree is greater than or equal to the data length of the be-encrypted data, then resets predetermined encryption length, it is described reset it is pre-
If encrypting the data length that length is less than the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again
The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted
According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted
The local cypher of data.
The fourth aspect of the present invention proposes a kind of decryption device, comprising: module is obtained, for obtaining data to be decrypted
Data length, default decryption length and starting decrypted positions;Judgment module, for judging whether the default decryption length is less than
The data length of the data to be decrypted;When deciphering module for the judging result in the judgment module is no, according to default
Decryption rule is decrypted the data to be decrypted from the starting decrypted positions.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule
Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have
Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into
Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length
When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that the deciphering module is specifically used for, using the default decryption length as working as
Preceding decryption length executes processing step: according to the starting decrypted positions and the default decryption length to the number to be decrypted
According to being decrypted, judge in the data to be decrypted with the presence or absence of untreatment data;Update module, in the deciphering module
Judging result be when being, using the untreatment data as the data to be decrypted, to starting decrypted positions and described
Current decryption length is updated, and the deciphering module is also used to, long according to updated starting decrypted positions and current decryption
Degree executes the processing step, until determining that the untreatment data is not present in the data to be decrypted, otherwise, terminates
Decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that the deciphering module is specifically used for, and obtains the data to be decrypted
Default length of the plaintext, and judge to whether there is the untreatment data in the data to be decrypted by following formula,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates
The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted
Data.
In any of the above-described technical solution, it is preferable that further include: setup module, for determining institute in the judgment module
When stating data length of the default decryption length more than or equal to the data to be decrypted, then default decryption length, institute are reset
State the data length that the default decryption length reset is less than the data to be decrypted.
The fifth aspect of the present invention proposes a kind of terminal, comprising: the dress of encryption described in any one of above-mentioned technical proposal
It sets;And decryption device described in any one of above-mentioned technical proposal, therefore, the terminal have and above-mentioned technical proposal in it is any
The identical technical effect of decryption device described in any one of encryption device, above-mentioned technical proposal described in, it is no longer superfluous herein
It states.
According to the technical solution of the present invention, by carrying out local cypher to data, it can be improved and data are encrypted
Efficiency, and when the data of the local cypher are decrypted, it can also be improved the efficiency that the data of encryption are decrypted,
So as to shorten the time for encrypting and decrypting.
Detailed description of the invention
Fig. 1 shows the flow diagram of encryption method according to an embodiment of the invention;
Fig. 2 shows the flow diagrams of encryption method according to another embodiment of the invention;
Fig. 3 shows the flow diagram of decryption method according to an embodiment of the invention;
Fig. 4 shows the structural schematic diagram of encryption device according to an embodiment of the invention;
Fig. 5 shows the structural schematic diagram of decryption device according to an embodiment of the invention;
Fig. 6 shows the structural schematic diagram of terminal according to an embodiment of the invention;
Fig. 7 shows the structural schematic diagram of terminal according to another embodiment of the invention;
Fig. 8 A to 8D shows the schematic diagram according to an embodiment of the invention encrypted to be-encrypted data;
Fig. 9 shows the schematic diagram of encrypted data according to an embodiment of the invention;
Figure 10 A and 10B show the schematic diagram according to an embodiment of the invention treating ciphertext data and being decrypted.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the flow diagram of encryption method according to an embodiment of the invention.
As shown in Figure 1, encryption method according to an embodiment of the invention, comprising:
Step 102, data length, predetermined encryption length and the initial encryption position of be-encrypted data are obtained;
Step 104, judge whether the predetermined encryption length is less than the data length of the be-encrypted data, described pre-
If encrypt data length of the length less than the be-encrypted data, 106 are entered step, this process is otherwise terminated;
Step 106, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption
Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption
According to (i.e. clear data) and encryption data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and
And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and
The time of decryption.
In the above-mentioned technical solutions, it is preferable that step 106 specifically includes: adding using the predetermined encryption length as current
Close length;Processing step: the be-encrypted data is added according to the initial encryption position and the predetermined encryption length
It is close, judge in the be-encrypted data with the presence or absence of untreatment data;There are the untreated numbers in the be-encrypted data
According to when, using the untreatment data as be-encrypted data, the initial encryption position and the current crypto length are carried out
It updates, the processing step is executed according to updated initial encryption position and current crypto length, it is described to be added until determining
There is no until the untreatment data in ciphertext data;Otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained
To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption,
As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it
One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining
There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data,
To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to
Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or
Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data
Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement be-encrypted data
According to the step of, specifically include: obtaining default length of the plaintext, and judge to whether there is in the be-encrypted data by following formula
The untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates
The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data
Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and
The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero,
If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small
Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that after step 104, further includes: if it is determined that the predetermined encryption length
More than or equal to the data length of the be-encrypted data, then reset predetermined encryption length, it is described reset it is default
Encrypt the data length that length is less than the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again
The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted
According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted
The local cypher of data.
Fig. 2 shows the flow diagrams of encryption method according to another embodiment of the invention.
As shown in Fig. 2, encryption method according to another embodiment of the invention, comprising:
Step 202, data length, predetermined encryption length and the initial encryption position of be-encrypted data are obtained;
Step 204, judge whether predetermined encryption length is less than the data length of be-encrypted data, it is small in predetermined encryption length
When the data length of be-encrypted data, 206 are entered step, otherwise, enters step 214;
Step 206, using predetermined encryption length as current crypto length;
Step 208, be-encrypted data is encrypted according to initial encryption position and predetermined encryption length;
Step 210, do you judge in be-encrypted data with the presence or absence of untreatment data? there are untreated numbers in be-encrypted data
According to when, enter step 212, otherwise, illustrate to have completed the encryption to be-encrypted data, terminate this encryption flow;
Step 212, using untreatment data as be-encrypted data, initial encryption position and current crypto length are carried out more
Newly, and again 208 are entered step, i.e., be-encrypted data is carried out according to updated initial encryption position and current crypto length
Encryption;
Step 214, predetermined encryption length is reset, the predetermined encryption length reset is less than the number of be-encrypted data
According to length;
Step 216, be-encrypted data is encrypted according to the predetermined encryption length reset.
Fig. 3 shows the flow diagram of decryption method according to an embodiment of the invention.
As shown in figure 3, decryption method according to an embodiment of the invention, comprising:
Step 302, data length, default decryption length and the starting decrypted positions of data to be decrypted are obtained;
Step 304, judge whether the default decryption length is less than the data length of the data to be decrypted, described pre-
If decrypt data length of the length less than the data to be decrypted, 306 are entered step, otherwise, terminates this process;
Step 306, the data to be decrypted are decrypted from the starting decrypted positions according to default decryption rule.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule
Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have
Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into
Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length
When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that step 306 specifically includes: using the default decryption length as current solution
Close length;Processing step: the data to be decrypted are solved according to the starting decrypted positions and the default decryption length
It is close, judge in the data to be decrypted with the presence or absence of untreatment data;There are when untreatment data in the data to be decrypted,
Using the untreatment data as the data to be decrypted, the starting decrypted positions and the current decryption length are carried out more
Newly, the processing step is executed according to updated starting decrypted positions and current decryption length, it is described to be decrypted until determining
There is no until the untreatment data in data;Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement data to be decrypted
According to the step of, specifically include: obtaining the default length of the plaintext of the data to be decrypted, and by described in following formula judgement wait solve
It whether there is the untreatment data in ciphertext data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates
The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted
Data.
In any of the above-described technical solution, it is preferable that described to judge the default decryption length described in whether being less than wait solve
After the data length of ciphertext data, further includes: if it is determined that the default decryption length is greater than or equal to the data to be decrypted
Data length, then reset default decryption length, and the default decryption length reset is less than the data to be decrypted
Data length.
Fig. 4 shows the structural schematic diagram of encryption device according to an embodiment of the invention.
As shown in figure 4, encryption device 400 according to an embodiment of the invention, comprising: acquiring unit 402, for obtaining
Take data length, predetermined encryption length and the initial encryption position of be-encrypted data;First judging unit 404, for judging
State the data length whether predetermined encryption length is less than the be-encrypted data;Encryption unit 406, in first judgement
The judging result of unit 404 is when being, according to predetermined encryption rule from the initial encryption position to the be-encrypted data into
Row encryption.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption
Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption
According to (i.e. clear data) and ciphertext data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and
And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and
The time of decryption.
In the above-mentioned technical solutions, it is preferable that the encryption unit 406 is specifically used for, and the predetermined encryption length is made
For current crypto length, and execution processing step: according to the initial encryption position and the predetermined encryption length to described
Be-encrypted data is encrypted, and is judged in the be-encrypted data with the presence or absence of untreatment data;Updating unit 4062 is used for
The judging result of the encryption unit 406 is when being, using the untreatment data as the be-encrypted data, to the starting
Encrypted location and the current crypto length are updated;The encryption unit 406 is also used to, according to updated initial encryption
Position and current crypto length execute the processing step, until determining that the untreated number is not present in the be-encrypted data
Until, otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained
To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption,
As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it
One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining
There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data,
To realize the local cypher to be-encrypted data.
In addition, updating unit 4062 is specifically used for, according to current crypto length and default length of the plaintext to initial encryption position
It sets and is updated, if the data length of be-encrypted data is less than or equal to predetermined encryption length, by the data of be-encrypted data
Length is as current crypto length, if the data length of be-encrypted data is greater than predetermined encryption length, by predetermined encryption length
As current crypto length.
In any of the above-described technical solution, it is preferable that the encryption unit 406 includes: second judgment unit 4064, is used for
Default length of the plaintext is obtained, and judges to whether there is the untreatment data in the be-encrypted data by following formula,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates
The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data
Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and
The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero,
If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small
Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that further include: setting unit 408, for if it is determined that the predetermined encryption
Length is greater than or equal to the data length of the be-encrypted data, then reset predetermined encryption length, described to reset
Predetermined encryption length is less than the data length of the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again
The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted
According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted
The local cypher of data.
Fig. 5 shows the structural schematic diagram of decryption device according to an embodiment of the invention.
As shown in figure 5, decryption device 500 according to an embodiment of the invention, comprising: module 502 is obtained, for obtaining
Take data length, default decryption length and the starting decrypted positions of data to be decrypted;Judgment module 504, it is described pre- for judging
If whether decryption length is less than the data length of the data to be decrypted;Deciphering module 506, in the judgment module 504
Judging result when being no, the data to be decrypted are decrypted from the starting decrypted positions according to default decryption is regular.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule
Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have
Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into
Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length
When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that the deciphering module 506 is specifically used for, and the default decryption length is made
For current decryption length, processing step is executed: according to the starting decrypted positions and the default decryption length to described wait solve
Ciphertext data is decrypted, and judges in the data to be decrypted with the presence or absence of untreatment data;Update module, in the decryption
The judging result of module 506 is when being, using the untreatment data as the data to be decrypted, to the starting decrypted positions
It is updated with the current decryption length, the deciphering module 506 is also used to, and according to updated starting decrypted positions and is worked as
Preceding decryption length executes the processing step, until determining that the untreatment data is not present in the data to be decrypted,
Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that the deciphering module 506 is specifically used for, and obtains the number to be decrypted
According to default length of the plaintext, and judged in the data to be decrypted by following formula with the presence or absence of the untreatment data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates
The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to
The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted
Data.
In any of the above-described technical solution, it is preferable that further include: setup module, for determining in the judgment module 504
When the default decryption length is greater than or equal to the data length of the data to be decrypted, then default decryption length is reset,
The default decryption length reset is less than the data length of the data to be decrypted.
Fig. 6 shows the structural schematic diagram of terminal according to an embodiment of the invention.
As shown in fig. 6, terminal 600 according to an embodiment of the invention, comprising: any one of above-mentioned technical proposal institute
The encryption stated fills 400 and sets;And decryption described in any one of above-mentioned technical proposal fills 500, therefore, the terminal 600 have and
500 phase of decryption device described in any one of encryption device 400, above-mentioned technical proposal described in any one of above-mentioned technical proposal
Same technical effect, details are not described herein.
Fig. 7 shows the structural schematic diagram of terminal according to another embodiment of the invention.
As shown in fig. 7, (be-encrypted data is terminal 700 according to another embodiment of the invention in this embodiment
Finger print information, certain be-encrypted data can be iris information, voice identification information or password), comprising: fingerprint reader
700, encryption device 400, control device 704, database 706 and decryption device 500, fingerprint reader 702 acquire finger print information
Later, finger print information is sent to encryption device 400, encryption device 400 encrypts finger print information, and encryption device 400 will
Encrypted finger print information is sent to control device 704, and control device 704 believes encrypted fingerprint by decryption device 500
Breath is decrypted, and pre-stored finger print information is obtained from database 706, by after decryption finger print information be stored in advance
Finger print information matched, according to matching result execute corresponding operating.
Fig. 8 A to 8D shows the schematic diagram according to an embodiment of the invention encrypted to be-encrypted data;Figure
9 show the schematic diagram of encrypted data according to an embodiment of the invention.
As shown in Figure 8 A, start to encrypt be-encrypted data at the initial encryption position of be-encrypted data, be formed
Ciphertext data, the length of ciphertext data are predetermined encryption length, to the one piece of data of the designated length after ciphertext data not into
Row encryption, i.e. clear data.Pass through formula L at this timeIt is untreated=LIt is to be encrypted-(LIt is close+LIt is bright) calculate untreatment data length, can by Fig. 8 A
See, the L being calculatedIt is untreatedGreater than 0, there is also untreatment datas for the be-encrypted data for illustrating after encryption, then continue to not locating
Reason data are encrypted.
As shown in Figure 8 B, using untreatment data as be-encrypted data, and initial encryption position is updated, i.e., it will be bright
One end of literary data is as updated initial encryption position, wherein one end of the clear data is adjacent with be-encrypted data.And
And since the length of be-encrypted data is greater than predetermined encryption length, then current crypto length is predetermined encryption length.
As shown in Figure 8 C, from updated initial encryption position be-encrypted data is encrypted, encrypt length
For predetermined encryption length, another section of ciphertext data are formed, and to the one piece of data adjacent with the ciphertext data without encrypting,
As another section of clear data passes through formula L at this timeIt is untreated=LIt is to be encrypted-(LIt is close+LIt is bright) calculate untreatment data length.
According to above scheme after repeatedly circulation encryption, as in fig. 8d, pass through formula LIt is untreated=LIt is to be encrypted-(LIt is close+
LIt is bright) calculate the length of untreatment data, LIt is untreatedGreater than zero, illustrate that there are untreatment datas in be-encrypted data, and will not locate
Data are managed as be-encrypted data, at this point, the length of be-encrypted data is less than predetermined encryption length, then by the length of be-encrypted data
Degree is used as current crypto length, encrypts from initial encryption position to be-encrypted data.
As shown in figure 9, after being encrypted according to above scheme to one section of be-encrypted data, encrypted be-encrypted data
It include multistage ciphertext data and multistage clear data.
Figure 10 A and 10B show the schematic diagram according to an embodiment of the invention treating ciphertext data and being decrypted.
As shown in Figure 10 A, from the starting decrypted positions of data to be decrypted treat ciphertext data and be decrypted, decrypt
Data length be default decryption length, wherein starting decrypted positions and default decryption length can exist according to data to be decrypted
Initial encryption position and predetermined encryption length when being encrypted determine.For example, if the data to be decrypted in Figure 10 A are by passing through
It crosses the ciphering process as shown in Fig. 8 A to Fig. 8 D obtains, therefore, starting decrypted positions of the data to be decrypted in Figure 10 A and pre-
If decryption length respectively corresponds initial encryption position and the predetermined encryption length of the be-encrypted data in Fig. 8 A.
As shown in Figure 10 B, it is treated from starting decrypted positions after ciphertext data is decrypted, passes through formula LIt is untreated=
LIt is to be encrypted-(LIt is close+LIt is bright) calculate data to be decrypted untreatment data length, at this point, LIt is untreatedGreater than zero, then by untreatment data
As data to be decrypted, and update the starting decrypted positions of data to be decrypted, i.e., using one end of ciphertext data as update after
Starting decrypted positions, wherein one end of ciphertext data is connected with one end of untreatment data, then according to above scheme after
It is continuous that the data to be decrypted are decrypted, due to treating the step of ciphertext data is decrypted with encrypting to be-encrypted data
Corresponding, this will not be repeated here treats the detailed process that ciphertext data is decrypted.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, by carrying out local cypher, Ke Yiti to data
The efficiency that height encrypts data, and when the data of the local cypher are decrypted, it can also be improved to encryption
The efficiency that data are decrypted, so as to shorten the time for encrypting and decrypting.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (7)
1. a kind of encryption method characterized by comprising
Obtain data length, predetermined encryption length and the initial encryption position of be-encrypted data;
Judge whether the predetermined encryption length is less than the data length of the be-encrypted data;
If the predetermined encryption length is less than the data length of the be-encrypted data, according to predetermined encryption rule from the starting
Encrypted location encrypts the be-encrypted data;
The described the step of be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule, specifically
Include:
Using the predetermined encryption length as current crypto length;
Processing step: encrypting the be-encrypted data according to the initial encryption position and the predetermined encryption length,
Judge in the be-encrypted data with the presence or absence of untreatment data;
If there are the untreatment datas in the be-encrypted data, using the untreatment data as be-encrypted data, to institute
It states initial encryption position and the current crypto length is updated, it is long according to updated initial encryption position and current crypto
Degree executes the processing step, until determining that the untreatment data is not present in the be-encrypted data;
Otherwise, terminate the encryption to the be-encrypted data;
Wherein, the step of whether there is untreatment data in the judgement be-encrypted data, specifically includes:
Default length of the plaintext is obtained, and is judged in the be-encrypted data by following formula with the presence or absence of the untreated number
According to,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeDescribed in expression
Predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be encrypted
The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the be-encrypted data
According to.
2. encryption method according to claim 1, which is characterized in that described to judge whether the predetermined encryption length is less than
After the data length of the be-encrypted data, further includes:
If it is determined that the predetermined encryption length is greater than or equal to the data length of the be-encrypted data, then default add is reset
Close length, the predetermined encryption length reset are less than the data length of the be-encrypted data.
3. a kind of decryption method characterized by comprising
Obtain data length, default decryption length and the starting decrypted positions of data to be decrypted;
Judge whether the default decryption length is less than the data length of the data to be decrypted;
It is regular from the starting according to default decryption if the default decryption length is less than the data length of the data to be decrypted
The data to be decrypted are decrypted in decrypted positions;
The described the step of data to be decrypted are decrypted from the starting decrypted positions according to default decryption rule, specifically
Include:
Using the default decryption length as current decryption length;
Processing step: being decrypted the data to be decrypted according to the starting decrypted positions and the default decryption length,
Judge in the data to be decrypted with the presence or absence of untreatment data;
It is right using the untreatment data as the data to be decrypted there are when untreatment data in the data to be decrypted
The starting decrypted positions and the current decryption length are updated, according to updated starting decrypted positions and current decryption
Length executes the processing step, until determining that the untreatment data is not present in the data to be decrypted;
Otherwise, terminate the decryption to the data to be decrypted;
Wherein, the step of whether there is untreatment data in the judgement data to be decrypted, specifically includes:
The default length of the plaintext of the data to be decrypted is obtained, and judges whether deposit in the data to be decrypted by following formula
In the untreatment data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeDescribed in expression
Default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be decrypted
The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the data to be decrypted
According to.
4. a kind of encryption device characterized by comprising
Acquiring unit, for obtaining data length, predetermined encryption length and the initial encryption position of be-encrypted data;
First judging unit, for judging whether the predetermined encryption length is less than the data length of the be-encrypted data;
Encryption unit, for judging that the predetermined encryption length is less than the number of the be-encrypted data in first judging unit
When according to length, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule;
The encryption unit is specifically used for, and using the predetermined encryption length as current crypto length, and executes processing step:
The be-encrypted data is encrypted according to the initial encryption position and the predetermined encryption length, is judged described to be encrypted
It whether there is untreatment data in data;The encryption unit includes:
Updating unit, for judging in the be-encrypted data in the encryption unit there are when the untreatment data, by institute
Untreatment data is stated as be-encrypted data, the initial encryption position and the current crypto length are updated;
The encryption unit is also used to, and is executed the processing according to updated initial encryption position and current crypto length and is walked
Suddenly, until determining that the untreatment data is not present in the be-encrypted data, otherwise, terminate to the be-encrypted data
Encryption;
Wherein, the encryption unit includes:
Second judgment unit, for obtaining default length of the plaintext, and by following formula judge in the be-encrypted data whether
There are the untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeDescribed in expression
Predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be encrypted
The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the be-encrypted data
According to.
5. encryption device according to claim 4, which is characterized in that further include:
Setting unit, for if it is determined that the predetermined encryption length is greater than or equal to the data length of the be-encrypted data, then
Predetermined encryption length is reset, the predetermined encryption length reset is less than the data length of the be-encrypted data.
6. a kind of decryption device characterized by comprising
Module is obtained, for obtaining data length, default decryption length and the starting decrypted positions of data to be decrypted;
Judgment module, for judging whether the default decryption length is less than the data length of the data to be decrypted;
Deciphering module, for it is described it is default decryption length be less than the data to be decrypted data length when, according to default solution
Close rule is decrypted the data to be decrypted from the starting decrypted positions;
The deciphering module is specifically used for, and using the default decryption length as current decryption length, executes processing step: according to
The data to be decrypted are decrypted in the starting decrypted positions and the default decryption length, judge the data to be decrypted
In whether there is untreatment data;
Update module is when being, using the untreatment data as described wait solve for the judging result in the deciphering module
Ciphertext data is updated the starting decrypted positions and the current decryption length;
The deciphering module is also used to, and is executed the processing according to updated starting decrypted positions and current decryption length and is walked
Suddenly, until determining that the untreatment data is not present in the data to be decrypted, otherwise, terminate to the data to be decrypted
Decryption;
Wherein, the deciphering module is specifically used for, and obtains the default length of the plaintext of the data to be decrypted, and passes through following formula
Judge to whether there is the untreatment data in the data to be decrypted,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeDescribed in expression
Default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be decrypted
The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the data to be decrypted
According to.
7. a kind of terminal characterized by comprising
Encryption device as described in claim 4 or 5;And
Decryption device as claimed in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511028284.6A CN105635150B (en) | 2015-12-31 | 2015-12-31 | Encryption method, decryption method and its device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511028284.6A CN105635150B (en) | 2015-12-31 | 2015-12-31 | Encryption method, decryption method and its device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105635150A CN105635150A (en) | 2016-06-01 |
CN105635150B true CN105635150B (en) | 2019-06-11 |
Family
ID=56049640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511028284.6A Expired - Fee Related CN105635150B (en) | 2015-12-31 | 2015-12-31 | Encryption method, decryption method and its device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105635150B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234111B (en) * | 2017-12-29 | 2021-03-23 | Tcl华星光电技术有限公司 | Data processing method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102064935A (en) * | 2010-11-04 | 2011-05-18 | 珠海艾派克微电子有限公司 | Decryption display method and system and related equipment |
CN102063598A (en) * | 2009-11-17 | 2011-05-18 | 北大方正集团有限公司 | Data encryption and decryption methods and devices |
CN103906000A (en) * | 2014-04-17 | 2014-07-02 | 福建联迪商用设备有限公司 | Method and device for communication between mobile terminal and POS terminal and POS |
-
2015
- 2015-12-31 CN CN201511028284.6A patent/CN105635150B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102063598A (en) * | 2009-11-17 | 2011-05-18 | 北大方正集团有限公司 | Data encryption and decryption methods and devices |
CN102064935A (en) * | 2010-11-04 | 2011-05-18 | 珠海艾派克微电子有限公司 | Decryption display method and system and related equipment |
CN103906000A (en) * | 2014-04-17 | 2014-07-02 | 福建联迪商用设备有限公司 | Method and device for communication between mobile terminal and POS terminal and POS |
Also Published As
Publication number | Publication date |
---|---|
CN105635150A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110944011B (en) | Joint prediction method and system based on tree model | |
CN105940439B (en) | Countermeasure to side-channel attacks on cryptographic algorithms using permutation responses | |
CN109040090A (en) | A kind of data ciphering method and device | |
CN105007577B (en) | A kind of virtual SIM card parameter management method, mobile terminal and server | |
CN111680676B (en) | Training face recognition model, image registration and face recognition method and device | |
US10389523B2 (en) | Apparatus and method for encrypting and decrypting | |
CN109428715A (en) | Data receiver, data transmission system and key generation device | |
CN105357003B (en) | Data encryption method and device | |
CN109165531B (en) | AES mask method, electronic equipment and storage medium | |
US20200076594A1 (en) | Key update for masked keys | |
CN105635150B (en) | Encryption method, decryption method and its device and terminal | |
US9160525B2 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
US20130152179A1 (en) | System and method for user authentication using one-time identification | |
CN105765896A (en) | A computing device for iterative application of table networks | |
CN116566584B (en) | Programmable controller communication method based on Henon chaotic system encryption | |
CN104301114A (en) | Stream cipher bidirectional authentication method for radio frequency identification system | |
KR102045843B1 (en) | Method and apparatus for block encryption algorithm | |
CN114172631B (en) | Sorting method and system based on secret sharing | |
Bian et al. | Privacy-preserving medical image segmentation via hybrid trusted execution environment | |
CN107994998A (en) | A kind of authentication information encryption method and system | |
CN112732776B (en) | Secure approximate pattern matching method and system and electronic equipment | |
CN105809063A (en) | Data processing method and security chip apparatus | |
EP3066861B1 (en) | Method to detect an ota (over the air) standard message affected by an error | |
Kang et al. | Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167‐6 | |
CN107959670B (en) | Dynamic password generation method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190611 |