CN106131051A - Information encryption and decryption method and device - Google Patents
Information encryption and decryption method and device Download PDFInfo
- Publication number
- CN106131051A CN106131051A CN201610674185.3A CN201610674185A CN106131051A CN 106131051 A CN106131051 A CN 106131051A CN 201610674185 A CN201610674185 A CN 201610674185A CN 106131051 A CN106131051 A CN 106131051A
- Authority
- CN
- China
- Prior art keywords
- notation system
- data
- binary data
- converted
- symbol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention is applicable to field of cryptography, it is provided that information encryption and decryption method and device, including: obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, the notation system symbol in described notation system glossary of symbols is ranked up;To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate the mapping relations between described notation system symbol and numerical value;Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as described notation system symbol.Encryption data is mapped as notation system symbol by the mapping relations of notation system symbol and numerical value by the present invention, and user can customize key, makes information have extremely strong confidentiality.
Description
Technical field
The invention belongs to field of cryptography, particularly relate to a kind of information encryption and decryption method and device.
Background technology
Information security is a relation national security, social stability, the major issue of family harmony.Its importance, just with
The quickening global IT application paces is more and more important.Mobile phone is more than a communication tool already, has more become modern life
Important component part indispensable in work.In mobile phone photograph, mobile payment, it is convenient with easily that periodic traffic etc. brings us
Time, the safety of mobile phone also seems the most important.
In order to tackle the mobile phone information safety problem become increasingly conspicuous, people have employed a lot of method, such as: blanking information source phone
Number, blanking information source customer name, change file suffixes etc. belong to relatively simple method.At present cellphone information is implemented encryption
Method be: communication system (such as certain instantaneous communication system) sets up one to be specifically used to deposit secret (note or i.e. in mobile phone
Shi Tongxin) the region of information, owner may specify and thinks that more Very Important Person, the Content of Communication being designated client will be stored into this district
Territory.Information is not implemented encryption during the transmission of information by the method, i.e. uses clear-text way, and simply information is sent to
So-called " secret " space is entered after the stay of two nights.Private space is not open, enter need password authentification can, namely
Saying that wanting to read this type of information need to obtain password, password is typically by character string, figure stroke or the fingerprint of owner's sets itself
Deng.This type of method seems fool proof, but it can only tackle general demand, enters so-called private the most for professionals
Without lifting an eyebrow, secondly the transmission of information need to be through system platform, and this unencrypted cleartext information is same in system background in close space
Sample can obtain.
Summary of the invention
The embodiment of the present invention provides a kind of information encryption and decryption method and device, it is intended to solve current encryption method safety
The problem that coefficient is low.
The embodiment of the present invention is achieved in that a kind of encryption method, including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system glossary of symbols
Notation system symbol be ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, right
Remaining described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates reflecting between described notation system symbol and numerical value
Penetrate relation;
Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as institute
State notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of decryption method, including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system glossary of symbols
Notation system symbol be ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, right
Remaining described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates reflecting between described notation system symbol and numerical value
Penetrate relation;
Data after encryption are mapped as R binary data according to described mapping relations, are converted to add by described R binary data
Data before close.
The another object of the embodiment of the present invention is to provide a kind of encryption device, including:
Definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will
Notation system symbol in described notation system glossary of symbols is ranked up;
Formulate cipher key module, be used for any one the notation system symbol assignment in the described notation system symbol after sequence,
And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system
Mapping relations between symbol and numerical value;
First number system transition module, for be-encrypted data being converted to R binary data, and will according to described mapping relations
Described R binary data is mapped as described notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of deciphering device, including:
Second definition notation system module, for obtaining the character quantity in notation system glossary of symbols and described notation system glossary of symbols
R, is ranked up the notation system symbol in described notation system glossary of symbols;
Second formulates cipher key module, for composing any one the notation system symbol in the described notation system symbol after sequence
Value, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described numeration
Mapping relations between symbol processed and numerical value;
3rd number system transition module, for the data after encryption are mapped as R binary data according to described mapping relations, will
Described R binary data is converted to the data before encryption.
In the embodiment of the present invention, use and obtain notation system glossary of symbols and amount R thereof, notation system symbol is ranked up;Right
Any one symbol assignment in notation system symbol after sequence, and according to described sequence, remaining notation system symbol is carried out position
Move assignment, generate the mapping relations between notation system symbol and numerical value;Be-encrypted data is converted to R binary data, by described R
Binary data is mapped as described notation system symbol.Such encryption method confidentiality is extremely strong, and the information encrypted is with readable
Ciphertext form presents, and possesses readability.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart that the embodiment of the present invention provides;
Fig. 2 A is the sequence of the notation system symbol that the embodiment of the present invention provides;
Notation system symbol and the mapping relations of numerical value when Fig. 2 B is G=0 under Fig. 2 A sequence that the embodiment of the present invention provides;
Fig. 3 is the telephone number number system transition flow chart that the embodiment of the present invention provides;
Fig. 4 be the embodiment of the present invention be the embodiment of the present invention provide text message number system transition flow chart;
Fig. 5 is audio frequency and video or the image binary data number system transition flow chart of embodiment of the present invention offer;
Fig. 6 is the decryption method flow chart that the embodiment of the present invention provides;
Fig. 7 is the encryption (modulation) of embodiment of the present invention offer, deciphering (demodulation) functions of modules schematic diagram;
Fig. 8 A is the embodiment of the present invention process chart to telephone number when being provided as caller;
Fig. 8 B is the embodiment of the present invention process chart to telephone number when being provided as called;
Fig. 9 A is the process chart to text message when sending text message that the embodiment of the present invention provides;
Fig. 9 B is the process chart to text message when receiving text message that the embodiment of the present invention provides;
Figure 10 A is transmission audio frequency and video or the transmission flow figure of image information of embodiment of the present invention offer;
Figure 10 B is audio frequency and video or the reception flow chart of image information of embodiment of the present invention offer;
The encryption process sequence to unencrypted text, audio frequency and video or image information that Figure 11 embodiment of the present invention provides
Figure;
When Figure 12 is intercommunication between the mobile phone that the embodiment of the present invention provides, number presents schematic diagram;
Figure 13 is the encryption device block diagram that the embodiment of the present invention provides;
Figure 14 is the deciphering device block diagram that the embodiment of the present invention provides.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, right
The present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, and
It is not used in the restriction present invention.
The embodiment of the present invention is introduced as a example by mobile phone cipher, but is not limited to mobile phone.The embodiment of the present invention also may be used
To be applied to other-end or equipment, described terminal includes but not limited to mobile phone, panel computer, notebook computer etc.;Described set
For including but not limited to switch, reason device etc..
Fig. 1 shows the flow process of the encryption method that the embodiment of the present invention provides, and details are as follows:
In S101, obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system
Notation system symbol in glossary of symbols is ranked up.
Described notation system glossary of symbols, can a suitable note selected by the language situation according to mobile phone territory of use
Numeral system glossary of symbols.As alphabetical as notation system glossary of symbols, at the Slav family of languages in may select 26 Latins (English/phonetic) in China
Optional 32 cyrillic alphabets of country, as notation system glossary of symbols, select 28 Arabic alphabets as note in Arab countries
Numeral system glossary of symbols etc..Using the quantity of its use Latin alphabet of non-English speaking country of the Latin alphabet, Italy is 21, Portugal
Grape tooth is 23,27, Spain etc., all can select notation system glossary of symbols according to practical situation.Can also be at described 26
Increase some symbols on the basis of the Latin alphabet, such as: increase by 4 [,] ,/symbol, form 30 notation system symbols as numeration
Glossary of symbols processed.
Character quantity R in described notation system glossary of symbols, also determines that while getting described notation system glossary of symbols
?.It is listed below the character quantity R in several notation system glossary of symbols and described notation system glossary of symbols:
English alphabet26=[ABCDEFGHIJKLMNOPQRSTUVWXYZ], R=26;
English character30=[ABCDEFGHIJKLMNOPQRSTUVWXYZ [] /], R=30;
Cyrillic alphabet32=[А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т y Ф Х Ц Ч Ш Щ Ъ Ы
Ь Э Ю Я], R=32;
Greek alphabet24=[Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ Σ Τ Υ Φ Χ Ψ Ω], R=24;
Italy's letter21=[ABCDEFGHILMNOPQRSTUVYZ], R=21;
... etc..
Described notation system symbol in described notation system glossary of symbols is ranked up, such as the sequence of table one to table five.
For the scheme that notation system symbol is ranked up, it is preferable that by each note in described notation system glossary of symbols
Numeral system symbol gives numerical value, to carry out the sequence of labelling notation system symbol according to the numerical value given.
Preferably, notation system symbol can also sort according to any order, does not has dividing of quality, and notation system symbol is different
The numerical value of sorting representationb is different.Such as 26 English alphabet notation system symbols, both can be ordered as such as table two English alphabet
Its assignment, it is also possible to table six be ordered as its assignment.Different sequence assignment, is only so that the last symbol combination representing numerical value
Difference, has no effect on numerical value content.As decimal number 1471 is converted into two hexadecimal representations by table two letter sequence it is:
147110=CEP26, but sort according to table six, it is expressed as: 147110=CVZ26。
Table one: two ten quaternary (Greek alphabet sequence)
Table two: two hexadecimal (English alphabet sequence)
Table three: two octodenary (Arabic alphabet sequence)
Table four: three decimal scale (English alphabet+number symbol sequence)
Table five: duotricemary notation (cyrillic alphabet sequence)
Table six: two hexadecimal (English alphabet sequence)
In S102, to any one the notation system symbol assignment in the described notation system symbol after sequence, and according to institute
State sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described notation system symbol and number
Mapping relations between value.
Preferably, any one notation system symbol described is entered as " 0 ".
Preferably, described default ordered series of numbers is arithmetic progression, and tolerance is "+1 " or "-1 ".
In embodiments of the present invention, what Fig. 2 A was vivid illustrates the ordering scenario to the notation system glossary of symbols shown in table two,
Fig. 2 B shows, under Fig. 2 A sequence, notation system symbol G is entered as " G=0 ", and remaining notation system symbol is according to arithmetic progression tolerance
It is 1 when carrying out displacement assignment clockwise, the mapping relations between notation system symbol and numerical value." G=0 " is key, and user is only
Need to remember " G=0 " this assignment, simple more than a traditional given telephone number or ID (identity number) card No., it is simple to note
Recall.
In like manner, as made " B=0 ", " H=0 ", " I=0 " ..., then represent different key under Fig. 2 A sequence.
In Fig. 2 B, numeration is made as two hexadecimals, and it is 26 that its 26 notation system symbols can generate number of keys altogether!
≈ 40,300,000,000 hundred million hundred million.Crack according to the speed of the fastest No. 2 3.39 hundred million hundred million times/second of the computer Milky Way, also take 377 years
Can decode, therefore encryption method has extremely strong confidentiality.
In S103, be-encrypted data is converted to R binary data, and according to described mapping relations by described R system number
According to being mapped as described notation system symbol.
Described be-encrypted data being converted to R binary data, according to the difference of the type of be-encrypted data, conversion regime is not
With, such as, telephone number, text message etc..
Below for different data types, S103 is specifically described:
Situation one:
Described be-encrypted data includes telephone number, in this case, described be-encrypted data is converted to R binary data
Be implemented as follows:
Described telephone number is converted to R binary data by decimal data.
Fig. 3 is the telephone number number system transition flow chart that the embodiment of the present invention provides, specifically, it is shown that telephone number
1391471402310、866276123410Number system transition flow process.
Telephone number 8662761234 both can regard numeral " 8,600,061,273 as
14 ", it is also possible to according to the custom of telecom coding be divided into three sections be expressed as 86 " 86 ", 6276 " 6,270
Six " and 1234 " 1,234 " three ten's digit.
86,6276,1,234 3 decimal numbers are converted into 26 systems.Wherein 86 divided by 26, and business is 3, and remainder is 8, i.e.
Two hexadecimals of metric 86 correspondences are 38, and two hexadecimals select 26 English alphabets to be notation system glossary of symbols, according to
The assignment of table two, 3 distinguish corresponding D and I with 8.In like manner 6276 corresponding JHK, 1234 corresponding BVM.I.e. 866276123410=
DIJHKBVM26。
In like manner, telephone number 1391471402310Three ten's digits can be divided into: 139 with segmentation10、147110With
402310.By 13910、147110With 402310Being respectively converted into two hexadecimals, hexadecimal selects 26 English alphabets for numeration
Glossary of symbols processed, according to the assignment of table two, 1391471402310=FJCEPFYT26。
If selecting duotricemary notation cyrillic alphabet is notation system symbol, according to the assignment of table four, by telephone number
866276123410Carry out the duotricemary notation data after number system transition and be mapped as notation system symbol be:
866276123410=Б Х Е Г Г А Е С32。
In like manner, telephone number 1391471402310, carry out duotricemary notation (cyrillic alphabet), 20 quaternarys respectively
After the conversion of (Greek alphabet) and three decimal scale (English character) it is:
1391471402310=Г К А М Ю В Ь Ц32;
1391471402310=Ζ Υ Γ Ξ Θ Η Ω Π24;
1391471402310=ETBTBEOD30。
It will be seen from the foregoing that after encryption, the length of telephone number shortens so that dial more succinct, simultaneously
Also occupying of system memory size can be reduced.
Situation two:
Described be-encrypted data includes that text message, the described R binary data that be-encrypted data is converted to include:
Obtain the character code of each character in text message;
The character code got is converted to R binary data.
Preferably, described character code is Unicode code.
Specifically, described text message include short message, Mail Contents, instant messaging word mutual etc..
Fig. 4 shows that the embodiment of the present invention is the text message number system transition flow chart that the embodiment of the present invention provides, specifically
Ground, embodiment of the present invention text message is " State Intellectual Property Office ".
The hexadecimal code (Unicode) of " State Intellectual Property Office " each Chinese character respectively is: 56FD16、
5BB616、77E516、8BC616、4EA716、674316、5C4016;
By described hexadecimal code (Unicode) 56FD16Being converted to decimal data is 2226910;
By decimal data 2226910Be converted to two hexadecimal datas, and the encryption display literary composition obtained according to table two assignment
Originally it is: BGYN26。
In like manner,
5BB616Decimal data is 2347810, after being converted to two hexadecimals, display text is: BITA26;
77E516Decimal data is 3069310, after being converted to two hexadecimals, display text is: BTKN26;
8BC616Decimal data is 3578210, after being converted to two hexadecimals, display text is: CAYG26;
4EA716Decimal data is 2013510, after being converted to two hexadecimals, display text is: BDUL26;
674316Decimal data is 2643510, after being converted to two hexadecimals, display text is: BNCT26;
5C4016Decimal data is 2361610, after being converted to two hexadecimals, display text is: BIYI26。
Further, the hexadecimal code (Unicode/Ascii) of above-mentioned encryption display text English alphabet is respectively as follows:
BGYN26=42 47 59 4E16;
BITA26=42 49 59 4116;
BTKN26=42 54 4B 4E16;
CAYG26=43 41 59 4716;
BDUL26=42 44 55 4C16;
BNCT26=42 4E 43 5416;
BIYI26=42 49 59 4916。
I.e. B=4216, G=4716, Y=5916, N=4E16....
Show and become after display text " State Intellectual Property Office " encryption " BGYN, BITA, BTKN, CAYG, BDUL, BNCT,
BIYI”。
View of the foregoing, it will be seen that the display content of display text changes, therefore reach the effect of encryption.
Situation three:
Described be-encrypted data includes audio frequency and video or image information, the described R binary data that be-encrypted data is converted to, bag
Include:
It is that unit quantizes respectively by the binary number byte according to this of described audio frequency and video or image information;
Described audio frequency and video or image information after quantizing are converted to R binary data.
Fig. 5 shows the audio frequency and video or image binary data number system transition flow chart that the embodiment of the present invention provides.Due to
Mobile phone is as computer, and all of information represents the most in binary form, audio frequency and video or image information also with
Binary form represents.
Specifically, there is a following byte content such as audio frequency and video or image information: 010100102、101000112、111111112、
001010112, its numerical value represented is respectively metric 8210、16310、25510、4310。
Above-mentioned metric data are converted to two hexadecimal datas, and according to the assignment of table two, obtain DE26、GH26、
JV26、BR26。
And DE26、GH26、JV26、BR26Hexadecimal code be 44 the most respectively164516、47164816、4A165616、
42165216.By 44164516、47164816、4A165616、42165216Substitute into former bytes of audio data, obtain:
010100102=44164516=010001002010001012;
101000112=47164816=010001112010010002;
111111112=4A165616=010010102010101102;
001010112=42165216=010000102010100102。
After above-mentioned ciphering process, former audio content changes the most completely, thus has reached the effect of encryption.
Deciphering is the inverse process of encryption, and in embodiments of the present invention, deciphering, will i.e. according to the difference of be-encrypted data type
Telephone number, text message, audio frequency and video or image information after encryption carry out respectively numeral system conversion and be reduced to decimal scale, 16
System, binary system.
The encryption method provided corresponding to the embodiment of the present invention, Fig. 6 shows the decryption side that the embodiment of the present invention provides
Method, including:
In S601, obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system
Notation system symbol in glossary of symbols is ranked up;
In S602, to any one the notation system symbol assignment in the described notation system symbol after sequence, and according to institute
State sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described notation system symbol and number
Mapping relations between value;
In S603, the data after encryption are mapped as R binary data according to described mapping relations, by described R system number
According to the data be converted to before encrypting.
Data before described encryption include telephone number, the described data be converted to by described R binary data before encrypting, bag
Include:
Described R binary data is converted to the decimal data of described telephone number.
Data before described encryption include text message, the described data be converted to by described R binary data before encrypting, bag
Include:
Described R binary data is converted into character code;
Obtain described character-coded text message.
Data before described encryption include audio frequency and video or image information, described described R binary data is converted to encryption before
Data, including:
Described R binary data is carried out segments value;
R binary data after described segments value is converted to binary data;
Described method also includes:
Data after encryption are converted to R binary data.
Fig. 7 shows embodiment of the present invention encryption (modulation), deciphering (demodulation) functions of modules schematic diagram.
Text, telephone number, audio frequency and video or image information can be reflected by encrypting module respectively as described
The relation of penetrating is converted to the method for expressing of the notation system symbol of corresponding numeral system, as being 20 shown in Fig. 5, Fig. 6
Senary English alphabet represents method, it is also possible to be two duodecimal notation hebrew alphabet representations or two octodenary Arabic words
Female representation.
Deciphering module be will encryption after information reverting be initial data.
Can be seen that from Fig. 3-Fig. 5, the embodiment of the present invention is to telephone number, text message, audio frequency and video or image information data
Cryptographic operation be different, therefore encrypting-decrypting module to carry out the operation of diversity according to the different objects that calls.
Fig. 8 A is the embodiment of the present invention process chart to telephone number when being provided as caller, the steps include:
Notation system symbolic number after input unencrypted digital number or encryption;
Judge input be unencrypted digital number or encryption after notation system symbolic number;
If input is the notation system symbolic number after encrypting, then to outcall after being decrypted, this is called simultaneously
Notation system symbolic number be stored in message registration;
If input is unencrypted digital number, then can directly call, digital number is encrypted simultaneously, and deposit
Enter in message registration.
Fig. 8 B is the embodiment of the present invention process chart to telephone number when being provided as called, the steps include:
Receive digital number;(as time called, receive can only be digital number, therefore need to be modulated.)
Described digital number is encrypted;
The notation system symbolic number of display encryption, after processing call, is stored in message registration by notation system symbolic number.
Process chart to text message, its step when sending text message that Fig. 9 A provides for the embodiment of the present invention
For:
The ciphertext information sent or unencrypted text message;
Judge transmission is ciphertext information or unencrypted text message;
If send is unencrypted text message, then it is encrypted rear after text message being sent and is stored in record;
If send is the text message of encryption, then sends after text message being encrypted to recipient and be stored in note
Record.
The handling process to text message when receiving text message that Fig. 9 B provides for the embodiment of the present invention, the steps include:
Receive or viewing textual information;
Judge that described reception or the text message checked are text message or the unencrypted text messages of encryption;
If described reception or the text message checked are the text messages of encryption, then input key, be decrypted, such as key
Correctly, then can normally show text, if wrong cipher key, then show that content will be made mistakes;
If described reception or the text message checked are unencrypted text messages, then directly display text.
Figure 10 A is transmission audio frequency and video or the process chart of image information of embodiment of the present invention offer, the steps include:
Send encryption audio frequency and video or image information, encryption audio frequency and video or image information;
If send is unencrypted audio frequency and video or image information, then it is encrypted place after sending information to recipient
Reason, and it is stored in record;
If send is audio frequency and video or the image information of encryption, then it is sent to recipient after information being encrypted,
And it is stored in record.
Figure 10 B is reception audio frequency and video or the process chart of image information of embodiment of the present invention offer, the steps include:
Receive or check audio frequency and video or image information;
Judge that described reception or the audio frequency and video checked or image information are information or the unencrypted information of encryption;
If described audio frequency and video or image information are the information of encryption, then directly input key, after being decrypted, show that sound regards
Frequency or image information;
If described audio frequency and video or image information are unencrypted information, the most directly show audio frequency and video or image information.
Figure 11 is being encrypted unencrypted text, audio frequency and video or image information of embodiment of the present invention offer
Flow chart, step is:
Select text, audio frequency and video or image information;
If after selection text message, carry out text message encryption, and replace original text storage;
If selecting audio frequency and video or image information, carrying out audio frequency and video or prime information storage is encrypted and replaced to image information.
When Figure 12 is intercommunication between the mobile phone that the embodiment of the present invention provides, number presents schematic diagram.
Step the most 2. in, number be the Greek alphabet that sets of mobile phone of 18664979065 as notation system glossary of symbols, by table one
Assignment;Number be 13914714023 mobile phone be not carried out encryption.
Step the most 4. in, number be the cyrillic alphabet that sets of mobile phone of 18664979065 as notation system glossary of symbols, by table
Five assignment;Number be 13914714023 mobile phone set English and add the symbol that counts for notation system glossary of symbols, by table four assignment.
Step the most 6. in, number is that the phone of 56781234 is without encryption function;Number is the mobile phone setting of 13914714023
English alphabet is notation system glossary of symbols, by table two assignment.
Specifically,
In step 1., regular handset 13914714023 call number 18664979065 mobile phone, calling number
13914714023 are shown as Greek alphabet " the Ζ Υ Γ Ξ Θ Η after encryption by encrypting module on mobile phone 18664979065
ΩΠ”;In step 2., mobile phone 18664979065 directly inputs " Ζ Υ Γ Ξ Θ Η Ω Π ", is demodulated into by deciphering module
Number " 13914714023 " calls, and calling number 18664979065 is displayed on mobile phone 13914714023.
In step 3., mobile phone 13914714023 directly inputs called number " GGHGRKCF ", this character decrypted module solution
Being adjusted to number 18664979065 and implement calling, the encrypted module of calling number 13914714023 is modulated to cyrillic alphabet " Г
К А М Ю В Ь Ц " shown;In step 4., mobile phone 18664979065 directly inputs cyrillic alphabet " Г К А М
Ю В Ь Ц ", the decrypted module of this character string is demodulated into number 13914714023 and calls, and calling number 18664979065 is added
Close module is modulated to " GGHGRKCF " display.
In step 5., fixed line phone 56781234 inputs called number 13914714023, and calling number 56781234 is added
Close module is modulated to English alphabet " IKKBVM " display;In step 6., 13914714023 number mobile phone inputting English letter
After " IKKBVM ", decrypted module is demodulated into number " 56781234 " calling, shows main in called phone 56781234 simultaneously
Call out the numbers code 13914714023.
The encryption method provided corresponding to the embodiment of the present invention, Figure 13 shows the encryption dress that the embodiment of the present invention provides
The structured flowchart put, including:
Definition notation system module 131, for obtaining the character quantity in notation system glossary of symbols and described notation system glossary of symbols
R, is ranked up the notation system symbol in described notation system glossary of symbols;
Formulate cipher key module 132, for any one the notation system symbol in the described notation system symbol after sequence is composed
Value, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described numeration
Mapping relations between symbol processed and numerical value;
First number system transition module 133, with be-encrypted data is converted to R binary data, and according to described mapping relations
Described R binary data is mapped as described notation system symbol.
Described be-encrypted data includes that telephone number, described first number system transition module 133 include:
First conversion subelement, is converted to R binary data by described telephone number by decimal data.
Described be-encrypted data includes that text message, described first number system transition module 133 include:
Obtain subelement, for obtaining the character code of each character in text message;
Second conversion subelement, for being converted to R binary data by the character code got.
Described be-encrypted data includes that audio frequency and video or image information, described first number system transition module 133 include:
Quantize subelement, divides in units of byte for being combined by the binary data of described audio frequency and video or image information
Do not quantize;
3rd conversion subelement, described audio frequency and video or image information after quantizing are converted to R binary data.
Described device also includes:
Second number system transition module, for being converted to binary data by described notation system symbol.
The decryption method provided corresponding to the embodiment of the present invention, Figure 14 shows a kind of deciphering that the embodiment of the present invention provides
Device, including:
Second definition notation system module 141, for obtaining the character in notation system glossary of symbols and described notation system glossary of symbols
Amount R, is ranked up the notation system symbol in described notation system glossary of symbols;
Second formulates cipher key module 142, for any one notation system symbol in the described notation system symbol after sequence
Number assignment, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described
Mapping relations between notation system symbol and numerical value;
3rd number system transition module 143, for being mapped as R system number by the data after encryption according to described mapping relations
According to, described R binary data is converted to the data before encryption.
Data before described encryption include that telephone number, described 3rd number system transition module 143 include:
4th conversion subelement, for being converted to the decimal data of described telephone number by described R binary data.
Data before described encryption include that text message, described 3rd number system transition module 143 include:
5th conversion subelement, for being converted to character code by described R binary data;
Second obtains subelement, is used for obtaining described character-coded for text message.
Data before described encryption include that audio frequency and video or image information, described 3rd number system transition module 143 include:
Second value beggar's unit, for carrying out segments value by described R binary data;
6th conversion subelement, for being converted to binary data by the R binary data after described segments value.
Described device also includes:
4th number system transition module, for being converted to R binary data by the data after encryption.
In the embodiment of the present invention, use and obtain notation system glossary of symbols and amount R thereof, notation system symbol is ranked up;Right
Any one symbol assignment in notation system symbol after sequence, and according to described sequence, remaining notation system symbol is carried out position
Move assignment, generate the mapping relations between notation system symbol and numerical value;Be-encrypted data is converted to R binary data, by described R
Binary data is mapped as described notation system symbol.By the mapping relations of notation system symbol and numerical value by encryption data in the present invention
It is mapped as notation system symbol, and user can customize key, make information have an extremely strong confidentiality, and the information encrypted is with can
The ciphertext form read presents, and possesses readability.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Any amendment, equivalent and the improvement etc. made within god and principle, should be included within the scope of the present invention.
Claims (20)
1. an encryption method, it is characterised in that including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by the note in described notation system glossary of symbols
Numeral system symbol is ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, to remaining
Described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates the mapping between described notation system symbol and numerical value and closes
System;
Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as described note
Numeral system symbol.
2. the method for claim 1, it is characterised in that described be-encrypted data includes telephone number, described by be added
Ciphertext data is converted to R binary data, including:
Described telephone number is converted to R binary data by decimal data.
3. the method for claim 1, it is characterised in that described be-encrypted data includes text message, described by be added
Ciphertext data is converted to R binary data and includes:
Obtain the character code of each character in text message;
The character code got is converted to R binary data.
4. the method for claim 1, it is characterised in that described be-encrypted data includes audio frequency and video or image information, institute
State and be-encrypted data is converted to R binary data, including:
It is that unit quantizes respectively by the binary number byte according to this of described audio frequency and video or image information;
Described audio frequency and video or image information after quantizing are converted to R binary data.
5. method as claimed in claim 4, it is characterised in that described method also includes:
Described notation system symbol is converted to binary data.
6. a decryption method, it is characterised in that including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by the note in described notation system glossary of symbols
Numeral system symbol is ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, to remaining
Described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates the mapping between described notation system symbol and numerical value and closes
System;
Data after encryption are mapped as R binary data according to described mapping relations, before described R binary data is converted to encryption
Data.
7. method as claimed in claim 6, it is characterised in that the data before described encryption include telephone number, described by institute
State the data before R binary data is converted to encryption, including:
Described R binary data is converted to the decimal data of described telephone number.
8. method as claimed in claim 6, it is characterised in that the data before described encryption include text message, described by institute
State the data before R binary data is converted to encryption, including:
Described R binary data is converted into character code;
Obtain described character-coded text message.
9. method as claimed in claim 6, it is characterised in that the data before described encryption include audio frequency and video or image information,
The described data described R binary data is converted to before encrypting, including:
Described R binary data is carried out segments value;
R binary data after described segments value is converted to binary data.
10. method as claimed in claim 9, it is characterised in that described method also includes:
Data after encryption are converted to R binary data.
11. 1 kinds of encryption devices, it is characterised in that including:
First definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will
Notation system symbol in described notation system glossary of symbols is ranked up;
First formulates cipher key module, is used for any one the notation system symbol assignment in the described notation system symbol after sequence,
And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system
Mapping relations between symbol and numerical value;
First number system transition module, for being converted to R binary data, and according to described mapping relations by described by be-encrypted data
R binary data is mapped as described notation system symbol.
12. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes telephone number, described first
Number system transition module includes:
First conversion subelement, is converted to R binary data by described telephone number by decimal data.
13. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes text message, described first
Number system transition module includes:
First obtains subelement, for obtaining the character code of each character in text message;
Second conversion subelement, for being converted to R binary data by the character code got.
14. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes audio frequency and video or image information,
Described first number system transition module includes:
First quantizes subelement, for being combined by the binary data of described audio frequency and video or image information in units of byte point
Do not quantize;
3rd conversion subelement, described audio frequency and video or image information after quantizing are converted to R binary data.
15. devices as claimed in claim 14, it is characterised in that described device also includes:
Second number system transition module, for being converted to binary data by described notation system symbol.
16. 1 kinds of deciphering devices, it is characterised in that including:
Second definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will
Notation system symbol in described notation system glossary of symbols is ranked up;
Second formulates cipher key module, is used for any one the notation system symbol assignment in the described notation system symbol after sequence,
And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system
Mapping relations between symbol and numerical value;
3rd number system transition module, for being mapped as R binary data according to described mapping relations, by described by the data after encryption
R binary data is converted to the data before encryption.
17. devices as claimed in claim 16, it is characterised in that the data before described encryption include telephone number, described
Three number system transition modules include:
4th conversion subelement, for being converted to the decimal data of described telephone number by described R binary data.
18. devices as claimed in claim 16, it is characterised in that the data before described encryption include text message, described
Three number system transition modules include:
5th conversion subelement, for being converted to character code by described R binary data;
Second obtains subelement, is used for obtaining described character-coded for text message.
19. devices as claimed in claim 16, it is characterised in that the data before described encryption include audio frequency and video or image letter
Breath, described 3rd number system transition module includes:
Second value beggar's unit, for carrying out segments value by described R binary data;
6th conversion subelement, for being converted to binary data by the R binary data after described segments value.
20. devices as claimed in claim 19, it is characterised in that described device also includes:
4th number system transition module, for being converted to R binary data by the data after encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610674185.3A CN106131051B (en) | 2016-08-16 | 2016-08-16 | Information encryption and decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610674185.3A CN106131051B (en) | 2016-08-16 | 2016-08-16 | Information encryption and decryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106131051A true CN106131051A (en) | 2016-11-16 |
CN106131051B CN106131051B (en) | 2019-06-21 |
Family
ID=57259091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610674185.3A Expired - Fee Related CN106131051B (en) | 2016-08-16 | 2016-08-16 | Information encryption and decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106131051B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804933A (en) * | 2018-05-25 | 2018-11-13 | 东北大学 | A kind of system conversion method for big data |
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
CN109889339A (en) * | 2018-12-29 | 2019-06-14 | 广州市宏大欣电子科技有限公司 | A kind of data encryption device and method |
CN110335586A (en) * | 2018-03-31 | 2019-10-15 | 深圳市掌网科技股份有限公司 | A kind of information conversion method and system |
CN112364368A (en) * | 2020-12-02 | 2021-02-12 | 四川长虹电器股份有限公司 | Telephone number encryption storage method |
CN113626849A (en) * | 2021-08-26 | 2021-11-09 | 杭州安恒信息技术股份有限公司 | Character string desensitization method, device, equipment and storage medium |
CN114255861A (en) * | 2022-01-20 | 2022-03-29 | 苏州景昱医疗器械有限公司 | Data processing method, device, medium and equipment of medical implantation equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645061A (en) * | 2009-09-03 | 2010-02-10 | 张�浩 | Information hiding method taking text information as carrier |
US20100277352A1 (en) * | 2009-05-01 | 2010-11-04 | Mark Ellery Ogram | Variable length encryption |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN103208229A (en) * | 2012-01-11 | 2013-07-17 | 孙强国 | Information processing and transmission method based on nonstandard code |
CN105721882A (en) * | 2016-04-18 | 2016-06-29 | 上海泥娃通信科技有限公司 | Separated coding and decoding method and system |
-
2016
- 2016-08-16 CN CN201610674185.3A patent/CN106131051B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100277352A1 (en) * | 2009-05-01 | 2010-11-04 | Mark Ellery Ogram | Variable length encryption |
CN101645061A (en) * | 2009-09-03 | 2010-02-10 | 张�浩 | Information hiding method taking text information as carrier |
CN103208229A (en) * | 2012-01-11 | 2013-07-17 | 孙强国 | Information processing and transmission method based on nonstandard code |
CN102761418A (en) * | 2012-07-16 | 2012-10-31 | 重庆电子工程职业学院 | Character compression encrypting method |
CN105721882A (en) * | 2016-04-18 | 2016-06-29 | 上海泥娃通信科技有限公司 | Separated coding and decoding method and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
CN110335586A (en) * | 2018-03-31 | 2019-10-15 | 深圳市掌网科技股份有限公司 | A kind of information conversion method and system |
CN110335586B (en) * | 2018-03-31 | 2021-07-02 | 深圳市掌网科技股份有限公司 | Information conversion method and system |
CN108804933A (en) * | 2018-05-25 | 2018-11-13 | 东北大学 | A kind of system conversion method for big data |
CN108804933B (en) * | 2018-05-25 | 2020-06-05 | 东北大学 | Method for carrying out scale conversion on big data in information hiding technology |
CN109889339A (en) * | 2018-12-29 | 2019-06-14 | 广州市宏大欣电子科技有限公司 | A kind of data encryption device and method |
CN112364368A (en) * | 2020-12-02 | 2021-02-12 | 四川长虹电器股份有限公司 | Telephone number encryption storage method |
CN113626849A (en) * | 2021-08-26 | 2021-11-09 | 杭州安恒信息技术股份有限公司 | Character string desensitization method, device, equipment and storage medium |
CN114255861A (en) * | 2022-01-20 | 2022-03-29 | 苏州景昱医疗器械有限公司 | Data processing method, device, medium and equipment of medical implantation equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106131051B (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106131051B (en) | Information encryption and decryption method and device | |
Ahvanooey et al. | AITSteg: An innovative text steganography technique for hidden transmission of text message via social media | |
CN106453268B (en) | A method of realizing express delivery secret protection in logistics progress | |
US6058187A (en) | Secure telecommunications data transmission | |
US8433068B2 (en) | Method and apparatus for communication based on pseudo-contact information | |
CN105719120A (en) | Method for encrypting privacy information on express waybills | |
CN105229985B (en) | Identity tokens | |
CN103401676A (en) | Two-dimensional barcode-based logistics industry personal information privacy protection system and method | |
US10461934B2 (en) | Authentication-based message display method and communication terminal thereof | |
CN103095890A (en) | Contact person information encryption method and communication terminal | |
CN107124500A (en) | The display methods and display device of address list in a kind of communication equipment | |
CN102684877A (en) | Method and device for carrying out user information processing | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
US9418215B2 (en) | Optical security enhancement device | |
Iranmanesh et al. | On using emoticons and lingoes for hiding data in SMS | |
AU2016241382A1 (en) | Secure and confidential messaging systems | |
CN115118453A (en) | Mailing sensitive information privacy protection method based on commercial cipher algorithm | |
US10728191B2 (en) | Method for establishing communication within a closed network | |
US11210407B2 (en) | Electronic communications device and messaging application therefor | |
CN110941815A (en) | Novel password | |
CN116561788B (en) | Electronic identity code encryption, decoding and key management system and method | |
Kingslin et al. | Design of a Security Based Technique for Handling Secure SMS in Mobile Phones using Text Steganography | |
EP3686764A1 (en) | Electronic communications device and messaging application therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190621 Termination date: 20210816 |