CN108183785A - A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library - Google Patents

A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library Download PDF

Info

Publication number
CN108183785A
CN108183785A CN201810023170.XA CN201810023170A CN108183785A CN 108183785 A CN108183785 A CN 108183785A CN 201810023170 A CN201810023170 A CN 201810023170A CN 108183785 A CN108183785 A CN 108183785A
Authority
CN
China
Prior art keywords
library
sequence
mapping
chaos
preventing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810023170.XA
Other languages
Chinese (zh)
Inventor
张建新
禹思敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201810023170.XA priority Critical patent/CN108183785A/en
Publication of CN108183785A publication Critical patent/CN108183785A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention discloses a kind of methods for preventing from hitting library or dragging library, and including obtaining the first chaos sequence by the first mapping equation, the second chaos sequence is obtained by the second mapping equation;By the first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;By chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and ciphertext is transferred to server.The present invention improves safety of the user password in transmission process, effectively prevents server end and hits library by disabled user or drag library.The invention also discloses a kind of system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library, have above-mentioned advantageous effect.

Description

A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library
Technical field
The present invention relates to field of encryption, more particularly to a kind of method for preventing from hitting library or dragging library, system, device and readable Storage medium.
Background technology
With the rapid development of internet, network safety event also occurs again and again, for example website is hit library or let out after dragging library Reveal personal information and password of user etc..In HTTP (Hyper Text Transfer Protocol, the hypertext of B/S structures Transport protocol) under agreement, code data is plaintext transmission, is then stored in the database of server end, is being passed During defeated, disabled user can directly acquire the code data of user, i.e. decodement.In practical applications, due to multistation Point shared secret is universal phenomenon, if user is ravesdropping for the account number cipher of a certain website, then the user is used for other The account number cipher of website may be also ravesdropping together, consequently, it is possible to bringing great security risk to user.
Therefore, how to provide a kind of scheme for solving above-mentioned technical problem is that those skilled in the art need to solve at present Problem.
Invention content
The object of the present invention is to provide a kind of methods for preventing from hitting library or dragging library, improve user password in transmission process Safety, effectively prevent server end and library hit by disabled user or drags library;It is a further object of the present invention to provide one kind It prevents from hitting library or drags system, device and the readable storage medium storing program for executing in library.
In order to solve the above technical problems, the present invention provides a kind of method for preventing from hitting library or dragging library, including:
First chaos sequence is obtained by the first mapping equation, the second chaos sequence is obtained by the second mapping equation;
By first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;
By the chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and the ciphertext is transferred to server.
Preferably, first mapping equation is two-dimentional mathematical logic Logistic mapping equations, the second mapping side Journey is two-dimentional Chebyshev's Chebyshev mapping equations.
Preferably, the process by the chaotic key sequence pair plaintext sequential encryption is specially:
The chaotic key sequence and plaintext sequence are subjected to exclusive or processing, to complete to the plaintext sequential encryption.
Preferably, the encrypted process carries out in js files.
Preferably, this method further includes:
Compression processing is carried out to the js files.
Preferably, it is described to the js files carry out compression processing process be specially:
Delete the annotation and/or figure shift in the code of the js files and/or the symbol that enters a new line.
In order to solve the above technical problems, the present invention also provides a kind of system for preventing from hitting library or dragging library, including:
Mapping block obtains the first chaos sequence for passing through the first mapping equation, and is obtained by the second mapping equation Two chaos sequences;
Processing module, for by first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key Sequence;
Encrypting module for passing through the chaotic key sequence pair plaintext sequential encryption, obtains ciphertext, and by the ciphertext It is transferred to server.
Preferably, first mapping equation is two-dimentional mathematical logic Logistic mapping equations, the second mapping side Journey is two-dimentional Chebyshev's Chebyshev mapping equations.
In order to solve the above technical problems, the present invention also provides a kind of device for preventing from hitting library or dragging library, including:
Memory, for storing computer program;
Processor realizes preventing from hitting library or drag library as described in above-mentioned any one during for performing the computer program The step of method.
In order to solve the above technical problems, the present invention also provides a kind of readable storage medium storing program for executing, on the readable storage medium storing program for executing Be stored with computer program, when the computer program is executed by processor realize as described in above-mentioned any one prevent hit library Or the step of dragging library method.
The present invention provides a kind of method for preventing from hitting library or dragging library, including obtaining the first chaos by the first mapping equation Sequence obtains the second chaos sequence by the second mapping equation;By the first chaos sequence and the second chaos sequence step-by-step with obtaining Chaotic key sequence;By chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and ciphertext is transferred to server.
As it can be seen that in practical applications, scheme using the present invention, by two different chaos sequence step-by-steps with being answered The better chaotic key sequence of polygamy, in the transmission process of code data, the password by chaotic key sequence pair user is bright Text carries out chaos encryption, obtains ciphertext, even if ensure that code data is obtained in transmission process by disabled user, can only also obtain Ciphertext is obtained, so as to improve safety of the user password in transmission process, it is illegal to effectively prevent server end User hits library or drags library.
The present invention also provides a kind of system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library, have and above-mentioned Prevent the advantageous effect hit library or drag the method in library identical.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to institute in the prior art and embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the present invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of step flow chart for the method for preventing from hitting library or dragging library provided by the present invention;
Fig. 2 is a kind of structure diagram of system for preventing from hitting library or dragging library provided by the present invention.
Specific embodiment
The core of the present invention is to provide a kind of method for preventing from hitting library or dragging library, improves user password in transmission process Safety, effectively prevent server end and library hit by disabled user or drags library;Another core of the present invention is to provide one kind It prevents from hitting library or drags system, device and the readable storage medium storing program for executing in library.
Purpose, technical scheme and advantage to make the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without making creative work shall fall within the protection scope of the present invention.
Fig. 1 is please referred to, Fig. 1 is a kind of step flow chart for the method for preventing from hitting library or dragging library provided by the present invention, is wrapped It includes:
Step 1:First chaos sequence is obtained by the first mapping equation, the second chaos sequence is obtained by the second mapping equation Row;
Specifically, Chaos Immune Algorithm is a kind of new cipher encryption algorithm, have it is simple, efficiently, it is safe the advantages that, chaos For the fundamental characteristics of cryptography Main Basiss chaos, i.e. randomness, ergodic, certainty and the sensibility to primary condition. The first chaos sequence and the second chaos sequence in the present invention are what iteration generated, and the chaos sequence that iteration generates is to initial strip Part is sensitive, complicated, it is difficult to which analysis and prediction can be provided with good randomness, correlation, the pseudorandom of complexity Sequence, so as to ensure that the cipher round results of the present invention are more preferable.
Step 2:By the first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;
It is understood that the present invention generates the chaos sequence of changeable parameters, and handle by two different chaotic models Two groups of chaos sequence step-by-steps are with forming a new, better chaos sequence of chaos performance, preferably being mixed so as to obtain complexity Ignorant key.
Illustrate step-by-step and process, it is assumed that chaos sequence A be 1011001, chaos sequence B be 0101011, obtain Chaotic key sequence is 0001001.
Certainly, step-by-step and process in addition to that can carry out as stated above, can also use other methods, the present invention herein It does not limit.
Step 3:By chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and ciphertext is transferred to server.
Specifically, the password of user is presented in a manner of plaintext sequence, by being obtained according to above-mentioned chaos encrypting method To chaotic key sequence pair plaintext sequence be encrypted, the ciphertext obtained later is more difficult to crack, even if in code data In transmission process, data therein are obtained by disabled user, also be can only obtain and are encrypted later ciphertext rather than decodement, So as to which safety of the code data in transmission process be made to be ensured, and then server end is prevented to hit library by disabled user Or drag library.
Wherein, it hits library and refers to disabled user by collecting the account and encrypted message of the user revealed in internet, it is raw Into corresponding dictionary table, carry out batch and log in, it, can so as to obtain the user that a batch can be logged according to the account number cipher revealed With understanding, in real life, many users use identical account number cipher, therefore disabled user in different websites Can by user A websites account number cipher come logon attempt B websites, this is it can be understood that hit library attack.Drag library original It is the term of database field, refers to and data are exported from database, is also used to refer to after website invaded, disabled user steals Its database.Scheme using the present invention just encrypts the account number cipher of user in transmission process, and transmits and protect Be stored to the database of server end be also ciphertext, so as to ensure that disabled user cannot be directly obtained user password it is bright Text effectively prevents disabled user and library is hit to server end or drags library.
Specifically, the present invention is applied to, the step of embodiment of user's registration, is as follows, and user carries out account in client first Number identification number register carries out account verification by server end, prompts the account existing if account is existing, user is needed to change Account re-registers, until the account of user's registration is not present, password input by user then is carried out chaos in browser end Encryption generates ciphertext, ciphertext finally is transferred to server end, and preserved in the database of server end, can will be noted The ciphertext generated during volume is known as legal ciphertext.
Correspondingly, the present invention is applied to, the step of embodiment that user logs in, is as follows, and user is close in client progress account Code logs in, and carries out account verification by server, if account is not present, prompts user that the account is not present, user is needed to change Account logs in again, if account exists, password input by user is carried out chaos encryption in browser end, generates ciphertext, and pass It is defeated to arrive server end, current ciphertext and legal ciphertext are matched, if it fails to match, prompt user password mistake, again Input, if password match success, jumps to respective page.
The present invention provides a kind of method for preventing from hitting library or dragging library, including obtaining the first chaos by the first mapping equation Sequence obtains the second chaos sequence by the second mapping equation;By the first chaos sequence and the second chaos sequence step-by-step with obtaining Chaotic key sequence;By chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and ciphertext is transferred to server.
As it can be seen that in practical applications, scheme using the present invention, by two different chaos sequence step-by-steps with being answered The better chaotic key sequence of polygamy, in the transmission process of code data, the password by chaotic key sequence pair user is bright Text carries out chaos encryption, obtains ciphertext, even if ensure that code data is obtained in transmission process by disabled user, can only also obtain Ciphertext is obtained, so as to improve safety of the user password in transmission process, it is illegal to effectively prevent server end User hits library or drags library.
On the basis of above-described embodiment:
As a kind of preferred embodiment, the first mapping equation is two-dimentional mathematical logic Logistic mapping equations, second Mapping equation is two-dimentional Chebyshev's Chebyshev mapping equations.
Wherein, two-dimentional mathematical logic Logistic mapping equations areλ1, λ2, λ and u are equal The control parameter of kinetics equation for Coupled Logistic chaotic map, u usually take 4, in initial value (xn, yn)=(0.1, 0.11), parameter lambda12When=0.89, there is chaos phenomenon, the part [x of Coupled Logistic chaotic map in system0, y0, λ1, λ2, λ] and initial key can be used as.xn+1And xnWhat is expressed is the functional relation of two-dimentional mathematical logic Logistic mapping equations, and x can Function variable is interpreted as, and is changed with the variation of u, when u values are in a certain range, chaos phenomenon occurs in system.Two dimension Chebyshev chaotic maps equations arexn∈ (- 1,1), as n >=2, two-dimentional Chebyshev Chaotic maps enter chaotic region, and the aperiodic chaos real value sequence of no line length can be generated under wireless precision conditions, The parameter of Chebyshev systems is respectively x0, y0, n, m, therefore [x0, y0, n, m] and it is the first of two dimension Chebyshev chaotic maps Beginning key.
As a kind of preferred embodiment, the process by chaotic key sequence pair plaintext sequential encryption is specially:
Chaotic key sequence and plaintext sequence are subjected to exclusive or processing, to complete to plaintext sequential encryption.
Specifically, exclusive or encryption usually first obtains encryption key, then decodement is added by encryption key Close and store results.The ciphertext exported after encryption is equivalent to the sequence of a completely random, from the foregoing, it can be understood that provided by the present invention Chaotic key sequence be random, complicated pseudo-random sequence, if disabled user cannot get chaotic key sequence, then broken Cryptography is nearly impossible, and the length of chaotic key sequence often increases by one, the difficulty to be broken a code by illegal methods Degree will increase by twice.
Illustrate the encrypted process of exclusive or, it is assumed that decodement sequence is A [1001], and chaotic key sequence is B [1010], exclusive or is done to A and B, obtained C [0011] is encrypted ciphertext.
Certainly, it completes to encrypt in addition to can chaotic key sequence and plaintext sequence be carried out exclusive or processing, can also lead to Other modes are crossed, the present invention does not limit herein.
As a kind of preferred embodiment, encrypted process carries out in js files.
It is understood that obtaining the first chaos sequence by the first mapping equation, is obtained by the second mapping equation Two chaos sequences, by the first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence, passing through chaotic key sequence Row obtain ciphertext, this process is exactly encrypted process, and the method used in the above process can also be seen to plaintext sequential encryption As a kind of chaos encryption algorithm, which is stored in js files, wherein, js, that is, javascript, In practical application, javascript can reduce corresponding network transmission due to its own characteristic.
As a kind of preferred embodiment, this method further includes:
Compression processing is carried out to js files.
As a kind of preferred embodiment, the process that compression processing is carried out to js files is specially:
Delete the annotation and/or figure shift in the code of js files and/or the symbol that enters a new line.
Specifically, in order to further improve the cipher round results of the present invention, the js files for storing Encryption Algorithm can be carried out It compresses and obscures, that is, all annotations and/or figure shift and/or line feed symbol in the code by deleting javascript And/or useless space, to compress the size of js files, while page loading velocity is optimized, can also will be become by coding Amount and the name of function original are changed to skimble-skamble name, and such as function (a, b, c, e, g) etc., disabled user is prevented so as to reach Pry through and steal the purpose of javascript codes.And js files are constantly updated by compressing the means of js files, are increased The acquisition difficulty of js files is added, so as to increase the time cost of disabled user's decryption.
Fig. 2 is please referred to, Fig. 2 is a kind of structure diagram of system for preventing from hitting library or dragging library provided by the present invention, is wrapped It includes:
Mapping block 1 obtains the first chaos sequence for passing through the first mapping equation, and is obtained by the second mapping equation Two chaos sequences;
Processing module 2, for by the first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;
Encrypting module 3 for passing through chaotic key sequence pair plaintext sequential encryption, obtains ciphertext, and ciphertext is transferred to Server.
As a kind of preferred embodiment, the first mapping equation is two-dimentional mathematical logic Logistic mapping equations, second Mapping equation is two-dimentional Chebyshev's Chebyshev mapping equations.
Correspondingly, the present invention also provides a kind of device for preventing from hitting library or dragging library, including:
Memory, for storing computer program;
Processor realizes the step for preventing from hitting library or drag library method such as above-mentioned any one during for performing computer program Suddenly.
Correspondingly, the present invention also provides a kind of readable storage medium storing program for executing, computer program is stored on readable storage medium storing program for executing, Such as the step of preventing from hitting library or drag library method of above-mentioned any one is realized when computer program is executed by processor.
It please for the introduction of a kind of system for preventing from hitting library or dragging library provided by the present invention, device and readable storage medium storing program for executing With reference to above-described embodiment, details are not described herein by the present invention.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related part is said referring to method part It is bright.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the present invention. A variety of modifications of these embodiments will be apparent for those skilled in the art, it is as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one The most wide range caused.

Claims (10)

  1. A kind of 1. method for preventing from hitting library or dragging library, which is characterized in that including:
    First chaos sequence is obtained by the first mapping equation, the second chaos sequence is obtained by the second mapping equation;
    By first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;
    By the chaotic key sequence pair plaintext sequential encryption, ciphertext is obtained, and the ciphertext is transferred to server.
  2. 2. according to the method described in claim 1, it is characterized in that, first mapping equation is two-dimentional mathematical logic Logistic mapping equations, second mapping equation are two-dimentional Chebyshev's Chebyshev mapping equations.
  3. 3. according to the method described in claim 1, it is characterized in that, described added by the chaotic key sequence pair plaintext sequence Close process is specially:
    The chaotic key sequence and plaintext sequence are subjected to exclusive or processing, to complete to the plaintext sequential encryption.
  4. 4. according to the method described in claim 1-3 any one, which is characterized in that the encrypted process in js files into Row.
  5. 5. according to the method described in claim 4, it is characterized in that, this method further includes:
    Compression processing is carried out to the js files.
  6. 6. according to the method described in claim 5, it is characterized in that, the process that compression processing is carried out to the js files has Body is:
    Delete the annotation and/or figure shift in the code of the js files and/or the symbol that enters a new line.
  7. 7. a kind of system for preventing from hitting library or dragging library, which is characterized in that including:
    Mapping block obtains the first chaos sequence for passing through the first mapping equation, and it is mixed to obtain second by the second mapping equation Ignorant sequence;
    Processing module, for by first chaos sequence and the second chaos sequence step-by-step with obtaining chaotic key sequence;
    Encrypting module for passing through the chaotic key sequence pair plaintext sequential encryption, obtains ciphertext, and the ciphertext is transmitted To server.
  8. 8. system according to claim 7, which is characterized in that first mapping equation is two-dimentional mathematical logic Logistic mapping equations, second mapping equation are two-dimentional Chebyshev's Chebyshev mapping equations.
  9. 9. a kind of device for preventing from hitting library or dragging library, which is characterized in that including:
    Memory, for storing computer program;
    Processor, realize during for performing the computer program as described in claim 1 to 6 any one prevent from hitting library or The step of dragging library method.
  10. 10. a kind of readable storage medium storing program for executing, which is characterized in that computer program, the meter are stored on the readable storage medium storing program for executing The step for preventing from hitting library or drag library method as described in claim 1 to 6 any one is realized when calculation machine program is executed by processor Suddenly.
CN201810023170.XA 2018-01-10 2018-01-10 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library Pending CN108183785A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810023170.XA CN108183785A (en) 2018-01-10 2018-01-10 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810023170.XA CN108183785A (en) 2018-01-10 2018-01-10 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library

Publications (1)

Publication Number Publication Date
CN108183785A true CN108183785A (en) 2018-06-19

Family

ID=62550164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810023170.XA Pending CN108183785A (en) 2018-01-10 2018-01-10 A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library

Country Status (1)

Country Link
CN (1) CN108183785A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889338A (en) * 2019-04-22 2019-06-14 苏州大学 Quantum encryption method based on chaos sequence
CN112073196A (en) * 2020-11-10 2020-12-11 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112953890A (en) * 2021-01-12 2021-06-11 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy utilization control system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100034377A1 (en) * 2008-08-08 2010-02-11 Universiti Putra Malaysia Chaotic asymmetric encryption process for data security
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
CN105513002A (en) * 2015-11-30 2016-04-20 广东海洋大学 Novel image encryption method based on correlation between chaos and plaintext

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100034377A1 (en) * 2008-08-08 2010-02-11 Universiti Putra Malaysia Chaotic asymmetric encryption process for data security
CN104751065A (en) * 2015-03-09 2015-07-01 哈尔滨工程大学 Encryption method for geographic information product file
CN105513002A (en) * 2015-11-30 2016-04-20 广东海洋大学 Novel image encryption method based on correlation between chaos and plaintext

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵芮: "《基于二维Logistic与Chebyshev映射AES混沌加密算法》", 《微计算机信息》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889338A (en) * 2019-04-22 2019-06-14 苏州大学 Quantum encryption method based on chaos sequence
CN112073196A (en) * 2020-11-10 2020-12-11 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112073196B (en) * 2020-11-10 2021-02-23 腾讯科技(深圳)有限公司 Service data processing method and device, electronic equipment and storage medium
CN112953890A (en) * 2021-01-12 2021-06-11 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy utilization control system
CN112953890B (en) * 2021-01-12 2023-11-21 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy consumption control system

Similar Documents

Publication Publication Date Title
US20190205875A1 (en) System and methods for validating and performing operations on homomorphically encrypted data
Hintz Fingerprinting websites using traffic analysis
US9906511B1 (en) Secure impersonation detection
Meneses et al. RSA encryption algorithm optimization to improve performance and security level of network messages
CN103870525A (en) Secure search processing system and secure search processing method
CN111512590B (en) Homomorphic encryption for password authentication
CN115567188B (en) Multi-key value hiding intersection solving method and device and storage medium
CN105743905A (en) Method, device and system for realizing security login and security equipment
CN108183785A (en) A kind of method, system, device and readable storage medium storing program for executing for preventing from hitting library or dragging library
CN113691502A (en) Communication method, communication device, gateway server, client and storage medium
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN112073444B (en) Data set processing method and device and server
CN112766495A (en) Deep learning model privacy protection method and device based on mixed environment
Firdaus et al. Monitoring system with two central facilities protocol
Rayappan et al. Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment
CN115276978A (en) Data processing method and related device
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
KR100951034B1 (en) Method of producing searchable keyword encryption based on public key for minimizing data size of searchable keyword encryption and method of searching data based on public key through that
CN115766244A (en) Internet of vehicles information encryption method and device, computer equipment and storage medium
CN111475690B (en) Character string matching method and device, data detection method and server
Athavale et al. One-way cryptographic hash function securing networks
Chakrabarti et al. The security enhancement of symmetric key crypto mechanism based on double stage secret model
US11809588B1 (en) Protecting membership in multi-identification secure computation and communication
CN109862015B (en) Information transmission method and device
CN115460020B (en) Data sharing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180619

RJ01 Rejection of invention patent application after publication