CN108155985A - A kind of encipher-decipher method, device and user terminal - Google Patents
A kind of encipher-decipher method, device and user terminal Download PDFInfo
- Publication number
- CN108155985A CN108155985A CN201710516098.XA CN201710516098A CN108155985A CN 108155985 A CN108155985 A CN 108155985A CN 201710516098 A CN201710516098 A CN 201710516098A CN 108155985 A CN108155985 A CN 108155985A
- Authority
- CN
- China
- Prior art keywords
- string
- bit value
- hexadecimal
- character string
- hand over
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of encipher-decipher method, device and user terminal, method includes:Encrypting step is performed for character string to be encrypted, obtains ciphertext;Encrypting step includes:Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;In the end of encrypted characters string A addition random string B;The value range of the bit value of random string B is 1~N;The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;In the end of random string B addition hand over word string C;The bit value of hand over word string C is the bit value of N;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, hand over word string C is formed plus cover mark by hexadecimal string.Brute Force difficulty can be substantially improved in this method.
Description
Technical field
The present invention relates to enciphering and deciphering algorithm fields.
Background technology
Common symmetrical enciphering and deciphering algorithm include AES, DES, 3DES scheduling algorithms original topic be all it is disclosed, Brute Force can
Energy property is high, these enciphering and deciphering algorithms have much room for improvement.
Invention content
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of encipher-decipher methods, realize
It is optimized on the basis of conventional algorithm, Brute Force difficulty is substantially improved.
The second object of the present invention is to provide a kind of ciphering and deciphering device, realizes and optimized on the basis of conventional algorithm,
Brute Force difficulty is substantially improved.
The third object of the present invention is to provide a kind of user terminal, realizes and optimized on the basis of conventional algorithm, greatly
Width promotes Brute Force difficulty.
One of to achieve the above object, the technical solution adopted in the present invention is as follows:
A kind of encipher-decipher method, includes the following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B
For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N
Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal
Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string
Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original
Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into
Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y
Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character
String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm
Kind.
To achieve the above object two, the technical solution adopted in the present invention is as follows:
A kind of ciphering and deciphering device, including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B
For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N
Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal
Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string
Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it further includes with lower module:Deciphering module asks for receiving and deciphering, decryption is performed for the ciphertext
Step, obtains original character string, and the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into
Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y
Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character
String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm
Kind.
To achieve the above object three, the technical solution adopted in the present invention is as follows:
A kind of user terminal, including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B
For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N
Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal
Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string
Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original
Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into
Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y
Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character
String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm
Kind.
Compared with prior art, the beneficial effects of the present invention are:The optimization carried out on the basis of conventional enciphering and deciphering algorithm, makes
The difficulty of Brute Force is substantially improved.
Description of the drawings
Fig. 1 is the flow chart of the encipher-decipher method of the embodiment of the present invention one;
Fig. 2 is the flow chart of the encrypting step of the encipher-decipher method of the embodiment of the present invention one;
The flow chart of the decryption step of the encipher-decipher method of Fig. 3 positions embodiment of the present invention one;
Fig. 4 is the structure diagram of the ciphering and deciphering device of the embodiment of the present invention two;
Fig. 5 is the structure diagram of the user terminal of the embodiment of the present invention three.
Specific embodiment
In the following, with reference to attached drawing and specific embodiment, the present invention is described further:
Embodiment one:
With reference to figure 1-3, the present invention provides a kind of encipher-decipher methods, include the following steps:
S101, it receives CIPHERING REQUEST and obtains character string to be encrypted;
S102, encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
S201, it encrypted characters string is treated by predetermined encryption algorithm is encrypted, obtain encrypted characters string A;
S202, random string B is added at the end of encrypted characters string A;The value of the bit value of the random string B
Ranging from 1~N, N are for integer and more than 1;
S203, the bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
S204, hand over word string C is added at the end of random string B;The bit value of the hand over word string C is N's
Bit value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is 16
System character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, by hexadecimal string
In addition cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
S103, receiving and deciphering request, decryption step is performed for the ciphertext, obtains original character string, the decryption step
Suddenly include:
S301, the X positions character string for obtaining the ciphertext end, the numerical value of the X are the bit value of N;
S302, the character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtained
Decimal value Y;
S303, the Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is obtained for X+Y
The value arrived;
S304, reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original
Beginning character string.
Wherein, the predetermined encryption algorithm is one kind in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm.
It is described in detail with reference to specific example.
For example, one original message is encrypted by AES encryption algorithm, encrypted characters string A is obtained.Then it re-encrypts
A random string B is added behind character string A, the digit of character string B is 110, then the bit value of random string B is 110,
Hexadecimal is converted to by the decimal system by 110, obtains hexadecimal string as 6e.Then add at the end of random string B
Add hand over word string C.Due to hand over word string C bit value be 110 bit value, as 3, less than hexadecimal string 6e
Bit value, therefore will add cover mark composition hand over word string C, cover mark can be g, then hand over word string C is
g6e。
It should be noted that digit refers to the length of random string B, if for example, the value of random string B is 1234,
Then digit is exactly 4;If the value of random string B is 123456789, digit is exactly 9;And so on.
During decryption, the X positions character string at ciphertext end is obtained, the numerical value of X is 110 bit value, as obtains ciphertext end
3 character strings, obtain g6e, by cover mark remove, obtain 6e, the decimal system be converted to by hexadecimal, obtains decimal number
Value 110.Then the Z positions character string at ciphertext end is removed, Z 3+110=113, that is, removes 113 characters at ciphertext end
String obtains reduction character string.Then recycle AES decipherment algorithms that reduction character string is decrypted, you can to obtain original message.
By the above method, the optimization carried out on the basis of conventional enciphering and deciphering algorithm makes the difficulty of Brute Force substantially carry
It rises.
Embodiment two:
With reference to figure 4, the present invention provides a kind of ciphering and deciphering device, including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B
For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N
Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal
Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string
Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it further includes with lower module:Deciphering module asks for receiving and deciphering, decryption is performed for the ciphertext
Step, obtains original character string, and the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into
Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y
Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character
String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm
Kind.
Embodiment three:
With reference to figure 5, the present invention provides a kind of user terminal, including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B
For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N
Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal
Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string
Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original
Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into
Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y
Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character
String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm
Kind.
It will be apparent to those skilled in the art that technical solution that can be as described above and design, make other various
Corresponding change and deformation, and all these changes and deformation should all belong to the protection domain of the claims in the present invention
Within.
Claims (9)
1. a kind of encipher-decipher method, which is characterized in that include the following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~
N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If
The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character
String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string
Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
2. encipher-decipher method according to claim 1, which is characterized in that further comprising the steps of:Receiving and deciphering is asked, needle
Decryption step is performed to the ciphertext, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number
Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
3. encipher-decipher method according to claim 1, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm,
One kind in des encryption algorithm and 3DES encryption algorithm.
4. a kind of ciphering and deciphering device, which is characterized in that including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~
N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If
The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character
String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string
Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
5. ciphering and deciphering device according to claim 4, which is characterized in that further include with lower module:Deciphering module, for connecing
Decoding request is received, decryption step is performed for the ciphertext, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number
Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
6. ciphering and deciphering device according to claim 4, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm,
One kind in des encryption algorithm and 3DES encryption algorithm.
7. a kind of user terminal, which is characterized in that including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~
N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If
The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character
String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string
Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
8. user terminal according to claim 7, which is characterized in that further comprising the steps of:Receiving and deciphering is asked, for
The ciphertext performs decryption step, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number
Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
9. user terminal according to claim 7, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm,
One kind in des encryption algorithm and 3DES encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710516098.XA CN108155985A (en) | 2017-06-29 | 2017-06-29 | A kind of encipher-decipher method, device and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710516098.XA CN108155985A (en) | 2017-06-29 | 2017-06-29 | A kind of encipher-decipher method, device and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108155985A true CN108155985A (en) | 2018-06-12 |
Family
ID=62468664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710516098.XA Pending CN108155985A (en) | 2017-06-29 | 2017-06-29 | A kind of encipher-decipher method, device and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108155985A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011787A (en) * | 2019-03-27 | 2019-07-12 | 北京瑞源芯科技有限公司 | A kind of data block fill method and device based on AES encryption algorithm |
CN110543778A (en) * | 2019-09-03 | 2019-12-06 | 广州市金其利信息科技有限公司 | linear random encryption and decryption algorithm for character data |
CN111030803A (en) * | 2019-12-19 | 2020-04-17 | 山东英信计算机技术有限公司 | Encryption method, device and equipment |
CN115225330A (en) * | 2022-06-21 | 2022-10-21 | 中国电信股份有限公司 | Data encryption method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942500A (en) * | 2014-05-11 | 2014-07-23 | 西安科技大学 | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN105099652A (en) * | 2014-05-04 | 2015-11-25 | 博雅网络游戏开发(深圳)有限公司 | Data encryption and decryption method and devices |
CN106301763A (en) * | 2016-08-31 | 2017-01-04 | 国家超级计算深圳中心(深圳云计算中心) | A kind of data encryption based on double salt figure and decryption method and system |
CN106375083A (en) * | 2016-09-30 | 2017-02-01 | 广东网金控股股份有限公司 | Encryption-decryption method based on Base64 and device thereof |
-
2017
- 2017-06-29 CN CN201710516098.XA patent/CN108155985A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105099652A (en) * | 2014-05-04 | 2015-11-25 | 博雅网络游戏开发(深圳)有限公司 | Data encryption and decryption method and devices |
CN103942500A (en) * | 2014-05-11 | 2014-07-23 | 西安科技大学 | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption |
CN104125055A (en) * | 2014-06-25 | 2014-10-29 | 小米科技有限责任公司 | Encryption and decryption method and electronic device |
CN106301763A (en) * | 2016-08-31 | 2017-01-04 | 国家超级计算深圳中心(深圳云计算中心) | A kind of data encryption based on double salt figure and decryption method and system |
CN106375083A (en) * | 2016-09-30 | 2017-02-01 | 广东网金控股股份有限公司 | Encryption-decryption method based on Base64 and device thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110011787A (en) * | 2019-03-27 | 2019-07-12 | 北京瑞源芯科技有限公司 | A kind of data block fill method and device based on AES encryption algorithm |
CN110543778A (en) * | 2019-09-03 | 2019-12-06 | 广州市金其利信息科技有限公司 | linear random encryption and decryption algorithm for character data |
CN111030803A (en) * | 2019-12-19 | 2020-04-17 | 山东英信计算机技术有限公司 | Encryption method, device and equipment |
CN115225330A (en) * | 2022-06-21 | 2022-10-21 | 中国电信股份有限公司 | Data encryption method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108155985A (en) | A kind of encipher-decipher method, device and user terminal | |
CN104205117B (en) | device file encryption and decryption method and device | |
CN110650010B (en) | Method, device and equipment for generating and using private key in asymmetric key | |
CN105722067B (en) | Data method for encryption/decryption and device on mobile terminal | |
CN108965302A (en) | Media data transmission system, method, apparatus and storage medium | |
CN106598882B (en) | A kind of safe internal storage data guard method and device | |
JP5542896B2 (en) | Low power encryption apparatus and method | |
CN110401527B (en) | Data encryption and decryption method and device and storage medium | |
CN102594548A (en) | Method capable of achieving data sectional encryption and decryption | |
CN105357003B (en) | A kind of method and device of encryption data | |
CN102063598A (en) | Data encryption and decryption methods and devices | |
WO2018213744A3 (en) | Reducing compromise of sensitive data in virtual machine | |
CN114124364B (en) | Key security processing method, device, equipment and computer readable storage medium | |
CN104506504A (en) | Security mechanism and security device for confidential information of card-free terminal | |
CN108667598B (en) | Device and method for realizing secure key exchange and secure key exchange method | |
KR20170097509A (en) | Operation method based on white-box cryptography and security apparatus for performing the method | |
CN105959279A (en) | Computer information transmission system and method based on encryption processing | |
CN109687966A (en) | Encryption method and its system | |
CN105379172B (en) | Device and method for the key updating used in Tuber yield | |
CN115603907A (en) | Method, device, equipment and storage medium for encrypting storage data | |
CN114117502B (en) | Data encryption and decryption method, system, equipment and computer readable storage medium | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN112231740B (en) | Data encryption method, data decryption method, data encryption device, computer device, and medium | |
CN103501220A (en) | Encryption method and device | |
US8774402B2 (en) | Encryption/decryption apparatus and method using AES rijndael algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200514 Address after: 510000 room 1601, No. 68, Huacheng Avenue, Tianhe District, Guangzhou City, Guangdong Province Applicant after: Guangdong No.7 Digital Service Co., Ltd Address before: 510000, 06-08, room 18, Yuexiu finance building, 28 Zhujiang East Road, Guangdong, Tianhe District, Guangzhou, China Applicant before: GUANGDONG WANGJIN CLOUD COMPUTING Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180612 |
|
RJ01 | Rejection of invention patent application after publication |