CN106130717B - A kind of file storage decryption method and device - Google Patents
A kind of file storage decryption method and device Download PDFInfo
- Publication number
- CN106130717B CN106130717B CN201610465910.6A CN201610465910A CN106130717B CN 106130717 B CN106130717 B CN 106130717B CN 201610465910 A CN201610465910 A CN 201610465910A CN 106130717 B CN106130717 B CN 106130717B
- Authority
- CN
- China
- Prior art keywords
- bits
- bit
- new
- last
- mantissa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 230000002441 reversible effect Effects 0.000 claims abstract description 10
- 230000011218 segmentation Effects 0.000 claims abstract description 10
- 229910002056 binary alloy Inorganic materials 0.000 claims description 6
- 239000002131 composite material Substances 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 17
- 238000013461 design Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
Abstract
The invention discloses a kind of file storage decryption method and devices, this method comprises: ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;The mantissa is the last one inadequate eight binary number, radix subject to last 8 bits in the multiple 8 bit;By the multiple 8 bit since the quasi- radix, same or position is carried out according to Fibonacci sequence rule from back to front and is calculated, obtain multiple 8 new bits;It combines the 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original plaintext.This method, which is realized, simplifies decrypting process, and reduces cost.
Description
Technical field
The present invention relates to data storage security technical fields, store decryption method and device more particularly to a kind of file.
Background technique
Currently, existing cloud service provider can provide underlying cryptographic cipher key scheme to protect application and development based on cloud
And service or they all transfer to their user to determine these safeguard measures.When cloud service provider is healthy and strong close to supporting
When the plan development of key management, need to do more work to overcome the obstacle of use.Traditional file data stores reversible encryption
Generally use two ways: exclusive or encryption or displacement encryption, both decryption need key that could decrypt, and key also needs
Protection, backup and recovery and later maintenance, comparatively laborious, cost is relatively high.Unsuitable key storage may endanger all
Encryption data, Lost Security Key mean to be lost the data that these keys are protected, so also needing to be implemented carrying out safety backup and extensive
Multiple solution, if access key storage, also need role's separation help to access control etc. the problems such as and challenge.Pass
Key must be used in the file data decrypting process of system, can be just decrypted, be decrypted using key, process using key
It is comparatively laborious, higher cost.
Summary of the invention
The object of the present invention is to provide a kind of file storage decryption method and devices, to realize simplified decrypting process, and drop
Low cost.
In order to solve the above technical problems, the present invention provides a kind of file storage decryption method, this method comprises:
Ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, after segmentation
To multiple 8 bits and a mantissa;The mantissa be the last one inadequate eight binary number, the multiple 8
Radix subject to last 8 bits in binary number;
By the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci sequence rule into
Row is same or position calculates, and obtains multiple 8 new bits;
It combines the 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original bright
Text.
Preferably, the method also includes: initial data is read out from database.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression
It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, it is described by the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci
Ordered series of numbers rule carries out same or position and calculates, and obtains multiple 8 new bits, comprising:
By the quasi- radix and 8 bit of penultimate carry out with or position calculate, obtain new the one 8 two into
New the one 8 bit and 8 bit of third last are carried out same or position and calculated, obtained new by number processed
New the 2nd 8 bit and fourth from the last 8 bits are carried out same or position and counted by the 2nd 8 bit
It calculates, obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
The present invention also provides a kind of files to store decryption device, which includes:
Divide module, for ciphertext to be split according to 8, if the ciphertext cannot be divided into integer 8 two into
Number processed obtains multiple 8 bits and a mantissa after segmentation;The mantissa is the last one inadequate eight binary system
It counts, radix subject to the last one 8 bit in the multiple 8 bit;
Computing module, for by the multiple 8 bit since the quasi- radix, from back to front according to striking Poona
Contract ordered series of numbers rule carries out same or position and calculates, and obtains multiple 8 new bits;
Composite module for combining the 8 new bits in reverse order, and connects the upper quasi- cardinal sum tail
Number, obtains original plaintext.
Preferably, described device further include:
Read module, for reading out initial data from database.
Preferably, the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ is expression
It carries out same or position and calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Preferably, the computing module, for by the multiple 8 bit since the quasi- radix, from backward
It is preceding to carry out the calculating of same or position according to Fibonacci sequence rule, obtain multiple 8 new bits, comprising:
The computing module is calculated for the quasi- radix and 8 bit of penultimate to be carried out same or position, is obtained
To the one 8 new bit, new the one 8 bit and 8 bit of third last are carried out same
Or position calculates, and obtains the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 two into
Number processed carries out same or position and calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
A kind of file storage decryption method provided by the present invention and device, ciphertext are split according to 8, if described
Ciphertext cannot be divided into 8 bits of integer, and multiple 8 bits and a mantissa are obtained after segmentation;The mantissa
For the last one inadequate eight binary number, base subject to last 8 bits in the multiple 8 bit
Number;By the multiple 8 bit since the quasi- radix, from back to front according to Fibonacci sequence rule carry out with or
Position calculates, and obtains multiple 8 new bits;It combines the 8 new bits in reverse order, and connects the upper standard
Cardinal sum mantissa, obtains original plaintext.As it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci to the ciphertext in file storage
Algorithm is decrypted, and is decrypted using Fibonacci design method and same or calculating is retrodicted, it is exactly more for retrodicting Fibonacci design method
A 8 bit carries out same or position according to Fibonacci sequence rule from back to front since 8 bits reciprocal
It calculates, obtains multiple new binary numbers, due to being calculated using Fibonacci sequence rule and same or position, decrypting process is without making
With key, reaching reduces cost, also simplifies decryption oprerations, that is, avoids decrypting using code key, reaches decryption simple to operation
Operation so the present invention, which realizes, simplifies decrypting process, and reduces cost.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow diagram that a kind of file provided by the present invention stores decryption method;
Fig. 2 is decrypting process schematic diagram;
Fig. 3 is a kind of structural schematic diagram of file storage decryption device provided by the present invention.
Specific embodiment
Core of the invention is to provide a kind of file storage decryption method and device, to realize simplified decrypting process, and drops
Low cost.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is the flow diagram that a kind of file provided by the present invention stores decryption method, this method
Include:
S11: ciphertext is split according to 8, if ciphertext cannot be divided into 8 bits of integer, after segmentation
To multiple 8 bits and a mantissa;
Wherein, mantissa is the last one inadequate eight binary number, last 8 in multiple 8 bits
Radix subject to binary number;
S12: it by multiple 8 bits since quasi- radix, is carried out from back to front according to Fibonacci sequence rule same
Or position calculates, and obtains multiple 8 new bits;
S13: combining 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtains original plaintext.
It is decrypted as it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage, benefit
With retrodict Fibonacci design method and with or calculate and be decrypted, retrodict Fibonacci design method be exactly multiple 8 bits from
8 bits reciprocal start, and carry out same or position according to Fibonacci sequence rule from back to front and calculate, and obtain multiple new
Binary number, due to using Fibonacci sequence rule and with or position calculate, decrypting process reaches reduction without using key
Cost also simplifies decryption oprerations, that is, avoids decrypting using code key, reaches decryption oprerations simple to operation, so of the invention
It realizes and simplifies decrypting process, and reduce cost.
Based on the above method, further, the above method further include: read out initial data from database.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression
Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Further, the process of step S12 specifically: by quasi- radix and 8 bit of penultimate carry out with or
Position calculates, and obtains the one 8 new bit, by new the one 8 bit and 8 bit of third last into
Row with or position calculate, obtain the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 two into
Number processed carries out same or position and calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
The above method can be used for entire cloud management platform, stores to file and is decrypted based on Fibonacci design method, utilize
It retrodicts Fibonacci design method and same or calculating is decrypted, Fibonacci design method is Fibonacci design method.
It is detailed, it is based on method, specific embodiment is as follows:
1, ciphertext by 8 segmentations, if integer cannot be divided into, the last one inadequate eight referred to as mantissa, together
When penultimate be known as base value;If can be divided into just several, the last one binary number is known as base value, is not present
Mantissa;It can refer to Fig. 2, Fig. 2 is decryption schematic diagram;
2, inclusive OR operation is carried out according to Fibonacci sequence rule, is carried out with base value and the previous encryption number of base value
Same or position calculates, and obtains the plaintext number of encryption number, and so on, so that original plaintext ordered series of numbers can be obtained, inclusive OR operation is phase
It is all 1, is not all 0;
3, new ordered series of numbers is combined in order the upper base value of connection and mantissa, data as before encrypting, as original number
According to.Sequence combination said herein is intuitively to see it is that sequence combines in Fig. 2, and convenient for intuitive explanation, the means actually used are down
Sequence combination.
See it is that sequence combines in Fig. 2, the process for obtaining 8 new bits in fact is by retrodicting Fibonacci
Algorithm is carried out with or is calculated, be carried out by quasi- radix and 8 bit of penultimate with or position calculate, obtain new the
New the one 8 bit and 8 bit of third last are carried out same or position and calculated, obtained by one 8 bits
The 2nd 8 new bit, and so on, multiple 8 new bits are obtained, then obtained multiple 8 two newly
In system number, the one 8 new bit is first calculated result, and the 2nd 8 new bit is second calculating
As a result, the sequence of so calculated result is the one 8 bit, the 2nd 8 system number, the 3rd 8 bit etc..But
When combining these new 8 bits, first calculated result is placed on the last one, and second calculated result is placed on reciprocal the
Two, so practical combinations process is that inverted order combines.
Wherein, ciphertext is divided with 8, successively presses inclusive OR bit manipulation from back to front according to Fibonacci sequence rule.
Wherein, it carries out same or position according to Fibonacci sequence rule to calculate, i.e. F (0)=0, F (1)=1, F (n)=F (n-
1) ⊙ F (n-2) (n >=2, n ∈ N*), F (n) are ordered series of numbers, and the expression formula of F (n) is recurrence formula.It is from last in this method
A 8 bit number and 8 bit number of penultimate start recursion.
Wherein, the formula that same or position calculates is a ⊙ b=ab+a'b', and a' is non-a, and b' is non-b, is avoided using code key solution
It is close, to reach decryption oprerations simple to operation.
Referring to FIG. 3, Fig. 3 is a kind of structural schematic diagram of file storage decryption device provided by the present invention, the device packet
It includes:
Divide module 101, for ciphertext to be split according to 8, if ciphertext cannot be divided into 8 binary systems of integer
Number, obtains multiple 8 bits and a mantissa after segmentation;Mantissa be the last one inadequate eight binary number, multiple 8
Radix subject to 8 bit of the last one in bit;
Computing module 102, for by multiple 8 bits since quasi- radix, from back to front according to Fibonacci number
Column rule carries out same or position and calculates, and obtains multiple 8 new bits;
Composite module 103 for combining 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtains
Original plaintext.
It is solved as it can be seen that the device is based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage
It is close, it is decrypted using Fibonacci design method and same or calculating is retrodicted, retrodicting Fibonacci design method is exactly multiple 8 binary systems
Number carries out same or position according to Fibonacci sequence rule from back to front and calculates, obtain more since 8 bits reciprocal
A new binary number, due to being calculated using Fibonacci sequence rule and same or position, decrypting process reaches without using key
Cost is reduced, decryption oprerations are also simplified, that is, avoids decrypting using code key, reaches decryption oprerations simple to operation, so should
Device, which is realized, simplifies decrypting process, and reduces cost.
Based on above-mentioned apparatus, described device further include:
Read module, for reading out initial data from database.
Wherein, the formula that same or position calculates are as follows: a ⊙ b=ab+a'b', a' are non-a, and b' is non-b, and ⊙ carries out same for expression
Or position calculates symbol, a and b are two binary numbers that carry out same or position and calculate.
Above-mentioned apparatus can be used for entire cloud management platform.
Further, computing module is specifically used for quasi- radix and 8 bit of penultimate carrying out same or position meter
It calculates, obtains the one 8 new bit, new the one 8 bit and 8 bit of third last are carried out same
Or position calculates, and obtains the 2nd 8 new bit, by new the 2nd 8 bit and fourth from the last 8 bits
It carries out same or position to calculate, obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits.
To sum up, a kind of file storage decryption method provided by the present invention and device, ciphertext is split according to 8,
If ciphertext cannot be divided into 8 bits of integer, multiple 8 bits and a mantissa are obtained after segmentation;Mantissa is
The last one inadequate eight binary number, radix subject to last 8 bits in multiple 8 bits;It will
Multiple 8 bits carry out same or position according to Fibonacci sequence rule from back to front and calculate, obtain more since quasi- radix
A 8 new bits;It combines 8 new bits in reverse order, and connects Shang Zhun cardinal sum mantissa, obtain original bright
Text.It is decrypted as it can be seen that being based on Fibonacci sequence rule, that is, Fibonacci design method to the ciphertext in file storage, using retrodicting
Fibonacci design method and with or calculate to be decrypted, retrodicting Fibonacci design method is exactly multiple 8 bits from inverse one
A 8 bit starts, from back to front according to Fibonacci sequence rule carry out with or position calculate, obtain multiple new two into
Number processed, due to being calculated using Fibonacci sequence rule and same or position, for decrypting process without using key, reaching reduces cost,
Decryption oprerations are also simplified, that is, avoid decrypting using code key, reach decryption oprerations simple to operation, so the present invention realizes letter
Change decrypting process, and reduces cost.
A kind of file storage decryption method provided by the present invention and device are described in detail above.It answers herein
With a specific example illustrates the principle and implementation of the invention, the explanation of above example is only intended to help to manage
Solve method and its core concept of the invention.It should be pointed out that for those skilled in the art, not departing from
, can be with several improvements and modifications are made to the present invention under the premise of the principle of the invention, these improvement and modification also fall into this hair
In bright scope of protection of the claims.
Claims (6)
1. a kind of file stores decryption method characterized by comprising
Ciphertext is split according to 8, if the ciphertext cannot be divided into 8 bits of integer, is obtained after segmentation more
A 8 bit and a mantissa;The mantissa be the last one inadequate eight binary number, the multiple 8 two into
Radix subject to last 8 bits in number processed;
The quasi- radix and 8 bit of penultimate are carried out same or position to calculate, obtain the one 8 new binary system
Number, by new the one 8 bit and 8 bit of third last carry out with or position calculate, obtain new the
New the 2nd 8 bit and fourth from the last 8 bits are carried out same or position and calculated by 28 bits,
The 3rd 8 new bit is obtained, and so on, obtain multiple 8 new bits;
It combines the multiple 8 new bits in reverse order, and connects the upper quasi- cardinal sum mantissa, obtain original bright
Text.
2. the method as described in claim 1, which is characterized in that further include: initial data is read out from database.
3. the method as described in claim 1, which is characterized in that the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b',
A' is non-a, and b' is non-b, and ⊙ calculates symbol to indicate to carry out same or position, and a and b are two binary systems that carry out same or position and calculate
Number.
4. a kind of file storage decryption device characterized by comprising
Divide module, for ciphertext to be split according to 8, if the ciphertext cannot be divided into 8 bits of integer,
Multiple 8 bits and a mantissa are obtained after segmentation;The mantissa is the last one inadequate eight binary number, described
Radix subject to the last one 8 bit in multiple 8 bits;
Computing module, for by the quasi- radix and 8 bit of penultimate carry out with or position calculate, obtain new the
New the one 8 bit and 8 bit of third last are carried out same or position and calculated by one 8 bits,
The 2nd 8 new bit is obtained, new the 2nd 8 bit and fourth from the last 8 bits are carried out
Same or position calculates, and obtains the 3rd 8 new bit, and so on, obtain multiple 8 new bits;
Composite module for combining the multiple 8 new bits in reverse order, and connects the upper quasi- cardinal sum tail
Number, obtains original plaintext.
5. device as claimed in claim 4, which is characterized in that further include:
Read module, for reading out initial data from database.
6. device as claimed in claim 4, which is characterized in that the formula that the same or position calculates are as follows: a ⊙ b=ab+a'b',
A' is non-a, and b' is non-b, and ⊙ calculates symbol to indicate to carry out same or position, and a and b are two binary systems that carry out same or position and calculate
Number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610465910.6A CN106130717B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610465910.6A CN106130717B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage decryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106130717A CN106130717A (en) | 2016-11-16 |
CN106130717B true CN106130717B (en) | 2019-05-28 |
Family
ID=57268552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610465910.6A Active CN106130717B (en) | 2016-06-23 | 2016-06-23 | A kind of file storage decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106130717B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107276744B (en) * | 2017-05-27 | 2020-12-18 | 王蕴卓 | File storage encryption method and system |
CN110659508B (en) * | 2019-08-16 | 2021-08-31 | 苏州浪潮智能科技有限公司 | Encryption and decryption method and device based on Lucas number sequence and readable medium |
CN112235319B (en) * | 2020-12-09 | 2021-03-16 | 卓尔智联(武汉)研究院有限公司 | Data encryption and decryption method and device and encryption and decryption circuit |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101076968A (en) * | 2004-10-13 | 2007-11-21 | 加利福尼亚大学董事会 | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups |
CN103684760A (en) * | 2012-09-24 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method, device and system for encryption and decryption of communication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6529487B1 (en) * | 1999-07-09 | 2003-03-04 | Qualcomm Incorporated | Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication |
-
2016
- 2016-06-23 CN CN201610465910.6A patent/CN106130717B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101076968A (en) * | 2004-10-13 | 2007-11-21 | 加利福尼亚大学董事会 | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups |
CN103684760A (en) * | 2012-09-24 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method, device and system for encryption and decryption of communication |
Non-Patent Citations (1)
Title |
---|
"基于广义斐波那契数列的密码系统设计";苏蕴娜 等;《西南师范大学学报》;20151130;第40卷(第11期);第61-66页 |
Also Published As
Publication number | Publication date |
---|---|
CN106130717A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850221B (en) | Information encryption and decryption method and device | |
CN103780622B (en) | A kind of data classification encryption method of facing cloud storage | |
CN102006300B (en) | Method, device and system for encrypting cloud storage data | |
CN107276744B (en) | File storage encryption method and system | |
CN101149768B (en) | Special processor software encryption and decryption method | |
CN102855448B (en) | A kind of Field-level database encryption device | |
JP2020074039A (en) | Method and system for encrypting data | |
CN108629027A (en) | Customer data base method for reconstructing, device, equipment and medium on block chain | |
CN104811298B (en) | One kind realizes encrypted method and device | |
CN110213354A (en) | Cloud storage data confidentiality guard method | |
CN105956492B (en) | A kind of file storage encryption method and device | |
CN106130717B (en) | A kind of file storage decryption method and device | |
CN107579813A (en) | information encryption and decryption method and device | |
CN111199053A (en) | System and method for multi-character wildcard search of encrypted data | |
CN108038128A (en) | A kind of search method, system, terminal device and storage medium for encrypting file | |
CN103051446B (en) | A kind of key encrypting and storing method | |
CN108462574A (en) | A kind of lightweight cipher encrypting method and system | |
CN104809407A (en) | Method and system for encrypting, decrypting and verifying cloud storage front end data | |
CN103067170A (en) | Encrypting file system, encrypting method and deciphering method based on EXT2 file system | |
CN108829899B (en) | Data table storage, modification, query and statistical method | |
US20160042187A1 (en) | System and method for initializing tokens in a dictionary encryption scheme | |
CN105281898A (en) | Apparatus and method for generating key | |
US11354427B2 (en) | Encrypting/decrypting method for multi-digit number and encrypting/decrypting server | |
Gupta et al. | Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms. | |
CN105933120A (en) | Spark platform-based password hash value recovery method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |