CN106027553A - Encryption/decryption method based on dynamic password - Google Patents

Encryption/decryption method based on dynamic password Download PDF

Info

Publication number
CN106027553A
CN106027553A CN201610508235.0A CN201610508235A CN106027553A CN 106027553 A CN106027553 A CN 106027553A CN 201610508235 A CN201610508235 A CN 201610508235A CN 106027553 A CN106027553 A CN 106027553A
Authority
CN
China
Prior art keywords
dynamic password
ciphertext
dynamic
token
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610508235.0A
Other languages
Chinese (zh)
Other versions
CN106027553B (en
Inventor
刘兴丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Ji Shun Xin Technology Development Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610508235.0A priority Critical patent/CN106027553B/en
Publication of CN106027553A publication Critical patent/CN106027553A/en
Application granted granted Critical
Publication of CN106027553B publication Critical patent/CN106027553B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys

Abstract

The invention discloses an encryption/decryption method based on a dynamic password. The encryption/decryption method based on the dynamic password comprises the following steps: encrypting information content through an encryption algorithm to form the first ciphertext; operating the first ciphertext and the first dynamic password in the first dynamic password token through the first encryption operational formula to form the second ciphertext; operating the first dynamic password and the second dynamic password in the second dynamic password token through the second encryption operational formula to form the plaintext; forming a password message through the plaintext and the second ciphertext, wherein each step of encryption process contains the detailed time information of using the dynamic password in encryption; forming the file information through the password message and the time information; selecting bit number with the same amount as the value in the file information through the adoption of the value of the ciphertext dynamic password generated by the ciphertext dynamic password token, and generating a section of bit code, recording the generating time of the bit code, and recording the generating time of the ciphertext dynamic password; generating a random dynamic password by a random dynamic password token, generating a section of messy code according to the value displayed by the random dynamic password, wherein the bit number of the messy code is equal to the value displayed by the random dynamic password; and recording the generating time of the random dynamic password.

Description

A kind of encryption and decryption method based on dynamic password
Technical field
The present invention relates to AES field, particularly to utilizing the disposable of dynamic password and time synchronizing characteristics to letter The method that breath encrypts and decrypts.
Background technology
The quantum communications of legend perfectly solve the safety problem in communication transmission process, and following communication will more come The safest and reliable.
But, in the common computer user using legacy network and mobile subscriber.Or exist by the attack of hacker Risk.For the information of some need for confidentiality, prevent from stealing the most critically important.If the important informations such as some passwords are stolen, meeting The property of people is brought huge loss.
Summary of the invention
It is an object of the invention to provide a kind of encryption and decryption method based on dynamic password, by many group dynamic passwords pair Information is encrypted, deciphers.
The technical scheme is that a kind of encryption method based on dynamic password, information content is implemented by AES Encryption, forms the first ciphertext;
The first dynamic password in first ciphertext and the first dynamic password token forms the by the first cryptographic calculation formula operation Two ciphertexts;
The computing by the second cryptographic calculation formula of the second dynamic password in first dynamic password and the second dynamic password token Formed in plain text;
In plain text with the second ciphertext composition cipher text, in each step ciphering process, when all including encryption, use dynamic password Concrete temporal information, cipher text and temporal information composing document information;
The numerical value of the ciphertext dynamic password that ciphertext dynamic password token generates is used in selecting file information and numerical value equal amount Bit number, and generate one section of bit code;Record the time that bit code generates;And record ciphertext dynamic password generate time Between;
Random dynamic puzzle token generates random dynamic puzzle, the numerical value shown according to random dynamic puzzle, generates one section of mess code, The numerical value that the bit number of mess code shows equal to random dynamic puzzle;And record the time that random dynamic puzzle generates;
After generating one section of bit code, automatically generating after one section of mess code is connected to bit code, many group bit code combine before and after mess code, Complete to fileinfo whole choose after, form message information to be sent;
A kind of decryption method based on dynamic password, determines putting in order of bit code and mess code;
The time generated according to ciphertext dynamic password and random dynamic puzzle, decryption terminal is searched ciphertext in the corresponding time and moves The ciphertext dynamic password of state cipher token and the concrete numerical value of the random dynamic puzzle of random dynamic puzzle token;
According to numerical value, message information is carried out classification searching, mess code information is deleted, restore the letter of the file after encryption Breath;
During being decrypted cipher text, according to temporal information, decryption terminal equipment is transferred out and encryption from memorizer Second dynamic password of synchronized update in terminal unit;
After to reversely deciphering computing in plain text, draw the value of the first dynamic password;
And the second ciphertext is deciphered according to the value of the first dynamic password, reduces, obtain the first ciphertext;Decryption terminal equipment synchronizes The first dynamic password updated, plays checking, the effect of verification;
AES for the first ciphertext is decrypted, and restores original information content.
Further, after generating one section of bit code or one section of mess code, automated randomized generation one in the dynamic token of position Serial number, carries out name placement according to the numerical value of serial number to bit code or mess code;The most forward, really by the least sequence of digital value Determine the clooating sequence of bit code and mess code.
Further, by ciphertext dynamic password token and mess code dynamic password token to message information computing again, can To generate new message information, calculating process can be once or repeatedly;The ciphertext dynamic password token used and mess code Dynamic password token can be same, it is also possible to is other ciphertext dynamic password token and mess code dynamic password token.
Further, dynamic password token automatically generates a dynamic password at set intervals, and this time span is with the second For ultimate unit;Dynamic token is respectively stored in ciphering terminal and decryption terminal, and synchronized update runs.
Further, dynamic password token is integrated with message information runs within one device.
Further, the original text of fileinfo can directly be entered by ciphertext dynamic password token and random dynamic puzzle token Row encryption.
Further, the numerical value of ciphertext dynamic password in the selecting file information with the bit number of numerical value equal amount Group, each group of bit number is made up of multiple bit informations.
Further, AES includes: symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm.
Further, mess code is the irregular stochastic and dynamic code of stochastic generation.
In embodiments of the present invention: by the dynamic password in multiple dynamic password tokens, information realization encryption is conciliate Close, in this process.Dynamic password and token are respectively stored in ciphering terminal and decryption terminal, are not involved in transmission.Pass through In fileinfo, insert reducible mess code, when information is transmitted, automatically information has been carried out change and has upset.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for From the point of view of those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart of a kind of based on dynamic password the encryption method that the embodiment of the present invention is introduced from terminal point.
Fig. 2 is the flow chart of a kind of based on dynamic password the decryption method that the embodiment of the present invention is introduced from terminal point.
Fig. 3 is the flow chart of a kind of based on dynamic password the encryption method that the embodiment of the present invention is introduced from terminal point.
Fig. 4 is the flow chart of a kind of based on dynamic password the encryption method that the embodiment of the present invention is introduced from terminal point.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only The embodiment of a present invention part rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under not making creative work premise, all should belong to the model of present invention protection Enclose.
As it is shown in figure 1, a kind of encryption method based on dynamic password, it is characterised in that by multiple dynamic password tokens Dynamic password realize encryption to information, described method includes:
Information content is implemented encryption by S11 AES, forms the first ciphertext;
S12 the first ciphertext is formed by the first cryptographic calculation formula operation with the first dynamic password in the first dynamic password token Second ciphertext;
The fortune by the second cryptographic calculation formula of the second dynamic password in S13 the first dynamic password and the second dynamic password token Calculate and formed in plain text;
S14 forms cipher text with the second ciphertext in plain text, in each step ciphering process, uses the closeest when all including encryption The concrete temporal information of code, cipher text and temporal information composing document information;
The numerical value of the ciphertext dynamic password that S15 ciphertext dynamic password token generates is used in selecting file information and numerical value equal numbers The bit number of amount, and generate one section of bit code;Record the time that bit code generates;And record ciphertext dynamic password generate time Between;
S16 random dynamic puzzle token generates random dynamic puzzle, the numerical value shown according to random dynamic puzzle, generates one section of unrest Code, the numerical value that the bit number of mess code shows equal to random dynamic puzzle;And record the time that random dynamic puzzle generates;
S17 generates after one section of bit code, automatically generates after one section of mess code is connected to bit code, group before and after many group bit code and mess code Close, complete to fileinfo whole choose after, form message information to be sent.
As in figure 2 it is shown, a kind of decryption method based on dynamic password, it is characterised in that by multiple dynamic password tokens Dynamic password realize deciphering to information, described method includes:
S21 determines putting in order of bit code and mess code;
The time that S22 generates according to ciphertext dynamic password and random dynamic puzzle, search in the corresponding time close in decryption terminal The ciphertext dynamic password of literary composition dynamic password token and the concrete numerical value of the random dynamic puzzle of random dynamic puzzle token;
S23, according to numerical value, carries out classification searching to message information, mess code information is deleted, restore the file after encryption Information;
During cipher text is decrypted by S24, according to temporal information, decryption terminal equipment is transferred out from memorizer and adds Second dynamic password of synchronized update in close terminal unit;
After S25 is by reversely deciphering computing to plaintext, draw the value of the first dynamic password;
Second ciphertext is deciphered, is reduced by S26 the value according to the first dynamic password, obtains the first ciphertext;In decryption terminal equipment First dynamic password of synchronized update, plays checking, the effect of verification;
S27 is decrypted for the AES of the first ciphertext, restores original information content.
As it is shown on figure 3, S18 is after generating one section of bit code or one section of mess code, automated randomized generation in the dynamic token of position One serial number, carries out name placement according to the numerical value of serial number to bit code or mess code;More leaned on by the least sequence of digital value Before, determine the clooating sequence of bit code and mess code.
S19, can be generated message information computing again by ciphertext dynamic password token and mess code dynamic password token New message information, calculating process can be once or repeatedly;The ciphertext dynamic password token used and mess code are the closeest Code token can be same, it is also possible to is other ciphertext dynamic password token and mess code dynamic password token.
As shown in Figure 4, S101 dynamic password token automatically generates a dynamic password, this time span at set intervals With the second as ultimate unit;Dynamic token is respectively stored in ciphering terminal and decryption terminal, and synchronized update runs.
S102 dynamic password token is integrated with message information to be run within one device.
The original text of fileinfo can directly be added by S103 ciphertext dynamic password token and random dynamic puzzle token Close.
The numerical value of S104 ciphertext dynamic password is used for the bit array in selecting file information with numerical value equal amount, each Group bit number is made up of multiple bit informations.
S105 AES includes: symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm.
S106 mess code is the irregular stochastic and dynamic code of stochastic generation.

Claims (9)

1. an encryption and decryption method based on dynamic password, it is characterised in that:
A kind of encryption method based on dynamic password, information content is implemented encryption, is formed the first ciphertext by AES;
The first dynamic password in first ciphertext and the first dynamic password token forms the by the first cryptographic calculation formula operation Two ciphertexts;
The computing by the second cryptographic calculation formula of the second dynamic password in first dynamic password and the second dynamic password token Formed in plain text;
In plain text with the second ciphertext composition cipher text, in each step ciphering process, when all including encryption, use dynamic password Concrete temporal information, cipher text and temporal information composing document information;
The numerical value of the ciphertext dynamic password that ciphertext dynamic password token generates is used in selecting file information and numerical value equal amount Bit number, and generate one section of bit code;Record the time that bit code generates;And record ciphertext dynamic password generate time Between;
Random dynamic puzzle token generates random dynamic puzzle, the numerical value shown according to random dynamic puzzle, generates one section of mess code, The numerical value that the bit number of mess code shows equal to random dynamic puzzle;And record the time that random dynamic puzzle generates;
After generating one section of bit code, automatically generating after one section of mess code is connected to bit code, many group bit code combine before and after mess code, Complete to fileinfo whole choose after, form message information to be sent;
A kind of decryption method based on dynamic password, the time generated according to ciphertext dynamic password and random dynamic puzzle, is solving Close terminal is searched the ciphertext dynamic password of ciphertext dynamic password token in the corresponding time and the random of random dynamic puzzle token The concrete numerical value of dynamic password;
According to numerical value, message information is carried out classification searching, mess code information is deleted, restore the letter of the file after encryption Breath;
During being decrypted cipher text, according to temporal information, decryption terminal equipment is transferred out and encryption from memorizer Second dynamic password of synchronized update in terminal unit;
After to reversely deciphering computing in plain text, draw the value of the first dynamic password;
And the second ciphertext is deciphered according to the value of the first dynamic password, reduces, obtain the first ciphertext;Decryption terminal equipment synchronizes The first dynamic password updated, plays checking, the effect of verification;
AES for the first ciphertext is decrypted, and restores original information content.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that position dynamic token is real Executing location, described method includes: after generating one section of bit code or one section of mess code, automated randomized generation one in the dynamic token of position Individual serial number, carries out name placement according to the numerical value of serial number to bit code or mess code;It is the most forward by the least sequence of digital value, Determine the clooating sequence of bit code and mess code.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that repeatedly encrypt, described side Method includes: by ciphertext dynamic password token and mess code dynamic password token to message information computing again, can generate new Message information, calculating process can be once or repeatedly;The ciphertext dynamic password token used and the order of mess code dynamic password Board can be same, it is also possible to is other ciphertext dynamic password token and mess code dynamic password token.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that time of day, described side Method includes: dynamic password token automatically generates a dynamic password at set intervals, and this time span is with the second as ultimate unit; Dynamic token is respectively stored in ciphering terminal and decryption terminal, and synchronized update runs.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that integration of equipments, described side Method includes: dynamic password token is integrated with message information to be run within one device.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that encryption submethod, described Method includes: the original text of fileinfo can be directly encrypted by ciphertext dynamic password token and random dynamic puzzle token.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that encryption unit size is entered Row is arranged, and described method includes: the numerical value of ciphertext dynamic password is used for the bit in selecting file information with numerical value equal amount Array, each group of bit number is made up of multiple bit informations.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that information content is implemented Conventional cryptography, described method includes: AES includes: symmetry encryption algorithm and unsymmetrical tridiagonal matrix algorithm.
A kind of encryption method based on dynamic password the most according to claim 1, it is characterised in that mess code and bit code Matter is consistent, simply has difference in reflection, and described method includes: mess code is the irregular stochastic and dynamic code of stochastic generation.
CN201610508235.0A 2016-07-02 2016-07-02 A kind of encryption and decryption method based on dynamic password Expired - Fee Related CN106027553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610508235.0A CN106027553B (en) 2016-07-02 2016-07-02 A kind of encryption and decryption method based on dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610508235.0A CN106027553B (en) 2016-07-02 2016-07-02 A kind of encryption and decryption method based on dynamic password

Publications (2)

Publication Number Publication Date
CN106027553A true CN106027553A (en) 2016-10-12
CN106027553B CN106027553B (en) 2019-05-03

Family

ID=57105953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610508235.0A Expired - Fee Related CN106027553B (en) 2016-07-02 2016-07-02 A kind of encryption and decryption method based on dynamic password

Country Status (1)

Country Link
CN (1) CN106027553B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964899A (en) * 2018-07-01 2018-12-07 刘兴丹 A kind of method, apparatus of dynamic formula and the timing Encryption Algorithm of more synchronous dynamic passwords
CN110290119A (en) * 2019-06-10 2019-09-27 北京信安世纪科技股份有限公司 A kind of JSON message encryption method, decryption method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
CN104202736A (en) * 2014-08-26 2014-12-10 东南大学常州研究院 Mobile terminal short message end-to-end encryption method oriented to Android system
CN104579646A (en) * 2015-01-30 2015-04-29 南京法威克信息科技有限公司 Limited gibberish text one-way conversion method and encryption/decryption application thereof
CN105656626A (en) * 2016-03-28 2016-06-08 陈剑辉 Reverse reconstruction encryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
CN104202736A (en) * 2014-08-26 2014-12-10 东南大学常州研究院 Mobile terminal short message end-to-end encryption method oriented to Android system
CN104579646A (en) * 2015-01-30 2015-04-29 南京法威克信息科技有限公司 Limited gibberish text one-way conversion method and encryption/decryption application thereof
CN105656626A (en) * 2016-03-28 2016-06-08 陈剑辉 Reverse reconstruction encryption method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964899A (en) * 2018-07-01 2018-12-07 刘兴丹 A kind of method, apparatus of dynamic formula and the timing Encryption Algorithm of more synchronous dynamic passwords
CN108964899B (en) * 2018-07-01 2021-03-12 深圳市有传科技有限公司 Method and device for timing encryption of dynamic formula and multiple synchronous dynamic passwords
CN110290119A (en) * 2019-06-10 2019-09-27 北京信安世纪科技股份有限公司 A kind of JSON message encryption method, decryption method and device
CN110290119B (en) * 2019-06-10 2021-11-09 北京信安世纪科技股份有限公司 JSON message encryption method, decryption method and device

Also Published As

Publication number Publication date
CN106027553B (en) 2019-05-03

Similar Documents

Publication Publication Date Title
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN103152362B (en) Based on the large data files encrypted transmission method of cloud computing
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN101464932A (en) Cooperation method and system for hardware security units, and its application apparatus
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN104378198A (en) Voice encryption method based on block cipher system
CN103198261A (en) Method and system for protecting file content security
US20060233361A1 (en) Device, method, and program for encrypton and decryption and recording medium
CN103236934A (en) Method for cloud storage security control
CN109614792A (en) A kind of hierarchial file structure key management method
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
US20160241387A1 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN106850597A (en) A kind of distributed cryptographic method and system
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
CN103501220A (en) Encryption method and device
CN105634729A (en) Mobile phone encryption and decryption method based on bluetooth equipment
CN106027553A (en) Encryption/decryption method based on dynamic password
CN109995519A (en) A kind of quantum key traffic service method and system
KR101602803B1 (en) The encryption and decryption Method of using to polarization
CN109726583A (en) Cloud data base encryption server system
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium
CN112149166B (en) Unconventional password protection method and intelligent bank machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190403

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen Qianhai Ji Shun Xin Technology Development Co., Ltd.

Address before: 650000 Room 201, Room 2, Building 5, Rui Tai Yuan, Dongjie Shenjun District, Guandu District, Kunming City, Yunnan Province

Applicant before: Liu Xingdan

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190503

Termination date: 20210702

CF01 Termination of patent right due to non-payment of annual fee