CN107070944A - A kind of safety storage of MAC Address and read method - Google Patents
A kind of safety storage of MAC Address and read method Download PDFInfo
- Publication number
- CN107070944A CN107070944A CN201710322729.4A CN201710322729A CN107070944A CN 107070944 A CN107070944 A CN 107070944A CN 201710322729 A CN201710322729 A CN 201710322729A CN 107070944 A CN107070944 A CN 107070944A
- Authority
- CN
- China
- Prior art keywords
- mac address
- key
- ciphertext
- vigenere
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Safety storage and read method the invention discloses a kind of MAC Address, including MAC Address key generation module, MAC Address encrypting module, MAC Address deciphering module and database, its method and step are as follows:A, generation key seed:MAC Address key generation module produces key seed using hashing algorithm and stores key seed into database;MAC Address key generation module extracts key and plaintext of the character content respectively as Vigenere cryptographic algorithms of designated length to key seed;B, MAC Address are stored safely:MAC Address encrypting module is encrypted using MAC Address encryption key in step A by BlowFish algorithms to MAC Address and generates MAC Address ciphertext, and MAC Address encrypting module stores MAC Address ciphertext into database;C, MAC Address are read safely.The present invention uses the mode of symmetric cryptography quickly and easily can store MAC Address with ciphertext form, using the user data SHA values in database as key seed, can come out MAC Address fast decryption after processing.
Description
Technical field
The present invention relates to security fields, more particularly to a kind of safety storage of MAC Address and read method, and in particular to
Mark action of the MAC Address on terminal SDK and how to store MAC Address with a kind of safely and effectively method
Background technology
According to newest《China Internet trend report 2016》, (2006-2015) China Internet user between 10 years
Number permeability in population rises to 50% from 10%.Internet ratio shared in people live is greatly improved, internet
Enterprise flourishes, and mobile Internet has led the trend of today's society.
But the problem that network security, which is for we, can not be ignored, either PC ends or mobile phone terminal, various safety
Leak emerges in an endless stream.To the related leak of Web applications also in rapid growth, the problem of being tampered for website uses numeral card
Book label will identity information, sets up https connections and is undoubtedly an effective solution.
Plaintext transmission is converted into ciphertext transmission by https connections as a kind of safe and reliable connection, which greatly enhances
The security of data is transmitted, has accomplished anti-eavesdrop, it is anti-tamper, it is anti-to divulge a secret.And certificate indispensable portion in being connected as https
Point --- the two-way authentication for the client and server when https sets up and connected.User certificate is built into terminal SDK
In, user installation is both facilitated, the verification of user identity is realized again.User's MAC address is in server-side database with close
Text storage, even if invader takes database data, also cannot be directly viewed user's MAC address.Using user data by dissipating
Row algorithm SHA512 produces key seed, and this has met the normalization that key is produced with hashing algorithm.By custom algorithm and
Vigenere algorithms are improved, which greatly enhances the security of produced key and privacy, this has also evaded use
Special algorithm produces the limitation of weak key.BlowFish algorithms are fast compared with other symmetric encipherment algorithm speed, efficiency high, and from number
There was only two row according to the data of library inquiry, this shortens the time for making decryption MAC Address as far as possible.
Conventional art be the MAC Address stored in clear by terminal user in the database of server end, this will improve number
According to compromised risk, and MAC Address is stored in the way of One-Way Encryption, be unfavorable for server end to the secondary of MAC Address
Verification.
The content of the invention
Part, is stored it is an object of the invention to provide a kind of safety of MAC Address in view of the shortcomings of the prior art
With read method, the present invention uses the mode of symmetric cryptography quickly and easily can store MAC Address with ciphertext form, will
User data SHA values in database can come out MAC Address fast decryption after processing as key seed.
The purpose of the present invention is achieved through the following technical solutions:
A kind of safety storage of MAC Address and read method, including MAC Address key generation module, MAC Address encryption mould
Block, MAC Address deciphering module and database, its method and step are as follows:
A, generation key seed:The MAC Address key generation module produces key seed using hashing algorithm and will be close
Key seed is stored into database;The MAC Address key generation module extracts the character content of designated length to key seed
Respectively as the key and plaintext of Vigenere cryptographic algorithms, the MAC Address key generation module passes through to plaintext
Vigenere cryptographic algorithms are encrypted using key and generate ciphertext;It is close that the Vigenere cryptographic algorithms are generated
Text is used as MAC Address encryption key;
B, MAC Address are stored safely:The MAC Address encrypting module is to MAC Address by BlowFish algorithms using step
MAC Address encryption key is encrypted and generates MAC Address ciphertext in rapid A, and the MAC Address encrypting module is close by MAC Address
Text is stored into database;
C, MAC Address are read safely, and its method and step is as follows:
C1, the MAC Address deciphering module read key seed and MAC Address ciphertext from database;
C2, the MAC Address deciphering module to key seed extract designated length character content respectively as
The key and plaintext of Vigenere cryptographic algorithms, the MAC Address deciphering module are adopted to plaintext by Vigenere cryptographic algorithms
It is encrypted with key and generates ciphertext;The ciphertext that the Vigenere cryptographic algorithms are generated is decrypted as MAC Address
Key;
C3, the MAC Address deciphering module use MAC in step C2 to MAC Address ciphertext by BlowFish algorithms
Location decruption key is decrypted.
In order to which the present invention is better achieved, the Vigenere cryptographic algorithms can support English and numerical character.
Further technical scheme is:The Vigenere cryptographic algorithms have mapping table, number of the English character to numeral
Mapping table of the word to numeral.
The present invention compared with the prior art, with advantages below and beneficial effect:
The present invention uses the mode of symmetric cryptography quickly and easily can store MAC Address with ciphertext form, by number
According to the user data SHA values in storehouse as key seed, MAC Address fast decryption can be come out after processing.
Brief description of the drawings
Fig. 1 is that the MAC Address key of the embodiment of the present invention two produces flow chart;
Fig. 2 is the MAC Address encryption flow figure of the embodiment of the present invention two;
Fig. 3 is that the MAC Address of the embodiment of the present invention two decrypts flow chart;
Fig. 4 is the Vigenere Algorithm mapping schematic diagrames of the embodiment of the present invention two.
Embodiment
The present invention is described in further detail with reference to embodiment:
Embodiment one
A kind of safety storage of MAC Address and read method, including MAC Address key generation module, MAC Address encryption mould
Block, MAC Address deciphering module and database, its method and step are as follows:
A, generation key seed:The MAC Address key generation module produces key seed using hashing algorithm and will be close
Key seed is stored into database;The MAC Address key generation module extracts the character content of designated length to key seed
Respectively as the key and plaintext of Vigenere cryptographic algorithms, the MAC Address key generation module passes through to plaintext
Vigenere cryptographic algorithms are encrypted using key and generate ciphertext;It is close that the Vigenere cryptographic algorithms are generated
Text is used as MAC Address encryption key;
B, MAC Address are stored safely:The MAC Address encrypting module is to MAC Address by BlowFish algorithms using step
MAC Address encryption key is encrypted and generates MAC Address ciphertext in rapid A, and the MAC Address encrypting module is close by MAC Address
Text is stored into database;
C, MAC Address are read safely, and its method and step is as follows:
C1, the MAC Address deciphering module read key seed and MAC Address ciphertext from database;
C2, the MAC Address deciphering module to key seed extract designated length character content respectively as
The key and plaintext of Vigenere cryptographic algorithms, the MAC Address deciphering module are adopted to plaintext by Vigenere cryptographic algorithms
It is encrypted with key and generates ciphertext;The ciphertext that the Vigenere cryptographic algorithms are generated is decrypted as MAC Address
Key;
C3, the MAC Address deciphering module use MAC in step C2 to MAC Address ciphertext by BlowFish algorithms
Location decruption key is decrypted.
The Vigenere cryptographic algorithms of the present invention can support English and numerical character;And Vigenere cryptographic algorithms have
English character to numeral mapping table, numeral to numeral mapping table.
Embodiment two
As shown in Figure 1 to 4, a kind of safety storage of MAC Address and read method, including MAC Address key produce mould
Block, MAC Address encrypting module, MAC Address deciphering module and database, its method and step are as follows:
A, generation key seed:The MAC Address key generation module produces key seed using hashing algorithm and will be close
Key seed is stored into database, and wherein key seed is 512;The MAC Address key generation module is carried to key seed
The character content of fetching measured length is extracted in the key seed respectively as the key and plaintext of improved Vigenere algorithms
The character content length of designated length is 448, and the MAC Address key generation module passes through improved Vigenere to plaintext
Algorithm is encrypted using key and generates ciphertext;The ciphertext that the improved Vigenere algorithms are generated is as MAC
Address encryption key;
B, MAC Address are stored safely:As shown in Fig. 2 the MAC Address encrypting module passes through BlowFish to MAC Address
Algorithm uses MAC Address encryption key in step A to be encrypted and generate MAC Address ciphertext, and the MAC Address encrypting module will
MAC Address ciphertext is stored into database;
C, MAC Address are read safely, and its method and step is as follows:
C1, the MAC Address deciphering module read key seed and MAC Address ciphertext from database;
C2, the MAC Address deciphering module extract the character content of designated length to key seed respectively as improved
The key and plaintext of Vigenere algorithms, the MAC Address deciphering module are used to plaintext by improved Vigenere algorithms
Key is encrypted and generates ciphertext;The ciphertext that the improved Vigenere algorithms are generated is decrypted as MAC Address
Key;
C3, as shown in figure 3, the MAC Address deciphering module uses step to MAC Address ciphertext by BlowFish algorithms
MAC Address decruption key is decrypted in C2.
The improved Vigenere algorithms of the present invention can support English and numerical character;And improved Vigenere algorithms
With English character to numeral mapping table, numeral to numeral mapping table, as shown in Figure 4.Vigenere algorithm realization principles
It is as follows:
Encrypt formula:Ciphertext=(plaintext+key) Mod 36-1
Decrypt formula:Mod 36+1 in plain text=[26+ (ciphertext-key)]
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (3)
1. a kind of safety storage of MAC Address and read method, it is characterised in that:Including MAC Address key generation module, MAC
Address encryption module, MAC Address deciphering module and database, its method and step are as follows:
A, generation key seed:The MAC Address key generation module produces key seed and by key kind using hashing algorithm
Son is stored into database;The character content that the MAC Address key generation module extracts designated length to key seed is distinguished
As the key and plaintext of Vigenere cryptographic algorithms, the MAC Address key generation module is close by Vigenere to plaintext
Code algorithm is encrypted using key and generates ciphertext;The ciphertext that the Vigenere cryptographic algorithms are generated is as MAC
Address encryption key;
B, MAC Address are stored safely:The MAC Address encrypting module is used in step A to MAC Address by BlowFish algorithms
MAC Address encryption key is encrypted and generates MAC Address ciphertext, and the MAC Address encrypting module stores MAC Address ciphertext
Into database;
C, MAC Address are read safely, and its method and step is as follows:
C1, the MAC Address deciphering module read key seed and MAC Address ciphertext from database;
The character content that C2, the MAC Address deciphering module extract designated length to key seed is close respectively as Vigenere
The key and plaintext of code algorithm, the MAC Address deciphering module are carried out to plaintext by Vigenere cryptographic algorithms using key
Encryption simultaneously generates ciphertext;The ciphertext that the Vigenere cryptographic algorithms are generated is as MAC Address decruption key;
C3, the MAC Address deciphering module use MAC Address solution in step C2 to MAC Address ciphertext by BlowFish algorithms
Key is decrypted.
2. safety storage and read method according to a kind of MAC Address described in claim 1, it is characterised in that:It is described
Vigenere cryptographic algorithms can support English and numerical character.
3. safety storage and read method according to a kind of MAC Address described in claim 2, it is characterised in that:It is described
Vigenere cryptographic algorithms have English character to the mapping table of numeral, the mapping table of numeral to numeral.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710322729.4A CN107070944B (en) | 2017-05-09 | 2017-05-09 | Safe storage and reading method of MAC address |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710322729.4A CN107070944B (en) | 2017-05-09 | 2017-05-09 | Safe storage and reading method of MAC address |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107070944A true CN107070944A (en) | 2017-08-18 |
CN107070944B CN107070944B (en) | 2019-12-24 |
Family
ID=59597725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710322729.4A Active CN107070944B (en) | 2017-05-09 | 2017-05-09 | Safe storage and reading method of MAC address |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070944B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493227A (en) * | 2019-08-20 | 2019-11-22 | 上海集成电路研发中心有限公司 | A kind of data frame transmission method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000138692A (en) * | 1998-11-02 | 2000-05-16 | Canon Inc | Mac address management system, mac address management method and storage medium |
US20020095514A1 (en) * | 2001-01-12 | 2002-07-18 | International Business Machines Corporation | Method and system for disguising a computer system's identity on a network by disguising the system's MAC address |
CN101141241A (en) * | 2006-09-06 | 2008-03-12 | 华为技术有限公司 | Method and network appliance for implementing MAC safety |
CN105429985A (en) * | 2015-11-30 | 2016-03-23 | 青岛海尔智能家电科技有限公司 | MAC (Media Access Control) authentication method, authentication device and MAC encryption method for WIFI (Wireless Fidelity) module and WIFI module |
-
2017
- 2017-05-09 CN CN201710322729.4A patent/CN107070944B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000138692A (en) * | 1998-11-02 | 2000-05-16 | Canon Inc | Mac address management system, mac address management method and storage medium |
US20020095514A1 (en) * | 2001-01-12 | 2002-07-18 | International Business Machines Corporation | Method and system for disguising a computer system's identity on a network by disguising the system's MAC address |
CN101141241A (en) * | 2006-09-06 | 2008-03-12 | 华为技术有限公司 | Method and network appliance for implementing MAC safety |
CN105429985A (en) * | 2015-11-30 | 2016-03-23 | 青岛海尔智能家电科技有限公司 | MAC (Media Access Control) authentication method, authentication device and MAC encryption method for WIFI (Wireless Fidelity) module and WIFI module |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493227A (en) * | 2019-08-20 | 2019-11-22 | 上海集成电路研发中心有限公司 | A kind of data frame transmission method and system |
CN110493227B (en) * | 2019-08-20 | 2021-12-24 | 上海集成电路研发中心有限公司 | Data frame transmission method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107070944B (en) | 2019-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103795533B (en) | Encryption based on identifier, the method and its performs device of decryption | |
CN103684794B (en) | A kind of communication data encipher-decipher method based on the AES of DES, RSA, SHA 1 | |
CN102082790B (en) | Method and device for encryption/decryption of digital signature | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
Tayde et al. | File encryption, decryption using AES algorithm in android phone | |
CN104378198A (en) | Voice encryption method based on block cipher system | |
CN109840425A (en) | A kind of method and apparatus of file encryption | |
CN109873699A (en) | A kind of voidable identity public key encryption method | |
CN103414552B (en) | One utilizes binary tree traversal mode to be encrypted, decryption method and device | |
Venkateswaran et al. | Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
CN108540486A (en) | The generation of cloud key and application method | |
CN110225028B (en) | Distributed anti-counterfeiting system and method thereof | |
Malalla et al. | Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography | |
CN105187418B (en) | Weak signature algorithm | |
CN104993924A (en) | Method for encryption and decryption of digital copyright | |
Bhat et al. | Information hiding through dynamic text steganography and cryptography: Computing and informatics | |
CN107070944A (en) | A kind of safety storage of MAC Address and read method | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN108494554B (en) | Data symmetric encryption method based on double plaintexts | |
CN115001758A (en) | Short byte message security encryption method based on quantum encryption | |
CN114401102A (en) | HTTP request parameter encryption scheme based on cryptographic algorithm | |
Dubey et al. | An innovative data security techniques using cryptography and steganographic techniques | |
CN110247878A (en) | A kind of data transfer encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |