CN112651034A - One-time pad replaceable encryption algorithm, assembly and equipment based on codebook - Google Patents
One-time pad replaceable encryption algorithm, assembly and equipment based on codebook Download PDFInfo
- Publication number
- CN112651034A CN112651034A CN202011519496.5A CN202011519496A CN112651034A CN 112651034 A CN112651034 A CN 112651034A CN 202011519496 A CN202011519496 A CN 202011519496A CN 112651034 A CN112651034 A CN 112651034A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- pad
- algorithm
- plaintext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 71
- 230000008569 process Effects 0.000 claims abstract description 52
- 230000007246 mechanism Effects 0.000 claims abstract description 33
- 238000004590 computer program Methods 0.000 claims description 6
- 239000000203 mixture Substances 0.000 claims description 3
- 230000007547 defect Effects 0.000 abstract description 3
- 239000000306 component Substances 0.000 description 15
- 238000010586 diagram Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 239000008358 core component Substances 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000011423 initialization method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a one-time pad replaceable encryption algorithm, a component and equipment based on a codebook, which comprises the following steps: initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library; storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files; creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process; and scrambling the encryption process of the plaintext by adopting a random key. The invention can improve the software encryption algorithm with a single key, overcomes the defects of single algorithm, complex key replacement and unsafe key storage, and exerts the advantages of convenient upgrading of the software encryption algorithm, tight combination with a program and high efficiency.
Description
Technical Field
The invention relates to the field of computer software encryption algorithm application, in particular to a one-time pad replaceable encryption algorithm, a one-time pad replaceable encryption component and equipment based on a codebook.
Background
At present, the symmetric key encryption algorithm is mainly realized by two encryption and decryption modes, namely a soft encryption mode based on a software algorithm and a hard encryption mode based on a hardware encryption machine, and the two modes have own defects.
The essence of software encryption is that an algorithm encrypts a key, a soft encryption key is generally stored in a program code or a configuration file, a fixed key is used for encryption, an open source algorithm is generally used for the encryption algorithm, the same key is used for encryption for a long time, if an attacker obtains the key through brute force cracking or other attack modes, the whole encryption mechanism is broken, the key needs to be replaced at a high cost, a service needs to be stopped, all ciphertext is decrypted and then encrypted, and certain risk exists.
The hardware-based encryption machine can generally ensure higher security, and as a safe black box, the encryption and decryption and the secret key are both inside the black box, and leave the encryption machine, data cannot be encrypted and decrypted, and the system security can be ensured as long as the security of the encryption machine is ensured. However, the encryption and decryption efficiency of the encryption machine is not high, as an external network device, the encryption and decryption have network delay, and at the same time, the cost is high, hardware equipment needs to be purchased and operation and maintenance needs to be deployed, so that performance bottleneck and fault hidden danger may be caused, and if the encryption and decryption efficiency needs to be improved, a plurality of hardware encryption machines are needed for load balancing.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a one-time pad replaceable encryption algorithm, component and device based on a codebook, which can improve a software encryption algorithm with a single key, overcome the disadvantages of single algorithm, tedious key replacement and unsafe key storage, and exert the advantages of convenient upgrading of the software encryption algorithm, tight combination with a program, and high efficiency.
In order to achieve the purpose, the invention is realized by the following technical scheme: a pad-based one-time pad replaceable encryption algorithm comprising:
initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files;
creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process;
and scrambling the encryption process of the plaintext by adopting a random key.
Further, the generating of the key meeting the preset condition by using the general security component and combining with the multithreading mechanism specifically includes:
a Java environment is adopted to generate a key meeting preset conditions by a multithreading mechanism.
Further, the key space adopts 262M of storage space for storing support 224A 128-bit key.
Further, the key rotation mechanism in the encryption and decryption process includes a key rotation mechanism in the encryption process, and specifically includes:
and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
Further, the key rotation mechanism in the encryption and decryption process further includes a key rotation mechanism in the decryption process, and specifically includes:
and separating the key index from the ciphertext according to a preset rule, and acquiring a key from a key library through the key index to decrypt the ciphertext to obtain a plaintext.
Further, the scrambling of the plaintext encryption process by using the random key specifically includes:
and randomly selecting a key in the key index obtaining process to complete scrambling of the plaintext encryption process.
Correspondingly, the invention also discloses a one-time pad replaceable encryption component based on the codebook, which comprises the following components:
the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files;
the key alternation mechanism unit is used for creating a key alternation mechanism in the encryption and decryption process and randomly distributing a key in a key base in the encryption and decryption process;
and the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
Correspondingly, the invention also discloses a one-time pad replaceable encryption device based on the codebook, which comprises:
a memory for storing a computer program;
a processor for implementing a pad based one time replaceable cryptographic algorithm as described in any of the above when executing said computer program.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention stores the secret key in the independent storage space, can effectively avoid the whole algorithm from being broken due to the leakage of the source code, and realizes the effective management of the secret key.
2. In the encryption and decryption process, the invention adopts a key alternation mechanism and carries out key scrambling, thereby improving the capability of resisting differential attack, realizing real one-time pad encryption, adopting different keys in each encryption process regardless of whether the same plaintext is adopted, and effectively reducing the risk of brute force decryption.
Therefore, compared with the prior art, the invention has prominent substantive features and remarkable progress, and the beneficial effects of the implementation are also obvious.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a method according to a first embodiment of the present invention.
Fig. 2 is a system configuration diagram of the first embodiment of the present invention.
Fig. 3 is a schematic diagram of an embodiment of the present invention, which is deployed in a separate service component and provides an external encryption/decryption service.
Fig. 4 is a schematic diagram of API calling by using a core component of an algorithm as a part of security middleware according to a second embodiment of the present invention.
Fig. 5 is a schematic diagram of an encryption process according to a second embodiment of the present invention.
Fig. 6 is a schematic diagram of a decryption process in the second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made with reference to the accompanying drawings.
The first embodiment is as follows:
a one-time pad replaceable encryption algorithm based on a codebook as shown in fig. 1, comprising the steps of:
s1: and initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library.
In order to improve the traditional single-key symmetric encryption algorithm, a key library concept is introduced firstly, the traditional single-key algorithm only supports a limited key library, and the algorithm expands the key library to a mass space to manage and utilize the key library.
In order to further expand the key space and enhance the encryption strength, the encryption mechanism needs enough keys to participate in encryption and decryption, so that the generation of a plurality of keys is supported, and the generation of 16,777,216-2 keys can be supported generally24The symmetric key with 128 bits, each key 128bit is 16 bytes, 16,777,216 is 16/1024 is 262,144, only 262M of storage space is occupied, the larger the keystore is, the more secure the algorithm is, and of course, the more resources are occupied. The key can be generated by a general security component, in Java, we adopt javaxThe mechanism may further provide a key generation speed.
S2: and storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files.
Each generated group of key banks is stored in an encrypted file mode, the encryption keys of each group of key banks are different, and the key management system is responsible for generation and storage and is transmitted with the key bank files through an independent safe channel.
S3: and creating a key rotation mechanism in the encryption and decryption process, and randomly distributing a key in the key bank in the encryption and decryption process.
The method specifically comprises the following steps:
A. and (3) encryption process:
and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
B. And (3) decryption process:
the decryption process is the reverse process of encryption, firstly, the key index is separated from the ciphertext according to a preset rule, and the key is obtained from the key database through the key index to decrypt the ciphertext, so that the plaintext is obtained.
By the key alternation process in the encryption and decryption processes each time, one key in a huge key base is randomly distributed, the effect of one-time one-key is close, the key is protected, and the defect caused by long-term use of one key is avoided.
S4: and scrambling the encryption process of the plaintext by adopting a random key.
In the above encryption process, in the key index generation stage, if the same plaintext is always assigned with the same key index according to the default key index generation rule, the same ciphertext is also generated, which may be attacked by the known plaintext and ciphertext, thereby reducing the encryption strength. However, this feature is necessary in some application scenarios, for example, the mobile phone number is encrypted and stored in the database, and meanwhile, the database search is performed by using the mobile phone number as a unique condition, so that it is necessary to ensure that the same plaintext is always encrypted to generate an unchanged ciphertext. Also in the above example, if the certificate number is used as the query condition to query the mobile phone number, the plaintext and ciphertext of the mobile phone number are not required to be one-to-one, the encryption process can be further scrambled, a random key is adopted each time, and the algorithm security is improved. In another scenario, the encryption algorithm encrypts the URL parameters, an attacker can easily attack or playback the URL by constructing a plaintext ciphertext string, and at the moment, the requirement on the plaintext ciphertext is not required one to one, and the requirement on the encryption strength is higher.
The method adopts the mode that the key is directly and randomly selected in the key index obtaining process, so that the key scrambling is realized, the differential attack resistance is improved, the one-time pad encryption is real, no matter the same plaintext is adopted, different keys are adopted in each encryption process, and the stream key is similar to the stream key to a certain degree.
Correspondingly, as shown in fig. 2, the present invention also discloses a one-time pad replaceable encryption component based on a codebook, which comprises:
and the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library.
And the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files.
And the key rotation mechanism unit is used for creating a key rotation mechanism in the encryption and decryption process, and randomly distributing one key in the key library in the encryption and decryption process.
And the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
Correspondingly, the invention also discloses a one-time pad replaceable encryption device based on the codebook, which comprises:
a memory for storing a computer program;
a processor for implementing a pad based one time replaceable cryptographic algorithm as described in any of the above when executing said computer program.
Example two:
based on the first embodiment, the one-time pad replaceable encryption algorithm based on the codebook provided by the invention can be packaged in an independent service component to provide encryption and decryption services for the outside, all the algorithms, the key bank and the encryption and decryption services are packaged to form a black box, the temporary storage medium is used for verifying the key bank to protect the encryption key through an initialization method, and then the key bank is led into the memory of the server at one time, so that the key bank only exists in the memory, and the performance and the safety are improved. The encryption algorithm is deployed in an independent service component, and the flow of providing the encryption and decryption services externally is shown in fig. 3, at this time, the encryption algorithm proposed by the present invention exists as a core component of a software encryption server.
In addition, as shown in fig. 4, a core component of the encryption algorithm may be called as a part of the security middleware, deployed in an application as a part of a program, and serves as an encryption and decryption API in the system, the initialization of the keystore is implemented by the host application, and similarly, after the keystore encryption key is verified by using a temporary storage medium through an initialization method through a keystore management function, the keystore is imported into the system at one time.
The invention can replace various encryption algorithms, only needs to change the algorithm to realize the specified interface, only needs to realize three methods for the interface, and receives the String type key as the symmetric algorithm key by the setKey method. The enCode and the decrode are encryption and decryption methods respectively, so that the simple interface is realized, the algorithm can be replaced flexibly, and the specific interface is defined as shown in fig. 3.
The core code implementation process is as follows:
an initialization process: firstly, an encryption and decryption algorithm which is initialized to conform to a Cipher interface is set, and the encryption and decryption algorithm is injected into an encryption and decryption program through a setcipher (Cipher) method.
As shown in fig. 5, the enCode encryption process includes: the enCode calculates a key index idx by a calKey method, acquires a key by idx by a getKey method, combines the index and the key according to rules, returns to the enCode method, calls an enCode method of a built-in cipher object to complete encryption, returns a cipher text cipertxt, combines the cipher text and the key index, and transmits the key index + the cipher text to a decryptor.
As shown in fig. 6, the deCode decryption process includes: the method of the decrode separates the key index and the real ciphertext from the ciphertext according to the rule, acquires the key from the key bank through the getKey method, completes decryption by calling the decrode method of the built-in cipher object, returns the plaintext and transmits the plaintext to a ciphertext receiver.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, and the storage medium can store program codes, and includes instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, and the like) to perform all or part of the steps of the method in the embodiments of the present invention. The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided by the present invention, it should be understood that the disclosed system, system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit.
Similarly, each processing unit in the embodiments of the present invention may be integrated into one functional module, or each processing unit may exist physically, or two or more processing units are integrated into one functional module.
The invention is further described with reference to the accompanying drawings and specific embodiments. It should be understood that these examples are for illustrative purposes only and are not intended to limit the scope of the present invention. Further, it should be understood that various changes or modifications of the present invention may be made by those skilled in the art after reading the teaching of the present invention, and these equivalents also fall within the scope of the present application.
Claims (8)
1. A pad-based one-time pad replaceable encryption algorithm, comprising:
initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
storing each generated group of key libraries in a key space in an encrypted file mode, and establishing an independent data channel for transmitting the key library files;
creating a key alternation mechanism in the encryption and decryption process, and randomly distributing a key in a key base in the encryption and decryption process;
and scrambling the encryption process of the plaintext by adopting a random key.
2. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the generating a key meeting a preset condition by using the general security component in combination with a multithreading mechanism is specifically:
a Java environment is adopted to generate a key meeting preset conditions by a multithreading mechanism.
3. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the key space employs 262M of storage space for storage of the value 224A 128-bit key.
4. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the key rotation mechanism in the encryption/decryption process comprises a key rotation mechanism in the encryption process, and specifically comprises: and (3) carrying out MD5 digest algorithm on the plaintext, taking out 6-bit HEX in the MD5 characteristic value, generating 4-bit 64-system characters as key indexes, encrypting the plaintext, mixing the key indexes and the ciphertext together according to a preset rule, and transmitting the mixture as the whole ciphertext.
5. The pad-based one-time pad replaceable encryption algorithm of claim 4, wherein the key rotation mechanism in the encryption/decryption process further comprises a key rotation mechanism in the decryption process, and specifically comprises:
and separating the key index from the ciphertext according to a preset rule, and acquiring a key from a key library through the key index to decrypt the ciphertext to obtain a plaintext.
6. The pad-based one-time pad replaceable encryption algorithm of claim 1, wherein the scrambling of the plaintext with the random key is specifically:
and randomly selecting a key in the key index obtaining process to complete scrambling of the plaintext encryption process.
7. A pad-based one-time pad replaceable cryptographic component, comprising:
the key generation unit is used for initializing a key space, generating a key meeting preset conditions by adopting a general security component and combining a multithreading mechanism, and generating a key library;
the key management unit is used for storing each generated group of key libraries in a key space in an encrypted file mode and establishing an independent data channel for transmitting the key library files;
the key alternation mechanism unit is used for creating a key alternation mechanism in the encryption and decryption process and randomly distributing a key in a key base in the encryption and decryption process;
and the key scrambling unit is used for scrambling the encryption process of the plaintext by adopting a random key.
8. A pad-based one-time pad replaceable encryption device, comprising:
a memory for storing a computer program;
a processor for implementing the pad-based one-time pad replaceable cryptographic algorithm of any one of claims 1 to 6 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011519496.5A CN112651034A (en) | 2020-12-21 | 2020-12-21 | One-time pad replaceable encryption algorithm, assembly and equipment based on codebook |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011519496.5A CN112651034A (en) | 2020-12-21 | 2020-12-21 | One-time pad replaceable encryption algorithm, assembly and equipment based on codebook |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112651034A true CN112651034A (en) | 2021-04-13 |
Family
ID=75360222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011519496.5A Pending CN112651034A (en) | 2020-12-21 | 2020-12-21 | One-time pad replaceable encryption algorithm, assembly and equipment based on codebook |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112651034A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115296808A (en) * | 2022-10-10 | 2022-11-04 | 深圳市西昊智能家具有限公司 | Key replacing method, device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101238677A (en) * | 2005-07-19 | 2008-08-06 | 株式会社Ntt都科摩 | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improv |
US20140369498A1 (en) * | 2000-03-29 | 2014-12-18 | Wolfgang Hammersmith | One-time-pad encryption with central key service |
CN107104791A (en) * | 2017-03-29 | 2017-08-29 | 江苏大学 | A kind of in-vehicle network one-time pad communication means hidden based on ECU identity |
CN107124271A (en) * | 2017-04-28 | 2017-09-01 | 成都梆梆信息科技有限公司 | A kind of data encryption, decryption method and equipment |
CN110929291A (en) * | 2019-12-04 | 2020-03-27 | 楚天龙股份有限公司 | Method and device for accessing text file and computer readable storage medium |
CN111698088A (en) * | 2020-05-28 | 2020-09-22 | 平安科技(深圳)有限公司 | Key alternation method, key alternation device, electronic equipment and medium |
CN111984985A (en) * | 2020-08-28 | 2020-11-24 | 思尔芯(上海)信息科技有限公司 | HDL source code encryption method based on FPGA hardware system |
-
2020
- 2020-12-21 CN CN202011519496.5A patent/CN112651034A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140369498A1 (en) * | 2000-03-29 | 2014-12-18 | Wolfgang Hammersmith | One-time-pad encryption with central key service |
CN101238677A (en) * | 2005-07-19 | 2008-08-06 | 株式会社Ntt都科摩 | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improv |
CN107104791A (en) * | 2017-03-29 | 2017-08-29 | 江苏大学 | A kind of in-vehicle network one-time pad communication means hidden based on ECU identity |
CN107124271A (en) * | 2017-04-28 | 2017-09-01 | 成都梆梆信息科技有限公司 | A kind of data encryption, decryption method and equipment |
CN110929291A (en) * | 2019-12-04 | 2020-03-27 | 楚天龙股份有限公司 | Method and device for accessing text file and computer readable storage medium |
CN111698088A (en) * | 2020-05-28 | 2020-09-22 | 平安科技(深圳)有限公司 | Key alternation method, key alternation device, electronic equipment and medium |
CN111984985A (en) * | 2020-08-28 | 2020-11-24 | 思尔芯(上海)信息科技有限公司 | HDL source code encryption method based on FPGA hardware system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115296808A (en) * | 2022-10-10 | 2022-11-04 | 深圳市西昊智能家具有限公司 | Key replacing method, device, computer equipment and storage medium |
CN115296808B (en) * | 2022-10-10 | 2023-03-10 | 深圳市西昊智能家具有限公司 | Key replacing method, device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN100379194C (en) | Memory encryption | |
EP3692682A1 (en) | Systems, devices, and methods for hybrid secret sharing | |
US8681975B2 (en) | Encryption method and apparatus using composition of ciphers | |
CN102024123B (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
CN104468562B (en) | A kind of data security protecting portable terminal transparent towards Mobile solution | |
CN102904712A (en) | Information encrypting method | |
CN101986663A (en) | OTP-based cloud storage data storing method, device and system | |
US20220417000A1 (en) | Random position cipher encryption using scrambled ascii strings | |
CN107800716B (en) | Data processing method and device | |
CN109274644A (en) | A kind of data processing method, terminal and watermark server | |
CN102063598A (en) | Data encryption and decryption methods and devices | |
CN115632880B (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN111404953A (en) | Message encryption method, message decryption method, related devices and related systems | |
CN115967485A (en) | Encryption and decryption system based on quantum key | |
CN103117850A (en) | Cryptosystem based on random sequence database | |
CN117134914B (en) | One-time-pad random key stream encryption algorithm and system based on hardware characteristics | |
US11720693B2 (en) | System and method for securely transferring data | |
CN113972985A (en) | Private cloud encryption storage method based on cloud cipher machine key management | |
CN112651034A (en) | One-time pad replaceable encryption algorithm, assembly and equipment based on codebook | |
CN116455572B (en) | Data encryption method, device and equipment | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
Gong | [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management | |
CN110419195A (en) | Data managing method and system in IOT lightweight terminal environments based on proxy re-encryption | |
CN114173303A (en) | Train-ground session key generation method and system for CTCS-3 level train control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210413 |
|
RJ01 | Rejection of invention patent application after publication |