CN106817216A - A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm - Google Patents

A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm Download PDF

Info

Publication number
CN106817216A
CN106817216A CN201611071964.0A CN201611071964A CN106817216A CN 106817216 A CN106817216 A CN 106817216A CN 201611071964 A CN201611071964 A CN 201611071964A CN 106817216 A CN106817216 A CN 106817216A
Authority
CN
China
Prior art keywords
zip
row
zlib
aes
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611071964.0A
Other languages
Chinese (zh)
Other versions
CN106817216B (en
Inventor
孙永超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruian Technology Co Ltd
Original Assignee
Beijing Ruian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruian Technology Co Ltd filed Critical Beijing Ruian Technology Co Ltd
Priority to CN201611071964.0A priority Critical patent/CN106817216B/en
Publication of CN106817216A publication Critical patent/CN106817216A/en
Application granted granted Critical
Publication of CN106817216B publication Critical patent/CN106817216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

Abstract

The present invention relates to a kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm.The method includes:1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is encrypted using aes algorithm;2) for the ZIP bag datas being encrypted using aes algorithm, aes algorithm is added on the basis of Zlib storehouses ZIP bags are decrypted and decompressed.Further, step 2) aes algorithm is encapsulated in libaes.a static state library files, Zlib storehouses are encapsulated in libz.so dynamic library files.In the present invention, to increasing income, compression Zlib projects are improved and optimize, and add AES decipherment algorithms so that YCL accurately and can be processed quickly for the data that website operator reports, and have the advantages that higher than 7 zip efficiency of algorithm, to occupy CPU few.

Description

A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm
Technical field
It is that a kind of being increased income based on Zlib is compressed and decompression project the present invention relates to computer information safety technique field, It is optimized, AES decipherment algorithms are added.ZIP bags to AES encryption are come by the dynamic link library of application call Zlib It is decrypted the method for decompression.
Background technology
The development of science and technology makes computer be deep into the every aspect of our lives, and compresses as a kind of very typical skill Art, is applied to all kinds of occasions such as many occasions, such as file system, database, message transmission.Compression can be divided into Lossless Compression And lossy compression method;Damage, refer to intactly reducing raw information after being compressed, but compression ratio is high;Lossless Compression is then For the occasion of the necessary full backup information such as file, the ZIP file being mentioned herein is exactly a kind of Lossless Compression.
In actual applications, it is often necessary to realize that the Internet data of each website is read out and analyzed, extract sense The information of interest.But the Internet data file content of each website is very huge, it is necessary to be compressed to data;In order to prevent letter Data have also been carried out encryption by breath leakage.
AES (The Advanced Encrypion Standard) is that American National Standard is used with technical research to be added The specification of cipher telegram subdata.It is widely applied to the fields such as finance, telecommunications and government's digital information.AES is an iteration, Symmetric key packet password, it can use 128,192,256 keys, and with 128 (16 byte) block encryptions with Ciphertext data.
Zlib be one it is free, general, do not hindered by any law, lossless data compression development library, but also be Cross-platform open source projects.Can change this means anyone, be employed without paying any expense, this is also to each When the Internet data of website is read out and analyzes, the main cause developed usually using Zlib storehouses, and ZIP forms category One of compressed format in several main flows.
When the Internet data of each website is read out and is analyzed using Zlib storehouses, generally carried using Linux Zlib built-in functions are compressed and decompress to data, and the data that number of site is reported are compressed into ZIP using 7-zip software cryptographies Bag, and 7-zip softwares are encrypted using aes algorithm to data.But Zlib only supports simple AES, does not support AES encryption decipherment algorithm;So the problem brought therewith is Zlib storehouses being unable to the use AES encryption that normal process website reports Data.
The content of the invention
Increased income storehouse based on Zlib it is an object of the invention to provide one kind, with reference to AES decipherment algorithms, can be automatically and accurately right The file of 7-zip software cryptographies compression is decrypted decompression, static by only adding libz.so dynamic link libraries and libaes.a Chained library can process the ZIP bags that website reports encryption.
The technical solution adopted by the present invention is as follows:
A kind of method for decompressing ZIP bags based on Zlib storehouses and aes algorithm, comprises the following steps:
1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is added using aes algorithm It is close;
2) for the ZIP bag datas being encrypted using aes algorithm, addition aes algorithm comes to ZIP on the basis of Zlib storehouses Bag is decrypted and decompresses.
Further, step 2) aes algorithm is encapsulated in static library file, Zlib storehouses are encapsulated in libz.so dynamics In library file.
Further, the AES encryption decipherment algorithm includes:
A.AES ciphering process:SubBytes (byte replacement), ShiftRows (row displacement), (row are mixed for MixColumns Confuse),
AddRoundKey (InvAddRoundKey);
B.AES decrypting processes:InvSubBytes (inverse byte is substituted), InvShiftRows (Retrograde transposition), InvMixColumns
(inverse row are obscured) AddRoundKey (InvAddRoundKey).
Advantages and positive effects of the present invention are as follows:
In due to the present invention, compression Zlib projects of increasing income are improved and optimized, add AES decipherment algorithms;This is exactly The AES of 7-zip, can accurately and quickly be processed hence for the data that website operator reports.In addition, Zlib is decompressed Algorithm is by the way of libz.so dynamic bases, and aes algorithm is processing the number that website reports using static library mode is packaged into According to when can install automatically, it is not necessary to the Zlib storehouses of upgrade-system, asked in addition this avoid too low the bringing of operating system version Topic;The Zlib decompression algorithms that the last present invention is used have the advantages that higher than 7-zip efficiency of algorithm, to occupy CPU few.
Brief description of the drawings
Fig. 1 is the flow chart for processing website reported data;
Fig. 2 is to call Zlib to decompress ZIP file flow chart;
Fig. 3 is AES encryption decryption flow chart;
Fig. 4 is SubBytes (byte replacement) matrix schematic diagram;
Fig. 5 is ShiftRows (row displacement) schematic diagram;
Fig. 6 is 7zip and Zlib decompression time comparison diagrams.
Specific embodiment
Below by specific embodiments and the drawings, the present invention will be further described.
Fig. 1 is to illustrate the whole flow process for processing website reported data in the prior art.As shown in the drawing, first from scene Carrying program receive ZIP bag datas, scan corresponding catalogue, then decompress ZIP APMB packages, then to scan decompression ZIP bags literary Bcp files are finally entered row format conversion by bcp files and entity file after part, that is, obtain invalid data and to effective number According to being verified, then from these effective specific information of extracting data;Entity file enters full-text database.Inventing herein is On the basis of original Zlib storehouses, the method for adding aes algorithm to decompress ZIP bags, positioned at the 3rd link of Fig. 1.
One, decompression modules are designed
Although the compression ratio of 7zip is very high, and supports AES encryption and decryption, cpu is very high for 7zip occupancy, and this can very great Cheng Its real-time when website reported data is processed is influenceed on degree, so decompressing ZIP file using Zlib storehouses in this method.
Zlib storehouses belong to storehouse of increasing income, and using DEFLATE compression algorithms, only support simple encryption decryption function;But do not support AES enciphering and deciphering algorithms, so wanting to decompress the ZIP bags of aes algorithm encryption, must just change the storehouse Zlib code additions AES that increases income Enciphering and deciphering algorithm.In order to not influence the interface for calling before, aes algorithm is encapsulated in libaes.a static state library files (libaes.a is the static library name of the present invention oneself definition);Zlib storehouses are encapsulated in libz.so dynamic library files.Do so Benefit be no matter how to change code, only need to update the two library files and need not change other programs.
Modification unzip.c files, increase
