CN106790288A - A kind of data encryption, decryption method and device - Google Patents

A kind of data encryption, decryption method and device Download PDF

Info

Publication number
CN106790288A
CN106790288A CN201710123554.4A CN201710123554A CN106790288A CN 106790288 A CN106790288 A CN 106790288A CN 201710123554 A CN201710123554 A CN 201710123554A CN 106790288 A CN106790288 A CN 106790288A
Authority
CN
China
Prior art keywords
character string
aes
data
user
decipherment algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710123554.4A
Other languages
Chinese (zh)
Inventor
杨志鹏
江春华
罗新伟
陈显龙
冯松
王洪兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Forever Technology Co Ltd
Original Assignee
Beijing Forever Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Forever Technology Co Ltd filed Critical Beijing Forever Technology Co Ltd
Priority to CN201710123554.4A priority Critical patent/CN106790288A/en
Publication of CN106790288A publication Critical patent/CN106790288A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Application discloses a kind of data encryption, decryption method and device.The method is by the way of dual encryption.Specifically, being encrypted to the initial data of user using the first AES first, the first character string is generated.And then the first character string is encrypted using the second AES, generate the second character string.So, waited when the AES of system is elevated to the second AES by the first AES, by after the decryption (corresponding with the first AES) of the second decipherment algorithm (corresponding with the second AES) and the first decipherment algorithm, the initial data of user still can user.

Description

A kind of data encryption, decryption method and device
Technical field
The application is related to data processing field, more specifically to a kind of data encryption, decryption method and device.
Background technology
With the arriving in big data epoch, the security of data has increasingly obtained the concern of user.Generally adopt at present With the security for ensureing the mode that data are encrypted data, such as MD2 AESs, md5 encryption algorithm.
However, in the prior art after system is upgraded to cipher mode, easily causing user's initial data cannot Use.
The content of the invention
In view of this, the application provides a kind of data encryption, decryption method and device, to ensure that system is upgraded in encryption Afterwards, user's initial data still can use.
To achieve these goals, it is proposed that scheme it is as follows:
A kind of data ciphering method, including:
Obtain user's initial data;
User's initial data is encrypted using the first AES, generates the first character string;
First character string is encrypted using the second AES, generates and preserve the second character string.
A kind of data encryption device, including:
First data acquisition unit, for obtaining user's initial data;
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, is generated First character string;
Second DEU data encryption unit, for being encrypted to first character string using the second AES, generation is simultaneously Preserve the second character string.
A kind of data decryption method, including:
Obtain the second character string described in claim 1;
Second character string is decrypted based on the second decipherment algorithm, generates above-mentioned the first character string, described the Two decipherment algorithms are corresponding with above-mentioned second AES.
First character string is decrypted based on the first decipherment algorithm, generates above-mentioned user's initial data, described the One decipherment algorithm is corresponding with above-mentioned first AES.
A kind of data decryption apparatus, including:
Second data acquisition unit, obtains above-mentioned second character string;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, in generation The first character string is stated, second decipherment algorithm is corresponding with above-mentioned second AES.
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, in generation User's initial data is stated, first decipherment algorithm is corresponding with above-mentioned first AES.
Through as shown from the above technical solution, this application discloses a kind of data encryption, decryption method and device.The method is adopted With the mode of dual encryption.Specifically, being encrypted to the initial data of user using the first AES first, the first word is generated Symbol string.And then the first character string is encrypted using the second AES, generate the second character string.So, adding when system Close algorithm is elevated to the second AES and waits by the first AES, by the second decipherment algorithm (corresponding with the second AES) After decryption (corresponding with the first AES) with the first decipherment algorithm, the initial data of user still can user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of data ciphering method disclosed in one embodiment of the invention;
Fig. 2 shows a kind of structural representation of data encryption device of the invention;
Fig. 3 shows a kind of schematic flow sheet of data decryption method disclosed in another embodiment of the present invention;
Fig. 4 shows a kind of structural representation of data decryption apparatus disclosed in another embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, the scope of protection of the invention is belonged to.
In the prior art after system is upgraded to cipher mode, easily causing user's initial data cannot use. Former login password such as party A-subscriber is " 123 ", and the character string stored in database after former encryption rule encryption is " abc ", upgrading After encryption rule, original code is encrypted as " abcd " through new rule, if now only going checking with new encryption rule, user input is close After code 123, " abc " gone in matching database table with " abcd " is clearly to unmatch.Therefore, the invention discloses one kind Data encryption, decryption method and device.
A kind of schematic flow sheet of data ciphering method disclosed in one embodiment of the invention is shown referring to Fig. 1.
As shown in Figure 1, the method includes:
S101:Obtain user's initial data.
S102:User's initial data is encrypted using the first AES, generates the first character string.
It should be noted that first AES is the AES before system upgrade.
S103:First character string is encrypted using the second AES, generates the second character string.
When system be encrypted algorithm lift when, based on lifting after the second AES above-mentioned first character string is carried out Encrypt again, generate the second character string, preserve second character string.
As seen from the above embodiment, this application discloses a kind of data ciphering method.The method is by the way of dual encryption. Specifically, being encrypted to the initial data of user using the first AES first, the first character string is generated.And then use Two AESs are encrypted to the first character string, generate the second character string.So, when the AES of system is by the first encryption Algorithm is elevated to the second AES time, by the second decipherment algorithm (corresponding with the second AES) and the first decipherment algorithm After decryption (corresponding with the first AES), the initial data of user still can user.
Execution flow of the invention is introduced with specific embodiment below.
Such as, user's initial data is password 123, and before system upgrade, password 123 is by raw after the encryption of the first AES Into the first character string abc.
In system upgrade, the first character string abc is encrypted using the second AES, generates the second character string abcd。
So, can be based on the second decipherment algorithm (corresponding with the second AES) and the first decryption after system completes upgrading After algorithm joint decryption (corresponding with the first AES), the password 123 of user is obtained.
A kind of structural representation of data encryption device of the invention is shown referring to Fig. 2.
As shown in Figure 2, the device includes:First data acquisition unit 1, the first DEU data encryption unit 2, the second data encryption Unit 3.
First data acquisition unit, for obtaining user's initial data.
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, is generated First character string.
Second DEU data encryption unit, for being encrypted to first character string using the second AES, generation is simultaneously Preserve the second character string.
It should be noted that a kind of also public data decryption method of another embodiment of the present invention.The decryption method with Decryption method in above-described embodiment is corresponding.
A kind of schematic flow sheet of data decryption method disclosed in another embodiment of the present invention is shown referring to Fig. 3.
From the figure 3, it may be seen that the method includes:
S201:Obtain above-mentioned second character string;
S202:Second character string is decrypted based on the second decipherment algorithm, the first character string during generation is above-mentioned.
Second decipherment algorithm is corresponding with the second above-mentioned AES.
S203:First character string is decrypted based on the first decipherment algorithm, the above-mentioned user's initial data of generation power.
First decipherment algorithm is corresponding with the first above-mentioned AES.
In addition, showing a kind of structural representation of data decryption apparatus disclosed in another embodiment of the present invention referring to Fig. 4 Figure.
The device includes:Second data acquisition unit 4, the second data decryption unit 5 and the first data decryption unit 6.
Second data acquisition unit, obtains the second above-mentioned character string;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, in generation The first described character string is stated, second decipherment algorithm is corresponding with the second above-mentioned AES.
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, in generation The user's initial data stated, first decipherment algorithm is corresponding with the first above-mentioned AES.
It should be noted that the system embodiment is corresponding with embodiment of the method, its implementation procedure is identical with principle is performed, Therefore not to repeat here.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", does not arrange Except also there is other identical element in the process including the key element, method, article or equipment.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention. Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The scope most wide for causing.

Claims (4)

1. a kind of data ciphering method, it is characterised in that including:
Obtain user's initial data;
User's initial data is encrypted using the first AES, generates the first character string;
First character string is encrypted using the second AES, generates and preserve the second character string.
2. a kind of data encryption device, it is characterised in that including:
First data acquisition unit, for obtaining user's initial data;
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, generation first Character string;
Second DEU data encryption unit, for being encrypted to first character string using the second AES, is generated and preserved Second character string.
3. a kind of data decryption method, it is characterised in that including:
Obtain the second character string described in claim 1;
Second character string is decrypted based on the second decipherment algorithm, the first character string described in generation claim 1, Second decipherment algorithm is corresponding with the second AES described in claim 1;
First character string is decrypted based on the first decipherment algorithm, the user's original number described in generation claim 1 According to first decipherment algorithm is corresponding with the first AES described in claim 1.
4. a kind of data decryption apparatus, it is characterised in that including:
Second data acquisition unit, obtains the second character string described in claim 2;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, generation right will The first character string described in 2 is sought, second decipherment algorithm is corresponding with the second AES described in claim 2;
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, generation right will The user's initial data described in 2 is sought, first decipherment algorithm is relative with the first AES described in claim 2 Should.
CN201710123554.4A 2017-03-03 2017-03-03 A kind of data encryption, decryption method and device Pending CN106790288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710123554.4A CN106790288A (en) 2017-03-03 2017-03-03 A kind of data encryption, decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710123554.4A CN106790288A (en) 2017-03-03 2017-03-03 A kind of data encryption, decryption method and device

Publications (1)

Publication Number Publication Date
CN106790288A true CN106790288A (en) 2017-05-31

Family

ID=58960926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710123554.4A Pending CN106790288A (en) 2017-03-03 2017-03-03 A kind of data encryption, decryption method and device

Country Status (1)

Country Link
CN (1) CN106790288A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN111030803A (en) * 2019-12-19 2020-04-17 山东英信计算机技术有限公司 Encryption method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677269A (en) * 2008-09-17 2010-03-24 比亚迪股份有限公司 Method and system for transmitting keys
CN105005731A (en) * 2015-06-30 2015-10-28 广东欧珀移动通信有限公司 Data encryption and decryption methods and mobile terminal
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677269A (en) * 2008-09-17 2010-03-24 比亚迪股份有限公司 Method and system for transmitting keys
CN105005731A (en) * 2015-06-30 2015-10-28 广东欧珀移动通信有限公司 Data encryption and decryption methods and mobile terminal
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107819569A (en) * 2017-12-14 2018-03-20 平安科技(深圳)有限公司 The encryption method and terminal device of log-on message
CN111030803A (en) * 2019-12-19 2020-04-17 山东英信计算机技术有限公司 Encryption method, device and equipment

Similar Documents

Publication Publication Date Title
EP3229397B1 (en) Method for fulfilling a cryptographic request requiring a value of a private key
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
US20210152351A1 (en) Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data
JP5742849B2 (en) Encrypted database system, client terminal, encrypted database server, natural join method and program
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
CN112400299B (en) Data interaction method and related equipment
WO2012043012A1 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
WO2009010985A2 (en) Method and apparatus for securing data and communication
CN111008094B (en) Data recovery method, device and system
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
US11360743B2 (en) Data set including a secure key
US11157631B1 (en) System and method for securely indexing, storing, and retrieving data within a computer network
US20090210720A1 (en) Method for generating one-time password
CN103853943A (en) Program protection method and device
CN110022207B (en) Method, apparatus, device and computer readable medium for key management and data processing
CN106790288A (en) A kind of data encryption, decryption method and device
US8751819B1 (en) Systems and methods for encoding data
CN105827411A (en) Information processing method and apparatus
US20130031373A1 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
Veeraragavan et al. Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud
CN105184119A (en) Software safety protection method
CN103763097A (en) Security encryption method for password or secret key
JP2008520145A (en) A secure interface for generic key derivation function support
US10445510B2 (en) Data checking apparatus and method using same
CN103795547A (en) User data encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication