CN105760765B - Data ciphering method, device and data decryption method, device - Google Patents

Data ciphering method, device and data decryption method, device Download PDF

Info

Publication number
CN105760765B
CN105760765B CN201610079284.7A CN201610079284A CN105760765B CN 105760765 B CN105760765 B CN 105760765B CN 201610079284 A CN201610079284 A CN 201610079284A CN 105760765 B CN105760765 B CN 105760765B
Authority
CN
China
Prior art keywords
data
encryption
rule
key
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610079284.7A
Other languages
Chinese (zh)
Other versions
CN105760765A (en
Inventor
姚亚平
刘古泉
王东旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyuan Internet Software Ltd By Share Ltd
Original Assignee
Beijing Zhiyuan Internet Software Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyuan Internet Software Ltd By Share Ltd filed Critical Beijing Zhiyuan Internet Software Ltd By Share Ltd
Priority to CN201610079284.7A priority Critical patent/CN105760765B/en
Publication of CN105760765A publication Critical patent/CN105760765A/en
Application granted granted Critical
Publication of CN105760765B publication Critical patent/CN105760765B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to data encrypting and deciphering field, specifically a kind of data ciphering method, a kind of data encryption device, a kind of data decryption method and a kind of data decryption apparatus.The present invention provides a kind of data ciphering method, firstly, obtaining encryption key and initial data;Then, a kind of encryption rule is selected from preset encryption rule library;The initial data is encrypted according to the encryption rule using the encryption key again, obtains intermediate data;Next, obtaining identification information corresponding with the encryption rule;Encryption data is generated finally, the intermediate data and the identification information are packaged.Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by carrying out selective use to encryption rule, realizes the encryption to encryption rule;Meanwhile in the transmission process of file, the identification information for there was only encryption rule in information is transmitted, there is no the particular contents of encryption rule.To realize multidimensional encryption, cryptographic means are more complicated, are not easy to crack, cryptographic security is higher.

Description

Data ciphering method, device and data decryption method, device
Technical field
The present invention relates to data encrypting and deciphering field, specifically a kind of data ciphering method, a kind of data encryption device, A kind of data decryption method and a kind of data decryption apparatus.
Background technique
The basic process of data encryption is exactly to be handled by certain algorithm the file or data that were originally plaintext, makes it As one section of unreadable code, commonly referred to as " ciphertext ", make it that can only can just show this after inputting corresponding key Carry out content, approach in this way achievees the purpose that protect data not stolen, read by juridical-person.The inverse process of the process is Decryption, i.e., convert the encoded information to the process of its original data.
Computer documents is a list of definition for the purpose of the partial function for realizing certain function or some software Position, such as text document, picture, program etc. are in the nature the set of the data of storage on a storage medium.
Existing encryption technology is mainly encrypted using key, and according to the format of file, Encryption Algorithm is substantially Determining, on the one hand, some password cracking softwares traverse different password attempts using password dictionary and decrypt, and password can be realized Crack;On the other hand, since encryption information only depends on this carrier of key, key is once compromised or steals, whole A encryption system is just cracked.To sum up, existing encryption technology secrecy means are more single, are easy to crack, and safety is poor.
Summary of the invention
In view of the above problems, there is an urgent need to a kind of higher data encryption sides of safety with multiple encryption information carriers Method and data encryption device and a kind of corresponding data decryption method and a kind of data decryption apparatus.
The technical solution adopted by the present invention is that:
The application provides a kind of data ciphering method, comprising: obtains encryption key and initial data;
A kind of encryption rule is selected from preset encryption rule library;
The initial data is encrypted according to the encryption rule using the encryption key, obtains mediant According to;
Obtain identification information corresponding with the encryption rule;
The intermediate data and the identification information are packaged and generate encryption data.
Optionally, the encryption rule for including in the encryption rule library is data mixing rule;
It is described that the initial data is encrypted according to the encryption rule using the encryption key, in acquisition Between data, comprising:
The encryption key and the initial data are subjected to data mixing processing according to the encryption rule, obtained intermediate Data.
Optionally, described to carry out the encryption key and the initial data at data mixing according to the encryption rule Reason obtains intermediate data, comprising:
The partial data of the encryption key and the initial data is carried out at data mixing according to the encryption rule Reason obtains intermediate data.
It is optionally, described to obtain the corresponding identification information of the encryption rule, comprising:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and adds with described The corresponding identification information of close rule.
Optionally, the characteristic value for extracting the initial data, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data;
Or
Any one following check code of the initial data is generated as the original number using check code calculation method According to characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
Optionally, the encryption key is identical close with the decruption key used when the encryption data is decrypted Code or each other public and private key.
Optionally, the encryption key and the initial data are subjected to data mixing according to the encryption rule described Processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;
It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule, it obtains Intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, obtained Obtain intermediate data.
The application also provides a kind of data encryption device, comprising:
Primary data obtains module, for obtaining encryption key and initial data;
Encryption rule selecting module, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module, for being carried out at encryption according to the encryption rule to the initial data using the encryption key Reason obtains intermediate data;
Identification information obtains module, for obtaining identification information corresponding with the encryption rule;
Packetization module generates encryption data for the intermediate data and the identification information to be packaged.
Optionally, the encryption rule for including in the encryption rule library is data mixing rule;
The encrypting module, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data according to the encryption rule Mixing processing, obtains intermediate data.
Optionally, the data mixing unit includes:
Partial data mixing subelement, for according to the encryption rule by the encryption key and the initial data Partial data carries out data mixing processing, obtains intermediate data.
Optionally, the identification information acquisition module includes:
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being added according to the encryption rule to the characteristic value using the encryption key Close processing obtains identification information corresponding with the encryption rule.
Optionally, the characteristics extraction unit includes:
Characteristics extraction subelement, for extracting spy of the partial data as the initial data from the initial data Value indicative;
Or
Check code computation subunit, for using check code computing device generate the initial data it is following any one Characteristic value of the check code as the initial data:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
Optionally, the encryption key is identical close with the decruption key used when the encryption data is decrypted Code or each other public and private key.
Optionally, the data encryption device, further includes:
Random data generation module, for generating one group of random data;
Encryption key mixing module, for being encrypted using the random data to the encryption key, acquisition has added Close encryption key;
The data mixing unit includes:
Data mixing subelement, being used for will encrypted cryptographic key and the initial data according to the encryption rule Data mixing processing is carried out, intermediate data is obtained.
The application also provides a kind of data decryption method, comprising:
Obtain decruption key and encryption data;
The encryption data is unpacked, identification information and intermediate data are obtained;
According to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base;
Using the decruption key and decryption rule, the intermediate data is decrypted, obtains original number According to.
Optionally, the decryption rule includes data mixing rule, and the data mixing rule adds with the intermediate data The data mixing rule used when close is the rule of identical rule or contrary;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, it obtains former Beginning data, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, It is separated from the intermediate data and restores initial data.
Optionally, described according to the identification information, a kind of corresponding decryption rule are chosen in preset decryption rule base Then, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to the decruption key and the ephemeral data Data mixing processing is carried out, and the interim mixing data that processing obtains are compared with the identification information, if comparison result Expection is not met, then chooses a kind of data mixing rule execution above-mentioned steps again from the decryption rule base, circulation executes Until comparison result meets expection, the data mixing rule chosen when comparison result is met expected as with the identification information Corresponding decryption rule.
