CN106375084A - Data encryption method and data encryption device - Google Patents

Data encryption method and data encryption device Download PDF

Info

Publication number
CN106375084A
CN106375084A CN201610898356.0A CN201610898356A CN106375084A CN 106375084 A CN106375084 A CN 106375084A CN 201610898356 A CN201610898356 A CN 201610898356A CN 106375084 A CN106375084 A CN 106375084A
Authority
CN
China
Prior art keywords
data
encrypted
insignificant
significant
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610898356.0A
Other languages
Chinese (zh)
Inventor
于辉
胡玉鹏
李新虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201610898356.0A priority Critical patent/CN106375084A/en
Publication of CN106375084A publication Critical patent/CN106375084A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data encryption method and a data encryption device. The method comprises steps: a to-be-encrypted data object is analyzed, and important data and unimportant data in the data object are distinguished; an encryption algorithm is adopted to carry out encryption processing on the important data, an important data ciphertext after encryption is obtained, and no processing is carried out on the unimportant data; and the important data ciphertext and the unimportant data are combined to obtain combined data. Through analyzing the data type of the data in the encryption object, encryption is only carried out on the important data, the data encryption efficiency is improved, and the privacy and the security of the data are ensured.

Description

A kind of data ciphering method and device
Technical field
Cloud storage technical field according to the present invention, more particularly to a kind of data ciphering method and device.
Background technology
At present, cloud computing is gradually approved by industry, and cloud data center gradually rises in social production and sphere of life To more and more important effect.Store substantial amounts of data in cloud data center, how efficiently, safety carry out data plus Close, preserve, transmission, be a good problem to study.But in current ciphering process, for data object to be encrypted, When docking object is encrypted, it is that all data in data object are all encrypted, ciphering process needs the long period, Data encryption less efficient.The efficiency how improving data encryption is problem demanding prompt solution.
Content of the invention
It is an object of the invention to provide a kind of data ciphering method and device, to realize improving the efficiency of data encryption.
For solving above-mentioned technical problem, the present invention provides a kind of data ciphering method, and the method includes:
Data object to be encrypted is analyzed, distinguishes the significant data in described data object and insignificant number According to;
Described significant data is encrypted using AES, the significant data ciphertext after being encrypted, and right Described insignificant data does not carry out any process;
Described significant data ciphertext and described insignificant data are combined, the data after being combined.
Preferably, described AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Preferably, described insignificant data is label information or the date and time information in described data object, described important Data is the text message in described data object.
Preferably, described combined after data after, also include: by combination after data stored.
The present invention also provides a kind of data encryption device, and this device includes:
Analysis module, for being analyzed to data object to be encrypted, distinguishes the important number in described data object According to insignificant data;
Encrypting module, for being encrypted using AES to described significant data, important after being encrypted Data ciphertext, and any process is not carried out to described insignificant data;
Composite module, for described significant data ciphertext and insignificant data are combined, the data after being combined.
Preferably, described AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Preferably, described insignificant data is label information or the date and time information in described data object, described important Data is the text message in described data object.
Preferably, described composite module also includes: memory element, for being stored the data after combination.
A kind of data ciphering method provided by the present invention and device, are analyzed to data object to be encrypted, and distinguish Go out the significant data in described data object and insignificant data;Using AES, place is encrypted to described significant data Reason, the significant data ciphertext after being encrypted, and any process is not carried out to described insignificant data;Will be close for described significant data Civilian and insignificant data is combined, the data after being combined.It can be seen that, by dividing to the data type of data in encrypted object Analysis, is encrypted just for significant data, improves the efficiency of data encryption, ensured privacy and the safety of data.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing providing obtains other accompanying drawings.
Fig. 1 is a kind of flow chart of data ciphering method provided by the present invention;
Fig. 2 is a kind of structural representation of data encryption device provided by the present invention.
Specific embodiment
The core of the present invention is to provide a kind of data ciphering method and device, to realize improving the efficiency of data encryption.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention it is clear that described embodiment is only The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, Fig. 1 is a kind of flow chart of data ciphering method provided by the present invention, the method includes:
S11: data object to be encrypted is analyzed, distinguishes the significant data in data object and insignificant number According to;
S12: significant data is encrypted using AES, the significant data ciphertext after being encrypted, and right Insignificant data does not carry out any process;
S13: significant data ciphertext and insignificant data are combined, the data after being combined.
It can be seen that, the method, by the data type analysis to data in encrypted object, is encrypted just for significant data, Improve the efficiency of data encryption, ensure privacy and the safety of data.
Based on said method, specifically, AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Wherein, insignificant data is the label information in data object or date and time information, and significant data is data object In text message.
Any process is not carried out to insignificant data, insignificant data is the insignificant data of unencrypted.Wherein, will add Significant data ciphertext after close and the insignificant data of unencrypted are combined, the data after being combined.
Further, after the data after being combined, also include: the data after combination is stored.Wherein, by group Data after conjunction be encrypted as data object to be encrypted after encrypted result.
Whole ciphering process is only encrypted to significant data, obtains significant data ciphertext, insignificant data is not entered Row encryption, insignificant data is insignificant data clear text, finally significant data ciphertext and insignificant data clear text is carried out group Close, combined result, as the encrypted result of data object, improves the efficiency of whole ciphering process.
Wherein, the data in data object is divided into significant data and insignificant data, by significant data and insignificant data Constitute data object.
Based on this method, specifically, first pass through and data object to be encrypted is analyzed, distinguish therein important Data and insignificant data, then, are only encrypted to significant data, and non-heavy to the significant data after encryption and unencrypted Want data to be combined, be for further processing, improve safety and the efficiency of data encryption.By the data to encrypted object Type analysis, are only encrypted to significant data, improve safety and the efficiency of data encryption.Overcome data encryption Method does not carry out the problem of specific aim analysis to encrypted object feature, improves safety and the efficiency of data encryption, in practice In have important technological value.
Detailed, data object is data file object, first the data file object of encryption is analyzed, gained Data includes insignificant data and significant data, and wherein, insignificant data refers mainly to the letter such as label in data content, date Breath, privately owned, the crucial information such as text in significant data mainly data content;Then, adopt for significant data and add Close algorithm is encrypted, the significant data ciphertext after being encrypted, and does not carry out any process to insignificant data;Finally, Significant data ciphertext after the encryption obtaining and the insignificant data clear text of unencrypted are combined, carry out data transmission or it His relevant treatment.In the method, it is encrypted just for significant data, improve the efficiency of data encryption, ensured data Privacy and safety.
Refer to Fig. 2, Fig. 2 is a kind of structural representation of data encryption device provided by the present invention, this device includes:
Analysis module 101, for being analyzed to data object to be encrypted, distinguishes important in described data object Data and insignificant data;
Encrypting module 102, the important number for being encrypted using AES to significant data, after being encrypted According to ciphertext, and any process is not carried out to insignificant data;
Composite module 103, for significant data ciphertext and insignificant data are combined, the data after being combined.
It can be seen that, this device, by the data type analysis to data in encrypted object, is encrypted just for significant data, Improve the efficiency of data encryption, ensure privacy and the safety of data.
Based on said apparatus, specifically, AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Wherein, insignificant data is the label information in data object or date and time information, and significant data is data object In text message.
Any process is not carried out to insignificant data, insignificant data is the insignificant data of unencrypted.Wherein, combine Significant data ciphertext after encrypting and the insignificant data of unencrypted are combined by module, the data after being combined.
Further, state composite module also to include: memory element, for the data after combination is stored.Wherein, will Data after combination be encrypted as data object to be encrypted after encrypted result.
Based on data encryption device, whole ciphering process is only encrypted to significant data, obtains significant data ciphertext, Insignificant data is not encrypted, insignificant data is insignificant data clear text, finally by significant data ciphertext and non-heavy Data clear text is wanted to be combined, combined result, as the encrypted result of data object, improves the efficiency of whole ciphering process.
Wherein, the data in data object is divided into significant data and insignificant data, by significant data and insignificant data Constitute data object.
Based on this device, specifically, first pass through and data object to be encrypted is analyzed, distinguish therein important Data and insignificant data, then, are only encrypted to significant data, and non-heavy to the significant data after encryption and unencrypted Want data to be combined, be for further processing, improve safety and the efficiency of data encryption.By the data to encrypted object Type analysis, are only encrypted to significant data, improve safety and the efficiency of data encryption.Overcome data encryption Method does not carry out the problem of specific aim analysis to encrypted object feature, improves safety and the efficiency of data encryption, in practice In have important technological value.
Detailed, data object is data file object, and this device is carried out to data file object to be encrypted first Analysis, the data obtained includes insignificant data and significant data, wherein, insignificant data refer mainly to label in data content, The information such as date, privately owned, the crucial information such as text in significant data mainly data content;Then, for important number It is encrypted according to using AES, the significant data ciphertext after being encrypted, any place is not carried out to insignificant data Reason;Finally, the significant data ciphertext after the encryption obtaining and the insignificant data clear text of unencrypted are combined, carry out data Transmission or other relevant treatment.This device is encrypted just for significant data, improves the efficiency of data encryption, has ensured number According to privacy and safety.
To sum up, a kind of data ciphering method provided by the present invention and device, are analyzed to data object to be encrypted, Distinguish the significant data in data object and insignificant data;Significant data is encrypted using AES, obtains Significant data ciphertext to after encryption, and any process is not carried out to insignificant data;By significant data ciphertext and insignificant number According to being combined, the data after being combined.It can be seen that, by the data type analysis to data in encrypted object, just for weight Want data to be encrypted, improve the efficiency of data encryption, ensure privacy and the safety of data.
Above a kind of data ciphering method provided by the present invention and device are described in detail.Used herein Specific case is set forth to the principle of the present invention and embodiment, and the explanation of above example is only intended to help understand this The method of invention and its core concept.It should be pointed out that for those skilled in the art, without departing from this On the premise of bright principle, the present invention can also be carried out with some improvement and modify, these improve and modification also falls into present invention power In the protection domain that profit requires.

Claims (8)

1. a kind of data ciphering method is it is characterised in that include:
Data object to be encrypted is analyzed, distinguishes the significant data in described data object and insignificant data;
Described significant data is encrypted using AES, the significant data ciphertext after being encrypted, and to described Insignificant data does not carry out any process;
Described significant data ciphertext and described insignificant data are combined, the data after being combined.
2. the method for claim 1 is it is characterised in that described AES includes symmetric encipherment algorithm des or number Word Signcryption Algorithm dsa.
3. method as claimed in claim 2 is it is characterised in that described insignificant data is the label letter in described data object Breath or date and time information, described significant data is the text message in described data object.
4. method as claimed in claim 3 it is characterised in that described combined after data after, also include: will combine Data afterwards is stored.
5. a kind of data encryption device is it is characterised in that include:
Analysis module, for being analyzed to data object to be encrypted, distinguish significant data in described data object and Insignificant data;
Encrypting module, for being encrypted using AES to described significant data, the significant data after being encrypted Ciphertext, and any process is not carried out to described insignificant data;
Composite module, for described significant data ciphertext and insignificant data are combined, the data after being combined.
6. device as claimed in claim 5 is it is characterised in that described AES includes symmetric encipherment algorithm des or number Word Signcryption Algorithm dsa.
7. device as claimed in claim 6 is it is characterised in that described insignificant data is the label letter in described data object Breath or date and time information, described significant data is the text message in described data object.
8. device as claimed in claim 7 is it is characterised in that described composite module also includes: memory element, for combining Data afterwards is stored.
CN201610898356.0A 2016-10-14 2016-10-14 Data encryption method and data encryption device Pending CN106375084A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610898356.0A CN106375084A (en) 2016-10-14 2016-10-14 Data encryption method and data encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610898356.0A CN106375084A (en) 2016-10-14 2016-10-14 Data encryption method and data encryption device

Publications (1)

Publication Number Publication Date
CN106375084A true CN106375084A (en) 2017-02-01

Family

ID=57896322

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610898356.0A Pending CN106375084A (en) 2016-10-14 2016-10-14 Data encryption method and data encryption device

Country Status (1)

Country Link
CN (1) CN106375084A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325354A (en) * 2017-07-31 2019-02-12 阿里巴巴集团控股有限公司 Storage, processing and the read method of data, data storage device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting
CN103905469A (en) * 2014-04-30 2014-07-02 电子科技大学 Safety control system and method applied to smart power grid wireless sensor network and cloud computing
CN104735457A (en) * 2015-03-27 2015-06-24 南京中新赛克科技有限责任公司 Video encryption and decryption method based on H.264 code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting
CN103905469A (en) * 2014-04-30 2014-07-02 电子科技大学 Safety control system and method applied to smart power grid wireless sensor network and cloud computing
CN104735457A (en) * 2015-03-27 2015-06-24 南京中新赛克科技有限责任公司 Video encryption and decryption method based on H.264 code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325354A (en) * 2017-07-31 2019-02-12 阿里巴巴集团控股有限公司 Storage, processing and the read method of data, data storage device and system

Similar Documents

Publication Publication Date Title
US20170093806A1 (en) Mutual approval for privacy-preserving computing
EP4307695A3 (en) Systems and methods for performing transport i/o
CN107733904A (en) A kind of method, apparatus and platform of virtual-machine data encryption and decryption
CN106817358A (en) The encryption and decryption method and equipment of a kind of user resources
CN106375084A (en) Data encryption method and data encryption device
Alidoost Nia et al. An introduction to digital signature schemes
Teuben et al. ADMIT: The ALMA Data Mining Toolkit
CN105516763B (en) Encipher-decipher method, device and the digital program system of certificate granting card identification information
CN104731878A (en) Data mining system and method based on cloud computation
CN106599705A (en) Encryption method for encrypting input character and corresponding pairing in corresponding library
Chao-Chun Cheng et al. EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis
CN106599624A (en) Method for generating universal text by corresponding result
Anugrah et al. INDONESIA INTEREST IN INTERNATIONAL LABOR ORGANIZATION (ILO) CONVENTION NO. 189
Gurman et al. The Virtual Solar Observatory: Progress and Diversions
Hall et al. Establishing a national water resources system model to inform policy decisions about resilience of water supplies
DHOOL et al. Encryption and Decryption of a File by Using AES-192 Algorithm
Behrens et al. The Orientation of Star-forming Cores in Nearby Clouds
Ben Fadhel et al. GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics
CN103618599A (en) Method for processing data set before encryption
McKay Fletcher et al. A natural approach to studying schema processing
Alidoost Nia et al. An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems
Ullrich et al. The Time-Dependent Particle-Hole Map
Campos Oliveira Silva et al. Does Technical Debt Lead to the Rejection of Pull Requests?
CN112685757A (en) Examination paper safety management system for paperless examination
Zhang et al. Universal properties of many-body localization criticality in 1D quasiperiodic systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170201

RJ01 Rejection of invention patent application after publication