CN106790288A - A kind of data encryption, decryption method and device - Google Patents
A kind of data encryption, decryption method and device Download PDFInfo
- Publication number
- CN106790288A CN106790288A CN201710123554.4A CN201710123554A CN106790288A CN 106790288 A CN106790288 A CN 106790288A CN 201710123554 A CN201710123554 A CN 201710123554A CN 106790288 A CN106790288 A CN 106790288A
- Authority
- CN
- China
- Prior art keywords
- character string
- aes
- data
- user
- decipherment algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Application discloses a kind of data encryption, decryption method and device.The method is by the way of dual encryption.Specifically, being encrypted to the initial data of user using the first AES first, the first character string is generated.And then the first character string is encrypted using the second AES, generate the second character string.So, waited when the AES of system is elevated to the second AES by the first AES, by after the decryption (corresponding with the first AES) of the second decipherment algorithm (corresponding with the second AES) and the first decipherment algorithm, the initial data of user still can user.
Description
Technical field
The application is related to data processing field, more specifically to a kind of data encryption, decryption method and device.
Background technology
With the arriving in big data epoch, the security of data has increasingly obtained the concern of user.Generally adopt at present
With the security for ensureing the mode that data are encrypted data, such as MD2 AESs, md5 encryption algorithm.
However, in the prior art after system is upgraded to cipher mode, easily causing user's initial data cannot
Use.
The content of the invention
In view of this, the application provides a kind of data encryption, decryption method and device, to ensure that system is upgraded in encryption
Afterwards, user's initial data still can use.
To achieve these goals, it is proposed that scheme it is as follows:
A kind of data ciphering method, including:
Obtain user's initial data;
User's initial data is encrypted using the first AES, generates the first character string;
First character string is encrypted using the second AES, generates and preserve the second character string.
A kind of data encryption device, including:
First data acquisition unit, for obtaining user's initial data;
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, is generated
First character string;
Second DEU data encryption unit, for being encrypted to first character string using the second AES, generation is simultaneously
Preserve the second character string.
A kind of data decryption method, including:
Obtain the second character string described in claim 1;
Second character string is decrypted based on the second decipherment algorithm, generates above-mentioned the first character string, described the
Two decipherment algorithms are corresponding with above-mentioned second AES.
First character string is decrypted based on the first decipherment algorithm, generates above-mentioned user's initial data, described the
One decipherment algorithm is corresponding with above-mentioned first AES.
A kind of data decryption apparatus, including:
Second data acquisition unit, obtains above-mentioned second character string;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, in generation
The first character string is stated, second decipherment algorithm is corresponding with above-mentioned second AES.
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, in generation
User's initial data is stated, first decipherment algorithm is corresponding with above-mentioned first AES.
Through as shown from the above technical solution, this application discloses a kind of data encryption, decryption method and device.The method is adopted
With the mode of dual encryption.Specifically, being encrypted to the initial data of user using the first AES first, the first word is generated
Symbol string.And then the first character string is encrypted using the second AES, generate the second character string.So, adding when system
Close algorithm is elevated to the second AES and waits by the first AES, by the second decipherment algorithm (corresponding with the second AES)
After decryption (corresponding with the first AES) with the first decipherment algorithm, the initial data of user still can user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of data ciphering method disclosed in one embodiment of the invention;
Fig. 2 shows a kind of structural representation of data encryption device of the invention;
Fig. 3 shows a kind of schematic flow sheet of data decryption method disclosed in another embodiment of the present invention;
Fig. 4 shows a kind of structural representation of data decryption apparatus disclosed in another embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this
Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example is applied, the scope of protection of the invention is belonged to.
In the prior art after system is upgraded to cipher mode, easily causing user's initial data cannot use.
Former login password such as party A-subscriber is " 123 ", and the character string stored in database after former encryption rule encryption is " abc ", upgrading
After encryption rule, original code is encrypted as " abcd " through new rule, if now only going checking with new encryption rule, user input is close
After code 123, " abc " gone in matching database table with " abcd " is clearly to unmatch.Therefore, the invention discloses one kind
Data encryption, decryption method and device.
A kind of schematic flow sheet of data ciphering method disclosed in one embodiment of the invention is shown referring to Fig. 1.
As shown in Figure 1, the method includes:
S101:Obtain user's initial data.
S102:User's initial data is encrypted using the first AES, generates the first character string.
It should be noted that first AES is the AES before system upgrade.
S103:First character string is encrypted using the second AES, generates the second character string.
When system be encrypted algorithm lift when, based on lifting after the second AES above-mentioned first character string is carried out
Encrypt again, generate the second character string, preserve second character string.
As seen from the above embodiment, this application discloses a kind of data ciphering method.The method is by the way of dual encryption.
Specifically, being encrypted to the initial data of user using the first AES first, the first character string is generated.And then use
Two AESs are encrypted to the first character string, generate the second character string.So, when the AES of system is by the first encryption
Algorithm is elevated to the second AES time, by the second decipherment algorithm (corresponding with the second AES) and the first decipherment algorithm
After decryption (corresponding with the first AES), the initial data of user still can user.
Execution flow of the invention is introduced with specific embodiment below.
Such as, user's initial data is password 123, and before system upgrade, password 123 is by raw after the encryption of the first AES
Into the first character string abc.
In system upgrade, the first character string abc is encrypted using the second AES, generates the second character string
abcd。
So, can be based on the second decipherment algorithm (corresponding with the second AES) and the first decryption after system completes upgrading
After algorithm joint decryption (corresponding with the first AES), the password 123 of user is obtained.
A kind of structural representation of data encryption device of the invention is shown referring to Fig. 2.
As shown in Figure 2, the device includes:First data acquisition unit 1, the first DEU data encryption unit 2, the second data encryption
Unit 3.
First data acquisition unit, for obtaining user's initial data.
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, is generated
First character string.
Second DEU data encryption unit, for being encrypted to first character string using the second AES, generation is simultaneously
Preserve the second character string.
It should be noted that a kind of also public data decryption method of another embodiment of the present invention.The decryption method with
Decryption method in above-described embodiment is corresponding.
A kind of schematic flow sheet of data decryption method disclosed in another embodiment of the present invention is shown referring to Fig. 3.
From the figure 3, it may be seen that the method includes:
S201:Obtain above-mentioned second character string;
S202:Second character string is decrypted based on the second decipherment algorithm, the first character string during generation is above-mentioned.
Second decipherment algorithm is corresponding with the second above-mentioned AES.
S203:First character string is decrypted based on the first decipherment algorithm, the above-mentioned user's initial data of generation power.
First decipherment algorithm is corresponding with the first above-mentioned AES.
In addition, showing a kind of structural representation of data decryption apparatus disclosed in another embodiment of the present invention referring to Fig. 4
Figure.
The device includes:Second data acquisition unit 4, the second data decryption unit 5 and the first data decryption unit 6.
Second data acquisition unit, obtains the second above-mentioned character string;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, in generation
The first described character string is stated, second decipherment algorithm is corresponding with the second above-mentioned AES.
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, in generation
The user's initial data stated, first decipherment algorithm is corresponding with the first above-mentioned AES.
It should be noted that the system embodiment is corresponding with embodiment of the method, its implementation procedure is identical with principle is performed,
Therefore not to repeat here.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that
A little key elements, but also other key elements including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", does not arrange
Except also there is other identical element in the process including the key element, method, article or equipment.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other
The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention.
Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The scope most wide for causing.
Claims (4)
1. a kind of data ciphering method, it is characterised in that including:
Obtain user's initial data;
User's initial data is encrypted using the first AES, generates the first character string;
First character string is encrypted using the second AES, generates and preserve the second character string.
2. a kind of data encryption device, it is characterised in that including:
First data acquisition unit, for obtaining user's initial data;
First DEU data encryption unit, for being encrypted to user's initial data using the first AES, generation first
Character string;
Second DEU data encryption unit, for being encrypted to first character string using the second AES, is generated and preserved
Second character string.
3. a kind of data decryption method, it is characterised in that including:
Obtain the second character string described in claim 1;
Second character string is decrypted based on the second decipherment algorithm, the first character string described in generation claim 1,
Second decipherment algorithm is corresponding with the second AES described in claim 1;
First character string is decrypted based on the first decipherment algorithm, the user's original number described in generation claim 1
According to first decipherment algorithm is corresponding with the first AES described in claim 1.
4. a kind of data decryption apparatus, it is characterised in that including:
Second data acquisition unit, obtains the second character string described in claim 2;
Second data decryption unit, for being decrypted to second character string based on the second decipherment algorithm, generation right will
The first character string described in 2 is sought, second decipherment algorithm is corresponding with the second AES described in claim 2;
First data decryption unit, for being decrypted to first character string based on the first decipherment algorithm, generation right will
The user's initial data described in 2 is sought, first decipherment algorithm is relative with the first AES described in claim 2
Should.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710123554.4A CN106790288A (en) | 2017-03-03 | 2017-03-03 | A kind of data encryption, decryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710123554.4A CN106790288A (en) | 2017-03-03 | 2017-03-03 | A kind of data encryption, decryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106790288A true CN106790288A (en) | 2017-05-31 |
Family
ID=58960926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710123554.4A Pending CN106790288A (en) | 2017-03-03 | 2017-03-03 | A kind of data encryption, decryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790288A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819569A (en) * | 2017-12-14 | 2018-03-20 | 平安科技(深圳)有限公司 | The encryption method and terminal device of log-on message |
CN111030803A (en) * | 2019-12-19 | 2020-04-17 | 山东英信计算机技术有限公司 | Encryption method, device and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677269A (en) * | 2008-09-17 | 2010-03-24 | 比亚迪股份有限公司 | Method and system for transmitting keys |
CN105005731A (en) * | 2015-06-30 | 2015-10-28 | 广东欧珀移动通信有限公司 | Data encryption and decryption methods and mobile terminal |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
-
2017
- 2017-03-03 CN CN201710123554.4A patent/CN106790288A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677269A (en) * | 2008-09-17 | 2010-03-24 | 比亚迪股份有限公司 | Method and system for transmitting keys |
CN105005731A (en) * | 2015-06-30 | 2015-10-28 | 广东欧珀移动通信有限公司 | Data encryption and decryption methods and mobile terminal |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819569A (en) * | 2017-12-14 | 2018-03-20 | 平安科技(深圳)有限公司 | The encryption method and terminal device of log-on message |
CN111030803A (en) * | 2019-12-19 | 2020-04-17 | 山东英信计算机技术有限公司 | Encryption method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3229397B1 (en) | Method for fulfilling a cryptographic request requiring a value of a private key | |
US8694467B2 (en) | Random number based data integrity verification method and system for distributed cloud storage | |
US20210152351A1 (en) | Computer System Implemented Method for Generating a Symmetric Encryption Key Used for Encrypting and Decrypting a Computer System User's Hidden Data | |
JP5742849B2 (en) | Encrypted database system, client terminal, encrypted database server, natural join method and program | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
CN112400299B (en) | Data interaction method and related equipment | |
WO2012043012A1 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
WO2009010985A2 (en) | Method and apparatus for securing data and communication | |
CN111008094B (en) | Data recovery method, device and system | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
US11360743B2 (en) | Data set including a secure key | |
US11157631B1 (en) | System and method for securely indexing, storing, and retrieving data within a computer network | |
US20090210720A1 (en) | Method for generating one-time password | |
CN103853943A (en) | Program protection method and device | |
CN110022207B (en) | Method, apparatus, device and computer readable medium for key management and data processing | |
CN106790288A (en) | A kind of data encryption, decryption method and device | |
US8751819B1 (en) | Systems and methods for encoding data | |
CN105827411A (en) | Information processing method and apparatus | |
US20130031373A1 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
Veeraragavan et al. | Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud | |
CN105184119A (en) | Software safety protection method | |
CN103763097A (en) | Security encryption method for password or secret key | |
JP2008520145A (en) | A secure interface for generic key derivation function support | |
US10445510B2 (en) | Data checking apparatus and method using same | |
CN103795547A (en) | User data encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |