CN109412791A - Key information processing method, device, electronic equipment and computer-readable medium - Google Patents
Key information processing method, device, electronic equipment and computer-readable medium Download PDFInfo
- Publication number
- CN109412791A CN109412791A CN201811442419.7A CN201811442419A CN109412791A CN 109412791 A CN109412791 A CN 109412791A CN 201811442419 A CN201811442419 A CN 201811442419A CN 109412791 A CN109412791 A CN 109412791A
- Authority
- CN
- China
- Prior art keywords
- tactics
- key
- vary
- data
- varies
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
This disclosure relates to a kind of key information processing method, device, electronic equipment and computer-readable medium.It is related to computer information processing field, this method comprises: determining that at least one varies one's tactics;The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;By it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And target cipher key file is generated by the key data and the policy data.This disclosure relates to key information processing method, device, electronic equipment and computer-readable medium, can to key to be transmitted carry out varying strength safety encrypt, thus key information transmission when improve key information security intensity.
Description
Technical field
This disclosure relates to computer information processing field, in particular to a kind of key information processing method, device,
Electronic equipment and computer-readable medium.
Background technique
Key is a kind of parameter, it is the ginseng inputted in being converted to ciphertext or the algorithm for converting ciphertext into plaintext in plain text
Number.Key encryption is the both sides for sending and receiving data, carries out encrypting and decrypting fortune in plain text using identical or symmetrical key pair
The encryption method of calculation.Under normal circumstances, Encryption Algorithm is disclosed, can guarantee that the key of a plaintext is that key, key must
It must be secrecy, it is usually a character string, and can frequently be replaced on demand.Therefore, the length of key is critically important, because
Password has been decoded once finding decruption key also, and the length of key is longer, key space is bigger, traverses key space institute
A possibility that time of cost is longer, decoding is also just smaller.
In the prior art, key is hidden or Preservation tactics are then transmitted again by carrying out data transformation to key
Mode realizes key secret.But method key in the prior art hides or Preservation tactics its security intensities is fixed
, the security intensity that can not be hidden according to different environment alternate key, so as to cause over time, computing capability
It is promoted, hiding for key may be no longer safe.
Therefore, it is necessary to a kind of new key information processing method, device, electronic equipment and computer-readable mediums.
Above- mentioned information are only used for reinforcing the understanding to the background of the disclosure, therefore it disclosed in the background technology part
It may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
In view of this, the disclosure provides a kind of key information processing method, device, electronic equipment and computer-readable Jie
Matter, the safety that varying strength can be carried out to key to be transmitted encrypt, to improve the letter of key in key information transmission
Cease security intensity.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure
Practice and acquistion.
According to the one side of the disclosure, a kind of key information processing method is proposed, comprising: determine at least one transformation plan
Slightly;The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;It will be described
At least one, which varies one's tactics, carries out abstract processing, generation strategy data;And pass through the key data and the strategy number
According to generation target cipher key file.
In a kind of exemplary embodiment of the disclosure, further includes: varied one's tactics group by multiple generations that vary one's tactics.
In a kind of exemplary embodiment of the disclosure, determining that at least one varies one's tactics includes: to generate M transformation plan
Slightly;And from the M vary one's tactics in randomly select N number of vary one's tactics;It will be described original close by N number of vary one's tactics
Key carries out n times transformation, generates key data;Wherein, M >=N > 1, M, N are positive integer.
In a kind of exemplary embodiment of the disclosure, by it is described at least one vary one's tactics and carry out abstract processing, it is raw
At policy data include: by it is described at least one vary one's tactics and carry out hash conversion one by one, generate at least one Hash value;It will
At least one described Hash value carries out abstract processing and maps in bit array;And by described in bit array generation
Policy data.
In a kind of exemplary embodiment of the disclosure, at least one described Hash value is subjected to abstract processing and is reflected
Being incident upon in bit array includes: the digit that predetermined number is extracted in each of at least one Hash value Hash value
Value;Digit value set is generated by the bit value of at least one Hash value;And by the bit value in the digit value set
It successively maps in the bit array.
According to the one side of the disclosure, a kind of key information processing method is proposed, comprising: extracted by target cipher key file close
Key data and policy data;At least one is obtained by the policy data to vary one's tactics;And pass through at least one described change
It changes strategy and inverse transformation is carried out to obtain key information to the key data.
In a kind of exemplary embodiment of the disclosure, at least one packet that varies one's tactics is obtained by the policy data
It includes: at least one being obtained with the policy data by the group that varies one's tactics and is varied one's tactics.
In a kind of exemplary embodiment of the disclosure, obtained at least by the group that varies one's tactics with the policy data
It includes: to generate multiple bit arrays by the multiple vary one's tactics in the group that varies one's tactics that one, which varies one's tactics,;Extract institute
State the bit array in policy data;And by multiple bit arrays in the group that varies one's tactics successively with the bit array in policy data into
Row is compared to determine that at least one varies one's tactics.
In a kind of exemplary embodiment of the disclosure, by multiple bit arrays in the group that varies one's tactics successively with policy data
In bit array be compared with determine at least one vary one's tactics include: will be each in multiple bit arrays in the group that varies one's tactics
The digit of units group is successively compared with the digit of the bit array in policy data;And when comparison result is consistent, really
Surely it varies one's tactics.
In a kind of exemplary embodiment of the disclosure, by it is described at least one vary one's tactics to the key data into
Row inverse transformation includes: that at least one described sequence to vary one's tactics is carried out random alignment to obtain key information, is generated multiple
Vary one's tactics permutation and combination;And it is close to obtain to key data progress inverse transformation by multiple permutation and combination that vary one's tactics
Key information.
According to the one side of the disclosure, a kind of key information processing unit is proposed, which includes: policy module, is used for
Determine that at least one varies one's tactics;Conversion module, for by key information by it is described at least one vary one's tactics and carry out key
Transformation generates key data;Abstract module, for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy
Data;And cipher key module, for generating target cipher key file by the key data and the policy data.
In a kind of exemplary embodiment of the disclosure, further includes: extraction module, it is close for being extracted by target cipher key file
Key data and policy data;Conversion module varies one's tactics for obtaining at least one by the policy data;And inverse transformation
Module, for by it is described at least one vary one's tactics inverse transformation carried out to obtain key information to the key data.
According to the one side of the disclosure, a kind of electronic equipment is proposed, which includes: one or more processors;
Storage device, for storing one or more programs;When one or more programs are executed by one or more processors, so that one
A or multiple processors realize such as methodology above.
According to the one side of the disclosure, it proposes a kind of computer-readable medium, is stored thereon with computer program, the program
Method as mentioned in the above is realized when being executed by processor.
It, can be to be passed according to the key information processing method of the disclosure, device, electronic equipment and computer-readable medium
Defeated key carries out the safety encryption of varying strength, to improve the information security intensity of key in key information transmission.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
It is open.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the disclosure will
It becomes more fully apparent.Drawings discussed below is only some embodiments of the present disclosure, for the ordinary skill of this field
For personnel, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the system block diagram of a kind of key information processing method and device shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of key information processing method shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.
Fig. 5 is a kind of schematic diagram of key information processing method shown according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Fig. 9 is that a kind of computer readable storage medium schematic diagram is shown according to an exemplary embodiment.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms
It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will be comprehensively and complete
It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure
Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner
In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However,
It will be appreciated by persons skilled in the art that can with technical solution of the disclosure without one or more in specific detail,
Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side
Method, device, realization or operation are to avoid fuzzy all aspects of this disclosure.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity.
I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit
These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step,
It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close
And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
It should be understood that although herein various assemblies may be described using term first, second, third, etc., these groups
Part should not be limited by these terms.These terms are to distinguish a component and another component.Therefore, first group be discussed herein below
Part can be described as the second component without departing from the teaching of disclosure concept.As used herein, term " and/or " include associated
All combinations for listing any of project and one or more.
It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, module or process in attached drawing
Necessary to not necessarily implementing the disclosure, therefore it cannot be used for the protection scope of the limitation disclosure.
The inventors of the present application found that the existing scheme hidden for key is all to carry out a kind of specific change to key
It changes, and key to transformation and strategy directly store.This key in the prior art hides or Preservation tactics its safety
Intensity be it is fixed, can not according to different environment alternate keys hide security intensity, so as to cause over time,
The promotion of computing capability, hiding for key may be no longer safe.
Following disadvantage exists in the prior art:
1, existing scheme only carries out primary specific transformation to key, and there is no realize to carry out the changes taken turns to key more
It changes, to adapt to different security levels.
2, the strategy of transformation is directly stored or is sent by existing scheme, is not hidden to relevant strategy,
To ensure the safety to vary one's tactics.
In view of this, present inventor proposes the key information processing method in the application, by original close
Key is converted, and user is by the wheel number of control transformation and the strategy of every wheel, and the intensity for enabling to key hiding is with transformation
The increase of wheel number is consequently increased.Varying one's tactics for every wheel is hidden into one by the key information processing method in the application simultaneously
Comprising in a large amount of false strategy files to vary one's tactics, the increase of strategy file entry will also increase vary one's tactics it is hiding strong
Degree, and then increase the hiding intensity of key.And according to key information processing method, additionally it is possible to provide the use that varies one's tactics accordingly
In restoring really to vary one's tactics from multiple strategy files, for restoring original key.
According to the key information processing method of the application, the safety that can carry out varying strength to key to be transmitted adds
It is close, to improve the information security intensity of key in key information transmission.
The detailed content of the application will be illustrated below:
Fig. 1 is the system block diagram of a kind of key information processing method and device shown according to an exemplary embodiment.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and terminal device
105,106,107.Network 104 is to provide communication between terminal device 101,102,103 and terminal device 105,106,107
The medium of link.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with terminal device 105,106,107,
To receive or send message etc..It can be equipped on terminal device 101,102,103 and terminal device 105,106,107 various logical
Interrogate client application, such as shopping class application, web browser applications, searching class application, instant messaging tools, mailbox client
End, social platform software etc..
Terminal device 101,102,103 and terminal device 105,106,107 can be with display screen and supported web page
The various electronic equipments of browsing, including but not limited to smart phone, tablet computer, pocket computer on knee and desktop computer
Etc..
Terminal device 101,102,103 can for example be encrypted target message to be sent by key, and end is then sent to
End equipment 105,106,107, terminal device 105,106,107 can be for example decrypted by the message that key pair receives, with
Extract target message.
Terminal device 101,102,103 can for example determine that at least one varies one's tactics;Terminal device 101,102,103 can example
At least one, which varies one's tactics, as described in passing through the primary key that will acquire carries out key conversion, generates key data;Terminal is set
Standby 101,102,103 can for example by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;Terminal device
101,102,103 target cipher key file for example can be generated by the key data and the policy data.
Terminal device 101,102,103 can be close with target by target message for example by target message after key encrypts
Key file is sent to terminal device 105,106,107, so that reduction target message is decrypted in terminal device 105,106,107.
Terminal device 105,106,107 for example can extract key data and policy data by target cipher key file;Terminal is set
Standby 105,106,107, which for example can obtain at least one by the policy data, varies one's tactics;Terminal device 105,106,107 can
Such as by it is described at least one vary one's tactics to the key data carry out inverse transformation to obtain key information.
Terminal device 105,106,107 can also be received for example to be added by the process that terminal device 101,102,103 sends over
Close target message, terminal device 105,106,107 can also for example solve the target information received by key information
It is close, to restore target message.
It should be noted that key information processing method provided by the embodiment of the present disclosure can by terminal device 101,
102, it 103 is executed with terminal device 105,106,107, correspondingly, key information processing unit can be set in terminal device
101,102,103 with terminal device 105,106,107 in.
Fig. 2 is a kind of flow chart of key information processing method shown according to an exemplary embodiment.At key information
Reason method 20 includes at least step S202 to S208.
As shown in Fig. 2, determining that at least one varies one's tactics in S202.It can be for example in terminal device A by mesh to be sent
It marks message to encrypt by key information, then determines that at least one varies one's tactics for encrypting to key information itself.
In one embodiment, can be varied one's tactics group by multiple generations that vary one's tactics, and in the group that varies one's tactics, extracted and become
Change strategy.By using a variety of different transformation rules, generates large batch of key conversion strategy and then generate multiple transformation plans
Slightly.
In one embodiment, it determines that at least one varies one's tactics and comprises determining that target strategy quantity of documents M;And by
M are randomly selected in the group that varies one's tactics to vary one's tactics;Wherein, M is positive integer.It specifically can be for example, in the group that will vary one's tactics
Multiple number consecutivelies that vary one's tactics determine target strategy quantity of documents M in be extracted vary one's tactics, then by random
Number generators, generate M random number, then successively number corresponding with varying one's tactics by M random number, determine M transformation plan
Slightly.
In one embodiment, can be according to own service demand for security, determining needs the item number to be used to vary one's tactics, false
If this number is N.And random screening goes out M item strategy from multiple strategy files, this M item strategy is that subsequent key ready for use becomes
Strategy is changed,
In one embodiment, target strategy quantity of documents M for example can be determined by the secret grade of target message, it can example
Such as, target message is defined as to different confidentials in advance: secret, top secret, secret etc., different confidentials set key
Different strategy file quantity.It can be for example, top-secret target message for higher level, to the close of the target message of top-secret grade
The strategy file quantity that key is encrypted may be, for example, 10.It can also be for example, secret target message for lower grade, to secret
The strategy file quantity that the key of the target message of close grade is encrypted may be, for example, 2.
In one embodiment, target strategy quantity of documents M can be determined with the transmission channel of target message, can for example be existed
In local area network when transmission message, determine small number of target strategy file, on the internet when transmission objectives message, determine compared with
The target strategy file of multi-quantity.In the embodiment of the present application, also the different mark strategy of rule setting can be judged by other
Quantity of documents M, the application are not limited.
In S204, the primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate
Key data.It can be varied one's tactics by using M item, key is converted, obtain transformed key.M can for example be generated
It varies one's tactics;And from the M vary one's tactics in randomly select N number of vary one's tactics;It will be described by N number of vary one's tactics
Primary key carries out n times transformation, generates key data;Wherein, M >=N > 1, M, N are positive integer.
In one embodiment, the rule of key conversion can be customized according to different needs, such as fairly simple
Mapping mode is exactly two values exchanged in key array, by key information by it is described at least one vary one's tactics and carry out key
Transformation may be, for example, and by different transformation rules (every rule will do it the exchange being repeatedly worth), successively exchange key array
In multiple numerical value, it is a plurality of vary one's tactics to be equivalent to carry out the multiple exchange of values of more wheels.
In one embodiment, it such as varies one's tactics to one: 161520100414102003052411, the hashed transformation
It is as follows that Hash Hash Hash array is generated after after strategy:
0=-534694747;
1=1985910054;
2=-488763339;
3=1331411845;
4=-137102220;
5=-81949194;
6=1794769274;
7=966099589;
8=907334699;
9=816196382;
Using the absolute value in Hash array except bit array length (can for example, this transformation test bit array length are as follows:
BitSetSize=7357745), obtain its remainder, code sample: Math.abs (hash%bitSetSize), acquisition it is remaining
Number array are as follows:
4937107;
6676649;
3152169;
7017745;
4662810;
1013999;
6837239;
2234994;
2332064;
6844432;
In bit array, 1 is set by the corresponding position of above-mentioned digit, to realize that is varied one's tactics hides.
In S206, by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data.
In one embodiment, by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data include:
By it is described at least one vary one's tactics and carry out hash conversion one by one, generate at least one Hash value;It will at least one described Kazakhstan
Uncommon numerical value carries out abstract processing and maps in bit array;And the policy data is generated by the bit array.
In one embodiment, at least one described Hash value is carried out abstract processing and mapped in bit array to wrap
It includes: extracting the bit value of predetermined number in each of at least one Hash value Hash value;Pass through at least one
The bit value of a Hash value generates digit value set;And the bit value in the digit value set is successively mapped to described
In bit array.
In S208, target cipher key file is generated by the key data and the policy data.For example, after converting
Key data and policy data be merged into a file, generate target cipher key file to facilitate storage and transmission.
According to the key information processing method of the disclosure, by the key conversion strategy of different number to key to be transmitted
The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission
Improve the information security intensity of key.
It will be clearly understood that the present disclosure describes how to form and use particular example, but the principle of the disclosure is not limited to
These exemplary any details.On the contrary, the introduction based on disclosure disclosure, these principles can be applied to many other
Embodiment.
Fig. 3 is a kind of schematic diagram of the key information processing method shown according to another exemplary embodiment.Fig. 3 is exemplary
The step S206 for illustrating key information processing method 20 as shown in Figure 2 in " by least one described progress that varies one's tactics
The particular content of abstract processing, generation strategy data ".
Key is converted according to the M item strategy filtered out, and genuine policy is abstracted, is such as abstracted into a position
In array, and the array and transformed key are merged into a file, the specific steps are as follows:
A) it is varied one's tactics using M item, key is converted, obtain transformed key.Can such as M be 2, as pass through
It (may be, for example, that the A and B that varies one's tactics) that varies one's tactics converts key that 2, which vary one's tactics,.
B) it varies one's tactics to M item and carries out hash conversion one by one, then obtained cryptographic Hash is abstracted into a units group.
Wherein, hash algorithm is the smaller binary value that the binary value of random length is mapped as to regular length, this small two into
Value processed is known as cryptographic Hash.Cryptographic Hash is the unique and extremely compact numerical value representation of one piece of data.If hashing a Duan Mingwen
And even only changing a letter of the paragraph, subsequent Hash will all generate different values.It is same for finding hash
Two different inputs of value, are computationally impossible.
After the A that varies one's tactics carries out hash conversion, cryptographic Hash are as follows: E8C636D0C048637;
After the B that varies one's tactics carries out hash conversion, cryptographic Hash are as follows: 8BF61E6A3000D0F;
The cryptographic Hash for the A that varies one's tactics is converted into the only binary form comprising 01, then by the cryptographic Hash for the A that varies one's tactics
It is mapped in bit array;
The cryptographic Hash for the A that varies one's tactics is converted into the only binary form comprising 01, then by the cryptographic Hash for the B that varies one's tactics
It is mapped in bit array;
Wherein, it is worth mentioning at this point that, varying one's tactics A and varies one's tactics B when being mapped in the same bit array, position
Number in this case, will not influence the decryption processing of subsequent file there may be being overlapped.
C) transformed key and bit array are merged into a file, to be transmitted.
It, can be raw according to the requirement of information inherently safe intensity to be transmitted according to the key information processing method of the disclosure
It varies one's tactics at a plurality of different, every varies one's tactics to one wheel of key progress (or primary) transformation, to realize the more of key
Round transformation, to adapt to different security intensity requirements.
It is specific by arbitrarily being picked out from a large amount of stochastic transformation strategy according to the key information processing method of the disclosure
Item number varies one's tactics, and when recipient stores, will store it is all vary one's tactics, rather than only storage is true
It varies one's tactics, to realize that true key varies one's tactics hiding.Change the entry to vary one's tactics in strategy file, can adapt to
Different security intensity requirements.
According to the key information processing method of the disclosure, true key conversion strategy is subjected to Hash and is abstracted into one
In bit array, to prevent true transformation strategy to be reduced, and it is merged into a file with transformed key, it is true to realize
The reduction of key conversion strategy.
Fig. 4 is a kind of flow chart of the key information processing method shown according to another exemplary embodiment.It is shown in Fig. 4
Process is the detailed description to target message decryption step in key information processing method 20 shown in Fig. 2,
As shown in figure 4, extracting key data and policy data by target cipher key file in S402.It can be for example in terminal
Equipment B receives target cipher key file and target message, and terminal device B extracts key data and strategy number by target cipher key file
According to.
In S404, at least one is obtained by the policy data and is varied one's tactics.It include: by the group that varies one's tactics
At least one is obtained with the policy data to vary one's tactics.
In one embodiment, at least one packet that varies one's tactics is obtained with the policy data by the group that varies one's tactics
It includes: multiple bit arrays is generated by the multiple vary one's tactics in the group that varies one's tactics;It extracts in the policy data
Bit array;And multiple bit arrays in the group that varies one's tactics successively are compared with the bit array in policy data to determine extremely
Few one varies one's tactics.
In one embodiment, multiple bit arrays in the group that varies one's tactics successively are carried out with the bit array in policy data
Comparing to determine that at least one varies one's tactics includes: by the digit of each bit array in multiple bit arrays in the group that varies one's tactics
Successively it is compared with the digit of the bit array in policy data;And when comparison result is consistent, determination varies one's tactics.
In S406, by it is described at least one vary one's tactics to the key data carry out inverse transformation with obtain key letter
Breath.It can be for example, at least one described sequence to vary one's tactics be carried out random alignment, the multiple permutation and combination that vary one's tactics of generation;
And inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
According to the key information processing method of the disclosure, by the key conversion strategy of different number to key to be transmitted
The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission
Improve the information security intensity of key.In decruption key file, by passing through group and the policy data of varying one's tactics
Acquisition varies one's tactics, and then the mode decrypted, and can effectively ensure that the information security of key.
Fig. 5 is a kind of schematic diagram of the key information processing method shown according to another exemplary embodiment.Fig. 5 is exemplary
The step S404 for illustrating key information processing method 40 as shown in Figure 4 in " pass through the policy data obtain at least one
It is a to vary one's tactics " particular content.
A) restore transformed key, bit array from transformed key & bit array file.
B) using the strategy file comprising true transformation strategy and a) in bit array, obtain true M item and vary one's tactics.
It can be for example, varying one's tactics in the group that varies one's tactics comprising 10, respectively vary one's tactics A, B, C, D, E, F, G, H, I;
Hash conversion is carried out respectively by varying one's tactics above, generates multiple cryptographic Hash A, B, C, D, E, F, G, H, I;Convert plan
Slightly A, B, C, D, E, F, G, H, I corresponding cryptographic Hash A, B, C, D, E, F, G, H, I are respectively converted into the only binary system shape comprising 01
Formula, and be mapped in bit array, generate bit array set.
Each of bit array set bit array is compared with the bit array in policy data respectively, is become with determining
Change strategy.During comparison, if each of corresponding bit array A of the A that varies one's tactics bit value (digit 1) with
When numerical value in bit array in policy data on corresponding position is consistent, determine that the A that varies one's tactics is in original vary one's tactics
One.
After determining that one varies one's tactics, continues comparison others and vary one's tactics, until all files are completeer
Finish position, is varied one's tactics with determination M to be processed.
C) using the transformed key in a) and b) in M item vary one's tactics and carry out inverse transformation, restore true close
Key.
According to the key information processing method of the disclosure, abstract hide and according to strategy can be carried out to true transformation strategy
File access pattern true transformation strategy.
According to the key information processing method of the disclosure, a large amount of false transformation plans are hidden by will really vary one's tactics
In slightly, can be realized vary one's tactics hide, to adapt to the demand for security of varying strength.
