CN105635150B - Encryption method, decryption method and its device and terminal - Google Patents

Encryption method, decryption method and its device and terminal Download PDF

Info

Publication number
CN105635150B
CN105635150B CN201511028284.6A CN201511028284A CN105635150B CN 105635150 B CN105635150 B CN 105635150B CN 201511028284 A CN201511028284 A CN 201511028284A CN 105635150 B CN105635150 B CN 105635150B
Authority
CN
China
Prior art keywords
data
length
decrypted
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201511028284.6A
Other languages
Chinese (zh)
Other versions
CN105635150A (en
Inventor
彭飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201511028284.6A priority Critical patent/CN105635150B/en
Publication of CN105635150A publication Critical patent/CN105635150A/en
Application granted granted Critical
Publication of CN105635150B publication Critical patent/CN105635150B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention proposes a kind of encryption method, decryption method and its device and terminal, the encryption method includes: to obtain data length, predetermined encryption length and the initial encryption position of be-encrypted data;Judge whether the predetermined encryption length is less than the data length of the be-encrypted data;If the predetermined encryption length is less than the data length of the be-encrypted data, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.According to the technical solution of the present invention, by carrying out local cypher to data, the efficiency encrypted to data can be improved, in this way when the data of the local cypher are decrypted, it can also be improved the efficiency that the data of encryption are decrypted, so as to shorten the time for encrypting and decrypting.

Description

Encryption method, decryption method and its device and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of encryption method, a kind of decryption method, Yi Zhongjia Close device, a kind of decryption device and a kind of terminal.
Background technique
Currently, being all to be encrypted to data, but encrypted to the whole of data when being encrypted to data When encryption times it is longer, and when the data of encryption are decrypted, it is also desirable to the long time, also result in logarithm It is very low according to the efficiency being encrypted and decrypted.
Therefore, how to improve the efficiency for being encrypted and being decrypted to data, so as to shorten the time for encrypting and decrypting at For urgent problem to be solved.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, by carrying out local cypher to data, The efficiency encrypted to data can be improved, and when the data of the local cypher are decrypted, can also be improved pair The efficiency that the data of encryption are decrypted, so as to shorten the time for encrypting and decrypting.
In view of this, the first aspect of the present invention proposes a kind of encryption method, comprising: obtain the data of be-encrypted data Length, predetermined encryption length and initial encryption position;Judge whether the predetermined encryption length is less than the be-encrypted data Data length;If the predetermined encryption length is less than the data length of the be-encrypted data, according to predetermined encryption rule from institute Initial encryption position is stated to encrypt the be-encrypted data.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption According to (i.e. clear data) and encryption data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and The time of decryption.
In the above-mentioned technical solutions, it is preferable that it is described according to predetermined encryption rule from the initial encryption position to described The step of be-encrypted data is encrypted specifically includes: using the predetermined encryption length as current crypto length;Processing step It is rapid: the be-encrypted data is encrypted according to the initial encryption position and the predetermined encryption length, judgement it is described to It whether there is untreatment data in encryption data;It, will be described untreated there are when untreatment data in the be-encrypted data Data are updated the initial encryption position and the current crypto length, as be-encrypted data according to updated Initial encryption position and current crypto length execute the processing step, until determining that there is no described in the be-encrypted data Until untreatment data;Otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption, As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data, To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement be-encrypted data According to the step of, specifically include: obtaining default length of the plaintext, and judge to whether there is in the be-encrypted data by following formula The untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero, If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that described to judge whether the predetermined encryption length is less than described to be added After the data length of ciphertext data, further includes: if it is determined that the predetermined encryption length is greater than or equal to the be-encrypted data Data length, then reset predetermined encryption length, and the predetermined encryption length reset is less than the be-encrypted data Data length.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted The local cypher of data.
The second aspect of the present invention proposes a kind of decryption method, comprising: obtains the data length of data to be decrypted, presets Decrypt length and starting decrypted positions;Judge whether the default decryption length is less than the data length of the data to be decrypted; If the default decryption length is less than the data length of the data to be decrypted, decrypted according to default decryption rule from the starting The data to be decrypted are decrypted in position.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that it is described according to default decryption rule from the starting decrypted positions to described The step of data to be decrypted are decrypted, specifically includes: using the default decryption length as current decryption length;Processing step It is rapid: the data to be decrypted are decrypted according to the starting decrypted positions and the default decryption length, judgement it is described to It whether there is untreatment data in ciphertext data;There are when the untreatment data in the data to be decrypted, general is described not Data are handled as the data to be decrypted, the starting decrypted positions and the current decryption length are updated, according to Updated starting decrypted positions and current decryption length execute the processing step, until determining in the data to be decrypted not There are until the untreatment data;Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement data to be decrypted According to the step of, specifically include: obtaining the default length of the plaintext of the data to be decrypted, and by described in following formula judgement wait solve It whether there is the untreatment data in ciphertext data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted Data.
In any of the above-described technical solution, it is preferable that described to judge the default decryption length described in whether being less than wait solve After the data length of ciphertext data, further includes: if it is determined that the default decryption length is greater than or equal to the data to be decrypted Data length, then reset default decryption length, and the default decryption length reset is less than the data to be decrypted Data length.
The third aspect of the present invention proposes a kind of encryption device, comprising: acquiring unit, for obtaining be-encrypted data Data length, predetermined encryption length and initial encryption position;First judging unit, for whether judging the predetermined encryption length Less than the data length of the be-encrypted data;Encryption unit, when being for the judging result in first judging unit, The be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption According to (i.e. clear data) and ciphertext data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and The time of decryption.
In the above-mentioned technical solutions, it is preferable that the encryption unit is specifically used for, using the predetermined encryption length as working as Preceding encryption length, and execute processing step: according to the initial encryption position and the predetermined encryption length to described to be added Ciphertext data is encrypted, and is judged in the be-encrypted data with the presence or absence of untreatment data;Updating unit, in the encryption The judging result of unit is when being, using the untreatment data as be-encrypted data, to the initial encryption position and described Current crypto length is updated;The encryption unit is also used to, long according to updated initial encryption position and current crypto Degree executes the processing step, until determining that the untreatment data is not present in the be-encrypted data, otherwise, terminates Encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption, As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data, To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that the encryption unit includes: second judgment unit, pre- for obtaining If length of the plaintext, and judge to whether there is the untreatment data in the be-encrypted data by following formula,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero, If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that further include: setting unit, for if it is determined that the predetermined encryption is long Degree is greater than or equal to the data length of the be-encrypted data, then resets predetermined encryption length, it is described reset it is pre- If encrypting the data length that length is less than the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted The local cypher of data.
The fourth aspect of the present invention proposes a kind of decryption device, comprising: module is obtained, for obtaining data to be decrypted Data length, default decryption length and starting decrypted positions;Judgment module, for judging whether the default decryption length is less than The data length of the data to be decrypted;When deciphering module for the judging result in the judgment module is no, according to default Decryption rule is decrypted the data to be decrypted from the starting decrypted positions.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that the deciphering module is specifically used for, using the default decryption length as working as Preceding decryption length executes processing step: according to the starting decrypted positions and the default decryption length to the number to be decrypted According to being decrypted, judge in the data to be decrypted with the presence or absence of untreatment data;Update module, in the deciphering module Judging result be when being, using the untreatment data as the data to be decrypted, to starting decrypted positions and described Current decryption length is updated, and the deciphering module is also used to, long according to updated starting decrypted positions and current decryption Degree executes the processing step, until determining that the untreatment data is not present in the data to be decrypted, otherwise, terminates Decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that the deciphering module is specifically used for, and obtains the data to be decrypted Default length of the plaintext, and judge to whether there is the untreatment data in the data to be decrypted by following formula,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted Data.
In any of the above-described technical solution, it is preferable that further include: setup module, for determining institute in the judgment module When stating data length of the default decryption length more than or equal to the data to be decrypted, then default decryption length, institute are reset State the data length that the default decryption length reset is less than the data to be decrypted.
The fifth aspect of the present invention proposes a kind of terminal, comprising: the dress of encryption described in any one of above-mentioned technical proposal It sets;And decryption device described in any one of above-mentioned technical proposal, therefore, the terminal have and above-mentioned technical proposal in it is any The identical technical effect of decryption device described in any one of encryption device, above-mentioned technical proposal described in, it is no longer superfluous herein It states.
According to the technical solution of the present invention, by carrying out local cypher to data, it can be improved and data are encrypted Efficiency, and when the data of the local cypher are decrypted, it can also be improved the efficiency that the data of encryption are decrypted, So as to shorten the time for encrypting and decrypting.
Detailed description of the invention
Fig. 1 shows the flow diagram of encryption method according to an embodiment of the invention;
Fig. 2 shows the flow diagrams of encryption method according to another embodiment of the invention;
Fig. 3 shows the flow diagram of decryption method according to an embodiment of the invention;
Fig. 4 shows the structural schematic diagram of encryption device according to an embodiment of the invention;
Fig. 5 shows the structural schematic diagram of decryption device according to an embodiment of the invention;
Fig. 6 shows the structural schematic diagram of terminal according to an embodiment of the invention;
Fig. 7 shows the structural schematic diagram of terminal according to another embodiment of the invention;
Fig. 8 A to 8D shows the schematic diagram according to an embodiment of the invention encrypted to be-encrypted data;
Fig. 9 shows the schematic diagram of encrypted data according to an embodiment of the invention;
Figure 10 A and 10B show the schematic diagram according to an embodiment of the invention treating ciphertext data and being decrypted.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the flow diagram of encryption method according to an embodiment of the invention.
As shown in Figure 1, encryption method according to an embodiment of the invention, comprising:
Step 102, data length, predetermined encryption length and the initial encryption position of be-encrypted data are obtained;
Step 104, judge whether the predetermined encryption length is less than the data length of the be-encrypted data, described pre- If encrypt data length of the length less than the be-encrypted data, 106 are entered step, this process is otherwise terminated;
Step 106, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption According to (i.e. clear data) and encryption data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and The time of decryption.
In the above-mentioned technical solutions, it is preferable that step 106 specifically includes: adding using the predetermined encryption length as current Close length;Processing step: the be-encrypted data is added according to the initial encryption position and the predetermined encryption length It is close, judge in the be-encrypted data with the presence or absence of untreatment data;There are the untreated numbers in the be-encrypted data According to when, using the untreatment data as be-encrypted data, the initial encryption position and the current crypto length are carried out It updates, the processing step is executed according to updated initial encryption position and current crypto length, it is described to be added until determining There is no until the untreatment data in ciphertext data;Otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption, As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data, To realize the local cypher to be-encrypted data.
In addition, the step of being updated to the initial encryption position and the current crypto length, specifically includes: according to Current crypto length and default length of the plaintext are updated initial encryption position, if the data length of be-encrypted data be less than or Equal to predetermined encryption length, then using the data length of be-encrypted data as current crypto length, if the data of be-encrypted data Length is greater than predetermined encryption length, then using predetermined encryption length as current crypto length.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement be-encrypted data According to the step of, specifically include: obtaining default length of the plaintext, and judge to whether there is in the be-encrypted data by following formula The untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero, If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that after step 104, further includes: if it is determined that the predetermined encryption length More than or equal to the data length of the be-encrypted data, then reset predetermined encryption length, it is described reset it is default Encrypt the data length that length is less than the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted The local cypher of data.
Fig. 2 shows the flow diagrams of encryption method according to another embodiment of the invention.
As shown in Fig. 2, encryption method according to another embodiment of the invention, comprising:
Step 202, data length, predetermined encryption length and the initial encryption position of be-encrypted data are obtained;
Step 204, judge whether predetermined encryption length is less than the data length of be-encrypted data, it is small in predetermined encryption length When the data length of be-encrypted data, 206 are entered step, otherwise, enters step 214;
Step 206, using predetermined encryption length as current crypto length;
Step 208, be-encrypted data is encrypted according to initial encryption position and predetermined encryption length;
Step 210, do you judge in be-encrypted data with the presence or absence of untreatment data? there are untreated numbers in be-encrypted data According to when, enter step 212, otherwise, illustrate to have completed the encryption to be-encrypted data, terminate this encryption flow;
Step 212, using untreatment data as be-encrypted data, initial encryption position and current crypto length are carried out more Newly, and again 208 are entered step, i.e., be-encrypted data is carried out according to updated initial encryption position and current crypto length Encryption;
Step 214, predetermined encryption length is reset, the predetermined encryption length reset is less than the number of be-encrypted data According to length;
Step 216, be-encrypted data is encrypted according to the predetermined encryption length reset.
Fig. 3 shows the flow diagram of decryption method according to an embodiment of the invention.
As shown in figure 3, decryption method according to an embodiment of the invention, comprising:
Step 302, data length, default decryption length and the starting decrypted positions of data to be decrypted are obtained;
Step 304, judge whether the default decryption length is less than the data length of the data to be decrypted, described pre- If decrypt data length of the length less than the data to be decrypted, 306 are entered step, otherwise, terminates this process;
Step 306, the data to be decrypted are decrypted from the starting decrypted positions according to default decryption rule.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that step 306 specifically includes: using the default decryption length as current solution Close length;Processing step: the data to be decrypted are solved according to the starting decrypted positions and the default decryption length It is close, judge in the data to be decrypted with the presence or absence of untreatment data;There are when untreatment data in the data to be decrypted, Using the untreatment data as the data to be decrypted, the starting decrypted positions and the current decryption length are carried out more Newly, the processing step is executed according to updated starting decrypted positions and current decryption length, it is described to be decrypted until determining There is no until the untreatment data in data;Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that whether there is untreated number in the judgement data to be decrypted According to the step of, specifically include: obtaining the default length of the plaintext of the data to be decrypted, and by described in following formula judgement wait solve It whether there is the untreatment data in ciphertext data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted Data.
In any of the above-described technical solution, it is preferable that described to judge the default decryption length described in whether being less than wait solve After the data length of ciphertext data, further includes: if it is determined that the default decryption length is greater than or equal to the data to be decrypted Data length, then reset default decryption length, and the default decryption length reset is less than the data to be decrypted Data length.
Fig. 4 shows the structural schematic diagram of encryption device according to an embodiment of the invention.
As shown in figure 4, encryption device 400 according to an embodiment of the invention, comprising: acquiring unit 402, for obtaining Take data length, predetermined encryption length and the initial encryption position of be-encrypted data;First judging unit 404, for judging State the data length whether predetermined encryption length is less than the be-encrypted data;Encryption unit 406, in first judgement The judging result of unit 404 is when being, according to predetermined encryption rule from the initial encryption position to the be-encrypted data into Row encryption.
In the technical scheme, when predetermined encryption length is less than the data length of be-encrypted data, according to predetermined encryption Rule to be-encrypted data from initial encryption position encrypt, i.e., encrypted be-encrypted data has the number of unencryption According to (i.e. clear data) and ciphertext data, realizes and local cypher is carried out to be-encrypted data, so that encryption efficiency is improved, and And when encrypted be-encrypted data is decrypted, the efficiency of decryption can be effectively improved, so as to shorten encryption and The time of decryption.
In the above-mentioned technical solutions, it is preferable that the encryption unit 406 is specifically used for, and the predetermined encryption length is made For current crypto length, and execution processing step: according to the initial encryption position and the predetermined encryption length to described Be-encrypted data is encrypted, and is judged in the be-encrypted data with the presence or absence of untreatment data;Updating unit 4062 is used for The judging result of the encryption unit 406 is when being, using the untreatment data as the be-encrypted data, to the starting Encrypted location and the current crypto length are updated;The encryption unit 406 is also used to, according to updated initial encryption Position and current crypto length execute the processing step, until determining that the untreated number is not present in the be-encrypted data Until, otherwise, terminate the encryption to the be-encrypted data.
In the technical scheme, be-encrypted data is encrypted since the initial encryption position of be-encrypted data, is obtained To a segment length be predetermined encryption length ciphertext data, then the one piece of data after the ciphertext data without encryption, As clear data, if in the pending data there is also untreatment data (i.e. in be-encrypted data the clear data it One piece of data afterwards), then using untreatment data as be-encrypted data, and execution above-mentioned steps are recycled, it is to be processed until determining There is no until untreatment data in data, so that there are ciphertext data and clear data in encrypted be-encrypted data, To realize the local cypher to be-encrypted data.
In addition, updating unit 4062 is specifically used for, according to current crypto length and default length of the plaintext to initial encryption position It sets and is updated, if the data length of be-encrypted data is less than or equal to predetermined encryption length, by the data of be-encrypted data Length is as current crypto length, if the data length of be-encrypted data is greater than predetermined encryption length, by predetermined encryption length As current crypto length.
In any of the above-described technical solution, it is preferable that the encryption unit 406 includes: second judgment unit 4064, is used for Default length of the plaintext is obtained, and judges to whether there is the untreatment data in the be-encrypted data by following formula,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeIt indicates The predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in encryption data, if LIt is untreated> 0 then determines that there are described untreated in the be-encrypted data Data.
In the technical scheme, the length of untreatment data be be-encrypted data length subtract ciphertext data length and The length of clear data, if the length of untreatment data illustrates to have completed the encryption to be-encrypted data less than or equal to zero, If the length of untreatment data is greater than zero, illustrate to continue cycling through processing step among the above, until the length of untreatment data is small Until zero, to ensure that the accuracy and reliability for judging whether to continue be-encrypted data encryption.
In any of the above-described technical solution, it is preferable that further include: setting unit 408, for if it is determined that the predetermined encryption Length is greater than or equal to the data length of the be-encrypted data, then reset predetermined encryption length, described to reset Predetermined encryption length is less than the data length of the be-encrypted data.
In the technical scheme, it if predetermined encryption length is greater than or equal to the data length of be-encrypted data, sets again The predetermined encryption length smaller than the data length of be-encrypted data is set, according to the predetermined encryption length reset to number to be encrypted According to being encrypted, in this way, encrypted be-encrypted data has clear data and ciphertext data simultaneously, that is, realize to be encrypted The local cypher of data.
Fig. 5 shows the structural schematic diagram of decryption device according to an embodiment of the invention.
As shown in figure 5, decryption device 500 according to an embodiment of the invention, comprising: module 502 is obtained, for obtaining Take data length, default decryption length and the starting decrypted positions of data to be decrypted;Judgment module 504, it is described pre- for judging If whether decryption length is less than the data length of the data to be decrypted;Deciphering module 506, in the judgment module 504 Judging result when being no, the data to be decrypted are decrypted from the starting decrypted positions according to default decryption is regular.
In the technical scheme, start to be solved at the starting decrypted positions of data to be decrypted according to default decryption rule Close, data to be decrypted can be the data to be decrypted encrypted by any of the above-described encryption method, i.e., data to be decrypted have Clear data and ciphertext data, that is to say, that when treating ciphertext data decryption, only treat ciphertext data in ciphertext data into Row decryption, to effectively improve decryption efficiency and shorten decryption time.
Specifically, decryption can be determined according to initial encryption position of the data to be decrypted in encryption and predetermined encryption length When starting decrypted positions and default decryption length.
In the above-mentioned technical solutions, it is preferable that the deciphering module 506 is specifically used for, and the default decryption length is made For current decryption length, processing step is executed: according to the starting decrypted positions and the default decryption length to described wait solve Ciphertext data is decrypted, and judges in the data to be decrypted with the presence or absence of untreatment data;Update module, in the decryption The judging result of module 506 is when being, using the untreatment data as the data to be decrypted, to the starting decrypted positions It is updated with the current decryption length, the deciphering module 506 is also used to, and according to updated starting decrypted positions and is worked as Preceding decryption length executes the processing step, until determining that the untreatment data is not present in the data to be decrypted, Otherwise, terminate the decryption to the data to be decrypted.
In any of the above-described technical solution, it is preferable that the deciphering module 506 is specifically used for, and obtains the number to be decrypted According to default length of the plaintext, and judged in the data to be decrypted by following formula with the presence or absence of the untreatment data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeIt indicates The default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine it is described to The untreatment data is not present in ciphertext data, if LIt is untreated> 0 then determines that there are described untreated in the data to be decrypted Data.
In any of the above-described technical solution, it is preferable that further include: setup module, for determining in the judgment module 504 When the default decryption length is greater than or equal to the data length of the data to be decrypted, then default decryption length is reset, The default decryption length reset is less than the data length of the data to be decrypted.
Fig. 6 shows the structural schematic diagram of terminal according to an embodiment of the invention.
As shown in fig. 6, terminal 600 according to an embodiment of the invention, comprising: any one of above-mentioned technical proposal institute The encryption stated fills 400 and sets;And decryption described in any one of above-mentioned technical proposal fills 500, therefore, the terminal 600 have and 500 phase of decryption device described in any one of encryption device 400, above-mentioned technical proposal described in any one of above-mentioned technical proposal Same technical effect, details are not described herein.
Fig. 7 shows the structural schematic diagram of terminal according to another embodiment of the invention.
As shown in fig. 7, (be-encrypted data is terminal 700 according to another embodiment of the invention in this embodiment Finger print information, certain be-encrypted data can be iris information, voice identification information or password), comprising: fingerprint reader 700, encryption device 400, control device 704, database 706 and decryption device 500, fingerprint reader 702 acquire finger print information Later, finger print information is sent to encryption device 400, encryption device 400 encrypts finger print information, and encryption device 400 will Encrypted finger print information is sent to control device 704, and control device 704 believes encrypted fingerprint by decryption device 500 Breath is decrypted, and pre-stored finger print information is obtained from database 706, by after decryption finger print information be stored in advance Finger print information matched, according to matching result execute corresponding operating.
Fig. 8 A to 8D shows the schematic diagram according to an embodiment of the invention encrypted to be-encrypted data;Figure 9 show the schematic diagram of encrypted data according to an embodiment of the invention.
As shown in Figure 8 A, start to encrypt be-encrypted data at the initial encryption position of be-encrypted data, be formed Ciphertext data, the length of ciphertext data are predetermined encryption length, to the one piece of data of the designated length after ciphertext data not into Row encryption, i.e. clear data.Pass through formula L at this timeIt is untreated=LIt is to be encrypted-(LIt is close+LIt is bright) calculate untreatment data length, can by Fig. 8 A See, the L being calculatedIt is untreatedGreater than 0, there is also untreatment datas for the be-encrypted data for illustrating after encryption, then continue to not locating Reason data are encrypted.
As shown in Figure 8 B, using untreatment data as be-encrypted data, and initial encryption position is updated, i.e., it will be bright One end of literary data is as updated initial encryption position, wherein one end of the clear data is adjacent with be-encrypted data.And And since the length of be-encrypted data is greater than predetermined encryption length, then current crypto length is predetermined encryption length.
As shown in Figure 8 C, from updated initial encryption position be-encrypted data is encrypted, encrypt length For predetermined encryption length, another section of ciphertext data are formed, and to the one piece of data adjacent with the ciphertext data without encrypting, As another section of clear data passes through formula L at this timeIt is untreated=LIt is to be encrypted-(LIt is close+LIt is bright) calculate untreatment data length.
According to above scheme after repeatedly circulation encryption, as in fig. 8d, pass through formula LIt is untreated=LIt is to be encrypted-(LIt is close+ LIt is bright) calculate the length of untreatment data, LIt is untreatedGreater than zero, illustrate that there are untreatment datas in be-encrypted data, and will not locate Data are managed as be-encrypted data, at this point, the length of be-encrypted data is less than predetermined encryption length, then by the length of be-encrypted data Degree is used as current crypto length, encrypts from initial encryption position to be-encrypted data.
As shown in figure 9, after being encrypted according to above scheme to one section of be-encrypted data, encrypted be-encrypted data It include multistage ciphertext data and multistage clear data.
Figure 10 A and 10B show the schematic diagram according to an embodiment of the invention treating ciphertext data and being decrypted.
As shown in Figure 10 A, from the starting decrypted positions of data to be decrypted treat ciphertext data and be decrypted, decrypt Data length be default decryption length, wherein starting decrypted positions and default decryption length can exist according to data to be decrypted Initial encryption position and predetermined encryption length when being encrypted determine.For example, if the data to be decrypted in Figure 10 A are by passing through It crosses the ciphering process as shown in Fig. 8 A to Fig. 8 D obtains, therefore, starting decrypted positions of the data to be decrypted in Figure 10 A and pre- If decryption length respectively corresponds initial encryption position and the predetermined encryption length of the be-encrypted data in Fig. 8 A.
As shown in Figure 10 B, it is treated from starting decrypted positions after ciphertext data is decrypted, passes through formula LIt is untreated= LIt is to be encrypted-(LIt is close+LIt is bright) calculate data to be decrypted untreatment data length, at this point, LIt is untreatedGreater than zero, then by untreatment data As data to be decrypted, and update the starting decrypted positions of data to be decrypted, i.e., using one end of ciphertext data as update after Starting decrypted positions, wherein one end of ciphertext data is connected with one end of untreatment data, then according to above scheme after It is continuous that the data to be decrypted are decrypted, due to treating the step of ciphertext data is decrypted with encrypting to be-encrypted data Corresponding, this will not be repeated here treats the detailed process that ciphertext data is decrypted.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, by carrying out local cypher, Ke Yiti to data The efficiency that height encrypts data, and when the data of the local cypher are decrypted, it can also be improved to encryption The efficiency that data are decrypted, so as to shorten the time for encrypting and decrypting.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (7)

1. a kind of encryption method characterized by comprising
Obtain data length, predetermined encryption length and the initial encryption position of be-encrypted data;
Judge whether the predetermined encryption length is less than the data length of the be-encrypted data;
If the predetermined encryption length is less than the data length of the be-encrypted data, according to predetermined encryption rule from the starting Encrypted location encrypts the be-encrypted data;
The described the step of be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule, specifically Include:
Using the predetermined encryption length as current crypto length;
Processing step: encrypting the be-encrypted data according to the initial encryption position and the predetermined encryption length, Judge in the be-encrypted data with the presence or absence of untreatment data;
If there are the untreatment datas in the be-encrypted data, using the untreatment data as be-encrypted data, to institute It states initial encryption position and the current crypto length is updated, it is long according to updated initial encryption position and current crypto Degree executes the processing step, until determining that the untreatment data is not present in the be-encrypted data;
Otherwise, terminate the encryption to the be-encrypted data;
Wherein, the step of whether there is untreatment data in the judgement be-encrypted data, specifically includes:
Default length of the plaintext is obtained, and is judged in the be-encrypted data by following formula with the presence or absence of the untreated number According to,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeDescribed in expression Predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be encrypted The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the be-encrypted data According to.
2. encryption method according to claim 1, which is characterized in that described to judge whether the predetermined encryption length is less than After the data length of the be-encrypted data, further includes:
If it is determined that the predetermined encryption length is greater than or equal to the data length of the be-encrypted data, then default add is reset Close length, the predetermined encryption length reset are less than the data length of the be-encrypted data.
3. a kind of decryption method characterized by comprising
Obtain data length, default decryption length and the starting decrypted positions of data to be decrypted;
Judge whether the default decryption length is less than the data length of the data to be decrypted;
It is regular from the starting according to default decryption if the default decryption length is less than the data length of the data to be decrypted The data to be decrypted are decrypted in decrypted positions;
The described the step of data to be decrypted are decrypted from the starting decrypted positions according to default decryption rule, specifically Include:
Using the default decryption length as current decryption length;
Processing step: being decrypted the data to be decrypted according to the starting decrypted positions and the default decryption length, Judge in the data to be decrypted with the presence or absence of untreatment data;
It is right using the untreatment data as the data to be decrypted there are when untreatment data in the data to be decrypted The starting decrypted positions and the current decryption length are updated, according to updated starting decrypted positions and current decryption Length executes the processing step, until determining that the untreatment data is not present in the data to be decrypted;
Otherwise, terminate the decryption to the data to be decrypted;
Wherein, the step of whether there is untreatment data in the judgement data to be decrypted, specifically includes:
The default length of the plaintext of the data to be decrypted is obtained, and judges whether deposit in the data to be decrypted by following formula In the untreatment data,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeDescribed in expression Default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be decrypted The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the data to be decrypted According to.
4. a kind of encryption device characterized by comprising
Acquiring unit, for obtaining data length, predetermined encryption length and the initial encryption position of be-encrypted data;
First judging unit, for judging whether the predetermined encryption length is less than the data length of the be-encrypted data;
Encryption unit, for judging that the predetermined encryption length is less than the number of the be-encrypted data in first judging unit When according to length, the be-encrypted data is encrypted from the initial encryption position according to predetermined encryption rule;
The encryption unit is specifically used for, and using the predetermined encryption length as current crypto length, and executes processing step: The be-encrypted data is encrypted according to the initial encryption position and the predetermined encryption length, is judged described to be encrypted It whether there is untreatment data in data;The encryption unit includes:
Updating unit, for judging in the be-encrypted data in the encryption unit there are when the untreatment data, by institute Untreatment data is stated as be-encrypted data, the initial encryption position and the current crypto length are updated;
The encryption unit is also used to, and is executed the processing according to updated initial encryption position and current crypto length and is walked Suddenly, until determining that the untreatment data is not present in the be-encrypted data, otherwise, terminate to the be-encrypted data Encryption;
Wherein, the encryption unit includes:
Second judgment unit, for obtaining default length of the plaintext, and by following formula judge in the be-encrypted data whether There are the untreatment data,
LIt is untreated=LIt is to be encrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be encryptedIndicate the length of the be-encrypted data, LIt is closeDescribed in expression Predetermined encryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be encrypted The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the be-encrypted data According to.
5. encryption device according to claim 4, which is characterized in that further include:
Setting unit, for if it is determined that the predetermined encryption length is greater than or equal to the data length of the be-encrypted data, then Predetermined encryption length is reset, the predetermined encryption length reset is less than the data length of the be-encrypted data.
6. a kind of decryption device characterized by comprising
Module is obtained, for obtaining data length, default decryption length and the starting decrypted positions of data to be decrypted;
Judgment module, for judging whether the default decryption length is less than the data length of the data to be decrypted;
Deciphering module, for it is described it is default decryption length be less than the data to be decrypted data length when, according to default solution Close rule is decrypted the data to be decrypted from the starting decrypted positions;
The deciphering module is specifically used for, and using the default decryption length as current decryption length, executes processing step: according to The data to be decrypted are decrypted in the starting decrypted positions and the default decryption length, judge the data to be decrypted In whether there is untreatment data;
Update module is when being, using the untreatment data as described wait solve for the judging result in the deciphering module Ciphertext data is updated the starting decrypted positions and the current decryption length;
The deciphering module is also used to, and is executed the processing according to updated starting decrypted positions and current decryption length and is walked Suddenly, until determining that the untreatment data is not present in the data to be decrypted, otherwise, terminate to the data to be decrypted Decryption;
Wherein, the deciphering module is specifically used for, and obtains the default length of the plaintext of the data to be decrypted, and passes through following formula Judge to whether there is the untreatment data in the data to be decrypted,
LIt is untreated=LIt is to be decrypted-n×(LIt is close+LIt is bright),
Wherein, LIt is untreatedIndicate the length of the untreatment data, LIt is to be decryptedIndicate the length of the data to be decrypted, LIt is closeDescribed in expression Default decryption length, LIt is brightIndicate the default length of the plaintext, n is the integer greater than 0, if LIt is untreated≤ 0, then determine described to be decrypted The untreatment data is not present in data, if LIt is untreated> 0 then determines that there are the untreated numbers in the data to be decrypted According to.
7. a kind of terminal characterized by comprising
Encryption device as described in claim 4 or 5;And
Decryption device as claimed in claim 6.
CN201511028284.6A 2015-12-31 2015-12-31 Encryption method, decryption method and its device and terminal Expired - Fee Related CN105635150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511028284.6A CN105635150B (en) 2015-12-31 2015-12-31 Encryption method, decryption method and its device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511028284.6A CN105635150B (en) 2015-12-31 2015-12-31 Encryption method, decryption method and its device and terminal

Publications (2)

Publication Number Publication Date
CN105635150A CN105635150A (en) 2016-06-01
CN105635150B true CN105635150B (en) 2019-06-11

Family

ID=56049640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511028284.6A Expired - Fee Related CN105635150B (en) 2015-12-31 2015-12-31 Encryption method, decryption method and its device and terminal

Country Status (1)

Country Link
CN (1) CN105635150B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234111B (en) * 2017-12-29 2021-03-23 Tcl华星光电技术有限公司 Data processing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064935A (en) * 2010-11-04 2011-05-18 珠海艾派克微电子有限公司 Decryption display method and system and related equipment
CN102063598A (en) * 2009-11-17 2011-05-18 北大方正集团有限公司 Data encryption and decryption methods and devices
CN103906000A (en) * 2014-04-17 2014-07-02 福建联迪商用设备有限公司 Method and device for communication between mobile terminal and POS terminal and POS

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063598A (en) * 2009-11-17 2011-05-18 北大方正集团有限公司 Data encryption and decryption methods and devices
CN102064935A (en) * 2010-11-04 2011-05-18 珠海艾派克微电子有限公司 Decryption display method and system and related equipment
CN103906000A (en) * 2014-04-17 2014-07-02 福建联迪商用设备有限公司 Method and device for communication between mobile terminal and POS terminal and POS

Also Published As

Publication number Publication date
CN105635150A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN109040090B (en) A kind of data ciphering method and device
CN105940439B (en) Countermeasure to side-channel attacks on cryptographic algorithms using permutation responses
CN110944011B (en) Joint prediction method and system based on tree model
CN106372519A (en) Information encryption method and device
US10389523B2 (en) Apparatus and method for encrypting and decrypting
CN106131021B (en) Request authentication method and system
CN111680676B (en) Training face recognition model, image registration and face recognition method and device
CN105847000A (en) Token generation method and communication system based on same
CN109428715A (en) Data receiver, data transmission system and key generation device
CN109165531B (en) AES mask method, electronic equipment and storage medium
EP3437248A1 (en) Key update for masked keys
CN105635150B (en) Encryption method, decryption method and its device and terminal
US20130152179A1 (en) System and method for user authentication using one-time identification
US20150023497A1 (en) Apparatus and method for key update for use in a block cipher algorithm
CN108369784B (en) Cryptographic algorithm with a key dependent mask calculation step (SBOX call)
CN104301114A (en) Stream cipher bidirectional authentication method for radio frequency identification system
KR102045843B1 (en) Method and apparatus for block encryption algorithm
CN114172631B (en) Sorting method and system based on secret sharing
CN105635157A (en) Password updating method
CN107994998A (en) A kind of authentication information encryption method and system
CN112732776B (en) Secure approximate pattern matching method and system and electronic equipment
CN105809063A (en) Data processing method and security chip apparatus
EP3066861B1 (en) Method to detect an ota (over the air) standard message affected by an error
Kang et al. Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167‐6
CN107959670B (en) Dynamic password generation method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190611