Modification unzOpenCurrentFilePassword functions, this function major function obtains ZIP file information;Judge If then ZIP bags use AES encryption to HEADID 0x9901;Read version number;Two bytes are read to determine whether ' A ' and ' E ';Read ZIP packet encryption patterns are taken, here should be AES;Read ZIP packet compression patterns.
Modification unzReadCurrentFile functions, this function major function reads the file content in ZIP bags, judges it The ZIP encryption modes of preceding reading;If AES then calls libaes.a static libraries to be decrypted, it is decrypted with known key Obtain in plain text.
Decompression flow:As shown in Fig. 2 including:ZIP streams are opened, the information of ZIP file is obtained, the text when prelocalization is opened File (if AES encryption then carries out AES decryption to reading data) is read in part, circulation, closes current file, closes ZIP streams.Tool Body step is as follows:
1. ZIP bags are opened in the way of file stream;
2. first file in compressed file is navigated to;
3. the related fileinfos of ZIP are obtained, if catalogue then continues recurrence, if file then establishment file;
4. open and currently navigate to file, obtain ZIP information, judge whether it is AES encryption, if then initialization AES letters The structure is referred to as aes_cox by breath structure, the present invention;
5. file is read from current ZIP bags, circulation is read, and judges whether it is AES encryption, if content is decrypted reading Go out, and the content that will be read is written in the file for creating before;
6. document time stamp is set;
7. the current file for reading, the internal memory of the AES message structures of dynamically distributes before release are closed;
8., if also there is alternative document in ZIP bags, next file is navigated to;
9. the stream opened is closed.
Two .AES algorithms for encryption and decryption are constituted
As shown in figure 3, the core of AES encryption algorithm includes:(row is moved for SubBytes (byte replacement), ShiftRows Position), MixColumns (row are obscured), AddRoundKey (InvAddRoundKey).AES decipherment algorithms are the inverse process of encryption, so removing AddRoundKey (InvAddRoundKey) is constant outer, and remaining is required for carrying out inverse transformation, InvSubBytes (inverse byte is substituted), InvShiftRows (Retrograde transposition), InvMixColumns (inverse row are obscured).
1. byte replaces
The major function that byte replaces is to complete a byte to the mapping of another byte by S boxes.It is one Nonlinear transformation on byte, each byte in state is non-linearly transformed to another byte by it, instead of table S boxes It is reversible;As shown in Figure 4.
Byte replaces being divided into:Forward byte replaces and reverse byte replaces.
2. row displacement
The function of row displacement is to realize the displacement between a 4*4 internal matrix byte.
Row displacement is divided into:Positive row displacement and the displacement of reverse row.
The operation of positive row displacement is:The first row continues to have, the second byte of row ring shift left 1, the third line circulation Move to left 2 bytes, 3 bytes of fourth line ring shift left, as shown in Figure 5.
Reverse row displacement is opposite operation.
3. row are obscured
Row are obscured:It is to enter line translation by column to a state, i.e., mixes four bytes of each column using linear transformation.
Arrange to obscure and be divided into:Positive nematic obscures and inversely row are obscured.
4. InvAddRoundKey
During InvAddRoundKey, using simple step-by-step xor operation, key is expanded by key schedule process Open up and obtain round key, then plaintext and corresponding sub-key XOR, i.e., the input often taken turns is with round key XOR once;Cause This, the key of the wheel can recover input on XOR again during decryption.
5. key schedule
Key schedule includes two parts:Cipher key spreading and round key are chosen.The effect of cipher key spreading is in data encryption/solution The round key used in round transformation is obtained before close.
In sum, can also learn that AES encryption and decryption are all a mistakes for iteration from AES encryption decryption flow chart Journey;Data are carried out in an iterative process repeat displacement, until obtaining last plaintext or cipher text.
The API of three, Callings
API1:Decompressing files
void unzip_extract(char*pZipFile,char*pExtractDir)
|input paramete:
1) decompressing files title, 2) decompression directory name;
Return value:Nothing.
API2:Open file stream
void*unzOpen(char*pZipFile)
|input paramete:
1) decompressing files title;
Return value:
1) it is converted into the file flow index of void* forms.
API3:Navigate to first file
int unzGoToFirstFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API4:Open current file
int unzOpenCurrentFilePassword(void*uf,char*pwd)
|input paramete:
1) file flow index, 2) key (key during ciphered compressed ZIP of website),
Return value:
1) 0 success, 2) -1 failure.
API5:Read current file content
int unzReadCurrentFile(void*uf,char*buf,size_t size)
|input paramete:
1) file flow index, 2) reading of content, 3) content size;
Return value:
1) 0 success, 2) -1 failure.
API6:Close current file
int unzCloseCurrentFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API7:Navigate to next file
int unzGoToNextFile(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API8:Close file stream
int unzClose(void*uf)
|input paramete:
1) file flow index;
Return value:
1) 0 success, 2) -1 failure.
API9:Reverse row are obscured
Void contrary_mixColumns (unsigned char*col) |input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after treatment are obscured.
API10:Reverse byte is replaced
void contrary_subBytes(unsigned char*col)
|input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after reverse byte replacement treatment.
API11:Reverse row displacement
void contrary_shiftRows(unsigned char*col)
|input paramete:
1) processing data (content of file in ZIP bags);
Return value:
1) data after reverse row shifting processing.
API12:InvAddRoundKey
void add_roundKey(unsigned char*col,unsigned char*key,int round)
|input paramete:
1) processing data (content of file in ZIP bags), 2) key (key during ciphered compressed ZIP of website), 3) poll Number of times;
Return value:
1) data after InvAddRoundKey treatment.
The present invention carries out decompression test, the chronomere that test is obtained to website reported data using 7zip and Zlib respectively It is microsecond, as shown in Table 1 below;And contrast is analyzed to decompression result, as shown in fig. 6, the abscissa of the figure represents different File, ordinate represents the time used by decompression.
The test result list of table 1.
Filename/decompressing method 7z ip(us) Zl ib(us)
data_1471449694.zip 617700 2922
data_1471453015.zip 256364 3209
data_1471453608.zip 183181 5564
data_1471451806.zip 193180 6083
data_1471450007.zip 169391 18622
data_1471450907.zip 250134 15472
data_1471452105.zip 180231 36974
data_1471451507.zip 184553 15633
data_1471450307.zip 206964 7315
From Fig. 6 it could be assumed that, using the method for the present invention, decompressed using Zlib storehouses, its on time stage much Decompressed better than using 7zip storehouses.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this area Personnel can modify or equivalent to technical scheme, without departing from the spirit and scope of the present invention, this The protection domain of invention should be to be defined described in claims.

Claims (8)

1. a kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm, it is characterised in that comprise the following steps:
1) the ZIP bag datas of website are obtained, file is read from ZIP bags and is judged whether it is encrypted using aes algorithm;
2) for the ZIP bag datas being encrypted using aes algorithm, aes algorithm is added on the basis of Zlib storehouses to enter ZIP bags Row decryption and decompression.
2. the method for claim 1, it is characterised in that step 2) aes algorithm is encapsulated in static library file, will Zlib storehouses are encapsulated in libz.so dynamic library files.
3. method as claimed in claim 1 or 2, it is characterised in that the aes algorithm includes:
A) AES encryption process, it includes:Byte is substituted, row is shifted, row are obscured, InvAddRoundKey;
B) AES decrypting processes, it includes:Inverse byte replacement, Retrograde transposition, inverse row are obscured, InvAddRoundKey.
4. method as claimed in claim 3, it is characterised in that the byte is substituted and completes a byte in addition by S boxes One mapping of byte, the mapping is a nonlinear transformation on byte.
5. method as claimed in claim 3, it is characterised in that the row displacement is realized between a 4*4 internal matrix byte Displacement, including positive row displacement and reverse row displacement;The operation of positive row displacement is:The first row continues to have, the second row 1 byte of ring shift left, 2 bytes of the third line ring shift left, 3 bytes of fourth line ring shift left.
6. method as claimed in claim 3, it is characterised in that the row are obscured and enter line translation by column to a state, even if Mix four bytes of each column with linear transformation.
7. method as claimed in claim 3, it is characterised in that the InvAddRoundKey uses step-by-step xor operation, by key Scheduling process is extended to key and obtains round key, then carries out XOR with corresponding sub-key in plain text, i.e., that often takes turns is defeated Enter with round key XOR once, in decryption, the key of the wheel can recover input on XOR again.
8. the method for claim 1, it is characterised in that in step 2) after decompression ZIP APMB packages, scan the bcp for obtaining File and entity file;Bcp files are entered into row format conversion, invalid data is obtained and effective data is verified, then from The specific information of effective extracting data;Entity file is entered into full-text database.
CN201611071964.0A 2016-11-29 2016-11-29 ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm Active CN106817216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611071964.0A CN106817216B (en) 2016-11-29 2016-11-29 ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611071964.0A CN106817216B (en) 2016-11-29 2016-11-29 ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm

Publications (2)

Publication Number Publication Date
CN106817216A true CN106817216A (en) 2017-06-09
CN106817216B CN106817216B (en) 2022-02-22

Family

ID=59106178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611071964.0A Active CN106817216B (en) 2016-11-29 2016-11-29 ZIP (ZIP packet decompression) method based on ZLib library and AES (advanced encryption Standard) algorithm

Country Status (1)

Country Link
CN (1) CN106817216B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861398A (en) * 2019-04-04 2019-06-07 南京电研电力自动化股份有限公司 A kind of the electrical power services device and its network system realization of digital transformer substation
CN109904931A (en) * 2019-04-04 2019-06-18 南京电研电力自动化股份有限公司 The process layer configuration method of intelligent substation electrical power services device and its system
CN116668007A (en) * 2023-08-01 2023-08-29 中电信量子科技有限公司 Encryption communication method, terminal and system based on white-box SM4 algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101937356A (en) * 2010-09-15 2011-01-05 青岛海信移动通信技术股份有限公司 Method for compiling WebKit browser and device thereof
US20110029679A1 (en) * 2009-07-31 2011-02-03 Canon Kabushiki Kaisha Communication apparatus, communication method and program
CN102226906A (en) * 2011-06-03 2011-10-26 王秋池 Information hiding system specified to htm/html
US20160292446A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Data encryption and compression
CN106055366A (en) * 2016-06-03 2016-10-26 用友网络科技股份有限公司 Extension method for custom control based on Eclipse
CN106055278A (en) * 2016-06-03 2016-10-26 无锡华云数据技术服务有限公司 Light-weight realization method based on qcow2 format incremental snapshot

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110029679A1 (en) * 2009-07-31 2011-02-03 Canon Kabushiki Kaisha Communication apparatus, communication method and program
CN101937356A (en) * 2010-09-15 2011-01-05 青岛海信移动通信技术股份有限公司 Method for compiling WebKit browser and device thereof
CN102226906A (en) * 2011-06-03 2011-10-26 王秋池 Information hiding system specified to htm/html
US20160292446A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Data encryption and compression
CN106055366A (en) * 2016-06-03 2016-10-26 用友网络科技股份有限公司 Extension method for custom control based on Eclipse
CN106055278A (en) * 2016-06-03 2016-10-26 无锡华云数据技术服务有限公司 Light-weight realization method based on qcow2 format incremental snapshot

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
万园春等: "微信交互协议和加密模式研究", 《微型电脑应用》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861398A (en) * 2019-04-04 2019-06-07 南京电研电力自动化股份有限公司 A kind of the electrical power services device and its network system realization of digital transformer substation
CN109904931A (en) * 2019-04-04 2019-06-18 南京电研电力自动化股份有限公司 The process layer configuration method of intelligent substation electrical power services device and its system
CN116668007A (en) * 2023-08-01 2023-08-29 中电信量子科技有限公司 Encryption communication method, terminal and system based on white-box SM4 algorithm
CN116668007B (en) * 2023-08-01 2023-10-31 中电信量子科技有限公司 Encryption communication method, terminal and system based on white-box SM4 algorithm

Also Published As

Publication number Publication date
CN106817216B (en) 2022-02-22

Similar Documents

Publication Publication Date Title
Maram et al. Intelligent security algorithm for UNICODE data privacy and security in IOT
US8874932B2 (en) Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects
CN111079162B (en) Data encryption method, data decryption method and data encryption system based on block chain
CN107786331B (en) Data processing method, device, system and computer readable storage medium
US20160050069A1 (en) Method and system for media path security
GNDU RC Dual layer security of data using LSB image steganography method and AES encryption algorithm
CN101996298A (en) Encrypting method and decrypting method corresponding to same
CN110704854B (en) Stream type encryption method aiming at text data reserved format
KR20170036100A (en) Encoder, decoder and methods
CN106100841A (en) A kind of data encryption system based on molecule encryption technology and method
Dolmatov GOST R 34.12-2015: Block Cipher" Kuznyechik"
Oh et al. A selective encryption algorithm based on AES for medical information
CN106817216A (en) A kind of ZIP bag decompressing methods based on Zlib storehouses and aes algorithm
Fauziah et al. Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application
Wen et al. Research on base64 encoding algorithm and PHP implementation
KR101445339B1 (en) Integrated cryptographic apparatus for providing confidentiality and integrity
Mabruri Data security system of text messaging based on android mobile devices using advanced encrytion standard dynamic s-box
Zhang Cryptanalyzing an image cryptosystem based on circular inter-intra pixels bit-level permutation
Balajee UNICODE and Colors Integration tool for Encryption and Decryption
Manikandasaran et al. MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
Amma NG et al. A novel scrambled data hiding approach towards securing sensitive data
CN111130755A (en) Matrix double encryption method based on signature
Kolapwar An improved geo-encryption algorithm in location based services
CN108270544A (en) A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms
Upadhyay et al. Image encryption by using block-based symmetric transformation algorithm (international data encryption algorithm)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant