CN106131051B - Information encryption and decryption method and device - Google Patents

Information encryption and decryption method and device Download PDF

Info

Publication number
CN106131051B
CN106131051B CN201610674185.3A CN201610674185A CN106131051B CN 106131051 B CN106131051 B CN 106131051B CN 201610674185 A CN201610674185 A CN 201610674185A CN 106131051 B CN106131051 B CN 106131051B
Authority
CN
China
Prior art keywords
notation system
data
binary data
converted
symbol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610674185.3A
Other languages
Chinese (zh)
Other versions
CN106131051A (en
Inventor
高金铎
高峰
王哲
武小毛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shendun Electronic Technology Co Ltd
Original Assignee
Shenzhen Shendun Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shendun Electronic Technology Co Ltd filed Critical Shenzhen Shendun Electronic Technology Co Ltd
Priority to CN201610674185.3A priority Critical patent/CN106131051B/en
Publication of CN106131051A publication Critical patent/CN106131051A/en
Application granted granted Critical
Publication of CN106131051B publication Critical patent/CN106131051B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention is suitable for field of cryptography, provides information encryption and decryption method and device, comprising: obtains the character quantity R in notation system glossary of symbols and the notation system glossary of symbols, the notation system symbol in the notation system glossary of symbols is ranked up;To any one notation system symbol assignment in the notation system symbol after sequence, and according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the mapping relations between the notation system symbol and numerical value;Be-encrypted data is converted into R binary data, and the R binary data is mapped as the notation system symbol according to the mapping relations.Encryption data is mapped as notation system symbol by the mapping relations of notation system symbol and numerical value in the present invention, and user can customize key, makes information that there is extremely strong confidentiality.

Description

Information encryption and decryption method and device
Technical field
The invention belongs to field of cryptography more particularly to a kind of information encryption and decryption method and devices.
Background technique
Information security is a relationship national security, social stability, the major issue of family harmony.Its importance, just with Global IT application paces quickening it is more and more important.Mobile phone is more than a communication tool already, more at modern life Indispensable important component in work.In mobile phone photograph, mobile payment, it is convenient and convenient and fast that periodic traffic etc. brings us When, the safety of mobile phone also seems more important.
In order to cope with the mobile phone information safety problem to become increasingly conspicuous, people use many methods, such as: blanking information source phone Number, blanking information source customer name, change file suffixes etc. belong to relatively simple method.At present cellphone information is implemented to encrypt Method be: communication system (such as certain instantaneous communication system) sets up one in mobile phone and is specifically used to store secret (short message or i.e. Shi Tongxin) the region of information, owner, which may specify, thinks more Very Important Person, and the Content of Communication for being designated client will be stored into the area Domain.The method is not implemented to encrypt in the transmit process of information to information, that is, uses clear-text way, only information is transmitted to So-called " secret " space is entered after the stay of two nights.Private space be not it is open, into need password authentification can, that is, Say that password is usually by the character string of owner's sets itself, figure stroke or fingerprint to read this type of information and need to obtain password Deng.Such method seems fool proof, but it can only cope with general demand, enters so-called private for professionals first Without lifting an eyebrow, secondly the transmission of information need to pass through system platform in close space, and the cleartext information of this unencryption is same in system background Sample is available.
Summary of the invention
The embodiment of the present invention provides a kind of information encryption and decryption method and device, it is intended to solve current encryption method safety The low problem of coefficient.
The embodiments of the present invention are implemented as follows, a kind of encryption method, comprising:
The character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, it will be in the notation system glossary of symbols Notation system symbol be ranked up;
It is right to any one notation system symbol assignment in the notation system symbol after sequence, and according to the sequence Remaining described notation system symbol carries out displacement assignment according to preset ordered series of numbers, generates reflecting between the notation system symbol and numerical value Penetrate relationship;
Be-encrypted data is converted into R binary data, and the R binary data is mapped as institute according to the mapping relations State notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of decryption method, comprising:
The character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, it will be in the notation system glossary of symbols Notation system symbol be ranked up;
It is right to any one notation system symbol assignment in the notation system symbol after sequence, and according to the sequence Remaining described notation system symbol carries out displacement assignment according to preset ordered series of numbers, generates reflecting between the notation system symbol and numerical value Penetrate relationship;
Encrypted data are mapped as R binary data according to the mapping relations, the R binary data is converted to and is added Data before close.
The another object of the embodiment of the present invention is to provide a kind of encryption device, comprising:
Notation system module is defined, it, will for obtaining the character quantity R in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up;
Cipher key module is formulated, for any one notation system symbol assignment in the notation system symbol after sequence, And according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the notation system Mapping relations between symbol and numerical value;
First number system transition module, for be-encrypted data to be converted to R binary data, and will according to the mapping relations The R binary data is mapped as the notation system symbol.
The another object of the embodiment of the present invention is to provide a kind of decryption device, comprising:
Second defines notation system module, for obtaining the character quantity in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up by R;
Second formulates cipher key module, for assigning to any one notation system symbol in the notation system symbol after sequence Value, and according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the numeration Mapping relations between symbol and numerical value processed;
Third number system transition module will for encrypted data to be mapped as R binary data according to the mapping relations The R binary data is converted to data before encrypting.
In the embodiment of the present invention, using notation system glossary of symbols and its amount R is obtained, notation system symbol is ranked up;It is right Any one symbol assignment in notation system symbol after sequence, and according to the sequence, position is carried out to remaining notation system symbol Assignment is moved, the mapping relations between notation system symbol and numerical value are generated;Be-encrypted data is converted into R binary data, by the R Binary data is mapped as the notation system symbol.Such encryption method confidentiality is extremely strong, and the information encrypted is with readable Ciphertext form is presented, and has readability.
Detailed description of the invention
Fig. 1 is encryption method flow chart provided in an embodiment of the present invention;
Fig. 2A is the sequence of notation system symbol provided in an embodiment of the present invention;
The mapping relations of notation system symbol and numerical value when Fig. 2 B is G=0 under Fig. 2A provided in an embodiment of the present invention sorts;
Fig. 3 is telephone number number system transition flow chart provided in an embodiment of the present invention;
Fig. 4 is that the embodiment of the present invention is text information number system transition flow chart provided in an embodiment of the present invention;
Fig. 5 is audio-video provided in an embodiment of the present invention or image binary data number system transition flow chart;
Fig. 6 is decryption method flow chart provided in an embodiment of the present invention;
Fig. 7 is encryption (modulation) provided in an embodiment of the present invention, decryption (demodulation) functions of modules schematic diagram;
Fig. 8 A be it is provided in an embodiment of the present invention as caller when to the process flow diagram of telephone number;
Fig. 8 B be it is provided in an embodiment of the present invention as it is called when to the process flow diagram of telephone number;
To the process flow diagram of text information when Fig. 9 A is sending information information provided in an embodiment of the present invention;
To the process flow diagram of text information when Fig. 9 B is reception text information provided in an embodiment of the present invention;
Figure 10 A is the transmission flow figure of transmission audio-video or image information provided in an embodiment of the present invention;
Figure 10 B is the reception flow chart of audio-video or image information provided in an embodiment of the present invention;
Figure 11 encryption process sequence provided in an embodiment of the present invention to non-encrypted text, audio-video or image information Figure;
Figure 12 is the presentation schematic diagram of number when communicating with each other between mobile phone provided in an embodiment of the present invention;
Figure 13 is encryption device block diagram provided in an embodiment of the present invention;
Figure 14 is decryption device block diagram provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The embodiment of the present invention is to be introduced by taking mobile phone cipher as an example, but be not limited to mobile phone.The embodiment of the present invention can also To be applied to other terminals or equipment, the terminal includes but is not limited to mobile phone, tablet computer, laptop etc.;It is described to set Standby including but not limited to interchanger, reason device etc..
Fig. 1 shows the process of encryption method provided in an embodiment of the present invention, and details are as follows:
In S101, the character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, by the notation system Notation system symbol in glossary of symbols is ranked up.
The notation system glossary of symbols selected one of the language situation of mobile phone territory of use can suitably be remembered according to Numeral system glossary of symbols.26 Latins (English/phonetic) letter such as may be selected as notation system glossary of symbols, in the Slav family of languages in China Optional 32 cyrillic alphabets of country select 28 Arabic alphabets as note as notation system glossary of symbols, in Arab countries Numeral system glossary of symbols etc..Using the non-English speaking country of the Latin alphabet, it is in varying numbers using the Latin alphabet, and Italy is 21, Portugal Grape tooth is 23,27, Spain etc., can select notation system glossary of symbols according to the actual situation.It can also be at described 26 Increase several symbols on the basis of the Latin alphabet, such as: increase by 4 [,] ,/symbol, form 30 notation system symbols as numeration Glossary of symbols processed.
Character quantity R in the notation system glossary of symbols, also determines that while getting the notation system glossary of symbols ?.The character quantity R being listed below in several notation system glossary of symbols and the notation system glossary of symbols:
English alphabet26=[ABCDEFGHIJKLMNOPQRSTUVWXYZ], R=26;
English character30=[ABCDEFGHIJKLMNOPQRSTUVWXYZ [] /], R=30;
Cyrillic alphabet32=[А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т y Ф Х Ц Ч Ш Щ Ъ Ы Ь Э Ю Я], R=32;
Greek alphabet24=[Α Β Γ Δ Ε Ζ Η Θ Ι Κ Λ Μ Ν Ξ Ο Π Ρ Σ Τ Υ Φ Χ Ψ Ω], R=24;
Italian letter21=[ABCDEFGHILMNOPQRSTUVYZ], R=21;
... etc..
The notation system symbol by the notation system glossary of symbols is ranked up, such as table one to the sequence of table five.
For the scheme being ranked up to notation system symbol, it is preferable that by each note in the notation system glossary of symbols Numeral system symbol assigns numerical value, to mark the sequence of notation system symbol according to the numerical value of imparting.
Preferably, notation system symbol can also sort according to any order, and without point of superiority and inferiority, notation system symbol is different The numerical value of sorting representationb is different.Such as 26 English alphabet notation system symbols, can be both ordered as such as two English alphabet of table Its assignment can also be ordered as its assignment with table six.Different sequence assignment, only so that finally indicating the symbol combination of numerical value Difference has no effect on numerical value content.As decimal number 1471 is converted into two hexadecimal representations by two letter sequence of table are as follows: 147110=CEP26, but then indicated according to the sequence of table six are as follows: 147110=CVZ26
One: two ten quaternary of table (Greek alphabet sequence)
Two: two hexadecimal of table (English alphabet sequence)
Three: two octodenary of table (Arabic alphabet sequence)
Four: three decimal system of table (English alphabet+number symbol sequence)
Table five: duotricemary notation (cyrillic alphabet sequence)
Six: two hexadecimal of table (English alphabet sequence)
In S102, to any one notation system symbol assignment in the notation system symbol after sequence, and according to institute Sequence is stated, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the notation system symbol and number Mapping relations between value.
Preferably, " 0 " is assigned a value of to any one described notation system symbol.
Preferably, the preset ordered series of numbers is arithmetic progression, and tolerance is "+1 " or " -1 ".
In embodiments of the present invention, the ordering scenario of Fig. 2A image illustrated to the notation system glossary of symbols shown in table two, Fig. 2 B shows and is assigned a value of " G=0 " to notation system symbol G under Fig. 2A sequence, remaining notation system symbol is according to arithmetic progression tolerance Mapping relations when carrying out displacement assignment clockwise for 1, between notation system symbol and numerical value." G=0 " is key, and user is only It needs to remember " G=0 " this assignment, it is simple more than a traditional given telephone number either ID card No., convenient for note Recall.
Similarly, as enable " B=0 ", " H=0 ", " I=0 " ..., if indicate different key under Fig. 2A sequence.
In Fig. 2 B, numeration is made as two hexadecimals, secondly it is 26 that number of keys, which can be generated, in 16 notation system symbols altogether! ≈ 40,300,000,000 hundred million hundred million.It is cracked according to the speed of No. 2 3.39 hundred million hundred million times/second of the computer Milky Way most fast in the world, also takes 377 years It can decode, therefore encryption method has extremely strong confidentiality.
In S103, be-encrypted data is converted into R binary data, and according to the mapping relations by the R system number According to being mapped as the notation system symbol.
Described that be-encrypted data is converted to R binary data, according to the difference of the type of be-encrypted data, conversion regime is not Together, for example, telephone number, text information etc..
Below for different data types, to be specifically described to S103:
Situation one:
The be-encrypted data includes telephone number, in this case, described that be-encrypted data is converted to R binary data Be implemented as follows:
The telephone number is converted into R binary data by decimal data.
Fig. 3 is that telephone number number system transition flow chart provided in an embodiment of the present invention specifically shows telephone number 1391471402310、866276123410Number system transition process.
Telephone number 8662761234 can both regard number " 8,600,006,276 Wan Yiqian 203 as 14 ", three sections can also be divided into according to the habit of telecom coding and be expressed as 86 " 86 ", 6276 " 6,270 Six " and 1234 " 1,234 " three ten's digits.
26 systems are converted by 86,6276,1,234 3 decimal numbers.Wherein 86 divided by 26, Shang Wei 3, remainder 8, i.e., Metric 86 corresponding two hexadecimal is 38, and it is notation system glossary of symbols that two hexadecimals, which select 26 English alphabets, according to The assignment of table two, 3 and 8 respectively correspond D and I.Similarly 6276 corresponding JHK, 1234 corresponding BVM.I.e. 866276123410= DIJHKBVM26
Similarly, telephone number 1391471402310It can be segmented and be divided into three ten's digits: 13910、147110With 402310.By 13910、147110With 402310Two hexadecimals are respectively converted into, it is numeration that hexadecimal, which selects 26 English alphabets, Glossary of symbols processed, according to the assignment of table two, 1391471402310=FJCEPFYT26
If selecting duotricemary notation cyrillic alphabet for notation system symbol, according to the assignment of table four, by telephone number 866276123410Duotricemary notation data after carrying out number system transition are mapped as notation system symbol are as follows:
866276123410=Б Х Е Г Г А Е С32
Similarly, telephone number 1391471402310, duotricemary notation (cyrillic alphabet), 20 quaternarys are carried out respectively After the conversion of (Greek alphabet) and three decimal systems (English character) are as follows:
1391471402310=Г К А М Ю В Ь Ц32
1391471402310=Ζ Υ Γ Ξ Θ Η Ω Π24
1391471402310=ETBTBEOD30
It will be seen from the foregoing that the length of telephone number shortens after encryption, so that dialing more succinctly, simultaneously Also occupying for system memory size can be reduced.
Situation two:
The be-encrypted data includes text information, described be-encrypted data is converted to R binary data to include:
Obtain the character code of each character in text information;
The character code that will acquire is converted to R binary data.
Preferably, the character code is Unicode code.
Specifically, the text information includes short message, Mail Contents, text interaction of instant messaging etc..
It is text information number system transition flow chart provided in an embodiment of the present invention that Fig. 4, which shows the embodiment of the present invention, specifically Ground, text information of the embodiment of the present invention are " State Intellectual Property Office ".
The hexadecimal code (Unicode) of " State Intellectual Property Office " each Chinese character respectively is: 56FD16、 5BB616、77E516、8BC616、4EA716、674316、5C4016
By the hexadecimal code (Unicode) 56FD16Being converted to decimal data is 2226910
By decimal data 2226910Two hexadecimal datas are converted to, and show text according to the encryption that two assignment of table obtains This are as follows: BGYN26
Similarly,
5BB616Decimal data is 2347810, after being converted to two hexadecimals, display text are as follows: BITA26
77E516Decimal data is 3069310, after being converted to two hexadecimals, display text are as follows: BTKN26
8BC616Decimal data is 3578210, after being converted to two hexadecimals, display text are as follows: CAYG26
4EA716Decimal data is 2013510, after being converted to two hexadecimals, display text are as follows: BDUL26
674316Decimal data is 2643510, after being converted to two hexadecimals, display text are as follows: BNCT26
5C4016Decimal data is 2361610, after being converted to two hexadecimals, display text are as follows: BIYI26
Further, the hexadecimal code (Unicode/Ascii) of above-mentioned encryption display text English alphabet is respectively as follows:
BGYN26=42 47 59 4E16
BITA26=42 49 59 4116
BTKN26=42 54 4B 4E16
CAYG26=43 41 59 4716
BDUL26=42 44 55 4C16
BNCT26=42 4E 43 5416
BIYI26=42 49 59 4916
That is B=4216, G=4716, Y=5916, N=4E16....
Display text " State Intellectual Property Office " encryption after display become " BGYN, BITA, BTKN, CAYG, BDUL, BNCT, BIYI”。
View of the foregoing, it will be seen that the display content of display text has changed, therefore encryption is achieved the effect that.
Situation three:
The be-encrypted data includes audio-video or image information, described that be-encrypted data is converted to R binary data, packet It includes:
By the binary number of the audio-video or image information, byte is that unit quantizes respectively accordingly;
By after numeralization the audio-video or image information be converted to R binary data.
Fig. 5 shows audio-video provided in an embodiment of the present invention or image binary data number system transition flow chart.Due to As computer, all information indicates mobile phone in binary form, audio-video or image information also with What binary form indicated.
Specifically, as audio-video or image information have a following byte content: 010100102、101000112、111111112、 001010112, the numerical value indicated is respectively metric 8210、16310、25510、4310
Above-mentioned metric data are converted into two hexadecimal datas, and according to the assignment of table two, obtain DE26、GH26、 JV26、BR26
And DE26、GH26、JV26、BR26Hexadecimal code again be 44 respectively164516、47164816、4A165616、 42165216.By 44164516、47164816、4A165616、42165216Former bytes of audio data is substituted into, is obtained:
010100102=44164516=010001002010001012
101000112=47164816=010001112010010002
111111112=4A165616=010010102010101102
001010112=42165216=010000102010100102
After above-mentioned ciphering process, former audio content changes completely, to achieve the effect that encryption.
Decryption is the inverse process of encryption, and in embodiments of the present invention, decryption, will i.e. according to the difference of be-encrypted data type Encrypted telephone number, text information, audio-video or image information carry out numeral system transformation respectively and are reduced to the decimal system, 16 System, binary system.
Corresponding to encryption method provided by the embodiment of the present invention, Fig. 6 shows decryption side provided in an embodiment of the present invention Method, comprising:
In S601, the character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, by the notation system Notation system symbol in glossary of symbols is ranked up;
In S602, to any one notation system symbol assignment in the notation system symbol after sequence, and according to institute Sequence is stated, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the notation system symbol and number Mapping relations between value;
In S603, encrypted data are mapped as R binary data according to the mapping relations, by the R system number According to being converted to data before encrypting.
The data before encrypting include telephone number, described that the R binary data is converted to data before encrypting, packet It includes:
The R binary data is converted to the decimal data of the telephone number.
The data before encrypting include text information, described that the R binary data is converted to data before encrypting, packet It includes:
Character code is converted by the R binary data;
Obtain the text information of the character code.
The data before encrypting include audio-video or image information, it is described the R binary data is converted into encryption before Data, comprising:
The R binary data is subjected to segmentation numeralization;
R binary data after the segmentation numeralization is converted into binary data;
The method also includes:
Encrypted data are converted into R binary data.
Fig. 7 shows encryption of the embodiment of the present invention (modulation), decryption (demodulation) functions of modules schematic diagram.
Encrypting module can respectively be reflected text, telephone number, audio-video or image information as described
The relationship of penetrating is converted to the representation method of the notation system symbol of corresponding numeral system, such as can be Fig. 5, shown in fig. 6 20 Senary English alphabet indicates method, is also possible to two duodecimal notation hebrew alphabet representations or two octodenary Arabic words Female representation.
Deciphering module is that encrypted information is reduced to initial data.
It can be seen that from Fig. 3-Fig. 5, the embodiment of the present invention is to telephone number, text information, audio-video or image information data Cryptographic operation be different, therefore encrypting-decrypting module will be according to the different operations for calling object to carry out otherness.
Fig. 8 A be it is provided in an embodiment of the present invention as caller when to the process flow diagram of telephone number, the steps include:
Input the digital number or encrypted notation system symbolic number of unencryption;
What judgement inputted is the digital number or encrypted notation system symbolic number of unencryption;
If input is encrypted notation system symbolic number, to outcall after being decrypted, while this being called Notation system symbolic number be stored in message registration;
If what is inputted is the digital number of unencryption, can directly call, while digital number is encrypted, and deposit Enter in message registration.
Fig. 8 B be it is provided in an embodiment of the present invention as it is called when to the process flow diagram of telephone number, the steps include:
Receive digital number;(as it is called when, what is received can only be digital number, therefore need to be modulated.)
The digital number is encrypted;
It shows the notation system symbolic number of encryption, after processing call, notation system symbolic number is stored in message registration.
To the process flow diagram of text information, step when Fig. 9 A is sending information information provided in an embodiment of the present invention Are as follows:
The ciphertext information of transmission or the text information of unencryption;
What judgement was sent is the text information of ciphertext information or unencryption;
If what is sent is the text information of unencryption, after being encrypted after text information is sent and it is stored in record;
If what is sent is the text information of encryption, it is sent to recipient after text information is encrypted and is stored in note Record.
To the process flow of text information when Fig. 9 B is reception text information provided in an embodiment of the present invention, the steps include:
Reception or viewing textual information;
Judge the reception or the text information checked is the text information of encryption or the text information of unencryption;
If the reception or the text information checked are the text informations of encryption, key is inputted, is decrypted, such as key Correctly, then can normal display text if wrong cipher key show that content will malfunction;
If the reception or the text information checked are the text informations of unencryption, text is directly displayed.
Figure 10 A is the process flow diagram of transmission audio-video or image information provided in an embodiment of the present invention, be the steps include:
Send the audio-video or image information of encryption, or the audio-video or image information of encryption;
If what is sent is the audio-video or image information of unencryption, carried out at encryption after sending information to recipient Reason, and it is stored in record;
If what is sent is the audio-video or image information of encryption, recipient is sent to after information is encrypted, And it is stored in record.
Figure 10 B is the process flow diagram of reception audio-video or image information provided in an embodiment of the present invention, be the steps include:
Receive or check audio-video or image information;
Judge the reception or the audio-video or image information checked are the information of encryption or the information of unencryption;
If the audio-video or image information are the information of encryption, key is directly inputted, sound view is shown after being decrypted Frequency or image information;
If the audio-video or image information are the information of unencryption, audio-video or image information are directly shown.
Figure 11 is provided in an embodiment of the present invention non-encrypted text, audio-video or image information to be encrypted Flow chart, step are as follows:
Select text, audio-video or image information;
If after selecting text information, carrying out text information encryption, and replace original text storage;
If selecting audio-video or image information, carries out audio-video or image information encrypts and replaces prime information storage.
Figure 12 is the presentation schematic diagram of number when communicating with each other between mobile phone provided in an embodiment of the present invention.
Step 1. 2. in, the Greek alphabet that the mobile phone that number is 18664979065 is set is notation system glossary of symbols, by table one Assignment;Encryption is not carried out in the mobile phone that number is 13914714023.
Step 3. 4. in, the cyrillic alphabet that the mobile phone that number is 18664979065 is set is notation system glossary of symbols, by table Five assignment;It is notation system glossary of symbols that the mobile phone setting English that number is 13914714023, which adds number symbol, by four assignment of table.
Step 5. 6. in, number be 56781234 phone without encryption function;The mobile phone that number is 13914714023 is set English alphabet is notation system glossary of symbols, by two assignment of table.
Specifically,
Step 1., 13914714023 call number of regular handset, 18664979065 mobile phone, calling number 13914714023 are shown as encrypted Greek alphabet " Ζ Υ Γ Ξ Θ Η by encrypting module on mobile phone 18664979065 ΩΠ";Step 2., mobile phone 18664979065 directly inputs " Ζ Υ Γ Ξ Θ Η Ω Π ", is demodulated by deciphering module Number " 13914714023 " calling, calling number 18664979065 are displayed on mobile phone 13914714023.
Step 3., mobile phone 13914714023 directly inputs called number " GGHGRKCF ", which is decrypted module solution It is adjusted to number 18664979065 and implements calling, calling number 13914714023 is encrypted module and is modulated to cyrillic alphabet " Г К А М Ю В Ь Ц " is shown;Step 4., cyrillic alphabet " Г К А М is directly inputted on mobile phone 18664979065 Ю В Ь Ц ", the character string are decrypted module and are demodulated into the calling of number 13914714023, and calling number 18664979065 is added Close module is modulated to " GGHGRKCF " display.
Step 5., fixed line phone 56781234 inputs called number 13914714023, and calling number 56781234 added Close module is modulated to English alphabet " IKKBVM " display;Step 6., 13914714023 number mobile phone inputting English letters After " IKKBVM ", decrypted module is demodulated into number " 56781234 " calling, while master is shown in called phone 56781234 It calls out the numbers code 13914714023.
Corresponding to encryption method provided by the embodiment of the present invention, Figure 13 shows encryption dress provided in an embodiment of the present invention The structural block diagram set, comprising:
Notation system module 131 is defined, for obtaining the character quantity in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up by R;
Cipher key module 132 is formulated, for assigning to any one notation system symbol in the notation system symbol after sequence Value, and according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the numeration Mapping relations between symbol and numerical value processed;
First number system transition module 133 is converted to R binary data with by be-encrypted data, and according to the mapping relations The R binary data is mapped as the notation system symbol.
The be-encrypted data includes telephone number, and the first number system transition module 133 includes:
The telephone number is converted to R binary data by decimal data by the first conversion subunit.
The be-encrypted data includes text information, and the first number system transition module 133 includes:
Subelement is obtained, for obtaining the character code of each character in text information;
Second conversion subunit, the character code for will acquire are converted to R binary data.
The be-encrypted data includes audio-video or image information, and the first number system transition module 133 includes:
Quantize subelement, is divided as unit of byte for combining the binary data of the audio-video or image information It does not quantize;
Third conversion subunit, for the audio-video after quantizing or image information to be converted to R binary data.
Described device further include:
Second number system transition module, for the notation system symbol to be converted to binary data.
Corresponding to decryption method provided in an embodiment of the present invention, Figure 14 shows a kind of decryption provided in an embodiment of the present invention Device, comprising:
Second defines notation system module 141, for obtaining the character in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up by amount R;
Second formulates cipher key module 142, for according with to any one notation system in the notation system symbol after sequence Number assignment, and according to the sequence carries out displacement assignment according to preset ordered series of numbers remaining described notation system symbol, described in generation Mapping relations between notation system symbol and numerical value;
Third number system transition module 143, for encrypted data to be mapped as R system number according to the mapping relations According to the R binary data is converted to data before encrypting.
The data before encrypting include telephone number, and the third number system transition module 143 includes:
4th conversion subunit, for the R binary data to be converted to the decimal data of the telephone number.
The data before encrypting include text information, and the third number system transition module 143 includes:
5th conversion subunit, for the R binary data to be converted to character code;
Second obtains subelement, is text information for obtaining the character code.
The data before encrypting include audio-video or image information, and the third number system transition module 143 includes:
Second value beggar's unit, for the R binary data to be carried out segmentation numeralization;
6th conversion subunit, for the R binary data after the segmentation numeralization to be converted to binary data.
Described device further include:
4th number system transition module, for encrypted data to be converted to R binary data.
In the embodiment of the present invention, using notation system glossary of symbols and its amount R is obtained, notation system symbol is ranked up;It is right Any one symbol assignment in notation system symbol after sequence, and according to the sequence, position is carried out to remaining notation system symbol Assignment is moved, the mapping relations between notation system symbol and numerical value are generated;Be-encrypted data is converted into R binary data, by the R Binary data is mapped as the notation system symbol.By the mapping relations of notation system symbol and numerical value by encryption data in the present invention It is mapped as notation system symbol, and user can customize key, makes information that there is extremely strong confidentiality, and the information encrypted is with can The ciphertext form of reading is presented, and has readability.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (20)

1. a kind of encryption method characterized by comprising
The character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, by the note in the notation system glossary of symbols Numeral system symbol is ranked up;
The notation system glossary of symbols is determined according to the language situation of the terminal territory of use of the application encryption method;
To any one notation system symbol assignment in the notation system symbol after sequence, and according to the sequence, to remaining The notation system symbol carries out displacement assignment according to preset ordered series of numbers, and the mapping generated between the notation system symbol and numerical value is closed System;
Be-encrypted data is converted into R binary data, and the R binary data is mapped as the note according to the mapping relations Numeral system symbol.
2. the method as described in claim 1, which is characterized in that the be-encrypted data includes telephone number, it is described will be to be added Ciphertext data is converted to R binary data, comprising:
The telephone number is converted into R binary data by decimal data.
3. the method as described in claim 1, which is characterized in that the be-encrypted data includes text information, it is described will be to be added Ciphertext data is converted to R binary data
Obtain the character code of each character in text information;
The character code that will acquire is converted to R binary data.
4. the method as described in claim 1, which is characterized in that the be-encrypted data includes audio-video or image information, institute It states and be-encrypted data is converted into R binary data, comprising:
By the binary number of the audio-video or image information, byte is that unit quantizes respectively accordingly;
By after numeralization the audio-video or image information be converted to R binary data.
5. method as claimed in claim 4, which is characterized in that the method also includes:
The R binary data is converted into binary data.
6. a kind of decryption method characterized by comprising
The character quantity R in notation system glossary of symbols and the notation system glossary of symbols is obtained, by the note in the notation system glossary of symbols Numeral system symbol is ranked up;
The notation system glossary of symbols is determined according to the language situation of the terminal territory of use of the application decryption method;
To any one notation system symbol assignment in the notation system symbol after sequence, and according to the sequence, to remaining The notation system symbol carries out displacement assignment according to preset ordered series of numbers, and the mapping generated between the notation system symbol and numerical value is closed System;
Encrypted data are mapped as R binary data according to the mapping relations, before the R binary data is converted to encryption Data.
7. method as claimed in claim 6, which is characterized in that the data before encrypting include telephone number, described by institute It states R binary data and is converted to data before encrypting, comprising:
The R binary data is converted to the decimal data of the telephone number.
8. method as claimed in claim 6, which is characterized in that the data before encrypting include text information, described by institute It states R binary data and is converted to data before encrypting, comprising:
Character code is converted by the R binary data;
Obtain the text information of the character code.
9. method as claimed in claim 6, which is characterized in that the data before encrypting include audio-video or image information, It is described that the R binary data is converted into data before encrypting, comprising:
The R binary data is subjected to segmentation numeralization;
R binary data after the segmentation numeralization is converted into binary data.
10. method as claimed in claim 9, which is characterized in that the method also includes:
Encrypted data are converted into R binary data.
11. a kind of encryption device characterized by comprising
First defines notation system module, will for obtaining the character quantity R in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up;The notation system glossary of symbols uses ground according to the encryption device The language situation in area determines;
First formulates cipher key module, for any one notation system symbol assignment in the notation system symbol after sequence, And according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the notation system Mapping relations between symbol and numerical value;
First number system transition module, for be-encrypted data to be converted to R binary data, and will be described according to the mapping relations R binary data is mapped as the notation system symbol.
12. device as claimed in claim 11, which is characterized in that the be-encrypted data includes telephone number, and described first Number system transition module includes:
The telephone number is converted to R binary data by decimal data by the first conversion subunit.
13. device as claimed in claim 11, which is characterized in that the be-encrypted data includes text information, and described first Number system transition module includes:
First obtains subelement, for obtaining the character code of each character in text information;
Second conversion subunit, the character code for will acquire are converted to R binary data.
14. device as claimed in claim 11, which is characterized in that the be-encrypted data includes audio-video or image information, The first number system transition module includes:
First numeralization subelement, is divided as unit of byte for combining the binary data of the audio-video or image information It does not quantize;
Third conversion subunit, for the audio-video after quantizing or image information to be converted to R binary data.
15. device as claimed in claim 14, which is characterized in that described device further include:
Second number system transition module, for the R binary data to be converted to binary data.
16. a kind of decryption device characterized by comprising
Second defines notation system module, will for obtaining the character quantity R in notation system glossary of symbols and the notation system glossary of symbols Notation system symbol in the notation system glossary of symbols is ranked up;The notation system glossary of symbols uses ground according to the decryption device The language situation in area determines;
Second formulates cipher key module, for any one notation system symbol assignment in the notation system symbol after sequence, And according to the sequence, displacement assignment is carried out according to preset ordered series of numbers remaining described notation system symbol, generates the notation system Mapping relations between symbol and numerical value;
Third number system transition module will be described for encrypted data to be mapped as R binary data according to the mapping relations R binary data is converted to data before encrypting.
17. device as claimed in claim 16, which is characterized in that the data before encrypting include telephone number, and described Three number system transition modules include:
4th conversion subunit, for the R binary data to be converted to the decimal data of the telephone number.
18. device as claimed in claim 16, which is characterized in that the data before encrypting include text information, and described Three number system transition modules include:
5th conversion subunit, for the R binary data to be converted to character code;
Second obtains subelement, is text information for obtaining the character code.
19. device as claimed in claim 16, which is characterized in that the data before encrypting include audio-video or image letter Breath, the third number system transition module include:
Second value beggar's unit, for the R binary data to be carried out segmentation numeralization;
6th conversion subunit, for the R binary data after the segmentation numeralization to be converted to binary data.
20. device as claimed in claim 19, which is characterized in that described device further include:
4th number system transition module, for encrypted data to be converted to R binary data.
CN201610674185.3A 2016-08-16 2016-08-16 Information encryption and decryption method and device Expired - Fee Related CN106131051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610674185.3A CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610674185.3A CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN106131051A CN106131051A (en) 2016-11-16
CN106131051B true CN106131051B (en) 2019-06-21

Family

ID=57259091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610674185.3A Expired - Fee Related CN106131051B (en) 2016-08-16 2016-08-16 Information encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN106131051B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325354B (en) * 2017-07-31 2022-06-28 阿里云计算有限公司 Data storage, processing and reading method, data storage device and system
CN110335586B (en) * 2018-03-31 2021-07-02 深圳市掌网科技股份有限公司 Information conversion method and system
CN108804933B (en) * 2018-05-25 2020-06-05 东北大学 Method for carrying out scale conversion on big data in information hiding technology
CN109889339A (en) * 2018-12-29 2019-06-14 广州市宏大欣电子科技有限公司 A kind of data encryption device and method
CN112364368B (en) * 2020-12-02 2022-06-03 四川长虹电器股份有限公司 Telephone number encryption storage method
CN113626849A (en) * 2021-08-26 2021-11-09 杭州安恒信息技术股份有限公司 Character string desensitization method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN103208229A (en) * 2012-01-11 2013-07-17 孙强国 Information processing and transmission method based on nonstandard code
CN105721882A (en) * 2016-04-18 2016-06-29 上海泥娃通信科技有限公司 Separated coding and decoding method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7852240B2 (en) * 2009-05-01 2010-12-14 Mark Ellery Ogram Variable length encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645061A (en) * 2009-09-03 2010-02-10 张�浩 Information hiding method taking text information as carrier
CN103208229A (en) * 2012-01-11 2013-07-17 孙强国 Information processing and transmission method based on nonstandard code
CN102761418A (en) * 2012-07-16 2012-10-31 重庆电子工程职业学院 Character compression encrypting method
CN105721882A (en) * 2016-04-18 2016-06-29 上海泥娃通信科技有限公司 Separated coding and decoding method and system

Also Published As

Publication number Publication date
CN106131051A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN106131051B (en) Information encryption and decryption method and device
US6058187A (en) Secure telecommunications data transmission
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
US8666065B2 (en) Real-time data encryption
CN106453268B (en) A method of realizing express delivery secret protection in logistics progress
CN105229985B (en) Identity tokens
CN105719120A (en) Method for encrypting privacy information on express waybills
CN107124500A (en) The display methods and display device of address list in a kind of communication equipment
US10114900B2 (en) Methods and systems for generating probabilistically searchable messages
CN111191289A (en) Method for displaying and storing private data
CN115336223A (en) Optimized private biometric matching
CN108090370A (en) Instant messaging encryption method and system based on index
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN107241184A (en) Personal identification number generation and management method based on improvement AES
US20210303716A1 (en) Securing PIN Information Using Obfuscation by Applying Extra Security Layer
US20160294787A1 (en) Secure and confidential messaging systems
CN108737443B (en) Method for hiding mail address based on cryptographic algorithm
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
WO2022021005A1 (en) Symmetric encryption and decryption method based on exponential complexity
US8473516B2 (en) Computer storage apparatus for multi-tiered data security
CN113904865A (en) Log transmission method and device based on asymmetric algorithm
CN106453273A (en) Cloud technology based information security management system and method
KR20220051510A (en) Device, method and computer program for protecting image including personal information
CN110941815A (en) Novel password
CN116561788B (en) Electronic identity code encryption, decoding and key management system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190621

Termination date: 20210816