CN108155985A - A kind of encipher-decipher method, device and user terminal - Google Patents

A kind of encipher-decipher method, device and user terminal Download PDF

Info

Publication number
CN108155985A
CN108155985A CN201710516098.XA CN201710516098A CN108155985A CN 108155985 A CN108155985 A CN 108155985A CN 201710516098 A CN201710516098 A CN 201710516098A CN 108155985 A CN108155985 A CN 108155985A
Authority
CN
China
Prior art keywords
string
bit value
hexadecimal
character string
hand over
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710516098.XA
Other languages
Chinese (zh)
Inventor
陈强
丰亚会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong No.7 Digital Service Co., Ltd
Original Assignee
Guangdong Net Gold Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Net Gold Cloud Computing Co Ltd filed Critical Guangdong Net Gold Cloud Computing Co Ltd
Priority to CN201710516098.XA priority Critical patent/CN108155985A/en
Publication of CN108155985A publication Critical patent/CN108155985A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of encipher-decipher method, device and user terminal, method includes:Encrypting step is performed for character string to be encrypted, obtains ciphertext;Encrypting step includes:Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;In the end of encrypted characters string A addition random string B;The value range of the bit value of random string B is 1~N;The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;In the end of random string B addition hand over word string C;The bit value of hand over word string C is the bit value of N;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, hand over word string C is formed plus cover mark by hexadecimal string.Brute Force difficulty can be substantially improved in this method.

Description

A kind of encipher-decipher method, device and user terminal
Technical field
The present invention relates to enciphering and deciphering algorithm fields.
Background technology
Common symmetrical enciphering and deciphering algorithm include AES, DES, 3DES scheduling algorithms original topic be all it is disclosed, Brute Force can Energy property is high, these enciphering and deciphering algorithms have much room for improvement.
Invention content
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of encipher-decipher methods, realize It is optimized on the basis of conventional algorithm, Brute Force difficulty is substantially improved.
The second object of the present invention is to provide a kind of ciphering and deciphering device, realizes and optimized on the basis of conventional algorithm, Brute Force difficulty is substantially improved.
The third object of the present invention is to provide a kind of user terminal, realizes and optimized on the basis of conventional algorithm, greatly Width promotes Brute Force difficulty.
One of to achieve the above object, the technical solution adopted in the present invention is as follows:
A kind of encipher-decipher method, includes the following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm Kind.
To achieve the above object two, the technical solution adopted in the present invention is as follows:
A kind of ciphering and deciphering device, including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it further includes with lower module:Deciphering module asks for receiving and deciphering, decryption is performed for the ciphertext Step, obtains original character string, and the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm Kind.
To achieve the above object three, the technical solution adopted in the present invention is as follows:
A kind of user terminal, including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm Kind.
Compared with prior art, the beneficial effects of the present invention are:The optimization carried out on the basis of conventional enciphering and deciphering algorithm, makes The difficulty of Brute Force is substantially improved.
Description of the drawings
Fig. 1 is the flow chart of the encipher-decipher method of the embodiment of the present invention one;
Fig. 2 is the flow chart of the encrypting step of the encipher-decipher method of the embodiment of the present invention one;
The flow chart of the decryption step of the encipher-decipher method of Fig. 3 positions embodiment of the present invention one;
Fig. 4 is the structure diagram of the ciphering and deciphering device of the embodiment of the present invention two;
Fig. 5 is the structure diagram of the user terminal of the embodiment of the present invention three.
Specific embodiment
In the following, with reference to attached drawing and specific embodiment, the present invention is described further:
Embodiment one:
With reference to figure 1-3, the present invention provides a kind of encipher-decipher methods, include the following steps:
S101, it receives CIPHERING REQUEST and obtains character string to be encrypted;
S102, encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
S201, it encrypted characters string is treated by predetermined encryption algorithm is encrypted, obtain encrypted characters string A;
S202, random string B is added at the end of encrypted characters string A;The value of the bit value of the random string B Ranging from 1~N, N are for integer and more than 1;
S203, the bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
S204, hand over word string C is added at the end of random string B;The bit value of the hand over word string C is N's Bit value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is 16 System character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, by hexadecimal string In addition cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
S103, receiving and deciphering request, decryption step is performed for the ciphertext, obtains original character string, the decryption step Suddenly include:
S301, the X positions character string for obtaining the ciphertext end, the numerical value of the X are the bit value of N;
S302, the character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtained Decimal value Y;
S303, the Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is obtained for X+Y The value arrived;
S304, reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original Beginning character string.
Wherein, the predetermined encryption algorithm is one kind in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm.
It is described in detail with reference to specific example.
For example, one original message is encrypted by AES encryption algorithm, encrypted characters string A is obtained.Then it re-encrypts A random string B is added behind character string A, the digit of character string B is 110, then the bit value of random string B is 110, Hexadecimal is converted to by the decimal system by 110, obtains hexadecimal string as 6e.Then add at the end of random string B Add hand over word string C.Due to hand over word string C bit value be 110 bit value, as 3, less than hexadecimal string 6e Bit value, therefore will add cover mark composition hand over word string C, cover mark can be g, then hand over word string C is g6e。
It should be noted that digit refers to the length of random string B, if for example, the value of random string B is 1234, Then digit is exactly 4;If the value of random string B is 123456789, digit is exactly 9;And so on.
During decryption, the X positions character string at ciphertext end is obtained, the numerical value of X is 110 bit value, as obtains ciphertext end 3 character strings, obtain g6e, by cover mark remove, obtain 6e, the decimal system be converted to by hexadecimal, obtains decimal number Value 110.Then the Z positions character string at ciphertext end is removed, Z 3+110=113, that is, removes 113 characters at ciphertext end String obtains reduction character string.Then recycle AES decipherment algorithms that reduction character string is decrypted, you can to obtain original message.
By the above method, the optimization carried out on the basis of conventional enciphering and deciphering algorithm makes the difficulty of Brute Force substantially carry It rises.
Embodiment two:
With reference to figure 4, the present invention provides a kind of ciphering and deciphering device, including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it further includes with lower module:Deciphering module asks for receiving and deciphering, decryption is performed for the ciphertext Step, obtains original character string, and the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm Kind.
Embodiment three:
With reference to figure 5, the present invention provides a kind of user terminal, including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B For 1~N, N is for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the digit of N Value;If the bit value of hexadecimal string is identical with the bit value of hand over word string C, hand over word string C is hexadecimal Character string;If the bit value of hexadecimal string is less than the bit value of hand over word string C, added by hexadecimal string Cover mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
Preferably, it is further comprising the steps of:Receiving and deciphering is asked, and is performed decryption step for the ciphertext, is obtained original Character string, the decryption step include:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
By in the X character string except cover identify in addition to character string the decimal system is converted to by hexadecimal, obtain ten into Numerical value Y processed;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;What the numerical value of the Z was obtained for X+Y Value;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character String.
Preferably, the predetermined encryption algorithm is one in AES encryption algorithm, des encryption algorithm and 3DES encryption algorithm Kind.
It will be apparent to those skilled in the art that technical solution that can be as described above and design, make other various Corresponding change and deformation, and all these changes and deformation should all belong to the protection domain of the claims in the present invention Within.

Claims (9)

1. a kind of encipher-decipher method, which is characterized in that include the following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~ N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
2. encipher-decipher method according to claim 1, which is characterized in that further comprising the steps of:Receiving and deciphering is asked, needle Decryption step is performed to the ciphertext, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
3. encipher-decipher method according to claim 1, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm, One kind in des encryption algorithm and 3DES encryption algorithm.
4. a kind of ciphering and deciphering device, which is characterized in that including with lower module:
Receiving module, for receiving CIPHERING REQUEST and obtaining character string to be encrypted;
Encrypting module performs encrypting step for being directed to character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~ N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
5. ciphering and deciphering device according to claim 4, which is characterized in that further include with lower module:Deciphering module, for connecing Decoding request is received, decryption step is performed for the ciphertext, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
6. ciphering and deciphering device according to claim 4, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm, One kind in des encryption algorithm and 3DES encryption algorithm.
7. a kind of user terminal, which is characterized in that including:
Memory, for storing program instruction;
Processor, for performing described program instruction, to perform following steps:
It receives CIPHERING REQUEST and obtains character string to be encrypted;
Encrypting step is performed for character string to be encrypted, obtains ciphertext;
The encrypting step includes:
Encrypted characters string is treated by predetermined encryption algorithm to be encrypted, and obtains encrypted characters string A;
In the end of encrypted characters string A addition random string B;The value range of the bit value of the random string B for 1~ N, N are for integer and more than 1;
The bit value of random string B is converted into hexadecimal by the decimal system, obtains hexadecimal string;
In the end of random string B addition hand over word string C;The bit value of the hand over word string C is the bit value of N;If The bit value of hexadecimal string is identical with the bit value of hand over word string C, then hand over word string C is hexadecimal character String;If the bit value of hexadecimal string is less than the bit value of hand over word string C, cover is added by hexadecimal string Mark composition hand over word string C;
The ciphertext is made of encrypted characters string A, random string B and hand over word string C.
8. user terminal according to claim 7, which is characterized in that further comprising the steps of:Receiving and deciphering is asked, for The ciphertext performs decryption step, obtains original character string, the decryption step includes:
The X positions character string at the ciphertext end is obtained, the numerical value of the X is the bit value of N;
Character string in the X character string in addition to cover identifies is converted into the decimal system by hexadecimal, obtains decimal number Value Y;
The Z positions character string at the ciphertext end is removed, obtains reduction character string;The numerical value of the Z is the value that X+Y is obtained;
Reduction character string is decrypted by default decipherment algorithm corresponding with predetermined encryption algorithm, obtains original character string.
9. user terminal according to claim 7, which is characterized in that the predetermined encryption algorithm for AES encryption algorithm, One kind in des encryption algorithm and 3DES encryption algorithm.
CN201710516098.XA 2017-06-29 2017-06-29 A kind of encipher-decipher method, device and user terminal Pending CN108155985A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710516098.XA CN108155985A (en) 2017-06-29 2017-06-29 A kind of encipher-decipher method, device and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710516098.XA CN108155985A (en) 2017-06-29 2017-06-29 A kind of encipher-decipher method, device and user terminal

Publications (1)

Publication Number Publication Date
CN108155985A true CN108155985A (en) 2018-06-12

Family

ID=62468664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710516098.XA Pending CN108155985A (en) 2017-06-29 2017-06-29 A kind of encipher-decipher method, device and user terminal

Country Status (1)

Country Link
CN (1) CN108155985A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011787A (en) * 2019-03-27 2019-07-12 北京瑞源芯科技有限公司 A kind of data block fill method and device based on AES encryption algorithm
CN110543778A (en) * 2019-09-03 2019-12-06 广州市金其利信息科技有限公司 linear random encryption and decryption algorithm for character data
CN111030803A (en) * 2019-12-19 2020-04-17 山东英信计算机技术有限公司 Encryption method, device and equipment
CN115225330A (en) * 2022-06-21 2022-10-21 中国电信股份有限公司 Data encryption method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942500A (en) * 2014-05-11 2014-07-23 西安科技大学 Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN105099652A (en) * 2014-05-04 2015-11-25 博雅网络游戏开发(深圳)有限公司 Data encryption and decryption method and devices
CN106301763A (en) * 2016-08-31 2017-01-04 国家超级计算深圳中心(深圳云计算中心) A kind of data encryption based on double salt figure and decryption method and system
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099652A (en) * 2014-05-04 2015-11-25 博雅网络游戏开发(深圳)有限公司 Data encryption and decryption method and devices
CN103942500A (en) * 2014-05-11 2014-07-23 西安科技大学 Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN104125055A (en) * 2014-06-25 2014-10-29 小米科技有限责任公司 Encryption and decryption method and electronic device
CN106301763A (en) * 2016-08-31 2017-01-04 国家超级计算深圳中心(深圳云计算中心) A kind of data encryption based on double salt figure and decryption method and system
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011787A (en) * 2019-03-27 2019-07-12 北京瑞源芯科技有限公司 A kind of data block fill method and device based on AES encryption algorithm
CN110543778A (en) * 2019-09-03 2019-12-06 广州市金其利信息科技有限公司 linear random encryption and decryption algorithm for character data
CN111030803A (en) * 2019-12-19 2020-04-17 山东英信计算机技术有限公司 Encryption method, device and equipment
CN115225330A (en) * 2022-06-21 2022-10-21 中国电信股份有限公司 Data encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108155985A (en) A kind of encipher-decipher method, device and user terminal
CN104205117B (en) device file encryption and decryption method and device
CN110650010B (en) Method, device and equipment for generating and using private key in asymmetric key
CN105722067B (en) Data method for encryption/decryption and device on mobile terminal
CN108965302A (en) Media data transmission system, method, apparatus and storage medium
CN106598882B (en) A kind of safe internal storage data guard method and device
JP5542896B2 (en) Low power encryption apparatus and method
CN110401527B (en) Data encryption and decryption method and device and storage medium
CN102594548A (en) Method capable of achieving data sectional encryption and decryption
CN105357003B (en) A kind of method and device of encryption data
CN102063598A (en) Data encryption and decryption methods and devices
WO2018213744A3 (en) Reducing compromise of sensitive data in virtual machine
CN114124364B (en) Key security processing method, device, equipment and computer readable storage medium
CN104506504A (en) Security mechanism and security device for confidential information of card-free terminal
CN108667598B (en) Device and method for realizing secure key exchange and secure key exchange method
KR20170097509A (en) Operation method based on white-box cryptography and security apparatus for performing the method
CN105959279A (en) Computer information transmission system and method based on encryption processing
CN109687966A (en) Encryption method and its system
CN105379172B (en) Device and method for the key updating used in Tuber yield
CN115603907A (en) Method, device, equipment and storage medium for encrypting storage data
CN114117502B (en) Data encryption and decryption method, system, equipment and computer readable storage medium
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN112231740B (en) Data encryption method, data decryption method, data encryption device, computer device, and medium
CN103501220A (en) Encryption method and device
US8774402B2 (en) Encryption/decryption apparatus and method using AES rijndael algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200514

Address after: 510000 room 1601, No. 68, Huacheng Avenue, Tianhe District, Guangzhou City, Guangdong Province

Applicant after: Guangdong No.7 Digital Service Co., Ltd

Address before: 510000, 06-08, room 18, Yuexiu finance building, 28 Zhujiang East Road, Guangdong, Tianhe District, Guangzhou, China

Applicant before: GUANGDONG WANGJIN CLOUD COMPUTING Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20180612

RJ01 Rejection of invention patent application after publication