CN105871542A - Encryption and decryption method of ciphertext - Google Patents

Encryption and decryption method of ciphertext Download PDF

Info

Publication number
CN105871542A
CN105871542A CN201610177523.2A CN201610177523A CN105871542A CN 105871542 A CN105871542 A CN 105871542A CN 201610177523 A CN201610177523 A CN 201610177523A CN 105871542 A CN105871542 A CN 105871542A
Authority
CN
China
Prior art keywords
ciphertext
address list
information
text
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610177523.2A
Other languages
Chinese (zh)
Inventor
彭长根
马海峰
田有亮
丁红发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN201610177523.2A priority Critical patent/CN105871542A/en
Publication of CN105871542A publication Critical patent/CN105871542A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption method of a ciphertext. According to the method, a randomness database of family names and given names is produced; a secret key which is generated by a plaintext through a symmetric encryption algorithm and a secret key generator is encrypted and is generated into ciphertext messy code; the messy code is segmented and filled, then is converted into an address book and then is generated into the original plaintext by an inverse converter. According to the method, the plaintext is hidden in the address book text; the plaintext information is hidden; the encryption information is hidden; dual security guarantee is realized; encryption and encryption hide of the plaintext information are realized; the ciphertext messy code encrypted by a security encryption algorithm is hidden in the text; the high redundancy demands on videos and pictures are solved; the conversion efficiency is very high; there is no any demand on the original information; and the realization technique of generating the meaningful ciphertext is independent of the format of the text and is more flexible.

Description

A kind of encrypting and decrypting method of ciphertext
Technical field
The present invention relates to the encrypting and decrypting method of a kind of ciphertext, belong to information communication security security technology area.
Background technology
It it is to realize information and embed by changing some feature of text or form with text for carrier, it is desirable to this embedding operation The gap of people's vision will not be caused.But text is almost without redundant space, the most unformatted plain text document.And Text message is again the mode of intelligence transmission of the most frequently used information;
Information hiding with text as carrier generally has following a few class: basic file structure, based on text sequence form, based on The processing method of natural language.
Method based on file structure, this method is unrelated with text itself.Relate generally to file structure feature, such as PDF literary composition Redundant space in the cross reference table of shelves and cross reference table initial address;Stacking form in html file, and label Not not differentiating between of the alphabet size of name and attribute-name;Attribute and the sequence of element in the labelling of XML file, and attribute itself; The Path attribute of Cookie file and Secure attribute;In WORD document between end-text and begin-text, EOF After labelling.This method utilizes particular file format and specific, constructs private communication channel.Utilize the redundancy in file format Space or format characteristic hide information, and be attained by reader is transparent.
Based on text typesetting format, utilize the redundancy principle of people's vision, the form of text is carried out trickle change, and does not causes Vision difference.As: font type, paragraph spacing, form data, font color, font size, line space, between word spacing, White underscore etc..
Method based on file structure, it is desirable to containing redundant space in text structure, this method can be only applied to specific literary composition Under part form environment, once form converted, then hide information and also can disappear therewith;
The space provided based on this mode of text typesetting format is little, and by carrier own content number quantitative limitation.At file Form is changed, or when agreeing to adjust text formatting, hiding information is easily lost.
The composition information utilizing text carries out Information hiding, although naked eyes are difficult to distinguish, and will not change original implication of text, But, embedded mode is the most dull, easily checks by program
Hidden method based on literal code: according to the self-defined reserved code set of character coding standard characteristic;According to reserved Code set technology L (number of element in set), self-defined L scale coding;Self-defined from L scale coding to reserved The bijective function f of code set and inverse function f-1 thereof;The method that self-defined reserved coded string embeds in text message; Secret information is converted to reserved coding, and is embedded in text message carrier, obtain concealed object, reach information of hiding Purpose;From concealed object, extract reserved coding, and be converted to secret information;
Although applying coding principle in the method principle, and avoid the existing Information hiding side with text message as carrier Method is necessarily dependent upon the limitation of particular file format, but, the method can only embed in the text being originally intended to justice to be hidden Information, and can not i.e. realize information of hiding, realize again the transformation to raw information structure and content;
The Information hiding of grammatical and semantic method, is generally replaced by near synonym and is hidden, and word is looked like difference by this method Require the most harsh, and for fear of synonymicon dimension-limited, so embedding rate and safety are not the most the highest.
Summary of the invention
The technical problem to be solved in the present invention is: provide the encrypting and decrypting method of a kind of ciphertext, produces redundancy few, and efficiency is high, It is beneficial to actual utilization, text can be independently generated, use scene not limit, and efficiency is high.
The technical scheme that the present invention takes is: the encrypting and decrypting method of a kind of ciphertext, and the method includes dictionary generation module, leads to News record modular converter and ciphertext modular converter, encrypting step is as follows:
(1) dictionary generation module: collect Chinese citizen's surname and conventional name, generates the data base of correspondence respectively, removes The data that randomness is the strongest, the foundation of dictionary, meet the reasonability of name, including conventional property, the reading of Chinese population name Sound, meaning;
(2) plaintext needing to be transmitted is obtained;
(3) encryption: use symmetric encipherment algorithm and key generator to generate plaintext in the double secret key step (2) of encrypting plaintext It is encrypted generation ciphertext mess code;
(4) address list modular converter: determine maximum conversion ratio according to the length of mess code ciphertext to be converted, ciphertext mess code is entered Row segmentation and filling, convert ciphertext into address list by conversion ratio according to transfer algorithm, every address list information include name, Landline telephone, mobile phone and social account data, the data after conversion do not have any difference with the most seen address list;
(5) ciphertext modular converter: on the basis of inverse conversion algorithm, bilingual dictionary, is original by address list backward recovery Ciphertext, then gone out actual cleartext information by decryptor decryption;
To ciphertext mess code segmentation and filling and conversion address list, every 24 16 system ciphertext mess code information in step (2) It is one section, if inadequate 24 the 16 system numbers of last segmentation, causes final communication to not increase the length of cipher-text information Record is covered close amount and is reduced, and filling mode uses the way of " borrowing forward " to carry out the filling of final stage data;Each section of ciphertext The address list record that mess code is convertible in address list text;By the front two in each section of ciphertext mess code, corresponding to surname N field in family name data base, finds the surname of correspondence;By three to five in each section of ciphertext mess code, corresponding to number of person names According to the N field in storehouse, find the name of correspondence;Remaining 16 system numbers are entered by figure place and structure in conjunction with each data Line number value is changed, and generates corresponding address list information.
Beneficial effects of the present invention:
(1) present invention uses technique scheme so that cleartext information can be hidden into meaningful, readable address list literary composition In Ben, due to actual be hidden in address list be use AES encrypted after cipher-text information, so not only concealing Cleartext information, and Information hiding will be encrypted, reaching dual safety guarantee, other people cannot learn communication after obtaining address list Record is concealed with ciphertext, and, if changing out ciphertext by machine, there is no the key of AES, cannot obtain true yet Cleartext information;
(2) present invention is simultaneously achieved the encryption to cleartext information and enciphering hiding;
(3) the ciphertext mess code after the present invention will encrypt through secure cryptographic algorithm, is hidden in text, solves regarding Frequency and the requirement of picture High redundancy;
(4) present invention by this can generate meaningful ciphertext realize technology, on the basis of hiding information, generation has The address list text of meaning, it is achieved that not only hide cipher-text information, and be independent of and existing text, it is only necessary to provide and want Carry out the cipher-text information changed, and information is changed completely, there is high efficiency;
(5) present invention is further, owing to the technology that realizes of the meaningful ciphertext of this generation is entirely autonomous, it is not necessary to right Raw information has any requirement, and the technology that realizes of the meaningful ciphertext of this generation is not need to rely on the form of text, cleverer Live.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart of the present invention;
Fig. 2 is the use flow chart of the present invention;
Fig. 3 is the Outline Design figure of the present invention.
Detailed description of the invention
Embodiment 1: as shown in FIG. 1 to 3, the encrypting and decrypting method of a kind of ciphertext, the method include dictionary generation module, Address list modular converter and ciphertext modular converter, encrypting step is as follows:
(1) dictionary generation module: collect Chinese citizen's surname and conventional name, generates the data base of correspondence respectively, removes The data that randomness is the strongest, the foundation of dictionary, meet the reasonability of name, including conventional property, the reading of Chinese population name Sound, meaning;
(2) plaintext needing to be transmitted is obtained;
(3) encryption: use symmetric encipherment algorithm and key generator to generate plaintext in the double secret key step (2) of encrypting plaintext It is encrypted generation ciphertext mess code;
(4) address list modular converter: determine maximum conversion ratio according to the length of mess code ciphertext to be converted, ciphertext mess code is entered Row segmentation and filling, convert ciphertext into address list by conversion ratio according to transfer algorithm, every address list information include name, Landline telephone, mobile phone and social account data, the data after conversion do not have any difference with the most seen address list;
(5) ciphertext modular converter: on the basis of inverse conversion algorithm, bilingual dictionary and key, by address list backward recovery For original cipher text, then gone out actual cleartext information by decryptor decryption;
To ciphertext mess code segmentation and filling and conversion address list, every 24 16 system ciphertext mess code information in step (2) It is one section, if inadequate 24 the 16 system numbers of last segmentation, causes final communication to not increase the length of cipher-text information Record is covered close amount and is reduced, and filling mode uses the way of " borrowing forward " to carry out the filling of final stage data;Each section of ciphertext The address list record that mess code is convertible in address list text;By the front two in each section of ciphertext mess code, corresponding to surname N field in family name data base, finds the surname of correspondence;By three to five in each section of ciphertext mess code, corresponding to number of person names According to the N field in storehouse, find the name of correspondence;Remaining 16 system numbers are entered by figure place and structure in conjunction with each data Line number value is changed, and generates corresponding address list information.
Certainly, above-mentioned address list, as set form text, present invention may also apply to other set form texts, as shopping list, Detailed list of goods, medicine list etc..
Embodiment 2: address list format text example:
Key generates: input the security parameter of arbitrary character string: 164512121;Input initial key: 50DAC7E4375BA89899FCC3D4BBFEFB9B;Security parameter and initial key generation actual key: 1937CBD97F321D7E2E2748B3BBED6A911589855E5B5491E28A43ACBD 9E11284D, in plain text: FAB69830108696702FB6926DABE13C6FEA1FFFD4C5F8205E727B069ECD83E41E141BC9 3776E3898C1A30ACABBA45E56C592CFF2Fa8FCE907FA47F232402ABC7;Use symmetric cryptography Algorithm obtains ciphertext mess code: 50DAC7E4375BA89899FCC3D4BBFEFB9B;The meaningful address list literary composition generated This is as shown in table 1.
Table 1 address list form
Name Age Phone Social account
Poplar is kind 21 15858383930 48873859
Yang Yuying 38 13690689943 3875594746
Decrypting process: input actual key and address list, uses symmetric encipherment algorithm, can obtain in plain text.

Claims (2)

1. the encrypting and decrypting method of a ciphertext, it is characterised in that: the method includes dictionary generation module, address list modular converter With ciphertext modular converter, encrypting step is as follows:
(1) dictionary generation module: collect Chinese citizen's surname and conventional name, generates the data base of correspondence respectively, removes The data that randomness is the strongest, the foundation of dictionary, meet the reasonability of name, including conventional property, the reading of Chinese population name Sound, meaning;
(2) plaintext needing to be transmitted is obtained;
(3) encryption: use symmetric encipherment algorithm and key generator to generate plaintext in the double secret key step (2) of encrypting plaintext It is encrypted generation ciphertext mess code;
(4) address list modular converter: determine maximum conversion ratio according to the length of mess code ciphertext to be converted, ciphertext mess code is entered Row segmentation and filling, convert ciphertext into address list by conversion ratio according to transfer algorithm, every address list information include name, Landline telephone, mobile phone and social account data, the data after conversion do not have any difference with the most seen address list;
(5) ciphertext modular converter: on the basis of inverse conversion algorithm, bilingual dictionary, is original by address list backward recovery Ciphertext, then gone out actual cleartext information by decryptor decryption.
The encrypting and decrypting method of a kind of ciphertext the most according to claim 1, it is characterised in that: in step (2) to ciphertext disorderly Code division section and filling and conversion address list, every 24 16 system ciphertext mess code information are one section, if last point Inadequate 24 the 16 system numbers of section, cause final address list to cover the reduction of close amount to not increase the length of cipher-text information, fill out The mode of filling uses the way of " borrowing forward " to carry out the filling of final stage data;Each section of ciphertext mess code is convertible into An address list record in address list text;By the front two in each section of ciphertext mess code, corresponding to surname data base In N field, find correspondence surname;By three to five in each section of ciphertext mess code, corresponding to name data base In N field, find correspondence name;Remaining 16 system numbers are carried out by figure place and structure in conjunction with each data Numerical value is changed, and generates corresponding address list information.
CN201610177523.2A 2016-03-25 2016-03-25 Encryption and decryption method of ciphertext Pending CN105871542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610177523.2A CN105871542A (en) 2016-03-25 2016-03-25 Encryption and decryption method of ciphertext

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610177523.2A CN105871542A (en) 2016-03-25 2016-03-25 Encryption and decryption method of ciphertext

Publications (1)

Publication Number Publication Date
CN105871542A true CN105871542A (en) 2016-08-17

Family

ID=56625262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610177523.2A Pending CN105871542A (en) 2016-03-25 2016-03-25 Encryption and decryption method of ciphertext

Country Status (1)

Country Link
CN (1) CN105871542A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360183A (en) * 2017-08-08 2017-11-17 珠海格力电器股份有限公司 A kind of method and device of hiding checking information
CN109948123A (en) * 2018-11-27 2019-06-28 阿里巴巴集团控股有限公司 A kind of image combining method and device
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence
CN103379458A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Number sharing and shielding method and system, mobile terminal and server
CN103825723A (en) * 2014-01-24 2014-05-28 深圳市太和物联信息技术有限公司 Encryption method and device
CN104462990A (en) * 2013-09-13 2015-03-25 腾讯科技(深圳)有限公司 Character string decrypting and encrypting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence
CN103379458A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Number sharing and shielding method and system, mobile terminal and server
CN104462990A (en) * 2013-09-13 2015-03-25 腾讯科技(深圳)有限公司 Character string decrypting and encrypting method and device
CN103825723A (en) * 2014-01-24 2014-05-28 深圳市太和物联信息技术有限公司 Encryption method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360183A (en) * 2017-08-08 2017-11-17 珠海格力电器股份有限公司 A kind of method and device of hiding checking information
CN109948123A (en) * 2018-11-27 2019-06-28 阿里巴巴集团控股有限公司 A kind of image combining method and device
CN109948123B (en) * 2018-11-27 2023-06-02 创新先进技术有限公司 Image merging method and device
CN112651214A (en) * 2020-08-28 2021-04-13 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read
CN112651214B (en) * 2020-08-28 2023-03-28 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read

Similar Documents

Publication Publication Date Title
CN106254074A (en) A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
US11902417B2 (en) Computer-implemented method of performing format-preserving encryption of a data object of variable size
Alsaidi et al. Compression multi-level crypto stego security of texts utilizing colored email forwarding
Dai et al. Text Steganography System Using Markov Chain Source Model and DES Algorithm.
CN108418683A (en) A kind of carrier-free text steganography method based on feature of Chinese characters structure
Kabetta et al. Information hiding in CSS: a secure scheme text-steganography using public key cryptosystem
Kataria et al. ECR (encryption with cover text and reordering) based text steganography
CN105871542A (en) Encryption and decryption method of ciphertext
CN102447558B (en) Encryption method using random sequence on-demand and having misleading function
CN106375083A (en) Encryption-decryption method based on Base64 and device thereof
Mahato et al. A modified approach to text steganography using HyperText markup language
Malik et al. A high capacity text steganography scheme based on huffman compression and color coding
KR101584127B1 (en) System and method for deniable encryption
CN108632138A (en) A kind of commodity network safety communicating method based on image latent writing art
Singh A new approach to enhance avalanche effect in aes to improve computer security
CN102571323A (en) Non-standard character repertoire processing method and device, and system adopting same
Balajee UNICODE and Colors Integration tool for Encryption and Decryption
Binu et al. Security plugin for Mozilla which integrates cryptography and steganography features
Khami Unlimited size of english plain text-in-text hiding algorithm
Swapnali et al. A cryptographic key generation on a 2D graphics using RGB pixel shuffling and transposition
Aggarwal et al. Adaptive approach for Information Hiding in WWW pages
Din et al. A comparative review on data hiding schemes
Raphael et al. Secured crypto-stegano communication through unicode
Mohamed et al. A novel method to protect content of microsoft word document using cryptography and steganography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817