CN106549756A - A kind of method and device of encryption - Google Patents

A kind of method and device of encryption Download PDF

Info

Publication number
CN106549756A
CN106549756A CN201510603328.7A CN201510603328A CN106549756A CN 106549756 A CN106549756 A CN 106549756A CN 201510603328 A CN201510603328 A CN 201510603328A CN 106549756 A CN106549756 A CN 106549756A
Authority
CN
China
Prior art keywords
character
string
ciphertext
encrypted
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510603328.7A
Other languages
Chinese (zh)
Other versions
CN106549756B (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510603328.7A priority Critical patent/CN106549756B/en
Publication of CN106549756A publication Critical patent/CN106549756A/en
Application granted granted Critical
Publication of CN106549756B publication Critical patent/CN106549756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides a kind of method and device of encryption, to solve the problems, such as that cipher mode of the prior art can reduce the safety of the standard cipher for preserving.The method is encrypted using at least two AESs to the plaintext string for obtaining, obtain corresponding at least two ciphertexts character string, intercept character respectively in the every kind of ciphertext character string for obtaining, and according to the character being truncated to, obtain the encrypted result being encrypted to the plaintext string.The encrypted result obtained by said method is encrypted the ciphertext character string for obtaining comprising different AESs, and the ciphertext character string for being included not is complete ciphertext character string, but intercept the character string of the incompleteness for obtaining, for the complete ciphertext character string obtained after being encrypted with respect to single AES, can effectively prevent from encrypted result from being compared attack by collision attack, brute force attack or rainbow table to be cracked, so as to improve the safety of encrypted result.

Description

A kind of method and device of encryption
Technical field
The application is related to field of computer technology, more particularly to a kind of method and device of encryption.
Background technology
With the fast development of information age, such as personal computer (Personal Computer, PC), The terminals such as smart mobile phone, panel computer can provide the user increasing facility, and information security also by The emphasis that people more pay close attention to gradually is become.
Verification is a kind of conventional means for ensuring information security, and its major way is:Pre-set standard cipher, And standard cipher is preserved by terminal or server, and during verification, user input password to be certified, terminal or service Device then compares standard cipher and password to be certified, if the two is consistent, verification passes through, and otherwise, verifies obstructed Cross.
For the safety of standard cipher preserved in ensureing terminal or server, in the prior art, preserve The mode of password enters to turn to preservation ciphertext password via preservation clear-text passwords, and its method is:Pre-set mark Quasi- password (standard cipher is clear-text passwords), terminal or server adopt default certain irreversible encryption Algorithm is encrypted to the standard cipher, obtains standard ciphertext password, and the standard ciphertext password is preserved, During verification, user input password to be certified (password to be certified is also clear-text passwords), terminal or server The password to be certified is encrypted using the same irreversible encryption algorithm, obtains ciphertext to be certified close Code, then the standard ciphertext password and ciphertext password to be certified of preservation are compared, if the two is consistent, verification passes through, Otherwise verify and do not pass through.
Due to the ciphertext password preserved in terminal or server be by irreversible encryption algorithm for encryption, because This, can not possibly restore clear-text passwords by ciphertext password, can effectively improve the safety for preserving standard cipher. But, in prior art, to obtain ciphertext close being encrypted to default standard cipher (clear-text passwords) for terminal During code, often it is encrypted only with a kind of AES, and is only encrypted very by a kind of ciphertext password Easily compared attack by collision attack, brute force attack or rainbow table to crack, therefore, encryption of the prior art Mode can reduce the safety of the standard cipher for preserving.
The content of the invention
The embodiment of the present application provides a kind of method and device of encryption, to solve encryption side of the prior art Formula can reduce the problem of the safety of the standard cipher for preserving.
A kind of method of encryption that the embodiment of the present application is provided, including:
Obtain plaintext string;
The plaintext string is encrypted using at least two AESs, obtains corresponding at least two Ciphertext character string;
Character is intercepted in the every kind of ciphertext character string for obtaining respectively;
According to the character being truncated to, the encrypted result being encrypted to the plaintext string is obtained.
A kind of device of encryption that the embodiment of the present application is provided, including:
Acquisition module, for obtaining plaintext string;
Encrypting module, for being encrypted to the plaintext string using at least two AESs, is obtained Corresponding at least two ciphertexts character string;
Interception module, for intercepting character in the every kind of ciphertext character string for obtaining respectively;
Encrypted result obtains module, for according to the character being truncated to, acquisition is carried out to the plaintext string The encrypted result of encryption.
The embodiment of the present application provides a kind of method and device of encryption, and the method is adopted to the plaintext string for obtaining It is encrypted with least two AESs, obtains corresponding at least two ciphertexts character string, obtaining respectively Every kind of ciphertext character string on intercept character, and according to the character being truncated to, obtain to the plaintext string The encrypted result being encrypted.The encrypted result obtained by said method carries out adding comprising different AESs The close ciphertext character string for obtaining, and the ciphertext character string for being included not is complete ciphertext character string, and It is the character string for intercepting the incompleteness for obtaining, what is obtained after being encrypted with respect to single AES is complete For ciphertext character string, can effectively prevent encrypted result from being attacked against each other by collision attack, brute force attack or rainbow table ratio Hit and cracked, so as to improve the safety of encrypted result.
Description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application Point, the schematic description and description of the application is used to explain the application, does not constitute to the application not Work as restriction.In the accompanying drawings:
The process of the encryption that Fig. 1 is provided for the embodiment of the present application;
The encryption device intercepting in the every kind of ciphertext character string for obtaining respectively that Fig. 2 is provided for the embodiment of the present application The schematic diagram of character;
The structural representation of the encryption device that Fig. 3 is provided for the embodiment of the present application;
Specific embodiment
It is to make purpose, technical scheme and the advantage of the application clearer, specifically real below in conjunction with the application Apply example and corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, it is described Embodiment is only some embodiments of the present application, rather than the embodiment of whole.Based on the enforcement in the application Example, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of the application protection.
The process of the encryption that Fig. 1 is provided for the embodiment of the present application, specifically includes following steps:
S101:Obtain plaintext string.
In the embodiment of the present application, encryption device obtains plaintext string to be encrypted first.Specifically, plus Close device can determine that the character string of user input, used as the plaintext string to be encrypted for getting.Wherein, User can be input into plaintext string when password is arranged, then the plaintext string can be described as standard plaintext character String, user also can be input into plaintext string in verification, then the plaintext string can be described as plaintext word to be certified Symbol string.Described encryption device can be terminal, it is also possible to server.
S102:The plaintext string is encrypted using at least two AESs, is obtained accordingly extremely Few two kinds of ciphertext character strings.
After encryption device gets plaintext string, can select from the multiple encryption algorithms for pre-saving At least two AESs, and the plaintext string is carried out adding using at least two AESs selected It is close, obtain corresponding at least two ciphertexts character string.
Wherein, at least two AESs for being adopted can be in the multiple encryption algorithms for pre-saving with What machine was selected.The multiple encryption algorithms for pre-saving may include such as the 5th edition (Mes of message digest algorithm Sage-Digest Algorithm 5, MD5), Secure Hash Algorithm 1 (Secure Hash Algorithm 1, ) and the AES such as safe gibberish standard (Secure Hash Standard, SHS) SHA1.Example Such as, it is assumed that the plaintext string that encryption device is obtained is " drami890 ", in the various encryptions for pre-saving Two kinds of different AESs of MD5 and SHA1 are randomly selected in algorithm, then can be by the MD5 of selection AES is encrypted to plaintext string " drami890 ", obtains ciphertext character string " woeijoc123s Oijesoiej333gienpmxde ", by the SHA1 AESs of selection to plaintext string " drami890 " It is encrypted, obtains ciphertext character string " xxifmeng3255die5234fecj7hntu9dqafh ", obtaining not After same ciphertext character string, encryption device will be processed to different ciphertext character strings.
S103:Character is intercepted in the every kind of ciphertext character string for obtaining respectively.
After different ciphertext character strings are obtained, encryption device will intercept character in each ciphertext character string, right For the every kind of ciphertext character string obtained by different AESs, the character of intercepting is not complete Ciphertext character string, that is, when being intercepted for a kind of ciphertext character string, only intercepting the ciphertext character string In partial character.
Specifically, when encryption device intercepts character in each ciphertext character string, several can first be generated more than 0 Random number, further according to generate each random number, intercept character in the every kind of ciphertext character string for obtaining respectively. Further, when character being intercepted according to random number, can be directed to each random number, at least two for obtaining Select a kind of in ciphertext character string, then random intercepting character, the character of intercepting from the ciphertext character string for selecting Quantity be exactly the random number.
In order to ensure only to intercept a part of character when intercepting in a ciphertext character string, encryption device is generated Each random number be smaller than the minima in the digit of at least two ciphertexts character string.
Continue to use the example above, the plaintext string " drami890 " for obtaining is entered by AES MD5 The digit that ciphertext character string is obtained after row encryption is 32, and ciphertext character string is obtained after being encrypted by SHA1 Digit be 34, in the two ciphertext character strings, digit it is minimum for 32, then when random number is generated, In addition to ensureing more than 0,32 are also less than.That is, the maximum that the random number of generation can be got is 31, by Cannot get identical with ciphertext character string digit or more than the number of ciphertext character string digit in the random number for generating Value, so, according to each random number is generated, respectively when the every kind of ciphertext character string for obtaining is intercepted, A complete ciphertext character string can not be truncated to, a part of word can only be intercepted in every kind of ciphertext character string Symbol.
It is in practical application scene, as the digit of encrypted result finally to be obtained should not be too short, also unsuitable It is long, therefore, encryption device can be before character be intercepted, it is determined that the digit of encrypted result to be obtained.
Specifically, encryption device can be according at least two ciphertext character strings for obtaining, it is determined that encryption to be obtained As a result digit, also, in order to ensure each ciphertext character string is comprised only in the encrypted result for finally giving A part of character, the digit of the encrypted result to be obtained that encryption device determines are smaller than at least two ciphertext The digit sum of character string.In addition, encryption device is after the digit for determining encrypted result to be obtained, When intercepting character, each random number sum of generation also will be with the digit phase of the encrypted result to be obtained for determining Deng.
Continue to use the example above, by the plaintext string " drami890 " for obtaining by MD5 and SHA1 two Kind of AES obtains two kinds of ciphertext character strings after being encrypted respectively, the digit of both ciphertext character strings it With for 66, then encryption device it is determined that encrypted result to be obtained digit when, determined by digit be less than Two kinds of ciphertext character string sums 66.Hypothesis determines that the digit of encrypted result to be obtained is 46, then generate Each random number sum be also equal to 46.Assume to generate altogether 3 randoms number, respectively 8,22,16, It is that 3 randoms number are added and be 46, and this 3 randoms number are all higher than 0, and it is less than two ciphertext characters Minima 32 in the digit of string.
After each random number is generated, encryption device can then be directed to each random number, close at least two for obtaining Select a kind of in Chinese character string, character, the number of the character of intercepting are arbitrarily intercepted from the ciphertext character string for selecting The numerical value for the random number is measured, as shown in Figure 2.
The encryption device intercepting in the every kind of ciphertext character string for obtaining respectively that Fig. 2 is provided for the embodiment of the present application The schematic diagram of character.
In Fig. 2, by the plaintext string " drami890 " for obtaining by two kinds of encryptions of MD5 and SHA1 Algorithm obtains as shown in Figure 2 two kind ciphertext character string after being encrypted respectively, obtaining two kinds of ciphertext characters After string, encryption device determines that the digit of encrypted result to be obtained is 46, and when intercepting character is carried out, 3 randoms number are generated respectively:8、22、16.
As shown in Fig. 2 being directed to random number 8, it is assumed that the ciphertext character string of selection is to be calculated by md5 encryption The ciphertext character string that method is obtained after being encrypted, then intercept front 8 characters, i.e. " w in the ciphertext character string oeijoc1”。
Similar, for random number 22, it is assumed that the ciphertext character string of selection is to be entered by SHA1 AESs The ciphertext character string that obtains after row encryption, then intercept front 22 characters, i.e. " xxi in the ciphertext character string fmeng3255die5234fec”;For random number 16, it is assumed that the ciphertext character string of selection is by MD5 The ciphertext character string that AES is obtained after being encrypted, then 16 words after intercepting in the ciphertext character string Symbol, i.e., " oiej333gienpmxde ".
In above-mentioned interception way, the character of intercepting be not required for must be in ciphertext character string one section it is continuous Character, it is also possible to according to the numerical value of random number, the random intercepting equal number in corresponding ciphertext character string Character.
S104:According to the character being truncated to, the encrypted result being encrypted to the plaintext string is obtained.
Encryption device is truncated to after character from each ciphertext character string by above-mentioned steps S103, will can be intercepted To character be combined, the result of combination is used as the encryption knot being encrypted to the plaintext string for obtaining Really.
Continue to use the example above, the 3 sections of characters for intercepting respectively are combined, obtain in each ciphertext character string Combined result " woeijoc1xxifmeng3255die5234fecoiej333gienpmxde ", and the combination is tied The encrypted result that fruit is obtained after being encrypted as the plaintext string " drami890 " to obtaining.
It should be noted that the mode for being combined the character being truncated to is not unique, when being combined, The each character for intercepting can be carried out random combine, obtain the encrypted result that plaintext string is encrypted.
It is encrypted obtain by different AESs by including in the encrypted result that said method is obtained Ciphertext character string, and the ciphertext character string for being included not is complete ciphertext character string, but intercept The character string of the incompleteness for arriving, the complete ciphertext character obtained after being encrypted with respect to single AES For string, can effectively prevent encrypted result from attack is compared by collision attack, brute force attack or rainbow table and be broken Solution, so as to improve the safety of encrypted result.
Lower mask body is carried out so that plaintext string is for standard plaintext string and plaintext string to be certified as an example Describe in detail.
In the scene for arranging password, the plaintext string of user input can be described as standard plaintext string, then Encryption device is encrypted and obtains encrypted result to the standard plaintext string by method as shown in Figure 1 Afterwards, can preserve the encrypted result as standard ciphertext result, and preservation is carried out to the standard plaintext string At least two AESs adopted during encryption, preserve the intercepting character when institute in every kind of ciphertext character string respectively Using interception way, in case subsequent authentication use.
In the scene of cipher authentication, the plaintext string of user input can be described as plaintext string to be certified, Then when being encrypted to the plaintext string to be certified by method as shown in Figure 1, in step S102 In, encryption device can be right using at least two AES corresponding with the standard ciphertext result for pre-saving The plaintext string to be certified is encrypted, in step s 103, encryption device can using with pre-save The corresponding interception way of standard ciphertext result, intercept character in the every kind of ciphertext character string for obtaining respectively. Follow-up, encryption device is according to adding that the character being truncated to obtains being encrypted the plaintext string to be certified After close result, using the encrypted result for obtaining as ciphertext result to be certified, and the ciphertext to be certified can be judged Whether as a result identical with the standard ciphertext result for pre-saving, if so, then verification passes through, and otherwise, verification is not Pass through.
For example, user is input into one section of plaintext string " ljq123bbb ", encryption when login password is arranged Device is then using the plaintext string as standard plaintext string.Encryption device is receiving the standard plaintext word After symbol string, which will be encrypted, wherein, encryption device is random from the multiple encryption algorithms for pre-saving Choose two kinds of AESs of MD5 and SHS to be encrypted the standard plaintext string, respectively obtain corresponding Two kinds of ciphertext character strings, and generate 3 randoms number:12nd, 7,14, for random number 12, select Front 12 characters are intercepted during the ciphertext character string for obtaining is encrypted by SHS AESs;For random Number 7, selection intercept front 7 words in the ciphertext character string for obtaining is encrypted by md5 encryption algorithm Symbol;For random number 14, select in the ciphertext character string for obtaining is encrypted by md5 encryption algorithm 14 characters after intercepting, will intercept the sequence according to above-mentioned 3 randoms number of the character that obtains (that is, 12,7, 14) it is combined, the ciphertext character string for obtaining is standard ciphertext result, and the standard ciphertext result is preserved In encryption device, meanwhile, encryption device will also be preserved to be encrypted the standard plaintext string and be adopted AES, i.e. two kinds of AESs of MD5 and SHS;Preserve above-mentioned 3 randoms number 12,7,14 And, according to this 3 randoms number, adopted when intercepting character in above two ciphertext character string respectively Interception way;Preserve the mode that the character that intercepting is obtained is combined.
And when user is when being logged in, then need by certification, i.e. one section of plaintext string of user input, Encryption device then using the plaintext string as plaintext string to be certified, wait to recognize receiving this by encryption device Card plaintext string when, the plaintext string to be certified will be encrypted, wherein encryption device using with guarantor The corresponding AES of above-mentioned standard ciphertext result deposited is encrypted to the plaintext string to be certified, that is, adopt It is encrypted with two kinds of AESs of MD5 and SHS, respectively obtains two kinds of ciphertext character strings;Encryption device Using 3 randoms number (i.e. 12,7,14) corresponding with the above-mentioned standard ciphertext result for preserving, respectively upper Character is intercepted in stating two kinds of ciphertext character strings, during intercepting, is obtained being encrypted by SHS AESs Ciphertext character string in intercept front 12 characters, the ciphertext for obtaining is being encrypted by md5 encryption algorithm Front 7 characters are intercepted in character string, the ciphertext character string that obtains is being encrypted by md5 encryption algorithm 14 characters after middle intercepting;Encryption device is using combination side corresponding with the above-mentioned standard ciphertext result for preserving Formula, the intercepted character for obtaining is combined, i.e. by the clooating sequence of random number 12,7,14, will The character being accordingly truncated to is combined, and the ciphertext character string for obtaining is ciphertext result to be certified.
Due to adopting identical encryption side for above-mentioned standard plaintext string and plaintext string to be certified Method is encrypted, therefore, if standard plaintext string is identical with plaintext string to be certified, obtain Standard ciphertext result and ciphertext result to be certified must be identical, whereas if standard plaintext string Different with plaintext character to be certified, then the standard ciphertext result for obtaining is different with ciphertext result to be certified, also It is to say, if standard plaintext string is identical with plaintext string to be certified, certification passes through, if standard Plaintext string is different with plaintext character to be certified, then certification does not pass through.
The encryption method for providing for the embodiment of the present application above, based on same thinking, the embodiment of the present application is also A kind of device of encryption is provided, as shown in Figure 3.
The structural representation of the encryption device that Fig. 3 is provided for the embodiment of the present application, specifically includes:
Acquisition module 301, for obtaining plaintext string;
Encrypting module 302, for being encrypted to the plaintext string using at least two AESs, Obtain corresponding at least two ciphertexts character string;
Interception module 303, for intercepting character in the every kind of ciphertext character string for obtaining respectively;
Encrypted result obtains module 304, and according to the character being truncated to, acquisition is carried out to the plaintext string The encrypted result of encryption.
The encrypting module 302 is additionally operable to, in the interception module 303 respectively in the every kind of ciphertext word for obtaining Before character is intercepted on symbol string, according at least two ciphertexts character string for obtaining, it is determined that to be obtained adds The digit of close result, wherein, the digit of the encrypted result to be obtained is less than at least two ciphertexts word The digit sum of symbol string.
The interception module 303 is specifically for generating several randoms number more than 0, according to each of generation Random number, intercepts character respectively in the every kind of ciphertext character string for obtaining;Wherein, each random number of generation it With the digit equal to the encrypted result to be obtained, each random number respectively less than at least two ciphertexts word Minima in the digit of symbol string.
The interception module 303 is specifically for for each random number, close in described at least two for obtaining Select a kind of in Chinese character string, it is random from the ciphertext character string for selecting to intercept character, the number of the character of intercepting Measure as the random number.
The encrypted result obtain module 304 specifically for, the character that obtains will be intercepted and is combined, as The encrypted result is encrypted by the plaintext string for obtaining.
The plaintext string is standard plaintext string.
Described device also includes:
Preserving module 305, for preserving the encrypted result as standard ciphertext result, and preserves to institute At least two AESs adopted when the standard plaintext string of stating is encrypted, preserve respectively in every kind of ciphertext The interception way adopted when intercepting character in character string.
The plaintext string is plaintext string to be certified.
The encrypting module 302 is specifically for using corresponding at least with the standard ciphertext result for pre-saving Two kinds of AESs, are encrypted to the plaintext string to be certified.
The interception module 303 is specifically for adopting intercepting corresponding with the standard ciphertext result for pre-saving Mode, intercepts character respectively in the every kind of ciphertext character string for obtaining.
Described device also includes:
Correction verification module 306, for will obtain the encrypted result as ciphertext result to be certified;Judge institute Whether state ciphertext result to be certified identical with the standard ciphertext result for pre-saving;If so, then verification passes through; Otherwise, verification does not pass through.
The embodiment of the present application provides a kind of method and device of encryption, and the method is adopted to the plaintext string for obtaining It is encrypted with least two AESs, obtains corresponding at least two ciphertexts character string, obtaining respectively Every kind of ciphertext character string on intercept character, and according to the character being truncated to, obtain to the plaintext string The encrypted result being encrypted.The encrypted result obtained by said method carries out adding comprising different AESs The close ciphertext character string for obtaining, and the ciphertext character string for being included not is complete ciphertext character string, and It is the character string for intercepting the incompleteness for obtaining, what is obtained after being encrypted with respect to single AES is complete For ciphertext character string, can effectively prevent encrypted result from being attacked against each other by collision attack, brute force attack or rainbow table ratio Hit and cracked, so as to improve the safety of encrypted result.
In a typical configuration, computing device includes one or more processors (CPU), input/defeated Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory And/or the form, such as read only memory (ROM) or flash memory (flashRAM) such as Nonvolatile memory (RAM). Internal memory is the example of computer-readable medium.
Computer-readable medium include permanent and non-permanent, removable and non-removable media can by appoint What method or technique is realizing information Store.Information can be computer-readable instruction, data structure, program Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment is accessed.Define according to herein, computer-readable medium does not include temporary computer-readable matchmaker The data signal and carrier wave of body (transitory media), such as modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant are intended to non-row His property is included, so that a series of process, method, commodity or equipment including key elements not only includes Those key elements, but also including other key elements being not expressly set out, or also include for this process, The intrinsic key element of method, commodity or equipment.In the absence of more restrictions, " included by sentence One ... " key element that limits, it is not excluded that in the process including the key element, method, commodity or set Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.And, the application can wherein include calculating using at one or more Machine usable program code computer-usable storage medium (including but not limited to disk memory, CD-ROM, Optical memory etc.) on the form of computer program implemented.
Embodiments herein is the foregoing is only, the application is not limited to.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvements of work etc., within the scope of should be included in claims hereof.

Claims (14)

1. a kind of method of encryption, it is characterised in that include:
Obtain plaintext string;
The plaintext string is encrypted using at least two AESs, obtains corresponding at least two Ciphertext character string;
Character is intercepted in the every kind of ciphertext character string for obtaining respectively;
According to the character being truncated to, the encrypted result being encrypted to the plaintext string is obtained.
2. the method for claim 1, it is characterised in that respectively in the every kind of ciphertext character for obtaining Before character is intercepted on string, methods described also includes:
According at least two ciphertexts character string for obtaining, it is determined that the digit of encrypted result to be obtained;
Wherein, digit of the digit of the encrypted result to be obtained less than at least two ciphertexts character string Sum.
3. method as claimed in claim 2, it is characterised in that respectively in the every kind of ciphertext character for obtaining Character is intercepted on string, is specifically included:
Generate several randoms number more than 0;Wherein, each random number sum of generation will be obtained equal to described Encrypted result digit, each random number be respectively less than at least two ciphertexts character string digit in most Little value;
According to each random number for generating, character is intercepted in the every kind of ciphertext character string for obtaining respectively.
4. method as claimed in claim 3, it is characterised in that according to each random number for generating, respectively Character is intercepted in the every kind of ciphertext character string for obtaining, is specifically included:
For each random number, select a kind of at least two ciphertexts character string for obtaining, from selection Ciphertext character string in it is random intercept character, the quantity of the character of intercepting is the random number.
5. the method for claim 1, it is characterised in that acquisition is carried out to the plaintext string The encrypted result of encryption, specifically includes:
The character that obtains will be intercepted to be combined, as obtain being encrypted to the plaintext string plus Close result.
6. the method for claim 1, it is characterised in that the plaintext string be standard in plain text Character string;
Methods described also includes:
Preserve the encrypted result as standard ciphertext result, and preserve to enter the standard plaintext string At least two AESs adopted during row encryption, preserve respectively in every kind of ciphertext character string during intercepting character The interception way for being adopted.
7. the method for claim 1, it is characterised in that the plaintext string is to be certified bright Chinese character string;
The plaintext string is encrypted using at least two AESs, is specifically included:
Using at least two AES corresponding with the standard ciphertext result for pre-saving, to described to be certified Plaintext string is encrypted;
Character is intercepted in the every kind of ciphertext character string for obtaining respectively, is specifically included:
Using interception way corresponding with the standard ciphertext result for pre-saving, respectively in the every kind of ciphertext for obtaining Character is intercepted in character string;
Methods described also includes:
Using the encrypted result for obtaining as ciphertext result to be certified;
Whether judge the ciphertext result to be certified identical with the standard ciphertext result for pre-saving;
If so, then verification passes through;
Otherwise, verification does not pass through.
8. a kind of device of encryption, it is characterised in that include:
Acquisition module, for obtaining plaintext string;
Encrypting module, for being encrypted to the plaintext string using at least two AESs, is obtained Corresponding at least two ciphertexts character string;
Interception module, for intercepting character in the every kind of ciphertext character string for obtaining respectively;
Encrypted result obtains module, for according to the character being truncated to, acquisition is carried out to the plaintext string The encrypted result of encryption.
9. device as claimed in claim 8, it is characterised in that the encrypting module is additionally operable to, in institute State interception module respectively before intercepting character in the every kind of ciphertext character string for obtaining, according to obtaining extremely Few two kinds of ciphertext character strings, it is determined that the digit of encrypted result to be obtained, wherein, the encryption to be obtained As a result digit sum of the digit less than at least two ciphertexts character string.
10. device as claimed in claim 9, it is characterised in that the interception module is specifically for raw Into several randoms number more than 0, according to each random number for generating, respectively in the every kind of ciphertext character for obtaining Character is intercepted on string;Wherein, each random number sum of generation is equal to the digit of the encrypted result to be obtained, Each random number is respectively less than the minima in the digit of at least two ciphertexts character string.
11. devices as claimed in claim 10, it is characterised in that the interception module specifically for, For each random number, select a kind of at least two ciphertexts character string for obtaining, it is close from what is selected Random in Chinese character string to intercept character, the quantity of the character of intercepting is the random number.
12. devices as claimed in claim 8, it is characterised in that it is concrete that the encrypted result obtains module For intercepting the character that obtains and be combined, as being encrypted to the plaintext string of obtaining Encrypted result.
13. devices as claimed in claim 8, it is characterised in that the plaintext string is standard plaintext Character string;
Described device also includes:
Preserving module, for preserving the encrypted result as standard ciphertext result, and preserves to the mark At least two AESs that quasi- plaintext string is adopted when being encrypted, preserve respectively in every kind of ciphertext character The interception way adopted when intercepting character on string.
14. devices as claimed in claim 8, it is characterised in that the plaintext string is to be certified bright Chinese character string;
The encrypting module is specifically for adopting and the standard ciphertext result corresponding at least two for pre-saving AES, is encrypted to the plaintext string to be certified;
The interception module is specifically for adopting intercepting side corresponding with the standard ciphertext result for pre-saving Formula, intercepts character respectively in the every kind of ciphertext character string for obtaining;
Described device also includes:
Correction verification module, for will obtain the encrypted result as ciphertext result to be certified;Treat described in judging Whether certification ciphertext result is identical with the standard ciphertext result for pre-saving;If so, then verification passes through;Otherwise, Verification does not pass through.
CN201510603328.7A 2015-09-21 2015-09-21 A kind of method and device of encryption Active CN106549756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510603328.7A CN106549756B (en) 2015-09-21 2015-09-21 A kind of method and device of encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510603328.7A CN106549756B (en) 2015-09-21 2015-09-21 A kind of method and device of encryption

Publications (2)

Publication Number Publication Date
CN106549756A true CN106549756A (en) 2017-03-29
CN106549756B CN106549756B (en) 2019-11-08

Family

ID=58364315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510603328.7A Active CN106549756B (en) 2015-09-21 2015-09-21 A kind of method and device of encryption

Country Status (1)

Country Link
CN (1) CN106549756B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds
CN110740032A (en) * 2019-04-11 2020-01-31 河北瑞通公路配套设施有限公司 Data encryption algorithm for random ciphertexts
CN111309987A (en) * 2019-10-31 2020-06-19 苏州浪潮智能科技有限公司 Encryption algorithm identification method and device in actual attack scene
CN117221877A (en) * 2023-09-03 2023-12-12 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1201545A (en) * 1995-09-18 1998-12-09 艾利森电话股份有限公司 Method and apparatus for user authentication
CN1623328A (en) * 2002-01-02 2005-06-01 索尼电子有限公司 Critical packet partial encryption
WO2007036011A1 (en) * 2005-09-30 2007-04-05 Nortel Networks Limited Double phase encoding quantum key distribution
CN102404111A (en) * 2011-12-28 2012-04-04 王勇 Method for encrypting in sections by using uncertain encryption algorithm
CN103023635A (en) * 2012-12-03 2013-04-03 广东欧珀移动通信有限公司 Method and device for message backup
CN103731272A (en) * 2014-01-06 2014-04-16 飞天诚信科技股份有限公司 Identity authentication method, system and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1201545A (en) * 1995-09-18 1998-12-09 艾利森电话股份有限公司 Method and apparatus for user authentication
CN1623328A (en) * 2002-01-02 2005-06-01 索尼电子有限公司 Critical packet partial encryption
WO2007036011A1 (en) * 2005-09-30 2007-04-05 Nortel Networks Limited Double phase encoding quantum key distribution
CN102404111A (en) * 2011-12-28 2012-04-04 王勇 Method for encrypting in sections by using uncertain encryption algorithm
CN103023635A (en) * 2012-12-03 2013-04-03 广东欧珀移动通信有限公司 Method and device for message backup
CN103731272A (en) * 2014-01-06 2014-04-16 飞天诚信科技股份有限公司 Identity authentication method, system and equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN108683706A (en) * 2018-04-12 2018-10-19 广东汇泰龙科技有限公司 A kind of Encryption Algorithm and its verification method based on the lock communication of NB-IOT clouds
CN108683706B (en) * 2018-04-12 2021-02-09 广东汇泰龙科技股份有限公司 Encryption algorithm based on NB-IOT cloud lock communication and verification method thereof
CN110740032A (en) * 2019-04-11 2020-01-31 河北瑞通公路配套设施有限公司 Data encryption algorithm for random ciphertexts
CN111309987A (en) * 2019-10-31 2020-06-19 苏州浪潮智能科技有限公司 Encryption algorithm identification method and device in actual attack scene
CN111309987B (en) * 2019-10-31 2022-05-31 苏州浪潮智能科技有限公司 Encryption algorithm identification method and device in actual attack scene
CN117221877A (en) * 2023-09-03 2023-12-12 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data
CN117221877B (en) * 2023-09-03 2024-03-29 广东高芯国际物联网科技有限公司 Safety verification and transmission method applied to frequency radio field data

Also Published As

Publication number Publication date
CN106549756B (en) 2019-11-08

Similar Documents

Publication Publication Date Title
US9544280B2 (en) Utilization of a protected module to prevent offline dictionary attacks
US10516527B1 (en) Split-key based cryptography system for data protection and synchronization across multiple computing devices
CN111917535B (en) Data encryption storage method and device and server
KR20180026508A (en) A security verification method based on biometric characteristics, a client terminal, and a server
CN106612180A (en) Method and device for realizing session identifier synchronization
Kheshaifaty et al. Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions
CN106549756A (en) A kind of method and device of encryption
CN103780379A (en) Password encryption method and system, and cryptographic check method and system
Vladimirov et al. Security and privacy protection obstacles with 3D reconstructed models of people in applications and the metaverse: A survey
Vashishtha et al. Security and detection mechanism in IoT-based cloud computing using hybrid approach
Moe et al. Improved hashing and honey-based stronger password prevention against brute force attack
KR20120087095A (en) Apparatus and method for generating a realtime password and storage medium
US11245684B2 (en) User enrollment and authentication across providers having trusted authentication and identity management services
Mandlekar et al. Survey on fog computing mitigating data theft attacks in cloud
Gupta et al. Cloud computing: Security threats & control strategy using tri-mechanism
Manjula et al. Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
KR20130085566A (en) Apparatus and method of authentifying password using captcha
Dhanalakshmi et al. Password Manager with Multi-Factor Authentication
Binu et al. A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services
Suresha et al. Enhancing data protection in cloud computing using key derivation based on cryptographic technique
CN104009851A (en) One-time pad bidirectional authentication safe logging technology for internet bank
Rajani et al. Multi-factor authentication as a service for cloud data security
Hire et al. Security of user credentials on web portals
CA2904646A1 (en) Secure authentication using dynamic passcode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.