CN112651034A - One-time pad replaceable encryption algorithm, assembly and equipment based on codebook - Google Patents

One-time pad replaceable encryption algorithm, assembly and equipment based on codebook Download PDF

Info

Publication number
CN112651034A
CN112651034A CN202011519496.5A CN202011519496A CN112651034A CN 112651034 A CN112651034 A CN 112651034A CN 202011519496 A CN202011519496 A CN 202011519496A CN 112651034 A CN112651034 A CN 112651034A
Authority
CN
China
Prior art keywords
key
encryption
pad
algorithm
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011519496.5A
Other languages
Chinese (zh)
Inventor
马磊
袁峰
江林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG SHANDA OUMA SOFTWARE CO Ltd
Original Assignee
SHANDONG SHANDA OUMA SOFTWARE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG SHANDA OUMA SOFTWARE CO Ltd filed Critical SHANDONG SHANDA OUMA SOFTWARE CO Ltd
Priority to CN202011519496.5A priority Critical patent/CN112651034A/en
Publication of CN112651034A publication Critical patent/CN112651034A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a one-time pad replaceable encryption algorithm, a component and equipment based on a codebook, which comprises the following steps: initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library; storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files; creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process; and scrambling the encryption process of the plaintext by adopting a random key. The invention can improve the software encryption algorithm with a single key, overcomes the defects of single algorithm, complex key replacement and unsafe key storage, and exerts the advantages of convenient upgrading of the software encryption algorithm, tight combination with a program and high efficiency.