Optionally, the decruption key is identical close with the encryption key used when encrypting to the encryption data Code or each other public and private key.
Optionally, place is decrypted to the intermediate data using the decruption key and decryption rule described Reason, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;It is described according to institute Decruption key is stated, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, from the intermediate data Middle separation simultaneously restores initial data, comprising:
According to the encrypted decryption key, reverse mixing is carried out to the intermediate data according to the data mixing rule Processing, separates from the intermediate data and restores initial data
The application also provides a kind of data decryption apparatus, comprising:
Data obtaining module is decrypted, for obtaining decruption key and encryption data;
Encryption data unpacks module, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module, for choosing in preset decryption rule base corresponding according to the identification information A kind of decryption rule;
Encryption data deciphering module, for regular using the decruption key and the decryption, to the intermediate data into Row decryption processing obtains initial data.
Optionally, the decryption rule includes data mixing rule, and the data mixing rule adds with the intermediate data The data mixing rule used when close is the rule of identical rule or contrary;
The encryption data deciphering module includes:
Mixing decryption unit is used for according to the decruption key, according to the data mixing rule to the intermediate data Reverse mixing processing is carried out, is separated from the intermediate data and restores initial data.
Optionally, the decryption rule selection module includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are identical One group of ephemeral data;
Regular comparing unit is decrypted, for choosing a kind of data mixing rule from preset decryption rule base to the solution Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information It is compared, if comparison result does not meet expection, chooses a kind of data mixing rule again from the decryption rule base and hold Row above-mentioned steps, circulation executes until comparison result meets expection, and the data mixing chosen when comparison result is met expected is advised Then as decryption rule corresponding with the identification information.
Optionally, the decruption key is identical close with the encryption key used when encrypting to the encryption data Code or each other public and private key.
Optionally, the data decryption apparatus, further includes:
Random-length obtains module, for obtaining the length of the random data used when encryption data encryption;
Random generating module, the length of random data identical one used when being encrypted for generating with the encryption data Group random data;
Decryption key encryption module, for being encrypted using the random data to the decruption key, acquisition has added Close decruption key;
The mixing decryption unit includes:
Subelement is decrypted in mixing, for the basis encrypted decryption key, according to the data mixing rule to described Intermediate data carries out reverse mixing processing, separates from the intermediate data and restores initial data.
Compared with prior art, the invention has the following advantages that
Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by encryption Rule carries out selective use, realizes the encryption to encryption rule, even if decryption person has stolen key, is not knowing specific add It is also that cannot achieve password cracking in the case of close rule;Meanwhile in the transmission process of encryption data, in encryption data only There is the identification information of encryption rule, there is no the particular contents of encryption rule, therefore, even if decryption person has known identification information, It is also that can not achieve password cracking in the case of no encryption rule library.Decryption person is only possessing encryption rule library and is obtaining Knowing can complete to decrypt under conditions of specific encryption rule and encryption key, realize multidimensional encryption, be not easy to crack, add Close safety is higher.
Further, compared to it is existing by more complicated Encryption Algorithm encrypted in the way of, the present invention in plus Close rule can be using data mixing rule, and carrying out simple data mixing processing by the data content to file can be realized The encryption of file content, since for computer, compared to the Encryption Algorithm of various complexity, data mixing processing is very Simple calculations, therefore, this method also have arithmetic speed fast, the high advantage of encryption efficiency.Meanwhile it carrying out at data mixing The file format of original will not be modified after reason, file size also hardly changes, and is not easy to be identified progress Encryption.
It on the other hand, is mainly the data progress for passing through the file header part for changing file for existing file cipher mode The problem of encryption, decryption person directly read file content after can removing file header, fail so as to cause file encryption, the present invention Carrying out data mixing processing to data content by using data mixing rule can be realized efficient, quick, safe encryption.Together When can solve existing the problem of carrying out big cryptographic calculation amount, low efficiency using total data of the complicated Encryption Algorithm to file.
Correspondingly, data decryption method provided by the invention be with the mating implementation of aforementioned data encryption method, due to solution Close side, which needs to have three decruption key, decryption rule base, identification information conditions, can complete to decrypt, therefore same with guarantor The advantages that close highly-safe.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart of data ciphering method embodiment provided by the invention;
Fig. 2 is a kind of schematic diagram of data encryption device embodiment provided by the invention;
Fig. 3 is a kind of flow chart of data decryption method embodiment provided by the invention;
Fig. 4 is a kind of schematic diagram of data decryption apparatus embodiment provided by the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention Middle attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only It is a part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, of the invention to what is provided in the accompanying drawings below The detailed description of embodiment is not intended to limit the range of claimed invention, but is merely representative of selected reality of the invention Apply example.For the embodiment of the present invention, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall within the protection scope of the present invention.
In view of current encryption technology secrecy means are more single, are easy to crack, the poor problem of safety, the present invention Embodiment provides a kind of data ciphering method, a kind of data encryption device, a kind of data decryption method and a kind of data solution Close device is in turn below described in detail the embodiment of the present invention in conjunction with attached drawing.
Referring to FIG. 1, it is a kind of flow chart of data ciphering method embodiment provided by the invention, the data encryption Method includes the following steps:
Step S101: encryption key and initial data are obtained.
Wherein, the initial data refers to that the total data of encrypted object, the encrypted object can be any format File, such as Streaming Media, word document, condensed document, picture etc. are also possible to a part of file
Encryption method provided by the present invention is suitable for symmetry encryption, is also applied for unsymmetrical tridiagonal matrix, and symmetrical expression adds Close is exactly that encryption and decryption use the same key.It is not same close that unsymmetrical tridiagonal matrix, which is exactly used in encryption and decryption, Key, usually there are two key, referred to as " public key " and " private key ", both must match use, otherwise cannot open encryption text Part.For example, password is arranged in user A, inputs the password, and program is encrypted using the password for symmetric cryptography mode, and use The password is informed user B by family A;User B inputs the password, and program is decrypted using the password.For another example, add for asymmetric Close mode, user A are arranged private key, input the private key, the corresponding public key of the Program Generating private key, which is supplied to user B.With Family B inputs the public key, and program is encrypted using the public key, and user A is decrypted using private key.Here " public key " refers to can With what is externally announced, " private key " then cannot, can only be known by one people of holder.
Therefore, encryption key of the present invention is either the identical password that symmetry encryption uses, is also possible to Unsymmetrical tridiagonal matrix use public key, in one embodiment provided by the present application, the encryption key with to the encryption number It is identical password or public and private key each other according to the decruption key used when being decrypted.
Step S102: a kind of encryption rule is selected from preset encryption rule library.
In one embodiment provided by the present application, encryption rule library, the encryption rule library are previously provided at encryption end For a database, there are many encryption rules for storage inside.
Wherein, the encryption rule library can be tree, such as the tree according to the specific encryption rule of major class-group- The deployment of shape structure, the encryption rule can classify from multiple dimensions, such as according to the encryption range of the initial data, Can be divided into local cypher, full text encrypt, and local cypher can be divided into the encryption of user's specified portions data, computer with Machine determines the encryption of partial data, and can also be there are many specific encryption rule, specifically, the encryption under each classification Rule can be a kind of data mixing rule, can also be that IDEA algorithm, asymmetric RSA Algorithm, irreversible aes algorithm etc. encrypt Algorithm no longer repeats one by one herein, within the scope of protection of this application.
In view of above situation, in the application, the mode of the encryption rule is chosen, can be the lattice according to the file Formula, size etc. are automatically selected according to scheduled logic by computer, are also possible to be selected according to the selection instruction that user inputs It selects, can also be and selected by computer random, implement further, it is also possible to which the above several ways are combined, such as selected by user Then big classification is randomly choosed specific a kind of encryption rule, etc., herein no longer one by one by computer under the classification It repeats, within the scope of protection of this application.
Step S103: being encrypted the initial data according to the encryption rule using the encryption key, Obtain intermediate data.
In one embodiment provided by the present application, select IDEA algorithm as encryption rule in step s 102, originally Step carries out operation to the encryption key and the initial data according to the IDEA algorithm, to encrypt acquisition mediant According to, etc..
In one embodiment provided by the present application, the encryption rule library includes data mixing rule base, the encryption The encryption rule for including in rule base is data mixing rule;Wherein, data mixing refers to the number in specified data acquisition system According to original sequence upset after resequence, or will upset again after another group of data and the data mixing in the data acquisition system Sequentially, the data processing method that the file constituted can not be read is closed so as to cause by original data set.Due to the original number According to also needing to decrypt after encryption, therefore, in data mixing, the specific rules of mixing need to be preset, for example, by data acquisition system In data be divided into multiple groups, then overturn the sequence between group and/or the data sequence in reverse group, it is specific mixed There are many discharge methods, to form a variety of data mixing rules.It is described to use the encryption key according to the encryption rule pair The initial data is encrypted, and obtains intermediate data, comprising: according to the encryption rule by the encryption key and institute It states initial data and carries out data mixing processing, obtain intermediate data.Due to adding for computer compared to various complicated Close algorithm, data mixing processing is very simple calculations, therefore, has operation as encryption rule using data mixing rule Speed is fast, the high advantage of encryption efficiency.
Have been mentioned in step s 102, this method can according to the encryption rule to the partial data of the initial data into Row encryption only can encrypt partial data without full text encryption hence for the biggish file of data volume, from And it reduces operand, improve encryption efficiency, while preferable cipher round results can also be obtained.Implement at one provided by the present application It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule in example, in acquisition Between data, comprising: according to the encryption rule by the partial data of the encryption key and the initial data progress data mix Row's processing, obtains intermediate data.
The data that existing file encryption mode mainly passes through the file header part of change file are encrypted, file header It is that the one section of data for undertaking certain task started positioned at file are directly read after can removing file header for this situation File content, so as to cause file encryption failure.Therefore, in one embodiment provided by the present application, this step is using institute It states encryption key to be encrypted according to data of the encryption rule to respective file main part in initial data, obtain Intermediate data, in this way, file content can not be distinguished even if breaking close person and removing file header, to realize higher safety.
In the above-described embodiments, the encryption rule can use traditional Encryption Algorithm, but due to the main part of file Divided data amount is larger, if encrypted according to traditional Encryption Algorithm, can generate biggish operand, lead to encryption times Therefore the problems such as length, computer load are high, encryption efficiency is low in one embodiment provided by the present application, preferably uses number It is encrypted according to data of the mixing rule to respective file main part in initial data, obtains intermediate data, in this way, While obtaining greater security, it is ensured that encryption it is efficient, quick.
In order to further increase the safety of this method, reused after can also being pre-processed to the encryption key, To improve the difficulty of password cracking, in one embodiment provided by the present application, it is described according to the encryption rule by institute It states encryption key and the initial data carries out data mixing processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;
It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule, it obtains Intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, obtained Obtain intermediate data.
Step S104: identification information corresponding with the encryption rule is obtained.
Wherein, the identification information can be there are many form, for example, in the encryption rule library, per middle encryption rule There is the code for being one, then it can be using the code as identification information corresponding with the encryption rule.In this way, decryption side After obtaining the identification information, can be found in decoding rule base accordingly according to the code corresponding decoding rule with It is decrypted.
For another example, described to obtain the corresponding identification information of the encryption rule, packet in one embodiment provided by the present application It includes:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and adds with described The corresponding identification information of close rule.In the present embodiment, after extracting characteristic value, the characteristic value has been carried out at encryption again Reason, to improve the safety of this method.
Wherein, in one embodiment provided by the present application, the characteristic value for extracting the initial data, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data.For example, for text text The initial data of part can extract characteristic value of the keyword as the initial data in text;For files in stream media Initial data can intercept characteristic value, etc. of the end data therein as the initial data.
In another embodiment provided by the present application, the characteristic value for extracting the initial data, comprising:
Any one following check code of the initial data is generated as the original number using check code calculation method According to characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.It is embodied as maturation side in the prior art Method no longer repeats one by one herein, within the scope of protection of this application.It is similar with step S103, in order to improve to institute The encryption efficiency that characteristic value is encrypted is stated, Computing load is reduced, in one embodiment provided by the present application, The encryption rule for including in the encryption rule library is data mixing rule;
It is described that the characteristic value is encrypted according to the encryption rule using the encryption key, acquisition and institute State the corresponding identification information of encryption rule, comprising:
The encryption key and the characteristic value are subjected to data mixing processing according to the encryption rule, obtain with it is described The corresponding identification information of encryption rule.
Step S105: the intermediate data and the identification information are packaged and generate encryption data.
Wherein, it in one embodiment provided by the present application, when being packaged, is still beaten using the file header of original Packet is not easy to be identified and is encrypted in this way, the file format of original will not be modified.
So far, by step S101 to step S105, data encryption process is completed.
It is encrypted after especially data mixing rule is encrypted by this method, file format is constant, file size It is almost unchanged, it is not easy to be identified and is encrypted.By taking word document as an example, document can be opened after encryption, only be beaten Document content after opening is messy code;By taking picture as an example, picture after encrypting opens the small fork fork for being shown as the upper left corner;With For compressed file, compressed file after encrypting, when opening, can prompt document to be damaged.
Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by encryption Rule carries out selective use, realizes the encryption to encryption rule, even if decryption person has stolen key, is not knowing specific add It is also that cannot achieve password cracking in the case of close rule;Meanwhile in the transmission process of encryption data, in encryption data only There is the identification information of encryption rule, there is no the particular contents of encryption rule, therefore, even if decryption person has known identification information, It is also that can not achieve password cracking in the case of no encryption rule library.Decryption person is only possessing encryption rule library and is obtaining Knowing can complete to decrypt under conditions of specific encryption rule and encryption key, realize multidimensional encryption, be not easy to crack, add Close safety is higher.
Further, compared to it is existing by more complicated Encryption Algorithm encrypted in the way of, the present invention in plus Close rule can be using data mixing rule, and carrying out simple data mixing processing by the data content to file can be realized The encryption of file content, since for computer, compared to the Encryption Algorithm of various complexity, data mixing processing is very Simple calculations, therefore, this method also have arithmetic speed fast, the high advantage of encryption efficiency.Meanwhile it carrying out at data mixing The file format of original will not be modified after reason, file size also hardly changes, and is not easy to be identified progress Encryption.
It on the other hand, is mainly the data progress for passing through the file header part for changing file for existing file cipher mode The problem of encryption, decryption person directly read file content after can removing file header, fail so as to cause file encryption, the present invention Carrying out data mixing processing to data content by using data mixing rule can be realized efficient, quick, safe encryption.Together When can solve existing the problem of carrying out big cryptographic calculation amount, low efficiency using total data of the complicated Encryption Algorithm to file.
In the above-described embodiment, a kind of data ciphering method is provided, corresponding, the application also provides one kind Data encryption device.Referring to FIG. 2, it is a kind of schematic diagram of data encryption device embodiment provided by the invention.Due to dress It sets embodiment and is substantially similar to embodiment of the method, so describing fairly simple, referring to the part of embodiment of the method in place of correlation Explanation.Installation practice described below is only schematical.
A kind of data encryption device provided in this embodiment, comprising:
Primary data obtains module 101, for obtaining encryption key and initial data;
Encryption rule selecting module 102, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module 103, for being added according to the encryption rule to the initial data using the encryption key Close processing obtains intermediate data;
Identification information obtains module 104, for obtaining identification information corresponding with the encryption rule;
Packetization module 105 generates encryption data for the intermediate data and the identification information to be packaged.
In one embodiment provided by the present application, the encryption rule for including in the encryption rule library is data mixing Rule;
The encrypting module 103, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data according to the encryption rule Mixing processing, obtains intermediate data.
In one embodiment provided by the present application, the data mixing unit includes:
Partial data mixing subelement, for according to the encryption rule by the encryption key and the initial data Partial data carries out data mixing processing, obtains intermediate data.
In one embodiment provided by the present application, the identification information obtains module 104 and includes:
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being added according to the encryption rule to the characteristic value using the encryption key Close processing obtains identification information corresponding with the encryption rule.
In one embodiment provided by the present application, the characteristics extraction unit includes:
Characteristics extraction subelement, for extracting spy of the partial data as the initial data from the initial data Value indicative;
Or
Check code computation subunit, for using check code computing device generate the initial data it is following any one Characteristic value of the check code as the initial data:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
In one embodiment provided by the present application, the encryption rule for including in the encryption rule library is data mixing Rule;
The characteristic value encryption unit includes:
Characteristic value mixing subelement, for counting the encryption key and the characteristic value according to the encryption rule It is handled according to mixing, obtains identification information corresponding with the encryption rule.
In one embodiment provided by the present application, the encryption key and use when the encryption data is decrypted Decruption key be identical password or public and private key each other.
In one embodiment provided by the present application, the data encryption device further include:
Random data generation module, for generating one group of random data;
Encryption key mixing module, for being encrypted using the random data to the encryption key, acquisition has added Close encryption key;
The data mixing unit includes:
Data mixing subelement, being used for will encrypted cryptographic key and the initial data according to the encryption rule Data mixing processing is carried out, intermediate data is obtained.
More than, it is a kind of embodiment of data encryption device provided by the invention.
The application also provides a kind of data decryption method, referring to FIG. 3, it is a kind of data deciphering side provided by the present application The flow chart of method embodiment, this method are to cooperate to implement with aforementioned data encryption method, and therefore, part related content is no longer superfluous It states, please refers to the above-mentioned local area network networking method embodiment for remote server and understood that the method includes walking as follows It is rapid:
Step S201: decruption key and encryption data are obtained.
In one embodiment provided by the present application, the decruption key and use when being encrypted to the encryption data Encryption key be identical password or public and private key each other.This part can refer to the explanation of above-mentioned data ciphering method embodiment Understood, details are not described herein again.
Step S202: unpacking the encryption data, obtains identification information and intermediate data.
Step S203: according to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base.
It is described according to the identification information in one embodiment provided by the present application, in preset decryption rule base Choose a kind of corresponding decryption rule, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to the decruption key and the ephemeral data Data mixing processing is carried out, and the interim mixing data that processing obtains are compared with the identification information, if comparison result Expection is not met, then chooses a kind of data mixing rule execution above-mentioned steps again from the decryption rule base, circulation executes Until comparison result meets expection, the data mixing rule chosen when comparison result is met expected as with the identification information Corresponding decryption rule.
Step S204: using the decruption key and decryption rule, the intermediate data is decrypted, is obtained Obtain initial data.
In one embodiment provided by the present application, the decryption rule includes data mixing rule, the data mixing The data mixing rule used when the regular encryption with the intermediate data is the rule of identical rule or contrary;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, it obtains former Beginning data, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, It is separated from the intermediate data and restores initial data.
In one embodiment provided by the present application, described using the decruption key and decryption rule, to institute It states intermediate data to be decrypted, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;
It is described according to the decruption key, the intermediate data is carried out at reverse mixing according to the data mixing rule Reason, separates from the intermediate data and restores initial data, comprising:
According to the encrypted decryption key, reverse mixing is carried out to the intermediate data according to the data mixing rule Processing, separates from the intermediate data and restores initial data
So far, by step S201 to step S204, data deciphering process is completed.
Notebook data decryption method be with the mating implementation of aforementioned data encryption method, due to decryption side need to have decryption it is close Three key, decryption rule base, identification information conditions can be completed to decrypt, therefore equally have many advantages, such as that secret and safe is high. Meanwhile the situation for using data mixing rule to be encrypted, decrypted, while have operand is small, computer load is low, solution The advantages that close speed is fast, decryption efficiency is high.
In the above-described embodiment, a kind of data decryption method is provided, corresponding, the application also provides one kind Data decryption apparatus.Referring to FIG. 4, it is a kind of schematic diagram of data decryption apparatus embodiment provided by the invention.Due to dress It sets embodiment and is substantially similar to embodiment of the method, so describing fairly simple, referring to the part of embodiment of the method in place of correlation Explanation.Installation practice described below is only schematical.
A kind of data decryption apparatus provided in this embodiment, comprising: decryption data obtaining module 201, for obtaining decryption Key and encryption data;
Encryption data unpacks module 202, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module 203, for choosing and corresponding in preset decryption rule base according to the identification information A kind of decryption rule;
Encryption data deciphering module 204, for regular using the decruption key and the decryption, to the intermediate data It is decrypted, obtains initial data.
In one embodiment provided by the present application, the decryption rule includes data mixing rule, the data mixing The data mixing rule used when the regular encryption with the intermediate data is the rule of identical rule or contrary;
The encryption data deciphering module 204 includes:
Mixing decryption unit is used for according to the decruption key, according to the data mixing rule to the intermediate data Reverse mixing processing is carried out, is separated from the intermediate data and restores initial data.
In one embodiment provided by the present application, the decryption rule chooses module 203 and includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are identical One group of ephemeral data;
Regular comparing unit is decrypted, for choosing a kind of data mixing rule from preset decryption rule base to the solution Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information It is compared, if comparison result does not meet expection, chooses a kind of data mixing rule again from the decryption rule base and hold Row above-mentioned steps, circulation executes until comparison result meets expection, and the data mixing chosen when comparison result is met expected is advised Then as decryption rule corresponding with the identification information.
In one embodiment provided by the present application, the decruption key and use when being encrypted to the encryption data Encryption key be identical password or public and private key each other.
In one embodiment provided by the present application, the data decryption apparatus, further includes:
Random-length obtains module, for obtaining the length of the random data used when encryption data encryption;
Random generating module, the length of random data identical one used when being encrypted for generating with the encryption data Group random data;
Decryption key encryption module, for being encrypted using the random data to the decruption key, acquisition has added Close decruption key;
The mixing decryption unit includes:
Subelement is decrypted in mixing, for the basis encrypted decryption key, according to the data mixing rule to described Intermediate data carries out reverse mixing processing, separates from the intermediate data and restores initial data.
More than, it is a kind of embodiment of data decryption apparatus provided by the invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present invention, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ", " installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition State the concrete meaning of term in the present invention.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention.Should all it cover in protection of the invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
1, computer-readable medium can be by any side including permanent and non-permanent, removable and non-removable media Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to Herein defines, and computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulates Data-signal and carrier wave.
2, it will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It can be used moreover, the application can be used in the computer that one or more wherein includes computer usable program code The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.

Claims (14)

1. a kind of data ciphering method characterized by comprising
Obtain encryption key and initial data;
A kind of encryption rule is selected from preset encryption rule library;
The initial data is encrypted according to the encryption rule using the encryption key, obtains intermediate data;
Obtain identification information corresponding with the encryption rule;
The intermediate data and the identification information are packaged and generate encryption data;
It is described to obtain the corresponding identification information of the encryption rule, comprising:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and is advised with the encryption Then corresponding identification information.
2. data ciphering method according to claim 1, which is characterized in that the encryption rule for including in the encryption rule library It is then data mixing rule;
It is described that the initial data is encrypted according to the encryption rule using the encryption key, obtain mediant According to, comprising:
The encryption key and the initial data are subjected to data mixing processing according to the encryption rule, obtain mediant According to.
3. data ciphering method according to claim 2, which is characterized in that described described to add according to the encryption rule Key and the initial data carry out data mixing processing, obtain intermediate data, comprising:
The partial data of the encryption key and the initial data is subjected to data mixing processing according to the encryption rule, is obtained Obtain intermediate data.
4. data ciphering method according to claim 1, which is characterized in that the feature for extracting the initial data Value, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data;
Or
Any one following check code of the initial data is generated as the initial data using check code calculation method Characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
5. data ciphering method according to claim 1, which is characterized in that the encryption key with to the encryption data The decruption key used when being decrypted public and private key for identical password or each other.
6. data ciphering method according to claim 2, which is characterized in that it is described will be described according to the encryption rule Encryption key and the initial data carry out data mixing processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;It is described to add according to described The encryption key and the initial data are carried out data mixing processing by close rule, obtain intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, in acquisition Between data.
7. a kind of data encryption device characterized by comprising
Primary data obtains module, for obtaining encryption key and initial data;
Encryption rule selecting module, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module, for the initial data to be encrypted according to the encryption rule using the encryption key, Obtain intermediate data;
Identification information obtains module, for obtaining identification information corresponding with the encryption rule;
Packetization module generates encryption data for the intermediate data and the identification information to be packaged;
The identification information obtains module
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being carried out at encryption according to the encryption rule to the characteristic value using the encryption key Reason obtains identification information corresponding with the encryption rule.
8. data encryption device according to claim 7, which is characterized in that the encryption rule for including in the encryption rule library It is then data mixing rule;
The encrypting module, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data mixing according to the encryption rule Processing obtains intermediate data.
9. a kind of data decryption method characterized by comprising
Obtain decruption key and encryption data;
The encryption data is unpacked, identification information and intermediate data are obtained;
According to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base;
Using the decruption key and decryption rule, the intermediate data is decrypted, obtains initial data;
It is described according to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to carry out the decruption key and the ephemeral data Data mixing processing, and the interim mixing data that processing obtains are compared with the identification information, if comparison result is not inconsistent Close and be expected, then choose a kind of data mixing rule again from the decryption rule base and execute above-mentioned steps, circulation execute up to Comparison result meets expection, and the data mixing rule chosen when comparison result is met expected is as corresponding with the identification information Decryption rule.
10. data decryption method according to claim 9, which is characterized in that the decryption rule includes that data mixing is advised Then, the data mixing rule used when the data mixing rule and the intermediate data encrypt is identical rule or contrary Rule;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, obtain original number According to, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, from institute It states and is separated in intermediate data and restore initial data.
11. data decryption method according to claim 9, which is characterized in that the decruption key with to the encryption number It is identical password or public and private key each other according to the encryption key used when being encrypted.
12. data decryption method according to claim 10, which is characterized in that utilize the decruption key and institute described Decryption rule is stated, the intermediate data is decrypted, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;It is described according to the solution Key carries out reverse mixing processing to the intermediate data according to the data mixing rule, divides from the intermediate data From and restore initial data, comprising:
According to the encrypted decryption key, the intermediate data is carried out at reverse mixing according to the data mixing rule Reason, separates from the intermediate data and restores initial data.
13. a kind of data decryption apparatus characterized by comprising
Data obtaining module is decrypted, for obtaining decruption key and encryption data;
Encryption data unpacks module, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module, for choosing corresponding one kind in preset decryption rule base according to the identification information Decryption rule;
Encryption data deciphering module, for being solved to the intermediate data using the decruption key and decryption rule Close processing obtains initial data;
The decryption rule chooses module and includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are one group identical Ephemeral data;
Regular comparing unit is decrypted, it is close to the decryption for choosing a kind of data mixing rule from preset decryption rule base Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information carry out It compares, if comparison result does not meet expection, from being chosen again in the decryption rule base in a kind of execution of data mixing rule Step is stated, circulation executes until comparison result meets expection, and the data mixing rule chosen when comparison result is met expected is made For decryption rule corresponding with the identification information.
14. data decryption apparatus according to claim 13, which is characterized in that the decryption rule includes that data mixing is advised Then, the data mixing rule used when the data mixing rule and the intermediate data encrypt is identical rule or contrary Rule;
The encryption data deciphering module includes:
Mixing decryption unit, for being carried out to the intermediate data according to the data mixing rule according to the decruption key Reverse mixing processing, separates from the intermediate data and restores initial data.
CN201610079284.7A 2016-02-04 2016-02-04 Data ciphering method, device and data decryption method, device Active CN105760765B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610079284.7A CN105760765B (en) 2016-02-04 2016-02-04 Data ciphering method, device and data decryption method, device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610079284.7A CN105760765B (en) 2016-02-04 2016-02-04 Data ciphering method, device and data decryption method, device

Publications (2)

Publication Number Publication Date
CN105760765A CN105760765A (en) 2016-07-13
CN105760765B true CN105760765B (en) 2019-03-26

Family

ID=56330622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610079284.7A Active CN105760765B (en) 2016-02-04 2016-02-04 Data ciphering method, device and data decryption method, device

Country Status (1)

Country Link
CN (1) CN105760765B (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101150B (en) * 2016-08-17 2019-04-19 北京锐安科技有限公司 The method and system of Encryption Algorithm
CN107992757B (en) * 2016-10-27 2021-11-16 珠海金山办公软件有限公司 File encryption and decryption method and device
CN106599723B (en) * 2016-12-19 2020-03-17 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN106850219B (en) * 2017-01-16 2020-06-05 宇龙计算机通信科技(深圳)有限公司 Data processing method and terminal
CN108737353B (en) * 2017-04-25 2021-08-20 北京国双科技有限公司 Data encryption method and device based on data analysis system
CN107357670B (en) * 2017-06-12 2020-09-18 卡斯柯信号有限公司 Automatic verification method for configuration data based on encryption equipment characteristic information
CN108986267A (en) * 2018-06-29 2018-12-11 江苏恒宝智能系统技术有限公司 A kind of user registering method and system applied to electronic password lock control
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN109450618B (en) * 2019-01-11 2021-12-31 无锡华大国奇科技有限公司 MD 5-based encryption method and system
CN109800588B (en) * 2019-01-24 2021-07-16 工业和信息化部装备工业发展中心 Dynamic bar code encryption method and device and dynamic bar code decryption method and device
CN109918929B (en) * 2019-03-06 2021-10-01 上海春魁信息技术有限公司 Encryption and decryption method and device
CN110069905B (en) * 2019-04-26 2021-03-23 深圳智慧园区信息技术有限公司 Device and method for encrypting and decrypting Springboot program
CN110492998B (en) * 2019-08-14 2022-10-25 郑州大学 Method for encrypting and decrypting data
CN111327638A (en) * 2020-03-18 2020-06-23 中科星图(深圳)数字技术产业研发中心有限公司 Information encryption method and information decryption method
CN111866868B (en) * 2020-07-03 2021-07-27 上海世麦智能科技有限公司 Method and system for encrypting contact through hardware
CN111885013B (en) * 2020-07-06 2022-04-26 河南信大网御科技有限公司 Mimicry encryption communication module, system and method
CN112188485A (en) * 2020-09-22 2021-01-05 四川长虹电器股份有限公司 Encryption and decryption method based on Bluetooth communication
CN112487461B (en) * 2020-12-07 2023-06-09 重庆电子工程职业学院 Data encryption method
CN112738033A (en) * 2020-12-17 2021-04-30 中国人民解放军战略支援部队信息工程大学 Encryption and decryption method for WAV voice file
US20220269807A1 (en) * 2021-02-22 2022-08-25 EMC IP Holding Company LLC Detecting unauthorized encryptions in data storage systems
CN112861164B (en) * 2021-03-16 2021-12-28 上海纬百科技有限公司 Encryption method, decryption method, data processing method, terminal and encryption machine
CN113572755A (en) * 2021-07-21 2021-10-29 揭阳职业技术学院 Intelligent media terminal data secure transmission method
CN114679324B (en) * 2021-12-15 2024-03-12 国机工业互联网研究院(河南)有限公司 Data exchange method, tool, system, equipment and medium
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium
CN116345676B (en) * 2023-02-15 2024-02-06 西安宇翔电气工程有限公司 Intelligent monitoring system for power distribution cabinet

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503503A (en) * 2002-11-26 2004-06-09 ���µ�����ҵ��ʽ���� Method and device for data encipher/deciphering
CN101895390A (en) * 2010-02-05 2010-11-24 上海复旦天臣新技术有限公司 Method, device and system for encryption and decryption
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503503A (en) * 2002-11-26 2004-06-09 ���µ�����ҵ��ʽ���� Method and device for data encipher/deciphering
CN101895390A (en) * 2010-02-05 2010-11-24 上海复旦天臣新技术有限公司 Method, device and system for encryption and decryption
CN104363091A (en) * 2014-12-01 2015-02-18 国家计算机网络与信息安全管理中心 Encryption and decryption method capable of automatically retrieving keys and selecting algorithms

Also Published As

Publication number Publication date
CN105760765A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN105760765B (en) Data ciphering method, device and data decryption method, device
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
US9158931B2 (en) Block encryption method and block decryption method having integrity verification
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
CN108111524A (en) Terminal data protection method and system based on private key dynamic generation mechanism
Raigoza et al. Evaluating performance of symmetric encryption algorithms
CN108134673B (en) Method and device for generating white box library file
CN108111622B (en) Method, device and system for downloading white box library file
CN112272314B (en) Method, device, equipment and medium for safely transmitting video in video network
WO2017006118A1 (en) Secure distributed encryption system and method
Fauziah et al. Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application
Mohammad et al. A comparative study between modern encryption algorithms based on cloud computing environment
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
TWI488478B (en) Techniques for performing symmetric cryptography
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
CN109255225A (en) Hard disc data security control apparatus based on dual-identity authentication
CN111314052B (en) Data encryption and decryption method
Oli et al. Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage
Kaur et al. Multiphase and multiple encryption
JP6631989B2 (en) Encryption device, control method, and program
KR101148560B1 (en) Apparatus and method for encryption using mixture of bit data
Tirmizi et al. Developing an API for Block-Cipher Encryption powered by Supervised Learning
Soni Performance Analysis of Cascaded Hybrid Symmetric Encryption Models
CN104468621B (en) A kind of method and its encryption device for improving cryptosecurity degree

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N

Applicant after: Beijing Zhiyuan Internet software Limited by Share Ltd

Address before: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N

Applicant before: Beijing Seeyon Software Co., Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant