CN106131051A - Information encryption and decryption method and device - Google Patents

Information encryption and decryption method and device Download PDF

Info

Publication number
CN106131051A
CN106131051A CN201610674185.3A CN201610674185A CN106131051A CN 106131051 A CN106131051 A CN 106131051A CN 201610674185 A CN201610674185 A CN 201610674185A CN 106131051 A CN106131051 A CN 106131051A
Authority
CN
China
Prior art keywords
notation system
data
binary data
converted
symbol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610674185.3A
Other languages
Chinese (zh)
Other versions
CN106131051B (en
Inventor
高金铎
高峰
王哲
武小毛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shendun Electronic Technology Co Ltd
Original Assignee
Shenzhen Shendun Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shendun Electronic Technology Co Ltd filed Critical Shenzhen Shendun Electronic Technology Co Ltd
Priority to CN201610674185.3A priority Critical patent/CN106131051B/en
Publication of CN106131051A publication Critical patent/CN106131051A/en
Application granted granted Critical
Publication of CN106131051B publication Critical patent/CN106131051B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention is applicable to field of cryptography, it is provided that information encryption and decryption method and device, including: obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, the notation system symbol in described notation system glossary of symbols is ranked up;To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate the mapping relations between described notation system symbol and numerical value;Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as described notation system symbol.Encryption data is mapped as notation system symbol by the mapping relations of notation system symbol and numerical value by the present invention, and user can customize key, makes information have extremely strong confidentiality.

Description

Information encryption and decryption method and device
Technical field
The invention belongs to field of cryptography, particularly relate to a kind of information encryption and decryption method and device.
Background technology
Information security is a relation national security, social stability, the major issue of family harmony.Its importance, just with The quickening global IT application paces is more and more important.Mobile phone is more than a communication tool already, has more become modern life Important component part indispensable in work.In mobile phone photograph, mobile payment, it is convenient with easily that periodic traffic etc. brings us Time, the safety of mobile phone also seems the most important.
In order to tackle the mobile phone information safety problem become increasingly conspicuous, people have employed a lot of method, such as: blanking information source phone Number, blanking information source customer name, change file suffixes etc. belong to relatively simple method.At present cellphone information is implemented encryption Method be: communication system (such as certain instantaneous communication system) sets up one to be specifically used to deposit secret (note or i.e. in mobile phone Shi Tongxin) the region of information, owner may specify and thinks that more Very Important Person, the Content of Communication being designated client will be stored into this district Territory.Information is not implemented encryption during the transmission of information by the method, i.e. uses clear-text way, and simply information is sent to So-called " secret " space is entered after the stay of two nights.Private space is not open, enter need password authentification can, namely Saying that wanting to read this type of information need to obtain password, password is typically by character string, figure stroke or the fingerprint of owner's sets itself Deng.This type of method seems fool proof, but it can only tackle general demand, enters so-called private the most for professionals Without lifting an eyebrow, secondly the transmission of information need to be through system platform, and this unencrypted cleartext information is same in system background in close space Sample can obtain.
Summary of the invention
The embodiment of the present invention provides a kind of information encryption and decryption method and device, it is intended to solve current encryption method safety The problem that coefficient is low.
The embodiment of the present invention is achieved in that a kind of encryption method, including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system glossary of symbols Notation system symbol be ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, right Remaining described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates reflecting between described notation system symbol and numerical value Penetrate relation;
Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as institute State notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of decryption method, including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system glossary of symbols Notation system symbol be ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, right Remaining described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates reflecting between described notation system symbol and numerical value Penetrate relation;
Data after encryption are mapped as R binary data according to described mapping relations, are converted to add by described R binary data Data before close.
The another object of the embodiment of the present invention is to provide a kind of encryption device, including:
Definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will Notation system symbol in described notation system glossary of symbols is ranked up;
Formulate cipher key module, be used for any one the notation system symbol assignment in the described notation system symbol after sequence, And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system Mapping relations between symbol and numerical value;
First number system transition module, for be-encrypted data being converted to R binary data, and will according to described mapping relations Described R binary data is mapped as described notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of deciphering device, including:
Second definition notation system module, for obtaining the character quantity in notation system glossary of symbols and described notation system glossary of symbols R, is ranked up the notation system symbol in described notation system glossary of symbols;
Second formulates cipher key module, for composing any one the notation system symbol in the described notation system symbol after sequence Value, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described numeration Mapping relations between symbol processed and numerical value;
3rd number system transition module, for the data after encryption are mapped as R binary data according to described mapping relations, will Described R binary data is converted to the data before encryption.
In the embodiment of the present invention, use and obtain notation system glossary of symbols and amount R thereof, notation system symbol is ranked up;Right Any one symbol assignment in notation system symbol after sequence, and according to described sequence, remaining notation system symbol is carried out position Move assignment, generate the mapping relations between notation system symbol and numerical value;Be-encrypted data is converted to R binary data, by described R Binary data is mapped as described notation system symbol.Such encryption method confidentiality is extremely strong, and the information encrypted is with readable Ciphertext form presents, and possesses readability.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart that the embodiment of the present invention provides;
Fig. 2 A is the sequence of the notation system symbol that the embodiment of the present invention provides;
Notation system symbol and the mapping relations of numerical value when Fig. 2 B is G=0 under Fig. 2 A sequence that the embodiment of the present invention provides;
Fig. 3 is the telephone number number system transition flow chart that the embodiment of the present invention provides;
Fig. 4 be the embodiment of the present invention be the embodiment of the present invention provide text message number system transition flow chart;
Fig. 5 is audio frequency and video or the image binary data number system transition flow chart of embodiment of the present invention offer;
Fig. 6 is the decryption method flow chart that the embodiment of the present invention provides;
Fig. 7 is the encryption (modulation) of embodiment of the present invention offer, deciphering (demodulation) functions of modules schematic diagram;
Fig. 8 A is the embodiment of the present invention process chart to telephone number when being provided as caller;
Fig. 8 B is the embodiment of the present invention process chart to telephone number when being provided as called;
Fig. 9 A is the process chart to text message when sending text message that the embodiment of the present invention provides;
Fig. 9 B is the process chart to text message when receiving text message that the embodiment of the present invention provides;
Figure 10 A is transmission audio frequency and video or the transmission flow figure of image information of embodiment of the present invention offer;
Figure 10 B is audio frequency and video or the reception flow chart of image information of embodiment of the present invention offer;
The encryption process sequence to unencrypted text, audio frequency and video or image information that Figure 11 embodiment of the present invention provides Figure;
When Figure 12 is intercommunication between the mobile phone that the embodiment of the present invention provides, number presents schematic diagram;
Figure 13 is the encryption device block diagram that the embodiment of the present invention provides;
Figure 14 is the deciphering device block diagram that the embodiment of the present invention provides.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, right The present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, and It is not used in the restriction present invention.
The embodiment of the present invention is introduced as a example by mobile phone cipher, but is not limited to mobile phone.The embodiment of the present invention also may be used To be applied to other-end or equipment, described terminal includes but not limited to mobile phone, panel computer, notebook computer etc.;Described set For including but not limited to switch, reason device etc..
Fig. 1 shows the flow process of the encryption method that the embodiment of the present invention provides, and details are as follows:
In S101, obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system Notation system symbol in glossary of symbols is ranked up.
Described notation system glossary of symbols, can a suitable note selected by the language situation according to mobile phone territory of use Numeral system glossary of symbols.As alphabetical as notation system glossary of symbols, at the Slav family of languages in may select 26 Latins (English/phonetic) in China Optional 32 cyrillic alphabets of country, as notation system glossary of symbols, select 28 Arabic alphabets as note in Arab countries Numeral system glossary of symbols etc..Using the quantity of its use Latin alphabet of non-English speaking country of the Latin alphabet, Italy is 21, Portugal Grape tooth is 23,27, Spain etc., all can select notation system glossary of symbols according to practical situation.Can also be at described 26 Increase some symbols on the basis of the Latin alphabet, such as: increase by 4 [,] ,/symbol, form 30 notation system symbols as numeration Glossary of symbols processed.
Character quantity R in described notation system glossary of symbols, also determines that while getting described notation system glossary of symbols ?.It is listed below the character quantity R in several notation system glossary of symbols and described notation system glossary of symbols:
English alphabet26=[ABCDEFGHIJKLMNOPQRSTUVWXYZ], R=26;
English character30=[ABCDEFGHIJKLMNOPQRSTUVWXYZ [] /], R=30;
Cyrillic alphabet32=[А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т y Ф Х Ц Ч Ш Щ Ъ Ы Ь Э Ю Я], R=32;
Greek alphabet24=[Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ Σ Τ Υ Φ Χ Ψ Ω], R=24;
Italy's letter21=[ABCDEFGHILMNOPQRSTUVYZ], R=21;
... etc..
Described notation system symbol in described notation system glossary of symbols is ranked up, such as the sequence of table one to table five.
For the scheme that notation system symbol is ranked up, it is preferable that by each note in described notation system glossary of symbols Numeral system symbol gives numerical value, to carry out the sequence of labelling notation system symbol according to the numerical value given.
Preferably, notation system symbol can also sort according to any order, does not has dividing of quality, and notation system symbol is different The numerical value of sorting representationb is different.Such as 26 English alphabet notation system symbols, both can be ordered as such as table two English alphabet Its assignment, it is also possible to table six be ordered as its assignment.Different sequence assignment, is only so that the last symbol combination representing numerical value Difference, has no effect on numerical value content.As decimal number 1471 is converted into two hexadecimal representations by table two letter sequence it is: 147110=CEP26, but sort according to table six, it is expressed as: 147110=CVZ26
Table one: two ten quaternary (Greek alphabet sequence)
Table two: two hexadecimal (English alphabet sequence)
Table three: two octodenary (Arabic alphabet sequence)
Table four: three decimal scale (English alphabet+number symbol sequence)
Table five: duotricemary notation (cyrillic alphabet sequence)
Table six: two hexadecimal (English alphabet sequence)
In S102, to any one the notation system symbol assignment in the described notation system symbol after sequence, and according to institute State sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described notation system symbol and number Mapping relations between value.
Preferably, any one notation system symbol described is entered as " 0 ".
Preferably, described default ordered series of numbers is arithmetic progression, and tolerance is "+1 " or "-1 ".
In embodiments of the present invention, what Fig. 2 A was vivid illustrates the ordering scenario to the notation system glossary of symbols shown in table two, Fig. 2 B shows, under Fig. 2 A sequence, notation system symbol G is entered as " G=0 ", and remaining notation system symbol is according to arithmetic progression tolerance It is 1 when carrying out displacement assignment clockwise, the mapping relations between notation system symbol and numerical value." G=0 " is key, and user is only Need to remember " G=0 " this assignment, simple more than a traditional given telephone number or ID (identity number) card No., it is simple to note Recall.
In like manner, as made " B=0 ", " H=0 ", " I=0 " ..., then represent different key under Fig. 2 A sequence.
In Fig. 2 B, numeration is made as two hexadecimals, and it is 26 that its 26 notation system symbols can generate number of keys altogether! ≈ 40,300,000,000 hundred million hundred million.Crack according to the speed of the fastest No. 2 3.39 hundred million hundred million times/second of the computer Milky Way, also take 377 years Can decode, therefore encryption method has extremely strong confidentiality.
In S103, be-encrypted data is converted to R binary data, and according to described mapping relations by described R system number According to being mapped as described notation system symbol.
Described be-encrypted data being converted to R binary data, according to the difference of the type of be-encrypted data, conversion regime is not With, such as, telephone number, text message etc..
Below for different data types, S103 is specifically described:
Situation one:
Described be-encrypted data includes telephone number, in this case, described be-encrypted data is converted to R binary data Be implemented as follows:
Described telephone number is converted to R binary data by decimal data.
Fig. 3 is the telephone number number system transition flow chart that the embodiment of the present invention provides, specifically, it is shown that telephone number 1391471402310、866276123410Number system transition flow process.
Telephone number 8662761234 both can regard numeral " 8,600,061,273 as 14 ", it is also possible to according to the custom of telecom coding be divided into three sections be expressed as 86 " 86 ", 6276 " 6,270 Six " and 1234 " 1,234 " three ten's digit.
86,6276,1,234 3 decimal numbers are converted into 26 systems.Wherein 86 divided by 26, and business is 3, and remainder is 8, i.e. Two hexadecimals of metric 86 correspondences are 38, and two hexadecimals select 26 English alphabets to be notation system glossary of symbols, according to The assignment of table two, 3 distinguish corresponding D and I with 8.In like manner 6276 corresponding JHK, 1234 corresponding BVM.I.e. 866276123410= DIJHKBVM26
In like manner, telephone number 1391471402310Three ten's digits can be divided into: 139 with segmentation10、147110With 402310.By 13910、147110With 402310Being respectively converted into two hexadecimals, hexadecimal selects 26 English alphabets for numeration Glossary of symbols processed, according to the assignment of table two, 1391471402310=FJCEPFYT26
If selecting duotricemary notation cyrillic alphabet is notation system symbol, according to the assignment of table four, by telephone number 866276123410Carry out the duotricemary notation data after number system transition and be mapped as notation system symbol be:
866276123410=Б Х Е Г Г А Е С32
In like manner, telephone number 1391471402310, carry out duotricemary notation (cyrillic alphabet), 20 quaternarys respectively After the conversion of (Greek alphabet) and three decimal scale (English character) it is:
1391471402310=Г К А М Ю В Ь Ц32
1391471402310=Ζ Υ Γ Ξ Θ Η Ω Π24
1391471402310=ETBTBEOD30
It will be seen from the foregoing that after encryption, the length of telephone number shortens so that dial more succinct, simultaneously Also occupying of system memory size can be reduced.
Situation two:
Described be-encrypted data includes that text message, the described R binary data that be-encrypted data is converted to include:
Obtain the character code of each character in text message;
The character code got is converted to R binary data.
Preferably, described character code is Unicode code.
Specifically, described text message include short message, Mail Contents, instant messaging word mutual etc..
Fig. 4 shows that the embodiment of the present invention is the text message number system transition flow chart that the embodiment of the present invention provides, specifically Ground, embodiment of the present invention text message is " State Intellectual Property Office ".
The hexadecimal code (Unicode) of " State Intellectual Property Office " each Chinese character respectively is: 56FD16、 5BB616、77E516、8BC616、4EA716、674316、5C4016
By described hexadecimal code (Unicode) 56FD16Being converted to decimal data is 2226910
By decimal data 2226910Be converted to two hexadecimal datas, and the encryption display literary composition obtained according to table two assignment Originally it is: BGYN26
In like manner,
5BB616Decimal data is 2347810, after being converted to two hexadecimals, display text is: BITA26
77E516Decimal data is 3069310, after being converted to two hexadecimals, display text is: BTKN26
8BC616Decimal data is 3578210, after being converted to two hexadecimals, display text is: CAYG26
4EA716Decimal data is 2013510, after being converted to two hexadecimals, display text is: BDUL26
674316Decimal data is 2643510, after being converted to two hexadecimals, display text is: BNCT26
5C4016Decimal data is 2361610, after being converted to two hexadecimals, display text is: BIYI26
Further, the hexadecimal code (Unicode/Ascii) of above-mentioned encryption display text English alphabet is respectively as follows:
BGYN26=42 47 59 4E16
BITA26=42 49 59 4116
BTKN26=42 54 4B 4E16
CAYG26=43 41 59 4716
BDUL26=42 44 55 4C16
BNCT26=42 4E 43 5416
BIYI26=42 49 59 4916
I.e. B=4216, G=4716, Y=5916, N=4E16....
Show and become after display text " State Intellectual Property Office " encryption " BGYN, BITA, BTKN, CAYG, BDUL, BNCT, BIYI”。
View of the foregoing, it will be seen that the display content of display text changes, therefore reach the effect of encryption.
Situation three:
Described be-encrypted data includes audio frequency and video or image information, the described R binary data that be-encrypted data is converted to, bag Include:
It is that unit quantizes respectively by the binary number byte according to this of described audio frequency and video or image information;
Described audio frequency and video or image information after quantizing are converted to R binary data.
Fig. 5 shows the audio frequency and video or image binary data number system transition flow chart that the embodiment of the present invention provides.Due to Mobile phone is as computer, and all of information represents the most in binary form, audio frequency and video or image information also with Binary form represents.
Specifically, there is a following byte content such as audio frequency and video or image information: 010100102、101000112、111111112、 001010112, its numerical value represented is respectively metric 8210、16310、25510、4310
Above-mentioned metric data are converted to two hexadecimal datas, and according to the assignment of table two, obtain DE26、GH26、 JV26、BR26
And DE26、GH26、JV26、BR26Hexadecimal code be 44 the most respectively164516、47164816、4A165616、 42165216.By 44164516、47164816、4A165616、42165216Substitute into former bytes of audio data, obtain:
010100102=44164516=010001002010001012
101000112=47164816=010001112010010002
111111112=4A165616=010010102010101102
001010112=42165216=010000102010100102
After above-mentioned ciphering process, former audio content changes the most completely, thus has reached the effect of encryption.
Deciphering is the inverse process of encryption, and in embodiments of the present invention, deciphering, will i.e. according to the difference of be-encrypted data type Telephone number, text message, audio frequency and video or image information after encryption carry out respectively numeral system conversion and be reduced to decimal scale, 16 System, binary system.
The encryption method provided corresponding to the embodiment of the present invention, Fig. 6 shows the decryption side that the embodiment of the present invention provides Method, including:
In S601, obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by described notation system Notation system symbol in glossary of symbols is ranked up;
In S602, to any one the notation system symbol assignment in the described notation system symbol after sequence, and according to institute State sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described notation system symbol and number Mapping relations between value;
In S603, the data after encryption are mapped as R binary data according to described mapping relations, by described R system number According to the data be converted to before encrypting.
Data before described encryption include telephone number, the described data be converted to by described R binary data before encrypting, bag Include:
Described R binary data is converted to the decimal data of described telephone number.
Data before described encryption include text message, the described data be converted to by described R binary data before encrypting, bag Include:
Described R binary data is converted into character code;
Obtain described character-coded text message.
Data before described encryption include audio frequency and video or image information, described described R binary data is converted to encryption before Data, including:
Described R binary data is carried out segments value;
R binary data after described segments value is converted to binary data;
Described method also includes:
Data after encryption are converted to R binary data.
Fig. 7 shows embodiment of the present invention encryption (modulation), deciphering (demodulation) functions of modules schematic diagram.
Text, telephone number, audio frequency and video or image information can be reflected by encrypting module respectively as described
The relation of penetrating is converted to the method for expressing of the notation system symbol of corresponding numeral system, as being 20 shown in Fig. 5, Fig. 6 Senary English alphabet represents method, it is also possible to be two duodecimal notation hebrew alphabet representations or two octodenary Arabic words Female representation.
Deciphering module be will encryption after information reverting be initial data.
Can be seen that from Fig. 3-Fig. 5, the embodiment of the present invention is to telephone number, text message, audio frequency and video or image information data Cryptographic operation be different, therefore encrypting-decrypting module to carry out the operation of diversity according to the different objects that calls.
Fig. 8 A is the embodiment of the present invention process chart to telephone number when being provided as caller, the steps include:
Notation system symbolic number after input unencrypted digital number or encryption;
Judge input be unencrypted digital number or encryption after notation system symbolic number;
If input is the notation system symbolic number after encrypting, then to outcall after being decrypted, this is called simultaneously Notation system symbolic number be stored in message registration;
If input is unencrypted digital number, then can directly call, digital number is encrypted simultaneously, and deposit Enter in message registration.
Fig. 8 B is the embodiment of the present invention process chart to telephone number when being provided as called, the steps include:
Receive digital number;(as time called, receive can only be digital number, therefore need to be modulated.)
Described digital number is encrypted;
The notation system symbolic number of display encryption, after processing call, is stored in message registration by notation system symbolic number.
Process chart to text message, its step when sending text message that Fig. 9 A provides for the embodiment of the present invention For:
The ciphertext information sent or unencrypted text message;
Judge transmission is ciphertext information or unencrypted text message;
If send is unencrypted text message, then it is encrypted rear after text message being sent and is stored in record;
If send is the text message of encryption, then sends after text message being encrypted to recipient and be stored in note Record.
The handling process to text message when receiving text message that Fig. 9 B provides for the embodiment of the present invention, the steps include:
Receive or viewing textual information;
Judge that described reception or the text message checked are text message or the unencrypted text messages of encryption;
If described reception or the text message checked are the text messages of encryption, then input key, be decrypted, such as key Correctly, then can normally show text, if wrong cipher key, then show that content will be made mistakes;
If described reception or the text message checked are unencrypted text messages, then directly display text.
Figure 10 A is transmission audio frequency and video or the process chart of image information of embodiment of the present invention offer, the steps include:
Send encryption audio frequency and video or image information, encryption audio frequency and video or image information;
If send is unencrypted audio frequency and video or image information, then it is encrypted place after sending information to recipient Reason, and it is stored in record;
If send is audio frequency and video or the image information of encryption, then it is sent to recipient after information being encrypted, And it is stored in record.
Figure 10 B is reception audio frequency and video or the process chart of image information of embodiment of the present invention offer, the steps include:
Receive or check audio frequency and video or image information;
Judge that described reception or the audio frequency and video checked or image information are information or the unencrypted information of encryption;
If described audio frequency and video or image information are the information of encryption, then directly input key, after being decrypted, show that sound regards Frequency or image information;
If described audio frequency and video or image information are unencrypted information, the most directly show audio frequency and video or image information.
Figure 11 is being encrypted unencrypted text, audio frequency and video or image information of embodiment of the present invention offer Flow chart, step is:
Select text, audio frequency and video or image information;
If after selection text message, carry out text message encryption, and replace original text storage;
If selecting audio frequency and video or image information, carrying out audio frequency and video or prime information storage is encrypted and replaced to image information.
When Figure 12 is intercommunication between the mobile phone that the embodiment of the present invention provides, number presents schematic diagram.
Step the most 2. in, number be the Greek alphabet that sets of mobile phone of 18664979065 as notation system glossary of symbols, by table one Assignment;Number be 13914714023 mobile phone be not carried out encryption.
Step the most 4. in, number be the cyrillic alphabet that sets of mobile phone of 18664979065 as notation system glossary of symbols, by table Five assignment;Number be 13914714023 mobile phone set English and add the symbol that counts for notation system glossary of symbols, by table four assignment.
Step the most 6. in, number is that the phone of 56781234 is without encryption function;Number is the mobile phone setting of 13914714023 English alphabet is notation system glossary of symbols, by table two assignment.
Specifically,
In step 1., regular handset 13914714023 call number 18664979065 mobile phone, calling number 13914714023 are shown as Greek alphabet " the Ζ Υ Γ Ξ Θ Η after encryption by encrypting module on mobile phone 18664979065 ΩΠ”;In step 2., mobile phone 18664979065 directly inputs " Ζ Υ Γ Ξ Θ Η Ω Π ", is demodulated into by deciphering module Number " 13914714023 " calls, and calling number 18664979065 is displayed on mobile phone 13914714023.
In step 3., mobile phone 13914714023 directly inputs called number " GGHGRKCF ", this character decrypted module solution Being adjusted to number 18664979065 and implement calling, the encrypted module of calling number 13914714023 is modulated to cyrillic alphabet " Г К А М Ю В Ь Ц " shown;In step 4., mobile phone 18664979065 directly inputs cyrillic alphabet " Г К А М Ю В Ь Ц ", the decrypted module of this character string is demodulated into number 13914714023 and calls, and calling number 18664979065 is added Close module is modulated to " GGHGRKCF " display.
In step 5., fixed line phone 56781234 inputs called number 13914714023, and calling number 56781234 is added Close module is modulated to English alphabet " IKKBVM " display;In step 6., 13914714023 number mobile phone inputting English letter After " IKKBVM ", decrypted module is demodulated into number " 56781234 " calling, shows main in called phone 56781234 simultaneously Call out the numbers code 13914714023.
The encryption method provided corresponding to the embodiment of the present invention, Figure 13 shows the encryption dress that the embodiment of the present invention provides The structured flowchart put, including:
Definition notation system module 131, for obtaining the character quantity in notation system glossary of symbols and described notation system glossary of symbols R, is ranked up the notation system symbol in described notation system glossary of symbols;
Formulate cipher key module 132, for any one the notation system symbol in the described notation system symbol after sequence is composed Value, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described numeration Mapping relations between symbol processed and numerical value;
First number system transition module 133, with be-encrypted data is converted to R binary data, and according to described mapping relations Described R binary data is mapped as described notation system symbol.
Described be-encrypted data includes that telephone number, described first number system transition module 133 include:
First conversion subelement, is converted to R binary data by described telephone number by decimal data.
Described be-encrypted data includes that text message, described first number system transition module 133 include:
Obtain subelement, for obtaining the character code of each character in text message;
Second conversion subelement, for being converted to R binary data by the character code got.
Described be-encrypted data includes that audio frequency and video or image information, described first number system transition module 133 include:
Quantize subelement, divides in units of byte for being combined by the binary data of described audio frequency and video or image information Do not quantize;
3rd conversion subelement, described audio frequency and video or image information after quantizing are converted to R binary data.
Described device also includes:
Second number system transition module, for being converted to binary data by described notation system symbol.
The decryption method provided corresponding to the embodiment of the present invention, Figure 14 shows a kind of deciphering that the embodiment of the present invention provides Device, including:
Second definition notation system module 141, for obtaining the character in notation system glossary of symbols and described notation system glossary of symbols Amount R, is ranked up the notation system symbol in described notation system glossary of symbols;
Second formulates cipher key module 142, for any one notation system symbol in the described notation system symbol after sequence Number assignment, and according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generate described Mapping relations between notation system symbol and numerical value;
3rd number system transition module 143, for being mapped as R system number by the data after encryption according to described mapping relations According to, described R binary data is converted to the data before encryption.
Data before described encryption include that telephone number, described 3rd number system transition module 143 include:
4th conversion subelement, for being converted to the decimal data of described telephone number by described R binary data.
Data before described encryption include that text message, described 3rd number system transition module 143 include:
5th conversion subelement, for being converted to character code by described R binary data;
Second obtains subelement, is used for obtaining described character-coded for text message.
Data before described encryption include that audio frequency and video or image information, described 3rd number system transition module 143 include:
Second value beggar's unit, for carrying out segments value by described R binary data;
6th conversion subelement, for being converted to binary data by the R binary data after described segments value.
Described device also includes:
4th number system transition module, for being converted to R binary data by the data after encryption.
In the embodiment of the present invention, use and obtain notation system glossary of symbols and amount R thereof, notation system symbol is ranked up;Right Any one symbol assignment in notation system symbol after sequence, and according to described sequence, remaining notation system symbol is carried out position Move assignment, generate the mapping relations between notation system symbol and numerical value;Be-encrypted data is converted to R binary data, by described R Binary data is mapped as described notation system symbol.By the mapping relations of notation system symbol and numerical value by encryption data in the present invention It is mapped as notation system symbol, and user can customize key, make information have an extremely strong confidentiality, and the information encrypted is with can The ciphertext form read presents, and possesses readability.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any amendment, equivalent and the improvement etc. made within god and principle, should be included within the scope of the present invention.

Claims (20)

1. an encryption method, it is characterised in that including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by the note in described notation system glossary of symbols Numeral system symbol is ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, to remaining Described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates the mapping between described notation system symbol and numerical value and closes System;
Be-encrypted data is converted to R binary data, and according to described mapping relations, described R binary data is mapped as described note Numeral system symbol.
2. the method for claim 1, it is characterised in that described be-encrypted data includes telephone number, described by be added Ciphertext data is converted to R binary data, including:
Described telephone number is converted to R binary data by decimal data.
3. the method for claim 1, it is characterised in that described be-encrypted data includes text message, described by be added Ciphertext data is converted to R binary data and includes:
Obtain the character code of each character in text message;
The character code got is converted to R binary data.
4. the method for claim 1, it is characterised in that described be-encrypted data includes audio frequency and video or image information, institute State and be-encrypted data is converted to R binary data, including:
It is that unit quantizes respectively by the binary number byte according to this of described audio frequency and video or image information;
Described audio frequency and video or image information after quantizing are converted to R binary data.
5. method as claimed in claim 4, it is characterised in that described method also includes:
Described notation system symbol is converted to binary data.
6. a decryption method, it is characterised in that including:
Obtain the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, by the note in described notation system glossary of symbols Numeral system symbol is ranked up;
To any one the notation system symbol assignment in the described notation system symbol after sequence, and according to described sequence, to remaining Described notation system symbol carries out displacement assignment according to default ordered series of numbers, generates the mapping between described notation system symbol and numerical value and closes System;
Data after encryption are mapped as R binary data according to described mapping relations, before described R binary data is converted to encryption Data.
7. method as claimed in claim 6, it is characterised in that the data before described encryption include telephone number, described by institute State the data before R binary data is converted to encryption, including:
Described R binary data is converted to the decimal data of described telephone number.
8. method as claimed in claim 6, it is characterised in that the data before described encryption include text message, described by institute State the data before R binary data is converted to encryption, including:
Described R binary data is converted into character code;
Obtain described character-coded text message.
9. method as claimed in claim 6, it is characterised in that the data before described encryption include audio frequency and video or image information, The described data described R binary data is converted to before encrypting, including:
Described R binary data is carried out segments value;
R binary data after described segments value is converted to binary data.
10. method as claimed in claim 9, it is characterised in that described method also includes:
Data after encryption are converted to R binary data.
11. 1 kinds of encryption devices, it is characterised in that including:
First definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will Notation system symbol in described notation system glossary of symbols is ranked up;
First formulates cipher key module, is used for any one the notation system symbol assignment in the described notation system symbol after sequence, And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system Mapping relations between symbol and numerical value;
First number system transition module, for being converted to R binary data, and according to described mapping relations by described by be-encrypted data R binary data is mapped as described notation system symbol.
12. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes telephone number, described first Number system transition module includes:
First conversion subelement, is converted to R binary data by described telephone number by decimal data.
13. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes text message, described first Number system transition module includes:
First obtains subelement, for obtaining the character code of each character in text message;
Second conversion subelement, for being converted to R binary data by the character code got.
14. devices as claimed in claim 11, it is characterised in that described be-encrypted data includes audio frequency and video or image information, Described first number system transition module includes:
First quantizes subelement, for being combined by the binary data of described audio frequency and video or image information in units of byte point Do not quantize;
3rd conversion subelement, described audio frequency and video or image information after quantizing are converted to R binary data.
15. devices as claimed in claim 14, it is characterised in that described device also includes:
Second number system transition module, for being converted to binary data by described notation system symbol.
16. 1 kinds of deciphering devices, it is characterised in that including:
Second definition notation system module, for obtaining the character quantity R in notation system glossary of symbols and described notation system glossary of symbols, will Notation system symbol in described notation system glossary of symbols is ranked up;
Second formulates cipher key module, is used for any one the notation system symbol assignment in the described notation system symbol after sequence, And according to described sequence, notation system symbol remaining described is carried out displacement assignment according to default ordered series of numbers, generates described notation system Mapping relations between symbol and numerical value;
3rd number system transition module, for being mapped as R binary data according to described mapping relations, by described by the data after encryption R binary data is converted to the data before encryption.
17. devices as claimed in claim 16, it is characterised in that the data before described encryption include telephone number, described Three number system transition modules include:
4th conversion subelement, for being converted to the decimal data of described telephone number by described R binary data.
18. devices as claimed in claim 16, it is characterised in that the data before described encryption include text message, described Three number system transition modules include:
5th conversion subelement, for being converted to character code by described R binary data;
Second obtains subelement, is used for obtaining described character-coded for text message.
19. devices as claimed in claim 16, it is characterised in that the data before described encryption include audio frequency and video or image letter Breath, described 3rd number system transition module includes:
Second value beggar's unit, for carrying out segments value by described R binary data;
6th conversion subelement, for being converted to binary data by the R binary data after described segments value.
20. devices as claimed in claim 19, it is characterised in that described device also includes:
4th number system transition module, for being converted to R binary data by the data after encryption.
CN201610674185.3A 2016-08-16 2016-08-16 Information encryption and decryption method and device Expired - Fee Related CN106131051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610674185.3A CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610674185.3A CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN106131051A true CN106131051A (en) 2016-11-16
CN106131051B CN106131051B (en) 2019-06-21

Family

ID=57259091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610674185.3A Expired - Fee Related CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN106131051B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804933A (en) * 2018-05-25 2018-11-13 东北大学 A kind of system conversion method for big data
CN109325354A (en) * 2017-07-31 2019-02-12 阿里巴巴集团控股有限公司 Storage, processing and the read method of data, data storage device and system
CN109889339A (en) * 2018-12-29 2019-06-14 广州市宏大欣电子科技有限公司 A kind of data encryption device and method
CN110335586A (en) * 2018-03-31 2019-10-15 深圳市掌网科技股份有限公司 A kind of information conversion method and system
CN112364368A (en) * 2020-12-02 2021-02-12 四川长虹电器股份有限公司 Telephone number encryption storage method
CN113626849A (en) * 2021-08-26 2021-11-09 杭州安恒信息技术股份有限公司 Character string desensitization method, device, equipment and storage medium
CN114255861A (en) * 2022-01-20 2022-03-29 苏州景昱医疗器械有限公司 Data processing method, device, medium and equipment of medical implantation equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
US20100277352A1 (en) * 2009-05-01 2010-11-04 Mark Ellery Ogram Variable length encryption
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103208229A (en) * 2012-01-11 2013-07-17 孙强国 Information processing and transmission method based on nonstandard code
CN105721882A (en) * 2016-04-18 2016-06-29 上海泥娃通信科技有限公司 Separated coding and decoding method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100277352A1 (en) * 2009-05-01 2010-11-04 Mark Ellery Ogram Variable length encryption
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN103208229A (en) * 2012-01-11 2013-07-17 孙强国 Information processing and transmission method based on nonstandard code
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN105721882A (en) * 2016-04-18 2016-06-29 上海泥娃通信科技有限公司 Separated coding and decoding method and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325354A (en) * 2017-07-31 2019-02-12 阿里巴巴集团控股有限公司 Storage, processing and the read method of data, data storage device and system
CN110335586A (en) * 2018-03-31 2019-10-15 深圳市掌网科技股份有限公司 A kind of information conversion method and system
CN110335586B (en) * 2018-03-31 2021-07-02 深圳市掌网科技股份有限公司 Information conversion method and system
CN108804933A (en) * 2018-05-25 2018-11-13 东北大学 A kind of system conversion method for big data
CN108804933B (en) * 2018-05-25 2020-06-05 东北大学 Method for carrying out scale conversion on big data in information hiding technology
CN109889339A (en) * 2018-12-29 2019-06-14 广州市宏大欣电子科技有限公司 A kind of data encryption device and method
CN112364368A (en) * 2020-12-02 2021-02-12 四川长虹电器股份有限公司 Telephone number encryption storage method
CN113626849A (en) * 2021-08-26 2021-11-09 杭州安恒信息技术股份有限公司 Character string desensitization method, device, equipment and storage medium
CN114255861A (en) * 2022-01-20 2022-03-29 苏州景昱医疗器械有限公司 Data processing method, device, medium and equipment of medical implantation equipment

Also Published As

Publication number Publication date
CN106131051B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN106131051B (en) Information encryption and decryption method and device
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
CN106453268B (en) A method of realizing express delivery secret protection in logistics progress
US6058187A (en) Secure telecommunications data transmission
US8433068B2 (en) Method and apparatus for communication based on pseudo-contact information
CN105719120A (en) Method for encrypting privacy information on express waybills
CN105229985B (en) Identity tokens
CN103401676A (en) Two-dimensional barcode-based logistics industry personal information privacy protection system and method
US10461934B2 (en) Authentication-based message display method and communication terminal thereof
CN103095890A (en) Contact person information encryption method and communication terminal
CN107124500A (en) The display methods and display device of address list in a kind of communication equipment
CN102684877A (en) Method and device for carrying out user information processing
CN104243149A (en) Encrypting and decrypting method, device and server
CN107666395A (en) One population file management method, user terminal, group chat system
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
US9418215B2 (en) Optical security enhancement device
Iranmanesh et al. On using emoticons and lingoes for hiding data in SMS
AU2016241382A1 (en) Secure and confidential messaging systems
CN115118453A (en) Mailing sensitive information privacy protection method based on commercial cipher algorithm
US10728191B2 (en) Method for establishing communication within a closed network
US11210407B2 (en) Electronic communications device and messaging application therefor
CN110941815A (en) Novel password
CN116561788B (en) Electronic identity code encryption, decoding and key management system and method
Kingslin et al. Design of a Security Based Technique for Handling Secure SMS in Mobile Phones using Text Steganography
EP3686764A1 (en) Electronic communications device and messaging application therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190621

Termination date: 20210816