CN106375084A - Data encryption method and data encryption device - Google Patents
Data encryption method and data encryption device Download PDFInfo
- Publication number
- CN106375084A CN106375084A CN201610898356.0A CN201610898356A CN106375084A CN 106375084 A CN106375084 A CN 106375084A CN 201610898356 A CN201610898356 A CN 201610898356A CN 106375084 A CN106375084 A CN 106375084A
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted
- insignificant
- significant
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data encryption method and a data encryption device. The method comprises steps: a to-be-encrypted data object is analyzed, and important data and unimportant data in the data object are distinguished; an encryption algorithm is adopted to carry out encryption processing on the important data, an important data ciphertext after encryption is obtained, and no processing is carried out on the unimportant data; and the important data ciphertext and the unimportant data are combined to obtain combined data. Through analyzing the data type of the data in the encryption object, encryption is only carried out on the important data, the data encryption efficiency is improved, and the privacy and the security of the data are ensured.
Description
Technical field
Cloud storage technical field according to the present invention, more particularly to a kind of data ciphering method and device.
Background technology
At present, cloud computing is gradually approved by industry, and cloud data center gradually rises in social production and sphere of life
To more and more important effect.Store substantial amounts of data in cloud data center, how efficiently, safety carry out data plus
Close, preserve, transmission, be a good problem to study.But in current ciphering process, for data object to be encrypted,
When docking object is encrypted, it is that all data in data object are all encrypted, ciphering process needs the long period,
Data encryption less efficient.The efficiency how improving data encryption is problem demanding prompt solution.
Content of the invention
It is an object of the invention to provide a kind of data ciphering method and device, to realize improving the efficiency of data encryption.
For solving above-mentioned technical problem, the present invention provides a kind of data ciphering method, and the method includes:
Data object to be encrypted is analyzed, distinguishes the significant data in described data object and insignificant number
According to;
Described significant data is encrypted using AES, the significant data ciphertext after being encrypted, and right
Described insignificant data does not carry out any process;
Described significant data ciphertext and described insignificant data are combined, the data after being combined.
Preferably, described AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Preferably, described insignificant data is label information or the date and time information in described data object, described important
Data is the text message in described data object.
Preferably, described combined after data after, also include: by combination after data stored.
The present invention also provides a kind of data encryption device, and this device includes:
Analysis module, for being analyzed to data object to be encrypted, distinguishes the important number in described data object
According to insignificant data;
Encrypting module, for being encrypted using AES to described significant data, important after being encrypted
Data ciphertext, and any process is not carried out to described insignificant data;
Composite module, for described significant data ciphertext and insignificant data are combined, the data after being combined.
Preferably, described AES includes symmetric encipherment algorithm des or digital signature encryption algorithm dsa.
Preferably, described insignificant data is label information or the date and time information in described data object, described important
Data is the text message in described data object.
Preferably, described composite module also includes: memory element, for being stored the data after combination.
A kind of data ciphering method provided by the present invention and device, are analyzed to data object to be encrypted, and distinguish
Go out the significant data in described data object and insignificant data;Using AES, place is encrypted to described significant data
Reason, the significant data ciphertext after being encrypted, and any process is not carried out to described insignificant data;Will be close for described significant data
Civilian and insignificant data is combined, the data after being combined.It can be seen that, by dividing to the data type of data in encrypted object
Analysis, is encrypted just for significant data, improves the efficiency of data encryption, ensured privacy and the safety of data.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing providing obtains other accompanying drawings.
Fig. 1 is a kind of flow chart of data ciphering method provided by the present invention;
Fig. 2 is a kind of structural representation of data encryption device provided by the present invention.
Specific embodiment
The core of the present invention is to provide a kind of data ciphering method and device, to realize improving the efficiency of data encryption.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present invention it is clear that described embodiment is only
The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, Fig. 1 is a kind of flow chart of data ciphering method provided by the present invention, the method includes:
S11: data object to be encrypted is analyzed, distinguishes the significant data in data object and insignificant number
According to;
S12: significant data is encrypted using AES, the significant data ciphertext after being encrypted, and right
Insignificant data does not carry out any process;
S13: significant data ciphertext and insignificant data are combined, the data after being combined.
It can be seen that, the method, by the data type analysis to data in encrypted object, is encrypted just for significant data,
Improve the efficiency of data encryption, ensure privacy and the safety of data.
Based on said method, specifically, AES includes symmetric encipherment algorithm des or digital signature encryption algorithm
dsa.
Wherein, insignificant data is the label information in data object or date and time information, and significant data is data object
In text message.
Any process is not carried out to insignificant data, insignificant data is the insignificant data of unencrypted.Wherein, will add
Significant data ciphertext after close and the insignificant data of unencrypted are combined, the data after being combined.
Further, after the data after being combined, also include: the data after combination is stored.Wherein, by group
Data after conjunction be encrypted as data object to be encrypted after encrypted result.
Whole ciphering process is only encrypted to significant data, obtains significant data ciphertext, insignificant data is not entered
Row encryption, insignificant data is insignificant data clear text, finally significant data ciphertext and insignificant data clear text is carried out group
Close, combined result, as the encrypted result of data object, improves the efficiency of whole ciphering process.
Wherein, the data in data object is divided into significant data and insignificant data, by significant data and insignificant data
Constitute data object.
Based on this method, specifically, first pass through and data object to be encrypted is analyzed, distinguish therein important
Data and insignificant data, then, are only encrypted to significant data, and non-heavy to the significant data after encryption and unencrypted
Want data to be combined, be for further processing, improve safety and the efficiency of data encryption.By the data to encrypted object
Type analysis, are only encrypted to significant data, improve safety and the efficiency of data encryption.Overcome data encryption
Method does not carry out the problem of specific aim analysis to encrypted object feature, improves safety and the efficiency of data encryption, in practice
In have important technological value.
Detailed, data object is data file object, first the data file object of encryption is analyzed, gained
Data includes insignificant data and significant data, and wherein, insignificant data refers mainly to the letter such as label in data content, date
Breath, privately owned, the crucial information such as text in significant data mainly data content;Then, adopt for significant data and add
Close algorithm is encrypted, the significant data ciphertext after being encrypted, and does not carry out any process to insignificant data;Finally,
Significant data ciphertext after the encryption obtaining and the insignificant data clear text of unencrypted are combined, carry out data transmission or it
His relevant treatment.In the method, it is encrypted just for significant data, improve the efficiency of data encryption, ensured data
Privacy and safety.
Refer to Fig. 2, Fig. 2 is a kind of structural representation of data encryption device provided by the present invention, this device includes:
Analysis module 101, for being analyzed to data object to be encrypted, distinguishes important in described data object
Data and insignificant data;
Encrypting module 102, the important number for being encrypted using AES to significant data, after being encrypted
According to ciphertext, and any process is not carried out to insignificant data;
Composite module 103, for significant data ciphertext and insignificant data are combined, the data after being combined.
It can be seen that, this device, by the data type analysis to data in encrypted object, is encrypted just for significant data,
Improve the efficiency of data encryption, ensure privacy and the safety of data.
Based on said apparatus, specifically, AES includes symmetric encipherment algorithm des or digital signature encryption algorithm
dsa.
Wherein, insignificant data is the label information in data object or date and time information, and significant data is data object
In text message.
Any process is not carried out to insignificant data, insignificant data is the insignificant data of unencrypted.Wherein, combine
Significant data ciphertext after encrypting and the insignificant data of unencrypted are combined by module, the data after being combined.
Further, state composite module also to include: memory element, for the data after combination is stored.Wherein, will
Data after combination be encrypted as data object to be encrypted after encrypted result.
Based on data encryption device, whole ciphering process is only encrypted to significant data, obtains significant data ciphertext,
Insignificant data is not encrypted, insignificant data is insignificant data clear text, finally by significant data ciphertext and non-heavy
Data clear text is wanted to be combined, combined result, as the encrypted result of data object, improves the efficiency of whole ciphering process.
Wherein, the data in data object is divided into significant data and insignificant data, by significant data and insignificant data
Constitute data object.
Based on this device, specifically, first pass through and data object to be encrypted is analyzed, distinguish therein important
Data and insignificant data, then, are only encrypted to significant data, and non-heavy to the significant data after encryption and unencrypted
Want data to be combined, be for further processing, improve safety and the efficiency of data encryption.By the data to encrypted object
Type analysis, are only encrypted to significant data, improve safety and the efficiency of data encryption.Overcome data encryption
Method does not carry out the problem of specific aim analysis to encrypted object feature, improves safety and the efficiency of data encryption, in practice
In have important technological value.
Detailed, data object is data file object, and this device is carried out to data file object to be encrypted first
Analysis, the data obtained includes insignificant data and significant data, wherein, insignificant data refer mainly to label in data content,
The information such as date, privately owned, the crucial information such as text in significant data mainly data content;Then, for important number
It is encrypted according to using AES, the significant data ciphertext after being encrypted, any place is not carried out to insignificant data
Reason;Finally, the significant data ciphertext after the encryption obtaining and the insignificant data clear text of unencrypted are combined, carry out data
Transmission or other relevant treatment.This device is encrypted just for significant data, improves the efficiency of data encryption, has ensured number
According to privacy and safety.
To sum up, a kind of data ciphering method provided by the present invention and device, are analyzed to data object to be encrypted,
Distinguish the significant data in data object and insignificant data;Significant data is encrypted using AES, obtains
Significant data ciphertext to after encryption, and any process is not carried out to insignificant data;By significant data ciphertext and insignificant number
According to being combined, the data after being combined.It can be seen that, by the data type analysis to data in encrypted object, just for weight
Want data to be encrypted, improve the efficiency of data encryption, ensure privacy and the safety of data.
Above a kind of data ciphering method provided by the present invention and device are described in detail.Used herein
Specific case is set forth to the principle of the present invention and embodiment, and the explanation of above example is only intended to help understand this
The method of invention and its core concept.It should be pointed out that for those skilled in the art, without departing from this
On the premise of bright principle, the present invention can also be carried out with some improvement and modify, these improve and modification also falls into present invention power
In the protection domain that profit requires.
Claims (8)
1. a kind of data ciphering method is it is characterised in that include:
Data object to be encrypted is analyzed, distinguishes the significant data in described data object and insignificant data;
Described significant data is encrypted using AES, the significant data ciphertext after being encrypted, and to described
Insignificant data does not carry out any process;
Described significant data ciphertext and described insignificant data are combined, the data after being combined.
2. the method for claim 1 is it is characterised in that described AES includes symmetric encipherment algorithm des or number
Word Signcryption Algorithm dsa.
3. method as claimed in claim 2 is it is characterised in that described insignificant data is the label letter in described data object
Breath or date and time information, described significant data is the text message in described data object.
4. method as claimed in claim 3 it is characterised in that described combined after data after, also include: will combine
Data afterwards is stored.
5. a kind of data encryption device is it is characterised in that include:
Analysis module, for being analyzed to data object to be encrypted, distinguish significant data in described data object and
Insignificant data;
Encrypting module, for being encrypted using AES to described significant data, the significant data after being encrypted
Ciphertext, and any process is not carried out to described insignificant data;
Composite module, for described significant data ciphertext and insignificant data are combined, the data after being combined.
6. device as claimed in claim 5 is it is characterised in that described AES includes symmetric encipherment algorithm des or number
Word Signcryption Algorithm dsa.
7. device as claimed in claim 6 is it is characterised in that described insignificant data is the label letter in described data object
Breath or date and time information, described significant data is the text message in described data object.
8. device as claimed in claim 7 is it is characterised in that described composite module also includes: memory element, for combining
Data afterwards is stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610898356.0A CN106375084A (en) | 2016-10-14 | 2016-10-14 | Data encryption method and data encryption device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610898356.0A CN106375084A (en) | 2016-10-14 | 2016-10-14 | Data encryption method and data encryption device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106375084A true CN106375084A (en) | 2017-02-01 |
Family
ID=57896322
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610898356.0A Pending CN106375084A (en) | 2016-10-14 | 2016-10-14 | Data encryption method and data encryption device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106375084A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1604640A (en) * | 2004-10-28 | 2005-04-06 | 武汉大学 | A video information encrypting-decrypting method |
CN103294961A (en) * | 2013-06-07 | 2013-09-11 | 北京奇虎科技有限公司 | Method and device for file encrypting/decrypting |
CN103905469A (en) * | 2014-04-30 | 2014-07-02 | 电子科技大学 | Safety control system and method applied to smart power grid wireless sensor network and cloud computing |
CN104735457A (en) * | 2015-03-27 | 2015-06-24 | 南京中新赛克科技有限责任公司 | Video encryption and decryption method based on H.264 code |
-
2016
- 2016-10-14 CN CN201610898356.0A patent/CN106375084A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1604640A (en) * | 2004-10-28 | 2005-04-06 | 武汉大学 | A video information encrypting-decrypting method |
CN103294961A (en) * | 2013-06-07 | 2013-09-11 | 北京奇虎科技有限公司 | Method and device for file encrypting/decrypting |
CN103905469A (en) * | 2014-04-30 | 2014-07-02 | 电子科技大学 | Safety control system and method applied to smart power grid wireless sensor network and cloud computing |
CN104735457A (en) * | 2015-03-27 | 2015-06-24 | 南京中新赛克科技有限责任公司 | Video encryption and decryption method based on H.264 code |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325354A (en) * | 2017-07-31 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Storage, processing and the read method of data, data storage device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170093806A1 (en) | Mutual approval for privacy-preserving computing | |
EP4307695A3 (en) | Systems and methods for performing transport i/o | |
CN107733904A (en) | A kind of method, apparatus and platform of virtual-machine data encryption and decryption | |
CN106817358A (en) | The encryption and decryption method and equipment of a kind of user resources | |
CN106375084A (en) | Data encryption method and data encryption device | |
Alidoost Nia et al. | An introduction to digital signature schemes | |
Teuben et al. | ADMIT: The ALMA Data Mining Toolkit | |
CN105516763B (en) | Encipher-decipher method, device and the digital program system of certificate granting card identification information | |
CN104731878A (en) | Data mining system and method based on cloud computation | |
CN106599705A (en) | Encryption method for encrypting input character and corresponding pairing in corresponding library | |
Chao-Chun Cheng et al. | EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis | |
CN106599624A (en) | Method for generating universal text by corresponding result | |
Anugrah et al. | INDONESIA INTEREST IN INTERNATIONAL LABOR ORGANIZATION (ILO) CONVENTION NO. 189 | |
Gurman et al. | The Virtual Solar Observatory: Progress and Diversions | |
Hall et al. | Establishing a national water resources system model to inform policy decisions about resilience of water supplies | |
DHOOL et al. | Encryption and Decryption of a File by Using AES-192 Algorithm | |
Behrens et al. | The Orientation of Star-forming Cores in Nearby Clouds | |
Ben Fadhel et al. | GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics | |
CN103618599A (en) | Method for processing data set before encryption | |
McKay Fletcher et al. | A natural approach to studying schema processing | |
Alidoost Nia et al. | An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems | |
Ullrich et al. | The Time-Dependent Particle-Hole Map | |
Campos Oliveira Silva et al. | Does Technical Debt Lead to the Rejection of Pull Requests? | |
CN112685757A (en) | Examination paper safety management system for paperless examination | |
Zhang et al. | Universal properties of many-body localization criticality in 1D quasiperiodic systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170201 |
|
RJ01 | Rejection of invention patent application after publication |