Description

One-time pad replaceable encryption algorithm, assembly and equipment based on codebook
Technical Field
The invention relates to the field of computer software encryption algorithm application, in particular to a one-time pad replaceable encryption algorithm, a one-time pad replaceable encryption component and equipment based on a codebook.
Background
At present, the symmetric key encryption algorithm is mainly realized by two encryption and decryption modes, namely a soft encryption mode based on a software algorithm and a hard encryption mode based on a hardware encryption machine, and the two modes have own defects.
The essence of software encryption is that an algorithm encrypts a key, a soft encryption key is generally stored in a program code or a configuration file, a fixed key is used for encryption, an open source algorithm is generally used for the encryption algorithm, the same key is used for encryption for a long time, if an attacker obtains the key through brute force cracking or other attack modes, the whole encryption mechanism is broken, the key needs to be replaced at a high cost, a service needs to be stopped, all ciphertext is decrypted and then encrypted, and certain risk exists.
The hardware-based encryption machine can generally ensure higher security, and as a safe black box, the encryption and decryption and the secret key are both inside the black box, and leave the encryption machine, data cannot be encrypted and decrypted, and the system security can be ensured as long as the security of the encryption machine is ensured. However, the encryption and decryption efficiency of the encryption machine is not high, as an external network device, the encryption and decryption have network delay, and at the same time, the cost is high, hardware equipment needs to be purchased and operation and maintenance needs to be deployed, so that performance bottleneck and fault hidden danger may be caused, and if the encryption and decryption efficiency needs to be improved, a plurality of hardware encryption machines are needed for load balancing.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a one-time pad replaceable encryption algorithm, component and device based on a codebook, which can improve a software encryption algorithm with a single key, overcome the disadvantages of single algorithm, tedious key replacement and unsafe key storage, and exert the advantages of convenient upgrading of the software encryption algorithm, tight combination with a program, and high efficiency.
In order to achieve the purpose, the invention is realized by the following technical scheme: a pad-based one-time pad replaceable encryption algorithm comprising:
initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files;
creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process;
and scrambling the encryption process of the plaintext by adopting a random key.
Further, the generating of the key meeting the preset condition by using the general security component and combining with the multithreading mechanism specifically includes:
a Java environment is adopted to generate a key meeting preset conditions by a multithreading mechanism.
Further, the key space adopts 262M of storage space for storing support 224A 128-bit key.
Further, the key rotation mechanism in the encryption and decryption process includes a key rotation mechanism in the encryption process, and specifically includes:
and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
Further, the key rotation mechanism in the encryption and decryption process further includes a key rotation mechanism in the decryption process, and specifically includes:
and separating the key index from the ciphertext according to a preset rule, and acquiring a key from a key library through the key index to decrypt the ciphertext to obtain a plaintext.
Further, the scrambling of the plaintext encryption process by using the random key specifically includes:
and randomly selecting a key in the key index obtaining process to complete scrambling of the plaintext encryption process.
Correspondingly, the invention also discloses a one-time pad replaceable encryption component based on the codebook, which comprises the following components:
the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files;
the key alternation mechanism unit is used for creating a key alternation mechanism in the encryption and decryption process and randomly distributing a key in a key base in the encryption and decryption process;
and the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
Correspondingly, the invention also discloses a one-time pad replaceable encryption device based on the codebook, which comprises:
a memory for storing a computer program;
a processor for implementing a pad based one time replaceable cryptographic algorithm as described in any of the above when executing said computer program.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention stores the secret key in the independent storage space, can effectively avoid the whole algorithm from being broken due to the leakage of the source code, and realizes the effective management of the secret key.
2. In the encryption and decryption process, the invention adopts a key alternation mechanism and carries out key scrambling, thereby improving the capability of resisting differential attack, realizing real one-time pad encryption, adopting different keys in each encryption process regardless of whether the same plaintext is adopted, and effectively reducing the risk of brute force decryption.
Therefore, compared with the prior art, the invention has prominent substantive features and remarkable progress, and the beneficial effects of the implementation are also obvious.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a method according to a first embodiment of the present invention.
Fig. 2 is a system configuration diagram of the first embodiment of the present invention.
Fig. 3 is a schematic diagram of an embodiment of the present invention, which is deployed in a separate service component and provides an external encryption/decryption service.
Fig. 4 is a schematic diagram of API calling by using a core component of an algorithm as a part of security middleware according to a second embodiment of the present invention.
Fig. 5 is a schematic diagram of an encryption process according to a second embodiment of the present invention.
Fig. 6 is a schematic diagram of a decryption process in the second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made with reference to the accompanying drawings.
The first embodiment is as follows:
a one-time pad replaceable encryption algorithm based on a codebook as shown in fig. 1, comprising the steps of:
s1: and initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library.
In order to improve the traditional single-key symmetric encryption algorithm, a key library concept is introduced firstly, the traditional single-key algorithm only supports a limited key library, and the algorithm expands the key library to a mass space to manage and utilize the key library.
In order to further expand the key space and enhance the encryption strength, the encryption mechanism needs enough keys to participate in encryption and decryption, so that the generation of a plurality of keys is supported, and the generation of 16,777,216-2 keys can be supported generally24The symmetric key with 128 bits, each key 128bit is 16 bytes, 16,777,216 is 16/1024 is 262,144, only 262M of storage space is occupied, the larger the keystore is, the more secure the algorithm is, and of course, the more resources are occupied. The key can be generated by a general security component, in Java, we adopt javaxThe mechanism may further provide a key generation speed.
S2: and storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files.
Each generated group of key banks is stored in an encrypted file mode, the encryption keys of each group of key banks are different, and the key management system is responsible for generation and storage and is transmitted with the key bank files through an independent safe channel.
S3: and creating a key rotation mechanism in the encryption and decryption process, and randomly distributing a key in the key bank in the encryption and decryption process.
The method specifically comprises the following steps:
A. and (3) encryption process:
and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
B. And (3) decryption process:
the decryption process is the reverse process of encryption, firstly, the key index is separated from the ciphertext according to a preset rule, and the key is obtained from the key database through the key index to decrypt the ciphertext, so that the plaintext is obtained.
By the key alternation process in the encryption and decryption processes each time, one key in a huge key base is randomly distributed, the effect of one-time one-key is close, the key is protected, and the defect caused by long-term use of one key is avoided.
S4: and scrambling the encryption process of the plaintext by adopting a random key.
In the above encryption process, in the key index generation stage, if the same plaintext is always assigned with the same key index according to the default key index generation rule, the same ciphertext is also generated, which may be attacked by the known plaintext and ciphertext, thereby reducing the encryption strength. However, this feature is necessary in some application scenarios, for example, the mobile phone number is encrypted and stored in the database, and meanwhile, the database search is performed by using the mobile phone number as a unique condition, so that it is necessary to ensure that the same plaintext is always encrypted to generate an unchanged ciphertext. Also in the above example, if the certificate number is used as the query condition to query the mobile phone number, the plaintext and ciphertext of the mobile phone number are not required to be one-to-one, the encryption process can be further scrambled, a random key is adopted each time, and the algorithm security is improved. In another scenario, the encryption algorithm encrypts the URL parameters, an attacker can easily attack or playback the URL by constructing a plaintext ciphertext string, and at the moment, the requirement on the plaintext ciphertext is not required one to one, and the requirement on the encryption strength is higher.
The method adopts the mode that the key is directly and randomly selected in the key index obtaining process, so that the key scrambling is realized, the differential attack resistance is improved, the one-time pad encryption is real, no matter the same plaintext is adopted, different keys are adopted in each encryption process, and the stream key is similar to the stream key to a certain degree.
Correspondingly, as shown in fig. 2, the present invention also discloses a one-time pad replaceable encryption component based on a codebook, which comprises:
and the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library.
And the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files.
And the key rotation mechanism unit is used for creating a key rotation mechanism in the encryption and decryption process, and randomly distributing one key in the key library in the encryption and decryption process.
And the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
Correspondingly, the invention also discloses a one-time pad replaceable encryption device based on the codebook, which comprises:
a memory for storing a computer program;
a processor for implementing a pad based one time replaceable cryptographic algorithm as described in any of the above when executing said computer program.
Example two:
based on the first embodiment, the one-time pad replaceable encryption algorithm based on the codebook provided by the invention can be packaged in an independent service component to provide encryption and decryption services for the outside, all the algorithms, the key bank and the encryption and decryption services are packaged to form a black box, the temporary storage medium is used for verifying the key bank to protect the encryption key through an initialization method, and then the key bank is led into the memory of the server at one time, so that the key bank only exists in the memory, and the performance and the safety are improved. The encryption algorithm is deployed in an independent service component, and the flow of providing the encryption and decryption services externally is shown in fig. 3, at this time, the encryption algorithm proposed by the present invention exists as a core component of a software encryption server.
In addition, as shown in fig. 4, a core component of the encryption algorithm may be called as a part of the security middleware, deployed in an application as a part of a program, and serves as an encryption and decryption API in the system, the initialization of the keystore is implemented by the host application, and similarly, after the keystore encryption key is verified by using a temporary storage medium through an initialization method through a keystore management function, the keystore is imported into the system at one time.
The invention can replace various encryption algorithms, only needs to change the algorithm to realize the specified interface, only needs to realize three methods for the interface, and receives the String type key as the symmetric algorithm key by the setKey method. The enCode and the decrode are encryption and decryption methods respectively, so that the simple interface is realized, the algorithm can be replaced flexibly, and the specific interface is defined as shown in fig. 3.
The core code implementation process is as follows:
an initialization process: firstly, an encryption and decryption algorithm which is initialized to conform to a Cipher interface is set, and the encryption and decryption algorithm is injected into an encryption and decryption program through a setcipher (Cipher) method.
As shown in fig. 5, the enCode encryption process includes: the enCode calculates a key index idx by a calKey method, acquires a key by idx by a getKey method, combines the index and the key according to rules, returns to the enCode method, calls an enCode method of a built-in cipher object to complete encryption, returns a cipher text cipertxt, combines the cipher text and the key index, and transmits the key index + the cipher text to a decryptor.
As shown in fig. 6, the deCode decryption process includes: the method of the decrode separates the key index and the real ciphertext from the ciphertext according to the rule, acquires the key from the key bank through the getKey method, completes decryption by calling the decrode method of the built-in cipher object, returns the plaintext and transmits the plaintext to a ciphertext receiver.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, and the storage medium can store program codes, and includes instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, and the like) to perform all or part of the steps of the method in the embodiments of the present invention. The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided by the present invention, it should be understood that the disclosed system, system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit.
Similarly, each processing unit in the embodiments of the present invention may be integrated into one functional module, or each processing unit may exist physically, or two or more processing units are integrated into one functional module.
The invention is further described with reference to the accompanying drawings and specific embodiments. It should be understood that these examples are for illustrative purposes only and are not intended to limit the scope of the present invention. Further, it should be understood that various changes or modifications of the present invention may be made by those skilled in the art after reading the teaching of the present invention, and these equivalents also fall within the scope of the present application.

Claims (8)

1. A pad-based one-time pad replaceable encryption algorithm, comprising:
initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files;
creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process;
and scrambling the encryption process of the plaintext by adopting a random key.
2. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the generating a key meeting a preset condition by using the general security component in combination with a multithreading mechanism is specifically:
a Java environment is adopted to generate a key meeting preset conditions by a multithreading mechanism.
3. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the key space employs 262M of storage space for storage of the value 224A 128-bit key.
4. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the key rotation mechanism in the encryption/decryption process comprises a key rotation mechanism in the encryption process, and specifically comprises: and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
5. The pad-based one-time pad replaceable encryption algorithm of claim 4, wherein the key rotation mechanism in the encryption/decryption process further comprises a key rotation mechanism in the decryption process, and specifically comprises:
and separating the key index from the ciphertext according to a preset rule, and acquiring a key from a key library through the key index to decrypt the ciphertext to obtain a plaintext.
6. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the scrambling of the plaintext with the random key is specifically:
and randomly selecting a key in the key index obtaining process to complete scrambling of the plaintext encryption process.
7. A pad-based one-time pad replaceable cryptographic component, comprising:
the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files;
the key alternation mechanism unit is used for creating a key alternation mechanism in the encryption and decryption process and randomly distributing a key in a key base in the encryption and decryption process;
and the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
8. A pad-based one-time pad replaceable encryption device, comprising:
a memory for storing a computer program;
a processor for implementing the pad-based one-time pad replaceable cryptographic algorithm of any one of claims 1 to 6 when executing the computer program.
CN202011519496.5A 2020-12-21 2020-12-21 One-time pad replaceable encryption algorithm, assembly and equipment based on codebook Pending CN112651034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011519496.5A CN112651034A (en) 2020-12-21 2020-12-21 One-time pad replaceable encryption algorithm, assembly and equipment based on codebook

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011519496.5A CN112651034A (en) 2020-12-21 2020-12-21 One-time pad replaceable encryption algorithm, assembly and equipment based on codebook

Publications (1)

Publication Number Publication Date
CN112651034A true CN112651034A (en) 2021-04-13

Family

ID=75360222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011519496.5A Pending CN112651034A (en) 2020-12-21 2020-12-21 One-time pad replaceable encryption algorithm, assembly and equipment based on codebook

Country Status (1)

Country Link
CN (1) CN112651034A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296808A (en) * 2022-10-10 2022-11-04 深圳市西昊智能家具有限公司 Key replacing method, device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101238677A (en) * 2005-07-19 2008-08-06 株式会社Ntt都科摩 Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improv
US20140369498A1 (en) * 2000-03-29 2014-12-18 Wolfgang Hammersmith One-time-pad encryption with central key service
CN107104791A (en) * 2017-03-29 2017-08-29 江苏大学 A kind of in-vehicle network one-time pad communication means hidden based on ECU identity
CN107124271A (en) * 2017-04-28 2017-09-01 成都梆梆信息科技有限公司 A kind of data encryption, decryption method and equipment
CN110929291A (en) * 2019-12-04 2020-03-27 楚天龙股份有限公司 Method and device for accessing text file and computer readable storage medium
CN111698088A (en) * 2020-05-28 2020-09-22 平安科技(深圳)有限公司 Key alternation method, key alternation device, electronic equipment and medium
CN111984985A (en) * 2020-08-28 2020-11-24 思尔芯(上海)信息科技有限公司 HDL source code encryption method based on FPGA hardware system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140369498A1 (en) * 2000-03-29 2014-12-18 Wolfgang Hammersmith One-time-pad encryption with central key service
CN101238677A (en) * 2005-07-19 2008-08-06 株式会社Ntt都科摩 Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improv
CN107104791A (en) * 2017-03-29 2017-08-29 江苏大学 A kind of in-vehicle network one-time pad communication means hidden based on ECU identity
CN107124271A (en) * 2017-04-28 2017-09-01 成都梆梆信息科技有限公司 A kind of data encryption, decryption method and equipment
CN110929291A (en) * 2019-12-04 2020-03-27 楚天龙股份有限公司 Method and device for accessing text file and computer readable storage medium
CN111698088A (en) * 2020-05-28 2020-09-22 平安科技(深圳)有限公司 Key alternation method, key alternation device, electronic equipment and medium
CN111984985A (en) * 2020-08-28 2020-11-24 思尔芯(上海)信息科技有限公司 HDL source code encryption method based on FPGA hardware system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296808A (en) * 2022-10-10 2022-11-04 深圳市西昊智能家具有限公司 Key replacing method, device, computer equipment and storage medium
CN115296808B (en) * 2022-10-10 2023-03-10 深圳市西昊智能家具有限公司 Key replacing method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
CN100379194C (en) Memory encryption
EP3692682A1 (en) Systems, devices, and methods for hybrid secret sharing
US8681975B2 (en) Encryption method and apparatus using composition of ciphers
CN102024123B (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN104468562B (en) A kind of data security protecting portable terminal transparent towards Mobile solution
CN102904712A (en) Information encrypting method
CN101986663A (en) OTP-based cloud storage data storing method, device and system
US20220417000A1 (en) Random position cipher encryption using scrambled ascii strings
CN107800716B (en) Data processing method and device
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN102063598A (en) Data encryption and decryption methods and devices
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN115967485A (en) Encryption and decryption system based on quantum key
CN103117850A (en) Cryptosystem based on random sequence database
CN117134914B (en) One-time-pad random key stream encryption algorithm and system based on hardware characteristics
US11720693B2 (en) System and method for securely transferring data
CN113972985A (en) Private cloud encryption storage method based on cloud cipher machine key management
CN112651034A (en) One-time pad replaceable encryption algorithm, assembly and equipment based on codebook
CN116455572B (en) Data encryption method, device and equipment
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
Gong [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN110419195A (en) Data managing method and system in IOT lightweight terminal environments based on proxy re-encryption
CN114173303A (en) Train-ground session key generation method and system for CTCS-3 level train control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210413

RJ01 Rejection of invention patent application after publication