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as being executed by CPU
Computer program.When the computer program is executed by CPU, above-mentioned function defined by the above method that the disclosure provides is executed
Energy.The program can store in a kind of computer readable storage medium, which can be read-only memory, magnetic
Disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place according to included by the method for disclosure exemplary embodiment
Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these
The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device
Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 6 is a kind of block diagram of key information processing unit shown according to an exemplary embodiment.Key information processing
Device 60 includes: policy module 602, conversion module 604, abstract module 606 and cipher key module 608.Wherein, key information
Processing unit 60 can be located at the terminal of information to be sent.
Policy module 602 is for determining that at least one varies one's tactics;Can be varied one's tactics group by multiple generations that vary one's tactics,
In the group that varies one's tactics, extraction varies one's tactics.By using a variety of different transformation rules, large batch of key conversion plan is generated
Slightly and then generate multiple vary one's tactics.
Conversion module 604 be used for by key information by it is described at least one vary one's tactics and carry out key conversion, generate close
Key data;It can be varied one's tactics by using N item, key is converted, obtain transformed key.
Abstract module 606 be used for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;It can example
At least one varies one's tactics as will be described carries out hash conversion one by one, generates at least one Hash value;Will it is described at least one
Hash value carries out abstract processing and maps in bit array;And the policy data is generated by the bit array.
Cipher key module 608 is used to generate target cipher key file by the key data and the policy data.For example, will
Transformed key data and policy data are merged into a file, generate target cipher key file to facilitate storage and transmission.
According to the key information processing unit of the disclosure, by the key conversion strategy of different number to key to be transmitted
The mode encrypted, the safety that varying strength can be carried out to key to be transmitted encrypt, thus in key information transmission
Improve the information security intensity of key.
Fig. 7 is a kind of block diagram of the key information processing unit shown according to another exemplary embodiment.At key information
Managing device 70 includes: extraction module 702, conversion module 704 and inverse transform module 706.
Extraction module 702 is used to extract key data and policy data by target cipher key file;It can be for example in terminal device B
Target cipher key file and target message are received, terminal device B extracts key data and policy data by target cipher key file.
Conversion module 704 varies one's tactics for obtaining at least one by the policy data;.It include: by the change
Strategy group is changed to obtain at least one with the policy data and vary one's tactics.And
Inverse transform module 706 be used for by it is described at least one vary one's tactics inverse transformation carried out to obtain to the key data
Take key information.It can be for example, at least one described sequence to vary one's tactics be carried out random alignment, the multiple rows of varying one's tactics of generation
Column combination;And inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
According to the key information processing unit of the disclosure, in decruption key file, by passing through the group that varies one's tactics
The mode for varying one's tactics with policy data acquisition, and then decrypting, can effectively ensure that the information security of key.
Fig. 8 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the disclosure is described referring to Fig. 8.The electronics that Fig. 8 is shown
Equipment 200 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in figure 8, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap
It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection
Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210
Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this
The step of disclosing various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, walked shown in Fig. 4
Suddenly.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory
Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205
Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make
Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with
By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should
Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited
In: microcode, device driver, redundant processing unit, external disk drive array, RAI d system, tape drive and number
According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 9 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method according to embodiment of the present disclosure
400, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, the program product of the disclosure is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism
Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing
Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet
Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by one
When the equipment executes, so that the computer-readable medium implements function such as: determining that at least one varies one's tactics;By key information
By it is described at least one vary one's tactics and carry out key conversion, generate key data;By at least one described progress that varies one's tactics
Abstract processing, generation strategy data;And target cipher key file is generated by the key data and the policy data.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also
Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into
One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein
It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the disclosure
The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories
In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can
To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present disclosure.
It is particularly shown and described the exemplary embodiment of the disclosure above.It should be appreciated that the present disclosure is not limited to
Detailed construction, set-up mode or implementation method described herein;On the contrary, disclosure intention covers included in appended claims
Various modifications and equivalence setting in spirit and scope.
Claims (13)
1. a kind of key information processing method characterized by comprising
Determine that at least one varies one's tactics;
The primary key that will acquire by it is described at least one vary one's tactics and carry out key conversion, generate key data;
By it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And
Target cipher key file is generated by the key data and the policy data.
2. the method as described in claim 1, which is characterized in that the primary key key information that will acquire passes through described
At least one, which varies one's tactics, carries out key conversion, generates key data and includes:
M are generated to vary one's tactics;And
From the M vary one's tactics in randomly select N number of vary one's tactics;It N number of is varied one's tactics the primary key by described
N times transformation is carried out, key data is generated;
Wherein, M >=N > 1, M, N are positive integer.
3. the method as described in claim 1, which is characterized in that by it is described at least one vary one's tactics and carry out abstract processing,
Generation strategy data include:
By it is described at least one vary one's tactics and carry out hash conversion, generate at least one Hash value;
At least one described Hash value is subjected to abstract processing and is mapped in bit array;And
The policy data is generated by the bit array.
4. method as claimed in claim 3, which is characterized in that at least one described Hash value is carried out abstract processing simultaneously
It maps in bit array and includes:
The bit value of predetermined number is extracted in each of at least one Hash value Hash value;
Digit value set is generated by the bit value of at least one Hash value;And
Bit value in the digit value set is successively mapped in the bit array.
5. a kind of key information processing method, which is characterized in that further include:
Key data and policy data are extracted by target cipher key file;
At least one is obtained by the policy data to vary one's tactics;And
By it is described at least one vary one's tactics to the key data carry out inverse transformation to obtain key information.
6. method as claimed in claim 5, which is characterized in that obtain at least one packet that varies one's tactics by the policy data
It includes:
At least one is obtained with the policy data by the group that varies one's tactics to vary one's tactics.
7. method as claimed in claim 6, which is characterized in that by it is described vary one's tactics group with the policy data obtain to
Few one varies one's tactics and includes:
Multiple bit arrays are generated by multiple vary one's tactics in the group that varies one's tactics;
Extract the bit array in the policy data;And
Multiple bit arrays in the group that varies one's tactics successively are compared with the bit array in policy data to determine at least one
It varies one's tactics.
8. method as claimed in claim 6, which is characterized in that by multiple bit arrays in the group that varies one's tactics successively with strategy number
Bit array in is compared to determine that at least one varies one's tactics to include:
By the digit of each bit array in multiple bit arrays in the group that varies one's tactics successively with the bit array in policy data
Digit is compared;And
When comparison result is consistent, determination varies one's tactics.
9. method as claimed in claim 5, which is characterized in that by it is described at least one vary one's tactics to the key data
Inverse transformation, which is carried out, to obtain key information includes:
At least one described sequence to vary one's tactics is subjected to random alignment, generates multiple permutation and combination that vary one's tactics;And
Inverse transformation is carried out to obtain key information to the key data by multiple permutation and combination that vary one's tactics.
10. a kind of key information processing unit characterized by comprising
Policy module, for determining that at least one varies one's tactics;
Conversion module, primary key for will acquire by it is described at least one vary one's tactics and carry out key conversion, generate
Key data;
Abstract module, for by it is described at least one vary one's tactics and carry out abstract processing, generation strategy data;And
Cipher key module, for generating target cipher key file by the key data and the policy data.
11. a kind of key information processing unit, which is characterized in that further include:
Extraction module, for extracting key data and policy data by target cipher key file;
Conversion module varies one's tactics for obtaining at least one by the policy data;And
Inverse transform module, for by it is described at least one vary one's tactics inverse transformation carried out to obtain key to the key data
Information.
12. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now method as described in any in claim 1-4 or 5-9.
13. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor
The method as described in any in claim 1-4 or 5-9 is realized when row.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442419.7A CN109412791B (en) | 2018-11-29 | 2018-11-29 | Key information processing method, device, electronic equipment and computer-readable medium |
CA3061776A CA3061776A1 (en) | 2018-11-29 | 2019-11-15 | Key information processing method and apparatus, electronic device and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442419.7A CN109412791B (en) | 2018-11-29 | 2018-11-29 | Key information processing method, device, electronic equipment and computer-readable medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109412791A true CN109412791A (en) | 2019-03-01 |
CN109412791B CN109412791B (en) | 2019-11-22 |
Family
ID=65456322
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811442419.7A Active CN109412791B (en) | 2018-11-29 | 2018-11-29 | Key information processing method, device, electronic equipment and computer-readable medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109412791B (en) |
CA (1) | CA3061776A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583588A (en) * | 2020-12-08 | 2021-03-30 | 四川虹微技术有限公司 | Communication method and device and readable storage medium |
CN114024671A (en) * | 2021-11-05 | 2022-02-08 | 深圳市联洲国际技术有限公司 | Key generation method and device and computer-readable storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208701B (en) * | 2022-09-15 | 2022-12-20 | 广州万协通信息技术有限公司 | Data packet selective encryption method and device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030182448A1 (en) * | 2002-03-21 | 2003-09-25 | Mark Gooch | Method and system for performing a hash transformation to generate a hash pointer for an address input by using rotation |
CN1697371A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sending and receiving data of cipher key |
CN101364868A (en) * | 2008-09-12 | 2009-02-11 | 华南理工大学 | Pseudo-noise code generator based on broad sense information field and generating method thereof |
CN201467167U (en) * | 2009-08-07 | 2010-05-12 | 薛明 | Password encoder and password protection system |
CN101902332A (en) * | 2010-07-16 | 2010-12-01 | 北京邮电大学 | Hashing method with secrete key based on coupled chaotic mapping system |
CN102868518A (en) * | 2004-08-12 | 2013-01-09 | Cmla有限公司 | Permutation data transform to enhance security |
CN104601321A (en) * | 2013-10-31 | 2015-05-06 | 上海复旦微电子集团股份有限公司 | Key expansion method and device |
CN105591734A (en) * | 2015-04-24 | 2016-05-18 | 桂林电子科技大学 | White-box cryptograph non-linear encoding protection method based on table lookup |
CN106452729A (en) * | 2016-08-30 | 2017-02-22 | 上海交通大学 | Method for encrypting white box password based on random permutation |
CN107947917A (en) * | 2017-12-29 | 2018-04-20 | 北京梆梆安全科技有限公司 | A kind of method and device for generating whitepack key |
-
2018
- 2018-11-29 CN CN201811442419.7A patent/CN109412791B/en active Active
-
2019
- 2019-11-15 CA CA3061776A patent/CA3061776A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030182448A1 (en) * | 2002-03-21 | 2003-09-25 | Mark Gooch | Method and system for performing a hash transformation to generate a hash pointer for an address input by using rotation |
CN1697371A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sending and receiving data of cipher key |
CN102868518A (en) * | 2004-08-12 | 2013-01-09 | Cmla有限公司 | Permutation data transform to enhance security |
CN101364868A (en) * | 2008-09-12 | 2009-02-11 | 华南理工大学 | Pseudo-noise code generator based on broad sense information field and generating method thereof |
CN201467167U (en) * | 2009-08-07 | 2010-05-12 | 薛明 | Password encoder and password protection system |
CN101902332A (en) * | 2010-07-16 | 2010-12-01 | 北京邮电大学 | Hashing method with secrete key based on coupled chaotic mapping system |
CN104601321A (en) * | 2013-10-31 | 2015-05-06 | 上海复旦微电子集团股份有限公司 | Key expansion method and device |
CN105591734A (en) * | 2015-04-24 | 2016-05-18 | 桂林电子科技大学 | White-box cryptograph non-linear encoding protection method based on table lookup |
CN106452729A (en) * | 2016-08-30 | 2017-02-22 | 上海交通大学 | Method for encrypting white box password based on random permutation |
CN107947917A (en) * | 2017-12-29 | 2018-04-20 | 北京梆梆安全科技有限公司 | A kind of method and device for generating whitepack key |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583588A (en) * | 2020-12-08 | 2021-03-30 | 四川虹微技术有限公司 | Communication method and device and readable storage medium |
CN114024671A (en) * | 2021-11-05 | 2022-02-08 | 深圳市联洲国际技术有限公司 | Key generation method and device and computer-readable storage medium |
CN114024671B (en) * | 2021-11-05 | 2024-03-29 | 深圳市联洲国际技术有限公司 | Method and device for generating secret key, and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CA3061776A1 (en) | 2020-05-29 |
CN109412791B (en) | 2019-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109478279A (en) | Method and system for realizing block chain | |
KR101393806B1 (en) | Multistage physical unclonable function system | |
CN109412791B (en) | Key information processing method, device, electronic equipment and computer-readable medium | |
CN109150499A (en) | Method, apparatus, computer equipment and the storage medium of dynamic encryption data | |
CN103455764A (en) | File segmentation and merging technology-based file encryption and decryption systems | |
Hu et al. | Batch image encryption using generated deep features based on stacked autoencoder network | |
CN105007256B (en) | Security module for executing security function on non-trusted platform | |
CN104022866A (en) | Searchable encryption method for multi-user cipher text keyword in cloud storage | |
WO2014132552A1 (en) | Order-preserving encryption system, device, method, and program | |
Wang et al. | New chaotic encryption algorithm based on chaotic sequence and plain text | |
CN108833117B (en) | Private key storage and reading method and device and hardware equipment | |
CN110084599A (en) | Cipher key processing method, device, equipment and storage medium | |
CN102833077A (en) | Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card | |
Pavithran et al. | Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine | |
Ahmad et al. | A secure network communication protocol based on text to barcode encryption algorithm | |
CN110635900B (en) | Key management method and system suitable for Internet of things system | |
Agarwal et al. | Prime weighted graph in cryptographic system for secure communication | |
Touil et al. | Efficient Braille Transformation for Secure Password Hashing | |
CN111475690B (en) | Character string matching method and device, data detection method and server | |
CN109560914A (en) | Data ciphering method and device, storage medium, electronic equipment | |
CN105678185B (en) | A kind of data security protection method and intelligent terminal management system | |
CN110990848A (en) | Sensitive word encryption method and device based on hive data warehouse and storage medium | |
US10445510B2 (en) | Data checking apparatus and method using same | |
CN109412754A (en) | A kind of data storage, distribution and access method encoding cloud | |
Adeniji et al. | Text encryption with advanced encryption standard (AES) for near field communication (NFC) using Huffman compression |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |