CN105760765B - Data ciphering method, device and data decryption method, device - Google Patents
Data ciphering method, device and data decryption method, device Download PDFInfo
- Publication number
- CN105760765B CN105760765B CN201610079284.7A CN201610079284A CN105760765B CN 105760765 B CN105760765 B CN 105760765B CN 201610079284 A CN201610079284 A CN 201610079284A CN 105760765 B CN105760765 B CN 105760765B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- rule
- key
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to data encrypting and deciphering field, specifically a kind of data ciphering method, a kind of data encryption device, a kind of data decryption method and a kind of data decryption apparatus.The present invention provides a kind of data ciphering method, firstly, obtaining encryption key and initial data;Then, a kind of encryption rule is selected from preset encryption rule library;The initial data is encrypted according to the encryption rule using the encryption key again, obtains intermediate data;Next, obtaining identification information corresponding with the encryption rule;Encryption data is generated finally, the intermediate data and the identification information are packaged.Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by carrying out selective use to encryption rule, realizes the encryption to encryption rule;Meanwhile in the transmission process of file, the identification information for there was only encryption rule in information is transmitted, there is no the particular contents of encryption rule.To realize multidimensional encryption, cryptographic means are more complicated, are not easy to crack, cryptographic security is higher.
Description
Technical field
The present invention relates to data encrypting and deciphering field, specifically a kind of data ciphering method, a kind of data encryption device,
A kind of data decryption method and a kind of data decryption apparatus.
Background technique
The basic process of data encryption is exactly to be handled by certain algorithm the file or data that were originally plaintext, makes it
As one section of unreadable code, commonly referred to as " ciphertext ", make it that can only can just show this after inputting corresponding key
Carry out content, approach in this way achievees the purpose that protect data not stolen, read by juridical-person.The inverse process of the process is
Decryption, i.e., convert the encoded information to the process of its original data.
Computer documents is a list of definition for the purpose of the partial function for realizing certain function or some software
Position, such as text document, picture, program etc. are in the nature the set of the data of storage on a storage medium.
Existing encryption technology is mainly encrypted using key, and according to the format of file, Encryption Algorithm is substantially
Determining, on the one hand, some password cracking softwares traverse different password attempts using password dictionary and decrypt, and password can be realized
Crack;On the other hand, since encryption information only depends on this carrier of key, key is once compromised or steals, whole
A encryption system is just cracked.To sum up, existing encryption technology secrecy means are more single, are easy to crack, and safety is poor.
Summary of the invention
In view of the above problems, there is an urgent need to a kind of higher data encryption sides of safety with multiple encryption information carriers
Method and data encryption device and a kind of corresponding data decryption method and a kind of data decryption apparatus.
The technical solution adopted by the present invention is that:
The application provides a kind of data ciphering method, comprising: obtains encryption key and initial data;
A kind of encryption rule is selected from preset encryption rule library;
The initial data is encrypted according to the encryption rule using the encryption key, obtains mediant
According to;
Obtain identification information corresponding with the encryption rule;
The intermediate data and the identification information are packaged and generate encryption data.
Optionally, the encryption rule for including in the encryption rule library is data mixing rule;
It is described that the initial data is encrypted according to the encryption rule using the encryption key, in acquisition
Between data, comprising:
The encryption key and the initial data are subjected to data mixing processing according to the encryption rule, obtained intermediate
Data.
Optionally, described to carry out the encryption key and the initial data at data mixing according to the encryption rule
Reason obtains intermediate data, comprising:
The partial data of the encryption key and the initial data is carried out at data mixing according to the encryption rule
Reason obtains intermediate data.
It is optionally, described to obtain the corresponding identification information of the encryption rule, comprising:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and adds with described
The corresponding identification information of close rule.
Optionally, the characteristic value for extracting the initial data, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data;
Or
Any one following check code of the initial data is generated as the original number using check code calculation method
According to characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
Optionally, the encryption key is identical close with the decruption key used when the encryption data is decrypted
Code or each other public and private key.
Optionally, the encryption key and the initial data are subjected to data mixing according to the encryption rule described
Processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;
It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule, it obtains
Intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, obtained
Obtain intermediate data.
The application also provides a kind of data encryption device, comprising:
Primary data obtains module, for obtaining encryption key and initial data;
Encryption rule selecting module, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module, for being carried out at encryption according to the encryption rule to the initial data using the encryption key
Reason obtains intermediate data;
Identification information obtains module, for obtaining identification information corresponding with the encryption rule;
Packetization module generates encryption data for the intermediate data and the identification information to be packaged.
Optionally, the encryption rule for including in the encryption rule library is data mixing rule;
The encrypting module, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data according to the encryption rule
Mixing processing, obtains intermediate data.
Optionally, the data mixing unit includes:
Partial data mixing subelement, for according to the encryption rule by the encryption key and the initial data
Partial data carries out data mixing processing, obtains intermediate data.
Optionally, the identification information acquisition module includes:
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being added according to the encryption rule to the characteristic value using the encryption key
Close processing obtains identification information corresponding with the encryption rule.
Optionally, the characteristics extraction unit includes:
Characteristics extraction subelement, for extracting spy of the partial data as the initial data from the initial data
Value indicative;
Or
Check code computation subunit, for using check code computing device generate the initial data it is following any one
Characteristic value of the check code as the initial data:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
Optionally, the encryption key is identical close with the decruption key used when the encryption data is decrypted
Code or each other public and private key.
Optionally, the data encryption device, further includes:
Random data generation module, for generating one group of random data;
Encryption key mixing module, for being encrypted using the random data to the encryption key, acquisition has added
Close encryption key;
The data mixing unit includes:
Data mixing subelement, being used for will encrypted cryptographic key and the initial data according to the encryption rule
Data mixing processing is carried out, intermediate data is obtained.
The application also provides a kind of data decryption method, comprising:
Obtain decruption key and encryption data;
The encryption data is unpacked, identification information and intermediate data are obtained;
According to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base;
Using the decruption key and decryption rule, the intermediate data is decrypted, obtains original number
According to.
Optionally, the decryption rule includes data mixing rule, and the data mixing rule adds with the intermediate data
The data mixing rule used when close is the rule of identical rule or contrary;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, it obtains former
Beginning data, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule,
It is separated from the intermediate data and restores initial data.
Optionally, described according to the identification information, a kind of corresponding decryption rule are chosen in preset decryption rule base
Then, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to the decruption key and the ephemeral data
Data mixing processing is carried out, and the interim mixing data that processing obtains are compared with the identification information, if comparison result
Expection is not met, then chooses a kind of data mixing rule execution above-mentioned steps again from the decryption rule base, circulation executes
Until comparison result meets expection, the data mixing rule chosen when comparison result is met expected as with the identification information
Corresponding decryption rule.
Optionally, the decruption key is identical close with the encryption key used when encrypting to the encryption data
Code or each other public and private key.
Optionally, place is decrypted to the intermediate data using the decruption key and decryption rule described
Reason, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;It is described according to institute
Decruption key is stated, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, from the intermediate data
Middle separation simultaneously restores initial data, comprising:
According to the encrypted decryption key, reverse mixing is carried out to the intermediate data according to the data mixing rule
Processing, separates from the intermediate data and restores initial data
The application also provides a kind of data decryption apparatus, comprising:
Data obtaining module is decrypted, for obtaining decruption key and encryption data;
Encryption data unpacks module, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module, for choosing in preset decryption rule base corresponding according to the identification information
A kind of decryption rule;
Encryption data deciphering module, for regular using the decruption key and the decryption, to the intermediate data into
Row decryption processing obtains initial data.
Optionally, the decryption rule includes data mixing rule, and the data mixing rule adds with the intermediate data
The data mixing rule used when close is the rule of identical rule or contrary;
The encryption data deciphering module includes:
Mixing decryption unit is used for according to the decruption key, according to the data mixing rule to the intermediate data
Reverse mixing processing is carried out, is separated from the intermediate data and restores initial data.
Optionally, the decryption rule selection module includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are identical
One group of ephemeral data;
Regular comparing unit is decrypted, for choosing a kind of data mixing rule from preset decryption rule base to the solution
Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information
It is compared, if comparison result does not meet expection, chooses a kind of data mixing rule again from the decryption rule base and hold
Row above-mentioned steps, circulation executes until comparison result meets expection, and the data mixing chosen when comparison result is met expected is advised
Then as decryption rule corresponding with the identification information.
Optionally, the decruption key is identical close with the encryption key used when encrypting to the encryption data
Code or each other public and private key.
Optionally, the data decryption apparatus, further includes:
Random-length obtains module, for obtaining the length of the random data used when encryption data encryption;
Random generating module, the length of random data identical one used when being encrypted for generating with the encryption data
Group random data;
Decryption key encryption module, for being encrypted using the random data to the decruption key, acquisition has added
Close decruption key;
The mixing decryption unit includes:
Subelement is decrypted in mixing, for the basis encrypted decryption key, according to the data mixing rule to described
Intermediate data carries out reverse mixing processing, separates from the intermediate data and restores initial data.
Compared with prior art, the invention has the following advantages that
Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by encryption
Rule carries out selective use, realizes the encryption to encryption rule, even if decryption person has stolen key, is not knowing specific add
It is also that cannot achieve password cracking in the case of close rule;Meanwhile in the transmission process of encryption data, in encryption data only
There is the identification information of encryption rule, there is no the particular contents of encryption rule, therefore, even if decryption person has known identification information,
It is also that can not achieve password cracking in the case of no encryption rule library.Decryption person is only possessing encryption rule library and is obtaining
Knowing can complete to decrypt under conditions of specific encryption rule and encryption key, realize multidimensional encryption, be not easy to crack, add
Close safety is higher.
Further, compared to it is existing by more complicated Encryption Algorithm encrypted in the way of, the present invention in plus
Close rule can be using data mixing rule, and carrying out simple data mixing processing by the data content to file can be realized
The encryption of file content, since for computer, compared to the Encryption Algorithm of various complexity, data mixing processing is very
Simple calculations, therefore, this method also have arithmetic speed fast, the high advantage of encryption efficiency.Meanwhile it carrying out at data mixing
The file format of original will not be modified after reason, file size also hardly changes, and is not easy to be identified progress
Encryption.
It on the other hand, is mainly the data progress for passing through the file header part for changing file for existing file cipher mode
The problem of encryption, decryption person directly read file content after can removing file header, fail so as to cause file encryption, the present invention
Carrying out data mixing processing to data content by using data mixing rule can be realized efficient, quick, safe encryption.Together
When can solve existing the problem of carrying out big cryptographic calculation amount, low efficiency using total data of the complicated Encryption Algorithm to file.
Correspondingly, data decryption method provided by the invention be with the mating implementation of aforementioned data encryption method, due to solution
Close side, which needs to have three decruption key, decryption rule base, identification information conditions, can complete to decrypt, therefore same with guarantor
The advantages that close highly-safe.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of flow chart of data ciphering method embodiment provided by the invention;
Fig. 2 is a kind of schematic diagram of data encryption device embodiment provided by the invention;
Fig. 3 is a kind of flow chart of data decryption method embodiment provided by the invention;
Fig. 4 is a kind of schematic diagram of data decryption apparatus embodiment provided by the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
Middle attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
It is a part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is real
The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, of the invention to what is provided in the accompanying drawings below
The detailed description of embodiment is not intended to limit the range of claimed invention, but is merely representative of selected reality of the invention
Apply example.For the embodiment of the present invention, those skilled in the art institute obtained without making creative work
There are other embodiments, shall fall within the protection scope of the present invention.
In view of current encryption technology secrecy means are more single, are easy to crack, the poor problem of safety, the present invention
Embodiment provides a kind of data ciphering method, a kind of data encryption device, a kind of data decryption method and a kind of data solution
Close device is in turn below described in detail the embodiment of the present invention in conjunction with attached drawing.
Referring to FIG. 1, it is a kind of flow chart of data ciphering method embodiment provided by the invention, the data encryption
Method includes the following steps:
Step S101: encryption key and initial data are obtained.
Wherein, the initial data refers to that the total data of encrypted object, the encrypted object can be any format
File, such as Streaming Media, word document, condensed document, picture etc. are also possible to a part of file
Encryption method provided by the present invention is suitable for symmetry encryption, is also applied for unsymmetrical tridiagonal matrix, and symmetrical expression adds
Close is exactly that encryption and decryption use the same key.It is not same close that unsymmetrical tridiagonal matrix, which is exactly used in encryption and decryption,
Key, usually there are two key, referred to as " public key " and " private key ", both must match use, otherwise cannot open encryption text
Part.For example, password is arranged in user A, inputs the password, and program is encrypted using the password for symmetric cryptography mode, and use
The password is informed user B by family A;User B inputs the password, and program is decrypted using the password.For another example, add for asymmetric
Close mode, user A are arranged private key, input the private key, the corresponding public key of the Program Generating private key, which is supplied to user B.With
Family B inputs the public key, and program is encrypted using the public key, and user A is decrypted using private key.Here " public key " refers to can
With what is externally announced, " private key " then cannot, can only be known by one people of holder.
Therefore, encryption key of the present invention is either the identical password that symmetry encryption uses, is also possible to
Unsymmetrical tridiagonal matrix use public key, in one embodiment provided by the present application, the encryption key with to the encryption number
It is identical password or public and private key each other according to the decruption key used when being decrypted.
Step S102: a kind of encryption rule is selected from preset encryption rule library.
In one embodiment provided by the present application, encryption rule library, the encryption rule library are previously provided at encryption end
For a database, there are many encryption rules for storage inside.
Wherein, the encryption rule library can be tree, such as the tree according to the specific encryption rule of major class-group-
The deployment of shape structure, the encryption rule can classify from multiple dimensions, such as according to the encryption range of the initial data,
Can be divided into local cypher, full text encrypt, and local cypher can be divided into the encryption of user's specified portions data, computer with
Machine determines the encryption of partial data, and can also be there are many specific encryption rule, specifically, the encryption under each classification
Rule can be a kind of data mixing rule, can also be that IDEA algorithm, asymmetric RSA Algorithm, irreversible aes algorithm etc. encrypt
Algorithm no longer repeats one by one herein, within the scope of protection of this application.
In view of above situation, in the application, the mode of the encryption rule is chosen, can be the lattice according to the file
Formula, size etc. are automatically selected according to scheduled logic by computer, are also possible to be selected according to the selection instruction that user inputs
It selects, can also be and selected by computer random, implement further, it is also possible to which the above several ways are combined, such as selected by user
Then big classification is randomly choosed specific a kind of encryption rule, etc., herein no longer one by one by computer under the classification
It repeats, within the scope of protection of this application.
Step S103: being encrypted the initial data according to the encryption rule using the encryption key,
Obtain intermediate data.
In one embodiment provided by the present application, select IDEA algorithm as encryption rule in step s 102, originally
Step carries out operation to the encryption key and the initial data according to the IDEA algorithm, to encrypt acquisition mediant
According to, etc..
In one embodiment provided by the present application, the encryption rule library includes data mixing rule base, the encryption
The encryption rule for including in rule base is data mixing rule;Wherein, data mixing refers to the number in specified data acquisition system
According to original sequence upset after resequence, or will upset again after another group of data and the data mixing in the data acquisition system
Sequentially, the data processing method that the file constituted can not be read is closed so as to cause by original data set.Due to the original number
According to also needing to decrypt after encryption, therefore, in data mixing, the specific rules of mixing need to be preset, for example, by data acquisition system
In data be divided into multiple groups, then overturn the sequence between group and/or the data sequence in reverse group, it is specific mixed
There are many discharge methods, to form a variety of data mixing rules.It is described to use the encryption key according to the encryption rule pair
The initial data is encrypted, and obtains intermediate data, comprising: according to the encryption rule by the encryption key and institute
It states initial data and carries out data mixing processing, obtain intermediate data.Due to adding for computer compared to various complicated
Close algorithm, data mixing processing is very simple calculations, therefore, has operation as encryption rule using data mixing rule
Speed is fast, the high advantage of encryption efficiency.
Have been mentioned in step s 102, this method can according to the encryption rule to the partial data of the initial data into
Row encryption only can encrypt partial data without full text encryption hence for the biggish file of data volume, from
And it reduces operand, improve encryption efficiency, while preferable cipher round results can also be obtained.Implement at one provided by the present application
It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule in example, in acquisition
Between data, comprising: according to the encryption rule by the partial data of the encryption key and the initial data progress data mix
Row's processing, obtains intermediate data.
The data that existing file encryption mode mainly passes through the file header part of change file are encrypted, file header
It is that the one section of data for undertaking certain task started positioned at file are directly read after can removing file header for this situation
File content, so as to cause file encryption failure.Therefore, in one embodiment provided by the present application, this step is using institute
It states encryption key to be encrypted according to data of the encryption rule to respective file main part in initial data, obtain
Intermediate data, in this way, file content can not be distinguished even if breaking close person and removing file header, to realize higher safety.
In the above-described embodiments, the encryption rule can use traditional Encryption Algorithm, but due to the main part of file
Divided data amount is larger, if encrypted according to traditional Encryption Algorithm, can generate biggish operand, lead to encryption times
Therefore the problems such as length, computer load are high, encryption efficiency is low in one embodiment provided by the present application, preferably uses number
It is encrypted according to data of the mixing rule to respective file main part in initial data, obtains intermediate data, in this way,
While obtaining greater security, it is ensured that encryption it is efficient, quick.
In order to further increase the safety of this method, reused after can also being pre-processed to the encryption key,
To improve the difficulty of password cracking, in one embodiment provided by the present application, it is described according to the encryption rule by institute
It states encryption key and the initial data carries out data mixing processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;
It is described that the encryption key and the initial data are subjected to data mixing processing according to the encryption rule, it obtains
Intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, obtained
Obtain intermediate data.
Step S104: identification information corresponding with the encryption rule is obtained.
Wherein, the identification information can be there are many form, for example, in the encryption rule library, per middle encryption rule
There is the code for being one, then it can be using the code as identification information corresponding with the encryption rule.In this way, decryption side
After obtaining the identification information, can be found in decoding rule base accordingly according to the code corresponding decoding rule with
It is decrypted.
For another example, described to obtain the corresponding identification information of the encryption rule, packet in one embodiment provided by the present application
It includes:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and adds with described
The corresponding identification information of close rule.In the present embodiment, after extracting characteristic value, the characteristic value has been carried out at encryption again
Reason, to improve the safety of this method.
Wherein, in one embodiment provided by the present application, the characteristic value for extracting the initial data, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data.For example, for text text
The initial data of part can extract characteristic value of the keyword as the initial data in text;For files in stream media
Initial data can intercept characteristic value, etc. of the end data therein as the initial data.
In another embodiment provided by the present application, the characteristic value for extracting the initial data, comprising:
Any one following check code of the initial data is generated as the original number using check code calculation method
According to characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.It is embodied as maturation side in the prior art
Method no longer repeats one by one herein, within the scope of protection of this application.It is similar with step S103, in order to improve to institute
The encryption efficiency that characteristic value is encrypted is stated, Computing load is reduced, in one embodiment provided by the present application,
The encryption rule for including in the encryption rule library is data mixing rule;
It is described that the characteristic value is encrypted according to the encryption rule using the encryption key, acquisition and institute
State the corresponding identification information of encryption rule, comprising:
The encryption key and the characteristic value are subjected to data mixing processing according to the encryption rule, obtain with it is described
The corresponding identification information of encryption rule.
Step S105: the intermediate data and the identification information are packaged and generate encryption data.
Wherein, it in one embodiment provided by the present application, when being packaged, is still beaten using the file header of original
Packet is not easy to be identified and is encrypted in this way, the file format of original will not be modified.
So far, by step S101 to step S105, data encryption process is completed.
It is encrypted after especially data mixing rule is encrypted by this method, file format is constant, file size
It is almost unchanged, it is not easy to be identified and is encrypted.By taking word document as an example, document can be opened after encryption, only be beaten
Document content after opening is messy code;By taking picture as an example, picture after encrypting opens the small fork fork for being shown as the upper left corner;With
For compressed file, compressed file after encrypting, when opening, can prompt document to be damaged.
Compared to the prior art, the encryption information in the present invention depends not only upon this carrier of key, also by encryption
Rule carries out selective use, realizes the encryption to encryption rule, even if decryption person has stolen key, is not knowing specific add
It is also that cannot achieve password cracking in the case of close rule;Meanwhile in the transmission process of encryption data, in encryption data only
There is the identification information of encryption rule, there is no the particular contents of encryption rule, therefore, even if decryption person has known identification information,
It is also that can not achieve password cracking in the case of no encryption rule library.Decryption person is only possessing encryption rule library and is obtaining
Knowing can complete to decrypt under conditions of specific encryption rule and encryption key, realize multidimensional encryption, be not easy to crack, add
Close safety is higher.
Further, compared to it is existing by more complicated Encryption Algorithm encrypted in the way of, the present invention in plus
Close rule can be using data mixing rule, and carrying out simple data mixing processing by the data content to file can be realized
The encryption of file content, since for computer, compared to the Encryption Algorithm of various complexity, data mixing processing is very
Simple calculations, therefore, this method also have arithmetic speed fast, the high advantage of encryption efficiency.Meanwhile it carrying out at data mixing
The file format of original will not be modified after reason, file size also hardly changes, and is not easy to be identified progress
Encryption.
It on the other hand, is mainly the data progress for passing through the file header part for changing file for existing file cipher mode
The problem of encryption, decryption person directly read file content after can removing file header, fail so as to cause file encryption, the present invention
Carrying out data mixing processing to data content by using data mixing rule can be realized efficient, quick, safe encryption.Together
When can solve existing the problem of carrying out big cryptographic calculation amount, low efficiency using total data of the complicated Encryption Algorithm to file.
In the above-described embodiment, a kind of data ciphering method is provided, corresponding, the application also provides one kind
Data encryption device.Referring to FIG. 2, it is a kind of schematic diagram of data encryption device embodiment provided by the invention.Due to dress
It sets embodiment and is substantially similar to embodiment of the method, so describing fairly simple, referring to the part of embodiment of the method in place of correlation
Explanation.Installation practice described below is only schematical.
A kind of data encryption device provided in this embodiment, comprising:
Primary data obtains module 101, for obtaining encryption key and initial data;
Encryption rule selecting module 102, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module 103, for being added according to the encryption rule to the initial data using the encryption key
Close processing obtains intermediate data;
Identification information obtains module 104, for obtaining identification information corresponding with the encryption rule;
Packetization module 105 generates encryption data for the intermediate data and the identification information to be packaged.
In one embodiment provided by the present application, the encryption rule for including in the encryption rule library is data mixing
Rule;
The encrypting module 103, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data according to the encryption rule
Mixing processing, obtains intermediate data.
In one embodiment provided by the present application, the data mixing unit includes:
Partial data mixing subelement, for according to the encryption rule by the encryption key and the initial data
Partial data carries out data mixing processing, obtains intermediate data.
In one embodiment provided by the present application, the identification information obtains module 104 and includes:
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being added according to the encryption rule to the characteristic value using the encryption key
Close processing obtains identification information corresponding with the encryption rule.
In one embodiment provided by the present application, the characteristics extraction unit includes:
Characteristics extraction subelement, for extracting spy of the partial data as the initial data from the initial data
Value indicative;
Or
Check code computation subunit, for using check code computing device generate the initial data it is following any one
Characteristic value of the check code as the initial data:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
In one embodiment provided by the present application, the encryption rule for including in the encryption rule library is data mixing
Rule;
The characteristic value encryption unit includes:
Characteristic value mixing subelement, for counting the encryption key and the characteristic value according to the encryption rule
It is handled according to mixing, obtains identification information corresponding with the encryption rule.
In one embodiment provided by the present application, the encryption key and use when the encryption data is decrypted
Decruption key be identical password or public and private key each other.
In one embodiment provided by the present application, the data encryption device further include:
Random data generation module, for generating one group of random data;
Encryption key mixing module, for being encrypted using the random data to the encryption key, acquisition has added
Close encryption key;
The data mixing unit includes:
Data mixing subelement, being used for will encrypted cryptographic key and the initial data according to the encryption rule
Data mixing processing is carried out, intermediate data is obtained.
More than, it is a kind of embodiment of data encryption device provided by the invention.
The application also provides a kind of data decryption method, referring to FIG. 3, it is a kind of data deciphering side provided by the present application
The flow chart of method embodiment, this method are to cooperate to implement with aforementioned data encryption method, and therefore, part related content is no longer superfluous
It states, please refers to the above-mentioned local area network networking method embodiment for remote server and understood that the method includes walking as follows
It is rapid:
Step S201: decruption key and encryption data are obtained.
In one embodiment provided by the present application, the decruption key and use when being encrypted to the encryption data
Encryption key be identical password or public and private key each other.This part can refer to the explanation of above-mentioned data ciphering method embodiment
Understood, details are not described herein again.
Step S202: unpacking the encryption data, obtains identification information and intermediate data.
Step S203: according to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base.
It is described according to the identification information in one embodiment provided by the present application, in preset decryption rule base
Choose a kind of corresponding decryption rule, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to the decruption key and the ephemeral data
Data mixing processing is carried out, and the interim mixing data that processing obtains are compared with the identification information, if comparison result
Expection is not met, then chooses a kind of data mixing rule execution above-mentioned steps again from the decryption rule base, circulation executes
Until comparison result meets expection, the data mixing rule chosen when comparison result is met expected as with the identification information
Corresponding decryption rule.
Step S204: using the decruption key and decryption rule, the intermediate data is decrypted, is obtained
Obtain initial data.
In one embodiment provided by the present application, the decryption rule includes data mixing rule, the data mixing
The data mixing rule used when the regular encryption with the intermediate data is the rule of identical rule or contrary;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, it obtains former
Beginning data, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule,
It is separated from the intermediate data and restores initial data.
In one embodiment provided by the present application, described using the decruption key and decryption rule, to institute
It states intermediate data to be decrypted, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;
It is described according to the decruption key, the intermediate data is carried out at reverse mixing according to the data mixing rule
Reason, separates from the intermediate data and restores initial data, comprising:
According to the encrypted decryption key, reverse mixing is carried out to the intermediate data according to the data mixing rule
Processing, separates from the intermediate data and restores initial data
So far, by step S201 to step S204, data deciphering process is completed.
Notebook data decryption method be with the mating implementation of aforementioned data encryption method, due to decryption side need to have decryption it is close
Three key, decryption rule base, identification information conditions can be completed to decrypt, therefore equally have many advantages, such as that secret and safe is high.
Meanwhile the situation for using data mixing rule to be encrypted, decrypted, while have operand is small, computer load is low, solution
The advantages that close speed is fast, decryption efficiency is high.
In the above-described embodiment, a kind of data decryption method is provided, corresponding, the application also provides one kind
Data decryption apparatus.Referring to FIG. 4, it is a kind of schematic diagram of data decryption apparatus embodiment provided by the invention.Due to dress
It sets embodiment and is substantially similar to embodiment of the method, so describing fairly simple, referring to the part of embodiment of the method in place of correlation
Explanation.Installation practice described below is only schematical.
A kind of data decryption apparatus provided in this embodiment, comprising: decryption data obtaining module 201, for obtaining decryption
Key and encryption data;
Encryption data unpacks module 202, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module 203, for choosing and corresponding in preset decryption rule base according to the identification information
A kind of decryption rule;
Encryption data deciphering module 204, for regular using the decruption key and the decryption, to the intermediate data
It is decrypted, obtains initial data.
In one embodiment provided by the present application, the decryption rule includes data mixing rule, the data mixing
The data mixing rule used when the regular encryption with the intermediate data is the rule of identical rule or contrary;
The encryption data deciphering module 204 includes:
Mixing decryption unit is used for according to the decruption key, according to the data mixing rule to the intermediate data
Reverse mixing processing is carried out, is separated from the intermediate data and restores initial data.
In one embodiment provided by the present application, the decryption rule chooses module 203 and includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are identical
One group of ephemeral data;
Regular comparing unit is decrypted, for choosing a kind of data mixing rule from preset decryption rule base to the solution
Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information
It is compared, if comparison result does not meet expection, chooses a kind of data mixing rule again from the decryption rule base and hold
Row above-mentioned steps, circulation executes until comparison result meets expection, and the data mixing chosen when comparison result is met expected is advised
Then as decryption rule corresponding with the identification information.
In one embodiment provided by the present application, the decruption key and use when being encrypted to the encryption data
Encryption key be identical password or public and private key each other.
In one embodiment provided by the present application, the data decryption apparatus, further includes:
Random-length obtains module, for obtaining the length of the random data used when encryption data encryption;
Random generating module, the length of random data identical one used when being encrypted for generating with the encryption data
Group random data;
Decryption key encryption module, for being encrypted using the random data to the decruption key, acquisition has added
Close decruption key;
The mixing decryption unit includes:
Subelement is decrypted in mixing, for the basis encrypted decryption key, according to the data mixing rule to described
Intermediate data carries out reverse mixing processing, separates from the intermediate data and restores initial data.
More than, it is a kind of embodiment of data decryption apparatus provided by the invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present invention, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ",
" installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one
Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary
It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition
State the concrete meaning of term in the present invention.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention.Should all it cover in protection of the invention
Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
1, computer-readable medium can be by any side including permanent and non-permanent, removable and non-removable media
Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulates
Data-signal and carrier wave.
2, it will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It can be used moreover, the application can be used in the computer that one or more wherein includes computer usable program code
The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
Claims (14)
1. a kind of data ciphering method characterized by comprising
Obtain encryption key and initial data;
A kind of encryption rule is selected from preset encryption rule library;
The initial data is encrypted according to the encryption rule using the encryption key, obtains intermediate data;
Obtain identification information corresponding with the encryption rule;
The intermediate data and the identification information are packaged and generate encryption data;
It is described to obtain the corresponding identification information of the encryption rule, comprising:
Extract the characteristic value of the initial data;
The characteristic value is encrypted according to the encryption rule using the encryption key, obtains and is advised with the encryption
Then corresponding identification information.
2. data ciphering method according to claim 1, which is characterized in that the encryption rule for including in the encryption rule library
It is then data mixing rule;
It is described that the initial data is encrypted according to the encryption rule using the encryption key, obtain mediant
According to, comprising:
The encryption key and the initial data are subjected to data mixing processing according to the encryption rule, obtain mediant
According to.
3. data ciphering method according to claim 2, which is characterized in that described described to add according to the encryption rule
Key and the initial data carry out data mixing processing, obtain intermediate data, comprising:
The partial data of the encryption key and the initial data is subjected to data mixing processing according to the encryption rule, is obtained
Obtain intermediate data.
4. data ciphering method according to claim 1, which is characterized in that the feature for extracting the initial data
Value, comprising:
Characteristic value of the partial data as the initial data is extracted from the initial data;
Or
Any one following check code of the initial data is generated as the initial data using check code calculation method
Characteristic value:
HASH value, SHA value, MD5 value, MD2 value, MD3 value, MD4 value.
5. data ciphering method according to claim 1, which is characterized in that the encryption key with to the encryption data
The decruption key used when being decrypted public and private key for identical password or each other.
6. data ciphering method according to claim 2, which is characterized in that it is described will be described according to the encryption rule
Encryption key and the initial data carry out data mixing processing, before obtaining intermediate data, further includes:
Generate one group of random data;
The encryption key is encrypted using the random data, obtains encrypted cryptographic key;It is described to add according to described
The encryption key and the initial data are carried out data mixing processing by close rule, obtain intermediate data, comprising:
The encrypted cryptographic key and the initial data are subjected to data mixing processing according to the encryption rule, in acquisition
Between data.
7. a kind of data encryption device characterized by comprising
Primary data obtains module, for obtaining encryption key and initial data;
Encryption rule selecting module, for selecting a kind of encryption rule from preset encryption rule library;
Encrypting module, for the initial data to be encrypted according to the encryption rule using the encryption key,
Obtain intermediate data;
Identification information obtains module, for obtaining identification information corresponding with the encryption rule;
Packetization module generates encryption data for the intermediate data and the identification information to be packaged;
The identification information obtains module
Characteristics extraction unit, for extracting the characteristic value of the initial data;
Characteristic value encryption unit, for being carried out at encryption according to the encryption rule to the characteristic value using the encryption key
Reason obtains identification information corresponding with the encryption rule.
8. data encryption device according to claim 7, which is characterized in that the encryption rule for including in the encryption rule library
It is then data mixing rule;
The encrypting module, comprising:
Data mixing unit, for the encryption key and the initial data to be carried out data mixing according to the encryption rule
Processing obtains intermediate data.
9. a kind of data decryption method characterized by comprising
Obtain decruption key and encryption data;
The encryption data is unpacked, identification information and intermediate data are obtained;
According to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base;
Using the decruption key and decryption rule, the intermediate data is decrypted, obtains initial data;
It is described according to the identification information, a kind of corresponding decryption rule is chosen in preset decryption rule base, comprising:
Obtain the length information of the characteristic value used when the identification information generates;
Generate one group of ephemeral data identical with the length of characteristic value used when identification information generation;
A kind of data mixing rule is chosen from preset decryption rule base to carry out the decruption key and the ephemeral data
Data mixing processing, and the interim mixing data that processing obtains are compared with the identification information, if comparison result is not inconsistent
Close and be expected, then choose a kind of data mixing rule again from the decryption rule base and execute above-mentioned steps, circulation execute up to
Comparison result meets expection, and the data mixing rule chosen when comparison result is met expected is as corresponding with the identification information
Decryption rule.
10. data decryption method according to claim 9, which is characterized in that the decryption rule includes that data mixing is advised
Then, the data mixing rule used when the data mixing rule and the intermediate data encrypt is identical rule or contrary
Rule;
It is described that the intermediate data is decrypted using the decruption key and decryption rule, obtain original number
According to, comprising:
According to the decruption key, reverse mixing processing is carried out to the intermediate data according to the data mixing rule, from institute
It states and is separated in intermediate data and restore initial data.
11. data decryption method according to claim 9, which is characterized in that the decruption key with to the encryption number
It is identical password or public and private key each other according to the encryption key used when being encrypted.
12. data decryption method according to claim 10, which is characterized in that utilize the decruption key and institute described
Decryption rule is stated, the intermediate data is decrypted, before obtaining initial data, further includes:
Obtain the length of the random data used when encryption data encryption;
Generate one group of random data identical with the length of random data used when encryption data encryption;
The decruption key is encrypted using the random data, obtains encrypted decryption key;It is described according to the solution
Key carries out reverse mixing processing to the intermediate data according to the data mixing rule, divides from the intermediate data
From and restore initial data, comprising:
According to the encrypted decryption key, the intermediate data is carried out at reverse mixing according to the data mixing rule
Reason, separates from the intermediate data and restores initial data.
13. a kind of data decryption apparatus characterized by comprising
Data obtaining module is decrypted, for obtaining decruption key and encryption data;
Encryption data unpacks module, for unpacking the encryption data, obtains identification information and intermediate data;
Decryption rule chooses module, for choosing corresponding one kind in preset decryption rule base according to the identification information
Decryption rule;
Encryption data deciphering module, for being solved to the intermediate data using the decruption key and decryption rule
Close processing obtains initial data;
The decryption rule chooses module and includes:
Characteristic length acquiring unit, for obtaining the length information of the characteristic value used when the identification information generates;
Ephemeral data acquiring unit, the length of characteristic value used when generating for generating with the identification information are one group identical
Ephemeral data;
Regular comparing unit is decrypted, it is close to the decryption for choosing a kind of data mixing rule from preset decryption rule base
Key and the ephemeral data carry out data mixing processing, and the interim mixing data that processing is obtained and the identification information carry out
It compares, if comparison result does not meet expection, from being chosen again in the decryption rule base in a kind of execution of data mixing rule
Step is stated, circulation executes until comparison result meets expection, and the data mixing rule chosen when comparison result is met expected is made
For decryption rule corresponding with the identification information.
14. data decryption apparatus according to claim 13, which is characterized in that the decryption rule includes that data mixing is advised
Then, the data mixing rule used when the data mixing rule and the intermediate data encrypt is identical rule or contrary
Rule;
The encryption data deciphering module includes:
Mixing decryption unit, for being carried out to the intermediate data according to the data mixing rule according to the decruption key
Reverse mixing processing, separates from the intermediate data and restores initial data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610079284.7A CN105760765B (en) | 2016-02-04 | 2016-02-04 | Data ciphering method, device and data decryption method, device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610079284.7A CN105760765B (en) | 2016-02-04 | 2016-02-04 | Data ciphering method, device and data decryption method, device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105760765A CN105760765A (en) | 2016-07-13 |
CN105760765B true CN105760765B (en) | 2019-03-26 |
Family
ID=56330622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610079284.7A Active CN105760765B (en) | 2016-02-04 | 2016-02-04 | Data ciphering method, device and data decryption method, device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105760765B (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106101150B (en) * | 2016-08-17 | 2019-04-19 | 北京锐安科技有限公司 | The method and system of Encryption Algorithm |
CN107992757B (en) * | 2016-10-27 | 2021-11-16 | 珠海金山办公软件有限公司 | File encryption and decryption method and device |
CN106599723B (en) * | 2016-12-19 | 2020-03-17 | 武汉斗鱼网络科技有限公司 | File encryption method and device and file decryption method and device |
CN106850219B (en) * | 2017-01-16 | 2020-06-05 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method and terminal |
CN108737353B (en) * | 2017-04-25 | 2021-08-20 | 北京国双科技有限公司 | Data encryption method and device based on data analysis system |
CN107357670B (en) * | 2017-06-12 | 2020-09-18 | 卡斯柯信号有限公司 | Automatic verification method for configuration data based on encryption equipment characteristic information |
CN108986267A (en) * | 2018-06-29 | 2018-12-11 | 江苏恒宝智能系统技术有限公司 | A kind of user registering method and system applied to electronic password lock control |
CN109035499A (en) * | 2018-06-30 | 2018-12-18 | 恒宝股份有限公司 | A kind of electronic password lock authentication method based on dynamic password |
CN109450618B (en) * | 2019-01-11 | 2021-12-31 | 无锡华大国奇科技有限公司 | MD 5-based encryption method and system |
CN109800588B (en) * | 2019-01-24 | 2021-07-16 | 工业和信息化部装备工业发展中心 | Dynamic bar code encryption method and device and dynamic bar code decryption method and device |
CN109918929B (en) * | 2019-03-06 | 2021-10-01 | 上海春魁信息技术有限公司 | Encryption and decryption method and device |
CN110069905B (en) * | 2019-04-26 | 2021-03-23 | 深圳智慧园区信息技术有限公司 | Device and method for encrypting and decrypting Springboot program |
CN110492998B (en) * | 2019-08-14 | 2022-10-25 | 郑州大学 | Method for encrypting and decrypting data |
CN111327638A (en) * | 2020-03-18 | 2020-06-23 | 中科星图(深圳)数字技术产业研发中心有限公司 | Information encryption method and information decryption method |
CN111866868B (en) * | 2020-07-03 | 2021-07-27 | 上海世麦智能科技有限公司 | Method and system for encrypting contact through hardware |
CN111885013B (en) * | 2020-07-06 | 2022-04-26 | 河南信大网御科技有限公司 | Mimicry encryption communication module, system and method |
CN112188485A (en) * | 2020-09-22 | 2021-01-05 | 四川长虹电器股份有限公司 | Encryption and decryption method based on Bluetooth communication |
CN112487461B (en) * | 2020-12-07 | 2023-06-09 | 重庆电子工程职业学院 | Data encryption method |
CN112738033A (en) * | 2020-12-17 | 2021-04-30 | 中国人民解放军战略支援部队信息工程大学 | Encryption and decryption method for WAV voice file |
US20220269807A1 (en) * | 2021-02-22 | 2022-08-25 | EMC IP Holding Company LLC | Detecting unauthorized encryptions in data storage systems |
CN112861164B (en) * | 2021-03-16 | 2021-12-28 | 上海纬百科技有限公司 | Encryption method, decryption method, data processing method, terminal and encryption machine |
CN113572755A (en) * | 2021-07-21 | 2021-10-29 | 揭阳职业技术学院 | Intelligent media terminal data secure transmission method |
CN114679324B (en) * | 2021-12-15 | 2024-03-12 | 国机工业互联网研究院(河南)有限公司 | Data exchange method, tool, system, equipment and medium |
CN114553532A (en) * | 2022-02-22 | 2022-05-27 | 深圳壹账通智能科技有限公司 | Data secure transmission method and device, electronic equipment and storage medium |
CN116345676B (en) * | 2023-02-15 | 2024-02-06 | 西安宇翔电气工程有限公司 | Intelligent monitoring system for power distribution cabinet |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1503503A (en) * | 2002-11-26 | 2004-06-09 | ���µ�����ҵ��ʽ���� | Method and device for data encipher/deciphering |
CN101895390A (en) * | 2010-02-05 | 2010-11-24 | 上海复旦天臣新技术有限公司 | Method, device and system for encryption and decryption |
CN104363091A (en) * | 2014-12-01 | 2015-02-18 | 国家计算机网络与信息安全管理中心 | Encryption and decryption method capable of automatically retrieving keys and selecting algorithms |
-
2016
- 2016-02-04 CN CN201610079284.7A patent/CN105760765B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1503503A (en) * | 2002-11-26 | 2004-06-09 | ���µ�����ҵ��ʽ���� | Method and device for data encipher/deciphering |
CN101895390A (en) * | 2010-02-05 | 2010-11-24 | 上海复旦天臣新技术有限公司 | Method, device and system for encryption and decryption |
CN104363091A (en) * | 2014-12-01 | 2015-02-18 | 国家计算机网络与信息安全管理中心 | Encryption and decryption method capable of automatically retrieving keys and selecting algorithms |
Also Published As
Publication number | Publication date |
---|---|
CN105760765A (en) | 2016-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105760765B (en) | Data ciphering method, device and data decryption method, device | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
US9158931B2 (en) | Block encryption method and block decryption method having integrity verification | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
CN108111524A (en) | Terminal data protection method and system based on private key dynamic generation mechanism | |
Raigoza et al. | Evaluating performance of symmetric encryption algorithms | |
CN108134673B (en) | Method and device for generating white box library file | |
CN108111622B (en) | Method, device and system for downloading white box library file | |
CN112272314B (en) | Method, device, equipment and medium for safely transmitting video in video network | |
WO2017006118A1 (en) | Secure distributed encryption system and method | |
Fauziah et al. | Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application | |
Mohammad et al. | A comparative study between modern encryption algorithms based on cloud computing environment | |
JP5992651B2 (en) | ENCRYPTION METHOD, PROGRAM, AND SYSTEM | |
TWI488478B (en) | Techniques for performing symmetric cryptography | |
CN111314270B (en) | Data encryption and decryption method based on validity period uniform distribution symmetric algorithm | |
CN109255225A (en) | Hard disc data security control apparatus based on dual-identity authentication | |
CN111314052B (en) | Data encryption and decryption method | |
Oli et al. | Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage | |
Kaur et al. | Multiphase and multiple encryption | |
JP6631989B2 (en) | Encryption device, control method, and program | |
KR101148560B1 (en) | Apparatus and method for encryption using mixture of bit data | |
Tirmizi et al. | Developing an API for Block-Cipher Encryption powered by Supervised Learning | |
Soni | Performance Analysis of Cascaded Hybrid Symmetric Encryption Models | |
CN104468621B (en) | A kind of method and its encryption device for improving cryptosecurity degree |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N Applicant after: Beijing Zhiyuan Internet software Limited by Share Ltd Address before: 100195 Haidian District, Beijing, North Village, a road, a static core Park, block N Applicant before: Beijing Seeyon Software Co., Ltd. |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant |