CN112714112B - Data encryption and decryption method for server data storage, storage medium and terminal equipment - Google Patents

Data encryption and decryption method for server data storage, storage medium and terminal equipment Download PDF

Info

Publication number
CN112714112B
CN112714112B CN202011535149.1A CN202011535149A CN112714112B CN 112714112 B CN112714112 B CN 112714112B CN 202011535149 A CN202011535149 A CN 202011535149A CN 112714112 B CN112714112 B CN 112714112B
Authority
CN
China
Prior art keywords
encryption
data
order
encrypted
data stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011535149.1A
Other languages
Chinese (zh)
Other versions
CN112714112A (en
Inventor
郭静松
杨望
杨锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Yunshen Zhicheng Technology Co ltd
Original Assignee
Sichuan Yunshen Zhicheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Yunshen Zhicheng Technology Co ltd filed Critical Sichuan Yunshen Zhicheng Technology Co ltd
Priority to CN202011535149.1A priority Critical patent/CN112714112B/en
Publication of CN112714112A publication Critical patent/CN112714112A/en
Application granted granted Critical
Publication of CN112714112B publication Critical patent/CN112714112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a data encryption and decryption method for server data storage, which comprises the steps of adopting a second-order encryption method for data or files needing to be encrypted after the data or files needing to be encrypted are compressed according to the types of the data or the files before the data are operated and prepared to be stored, splitting the data stream, generating random numbers, adding the random numbers in the front, between and at the end of the split sub-data stream to form a new data stream, operating according to a time stamp, selecting one of a plurality of encryption algorithms as a second-order encryption algorithm according to an operation result, and storing after an encrypted piece is obtained; before the data or the file needs to be sent, the encryption piece is decrypted, and the safety of the data in the storage process is guaranteed.

Description

Data encryption and decryption method for server data storage, storage medium and terminal equipment
Technical Field
The invention relates to the technical field of data encryption and decryption, in particular to a data encryption and decryption method for server data storage.
Background
The development of the internet has made the security protection of data a major part, and encrypting data is a common method for data security, and accordingly, decrypting encrypted data is accompanied. The places where data is most vulnerable to attacks include: in the data transmission process and the database storage process, once the database is attacked, the loss caused by the attack cannot be calculated, so that the method is particularly important for the safety protection of the data in the database.
The prior art protects a database, which can only provide one protection, and the security is not high, and how to realize encryption and decryption of data in order to improve the security of the data is a problem to be solved urgently at present.
Disclosure of Invention
The invention aims to provide a data encryption and decryption method for server data storage, which is characterized in that a second-order encryption method is adopted before data are calculated and prepared to be stored, data streams are split, random numbers are added among split sub-data streams to form new data streams, one of the multiple encryption algorithms is selected as a second-order encryption algorithm according to a time stamp, and an encryption piece is obtained and then stored; before the data or the file needs to be sent, the encryption piece is decrypted, and the safety of the data in the storage process is guaranteed.
In a first aspect, the above object of the present invention is achieved by the following technical solutions:
a data encryption and decryption method for server data storage is characterized in that after data or files enter a server to perform corresponding operation, a piece to be encrypted is split and added with random numbers in a second-order encryption mode according to the type of the data or files, and a second-order encryption algorithm is selected according to a timestamp to obtain an encrypted piece and the encrypted piece is stored; before the data or file needs to be sent, the encrypted piece is decrypted.
The invention is further configured to: the encryption comprises the following steps: according to the data or file type, compressing the non-compilable file to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password by adopting a second-order encryption mode; encrypting data to be encrypted and stored and a file which can be compiled by adopting a second-order encryption mode; and storing the plaintext which does not need to be encrypted without encryption.
The invention is further configured to: the second-order encryption mode comprises the following steps: the method comprises the steps of compressing a piece to be encrypted to obtain a data stream, carrying out first-order encryption on the data stream to obtain a first-order encryption piece, carrying out secondary compression on the first-order encryption piece to obtain a first-order encryption compression piece, carrying out second-order encryption on the first-order encryption compression piece after a timestamp node is obtained, and storing the obtained second-order encryption piece.
The invention is further configured to: and performing first-stage encryption by adopting a value length encryption algorithm, taking the length of a character string of the data stream to be encrypted as a pointer, splitting the character string into N sections, and adding at least one random number to obtain a first-stage encryption element.
The invention is further configured to: the character string is divided into N sections, a first random number is added at the beginning of a first sub-character string in a mode that the random number is spaced from the sub-character string, the random number is added between every two adjacent sub-character strings, and an N +1 th random number is added at the end of an N-th sub-character string.
The invention is further configured to: acquiring the length X of a current data stream character string, splitting the current data stream character string into two sub-data stream character strings StrD and StrE, acquiring a random character string StrA with the length X by using a random number function, dividing the X into two parts X1/X2, and acquiring two random character strings StrB and StrC with the length X1/X2 by using the random number function at the same time with the length X1/X2; and splicing StrB, StrE, StrA, StrD and StrC to obtain a first-stage encrypted part.
The invention is further configured to: when X is an odd number, X1 ═ 0.5, (X/2) —, X2 ═ 0.5; when X is an even number, X1 ═ X2 ═ X/2; the splicing sequence comprises StrB, StrE, StrA, StrD, StrC, or StrB, StrD, StrA, StrE, StrC.
The invention is further configured to: the second-order encryption comprises M encryption algorithms, one of the encryption algorithms is selected based on the operation result of the timestamp, and the data stream to be encrypted is encrypted, wherein M is a positive integer greater than 1.
The invention is further configured to: the encryption algorithm comprises reverse order encryption, word conversion encryption, bit insertion encryption, reverse conversion encryption and splicing encryption.
The invention is further configured to: the decryption includes: storing the unencrypted plaintext without decrypting; a decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
The invention is further configured to: the decryption algorithm comprises: the method comprises the steps of obtaining a second-order ciphertext and a time stamp of an encryption piece, obtaining a second-order encryption key according to the time stamp, decrypting the second-order ciphertext and the second-order encryption key to obtain a second-order decryption ciphertext, decompressing the second-order decryption ciphertext to obtain a first-order ciphertext, performing encryption solution operation on the first-order ciphertext to obtain a data stream, and decompressing to obtain plaintext data.
In a second aspect, the above object of the present invention is achieved by the following technical solutions:
a computer-readable storage medium having stored thereon a computer program which, when executed, implements the data encryption and decryption method for server data storage.
In a third aspect, the above object of the present invention is achieved by the following technical solutions:
a data encryption and decryption terminal device for server data storage comprises a processor and a memory, wherein the memory stores a computer program capable of running on the processor, and the processor can realize the data encryption and decryption method for server data storage when executing the computer program.
Compared with the prior art, the beneficial technical effects of this application do:
1. the data stream is encrypted in the second order, so that the safety of data storage is improved;
2. furthermore, the data stream is split and then the random number is added, so that the value length of the data stream is changed, and the data security is improved;
3. furthermore, in the second-order encryption process, calculation is carried out according to the time stamp, and one of a plurality of encryption algorithms is selected for encryption, so that the uniqueness of data encryption is ensured, and the data security is improved;
4. furthermore, the application decrypts the encrypted data by performing reverse operation, so as to ensure data recovery.
Drawings
FIG. 1 is a schematic diagram of a data encryption flow of an embodiment of the present application;
fig. 2 is a schematic diagram of a data decryption process according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Detailed description of the preferred embodiment
The data encryption method for server data storage comprises the steps that before data or files enter a server to be subjected to corresponding operation and are prepared to be stored, the data or file types are analyzed, plaintext data which do not need to be encrypted are directly stored, a second-order encryption mode is adopted for the data or files which need to be encrypted, in a first-order encryption process, data streams are split into a plurality of sub data streams, random numbers are added among the sub data streams or between the sub data streams, a new data stream is formed, the new data stream is compressed, a timestamp node is obtained, and a timestamp is recorded; in the second-order encryption process, operation is carried out according to the time stamp, one of a plurality of encryption algorithms is selected as a second-order encryption algorithm according to the operation result, the compressed new data stream is encrypted, and a final encryption piece is obtained and then stored; before data or files need to be sent, inverse operation is carried out, and the encrypted piece is decrypted.
Data or files needing encryption comprise data needing encryption, compilable files and non-compilable files.
The method comprises the steps of encrypting data to be encrypted and files which can be compiled in a second-order encryption mode, compressing files which cannot be compiled to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password in the second-order encryption mode.
The second-order encryption mode comprises the following steps: the method comprises the steps of compressing a piece to be encrypted to obtain a data stream, carrying out first-order encryption on the data stream to obtain a first-order encryption piece, carrying out secondary compression on the first-order encryption piece to obtain a first-order encryption compression piece, carrying out second-order encryption on the first-order encryption compression piece after a timestamp node is obtained, and storing the obtained second-order encryption piece.
As shown in fig. 1, the second-order encryption method includes the following steps:
s1, compressing the piece to be encrypted into data flow, wherein the piece to be encrypted comprises: data needing to be encrypted, a file capable of being compiled and a first decompression password;
s2, performing first-order encryption on the data stream by adopting value length operation to obtain a first-order encryption piece;
s3, compressing the first-order encryption piece to obtain a first-order encryption compression piece;
s4, acquiring and recording the timestamp node;
and S5, performing operation according to the timestamp nodes, selecting one of a plurality of encryption algorithms according to the operation result, and encrypting the first-order encryption compression piece to obtain a directional random encryption key and a second-order encryption piece.
In step S2, the value length calculation includes: reading the length X of the string StrBegin of the data stream to be encrypted, and splitting the string StrBegin into N sections to obtain N sections of sub-strings.
N is a positive integer of 2 or more.
For simplicity of description, the present embodiment is described with N being 2, and so on for the case where N is greater than 2.
Acquiring a random character string with the length of X by using a random number function: StrA.
When X is an odd number, X1 ═ 0.5, (X/2) +0.5, and X2 ═ 0.5.
When X is an even number, X1 ═ X2 ═ X/2 is assumed.
The random string StrB of length X1 and the random string StrC of length X2 are obtained separately using a random function.
The character string StrBegin is divided into two sub-character strings StrD and StrE, wherein the length of the sub-character string StrD is X1, and the length of the sub-character string StrE is X2.
And splicing the random number and the substring in a mode of random number 1+ substring 1+ random number 2+ substring 2+ random number 3 to form a first-stage encryption piece.
In a specific embodiment of the present application, the concatenation is performed by placing the random number of the same length as the string in a middle position and placing the random numbers of the same length as the substring in the remaining positions, e.g., in the order of StrB, StrE, StrA, StrD, StrC, or in the order of StrB, StrD, StrA, StrE, StrC.
The data stream is divided into two parts, and a new data with 5 parts, namely a first-order encryption element, is formed through random numbers, so that the character string is prolonged, and the actual character content is hidden.
In step S5, M encryption algorithms are set, the operation is performed according to the time stamp, one of the encryption algorithms is selected according to the operation result, and the second-order encryption is performed on the compression element of the first-order encryption element.
In this embodiment, M is 5, and so on.
The five encryption algorithms include: reverse order encryption, word-changing encryption, bit-inserting encryption, reverse-changing encryption and splicing encryption.
Wherein, the reverse order encryption: and taking the last bit of the data stream to be encrypted as the first bit and the second last bit as the second bit, and repeating the steps in the same way, completely reversing the sequence and recombining a new character data stream.
For example: before encryption, the following steps are carried out: a23b1h 67; after encryption, the method comprises the following steps: 76h1b32 a.
Word changing and encryption: according to 36-bit operation, orienting + W bit of each bit character in the data stream to be encrypted, if the + W bit exceeds 36 bit, entering circulation, not participating in operation of symbols, and converting capital letters to be in a rear + symbol.
And 2, carrying out binary system: 01
And (5) carrying 10 systems: 0123456789
16, carrying out the following steps: 0123456789ABCDEF
36, carry in the system: 0123456789 ABCDEFGHIJKLMNOPQRSTHWXYZ
For example: before encryption, the following steps are carried out: siH8+74/K2gs3, encrypted as: yon & + da/q &2my 9.
Inserting and encrypting: and splitting the data stream to be encrypted in half, splicing the data stream together in the air, removing the last bit if the data stream is odd, ensuring that the lengths of the left side and the right side of the split data are the same, and supplementing the last bit at the tail after splicing.
For example: before encryption, the following steps are carried out: 0123456789ab, encrypted as: 061728394a5 b.
Reverse encryption: and correspondingly replacing all letters/numbers in the characters from beginning to end in a 36-system corresponding sequence, wherein symbols do not participate in operation, and capital letters are converted and then are + &atthe rear.
For example: before encryption, the following steps are carried out: 0123456789ab, encrypted as: ZYXWVUTSRQPO.
E: splicing and encrypting: taking 10 remainders of the length of the character string of the data stream to be encrypted, intercepting the character string by using the remainders to generate an array, and splicing the array head and tail;
for example: before encryption, the following steps are carried out: 0123456789abc, length 13, remaining 13% 10 to 3, encrypted as: 012c3459ab 678.
And performing second-order encryption on the compression element of the first-order encryption element by adopting one encryption algorithm to obtain a second-order encryption element for storage.
And each file or data needing encryption is encrypted, so that the safety of the data is improved.
Before data is sent, the second-order encryption element needs to be subjected to inverse operation, and after decryption, a data stream is obtained and then sent.
The unencrypted plaintext is stored without decryption. A decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
As shown in fig. 2, the second-order decryption algorithm includes the following steps:
a1, acquiring a second-order encryption piece and a time stamp corresponding to the second-order encryption piece;
a2, acquiring a directional random encryption key corresponding to the second-order encryption according to the timestamp, and decrypting the second-order encryption element to obtain a second-order decrypted ciphertext;
a3, decompressing the second-order decrypted ciphertext to obtain a first-order ciphertext;
a4, operating a value length encryption solution of an indefinite number on a first-order ciphertext to obtain a data stream;
and A5, decompressing the data stream to obtain decompressed plaintext data, a compliable file and a decompressed password.
And decrypting the first compression part again by combining the decompression password of the uncompiled file to obtain the uncompiled file.
And sending the plaintext data, the compilable file and the uncompilable file to the client.
Detailed description of the invention
An embodiment of the present invention provides a data encryption/decryption terminal device for server data storage, where the terminal device in the embodiment includes: a processor, a memory, and a computer program, such as a data encryption and decryption computer program, stored in the memory and executable on the processor, the processor implementing the encryption and decryption steps in embodiment 1 when executing the computer program;
illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used for describing the execution process of the computer program in the data encryption and decryption terminal device for server data storage. For example, the computer program may be divided into a plurality of modules, each module having the following specific functions:
1. the encryption module is used for encrypting the data;
2. and the decryption module is used for decrypting the data.
The data encryption and decryption terminal device for the server data storage can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing devices. The terminal device may include, but is not limited to, a processor, a memory. It will be understood by those skilled in the art that the above examples are merely examples of the data encryption and decryption terminal device of the server data storage, and do not constitute a limitation on the data encryption and decryption terminal device of the server data storage, and may include more or less components than those shown, or combine some components, or different components, for example, the data encryption and decryption terminal device of the server data storage may further include an input and output device, a network access device, a bus, and the like.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor is a control center of the data encryption and decryption terminal device of the server data storage, and various interfaces and lines are used for connecting various parts of the whole terminal device.
The memory may be used for storing the computer programs and/or modules, and the processor may implement the various functions of the terminal device by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the mobile phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Detailed description of the preferred embodiment
The integrated module/unit of the data encryption and decryption terminal device for server data storage can be stored in a computer readable storage medium if the module/unit is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.

Claims (11)

1. A data encryption and decryption method for server data storage is characterized by comprising the following steps: after data or files enter a server to perform corresponding operation, according to the type of the data or files, a second-order encryption mode is adopted for an encrypted piece, wherein the encrypted piece comprises the data to be encrypted, a file capable of being compiled and a first decompression password, in the first-order encryption process, a data stream is split into a plurality of sub-data streams, a random number with the same length as the data stream and random numbers with the same length as each sub-data stream are obtained by utilizing a random function, the random numbers are added among the sub-data streams and before and after the sub-data streams to form a new data stream, the new data stream is compressed, a time stamp node is obtained, and a time stamp is recorded; in the second-order encryption process, operation is carried out according to the time stamp, one of M encryption algorithms is selected as a second-order encryption algorithm according to the operation result, wherein M is a positive integer larger than 1, the compressed new data stream is encrypted, and an encrypted piece is obtained and stored; before the data or file needs to be sent, the encrypted piece is decrypted.
2. The data encryption and decryption method for server data storage according to claim 1, wherein: according to the data or file type, compressing the non-compilable file to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password by adopting a second-order encryption mode; encrypting data to be encrypted and stored and a file which can be compiled by adopting a second-order encryption mode; and storing the plaintext which does not need to be encrypted without encryption.
3. The data encryption and decryption method for server data storage according to claim 1, wherein: and compressing the piece to be encrypted to obtain the data stream.
4. The data encryption and decryption method for server data storage according to claim 1, wherein: in the first-order encryption process, a value length encryption algorithm is adopted, the length of a data stream to be encrypted is used as a pointer, the data stream string is divided into N sections, N sub-data streams are formed, a first random number is added at the beginning of a first sub-data stream in a mode of interval between the random number and the sub-data streams, random numbers are added between every two adjacent sub-data streams, and an N +1 th random number is added at the end of an Nth sub-data stream.
5. The data encryption and decryption method for server data storage according to claim 1, wherein: acquiring the length X of a data stream, splitting the data stream into two sub-data streams StrD and StrE, acquiring a random character string StrA with the length X by using a random number function, dividing the X into two parts of X1 and X2, and acquiring two random character strings StrB and StrC with the length X1 or X2 by using the random number function at the same time according to the length of X1 or X2; and placing the random number with the same length as the data stream at the middle position, placing the random numbers with the same length as the sub-data stream at the other positions, and splicing StrB, StrE, StrA, StrD and StrC or splicing StrB, StrD, StrA, StrE and StrC to obtain a first-stage encryption element.
6. The data encryption and decryption method for server data storage according to claim 5, wherein: when X is an odd number, X1 = (X ⁄ 2) -0.5, X2 = (X ⁄ 2) + 0.5; when in use
X1 = X2 = X ⁄ 2 when X is even; the splicing sequence comprises StrB, StrE, StrA, StrD, StrC, or StrB, StrD, StrA, StrE, StrC.
7. The data encryption and decryption method for server data storage according to claim 1, wherein: the encryption algorithm comprises reverse encryption or/and word-changing encryption or/and bit-inserting encryption or/and reverse encryption or/and splicing encryption.
8. The data encryption and decryption method for server data storage according to claim 2, wherein: the decryption includes: storing the unencrypted plaintext without decrypting; a decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
9. The data encryption and decryption method for server data storage according to claim 8, wherein: the decryption algorithm comprises: the method comprises the steps of obtaining a second-order encryption piece and a time stamp corresponding to the second-order encryption piece, obtaining a second-order random encryption key according to the time stamp, decrypting the second-order encryption piece to obtain a second-order decrypted ciphertext, decompressing the second-order decrypted ciphertext to obtain a first-order ciphertext, performing decryption operation on the first-order ciphertext to obtain a data stream, and decompressing to obtain plaintext data.
10. A computer-readable storage medium characterized by: the storage medium having stored thereon a computer program which, when executed, implements the method of any of claims 1-9.
11. A data encryption/decryption terminal device for server data storage, comprising a processor, a memory, said memory storing a computer program capable of running on said processor, said processor being capable of implementing the method according to any one of claims 1 to 9 when executing said computer program.
CN202011535149.1A 2020-12-22 2020-12-22 Data encryption and decryption method for server data storage, storage medium and terminal equipment Active CN112714112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011535149.1A CN112714112B (en) 2020-12-22 2020-12-22 Data encryption and decryption method for server data storage, storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011535149.1A CN112714112B (en) 2020-12-22 2020-12-22 Data encryption and decryption method for server data storage, storage medium and terminal equipment

Publications (2)

Publication Number Publication Date
CN112714112A CN112714112A (en) 2021-04-27
CN112714112B true CN112714112B (en) 2022-05-17

Family

ID=75543642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011535149.1A Active CN112714112B (en) 2020-12-22 2020-12-22 Data encryption and decryption method for server data storage, storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN112714112B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114401288A (en) * 2021-12-28 2022-04-26 四川瑞霆智汇科技有限公司 Low-power-consumption access system and method based on edge Internet of things agent and storage medium thereof
CN114598470B (en) * 2022-03-17 2023-12-19 北京启明星辰信息安全技术有限公司 Encryption method, decryption method, device, and computer-readable storage medium
CN114629649B (en) * 2022-05-10 2022-09-13 深圳市搜了网络科技股份有限公司 Data processing method and device based on cloud computing and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060036852A1 (en) * 2004-08-16 2006-02-16 Kwok-Yan Leung Byte-based data-processing device and the processing method thereof
CN101621677A (en) * 2008-06-30 2010-01-06 北京中星微电子有限公司 Method, device and system for multi-level encryption and decryption of audios and videos for monitoring
CN104268480A (en) * 2014-10-10 2015-01-07 重庆邮电大学 XML (extensive markup language) configuration file security protection processing method and system
CN105574424B (en) * 2014-10-16 2018-10-16 中国移动通信集团广东有限公司 A kind of big data encrypting and deciphering processing method and system
CN106612264A (en) * 2015-10-26 2017-05-03 广州市动景计算机科技有限公司 Method and device for acquiring file decompression password
JP2017005682A (en) * 2016-02-16 2017-01-05 国立大学法人京都大学 Data processing device, data transmission method, computer program and data server
CN111698253A (en) * 2020-06-13 2020-09-22 郑州智利信信息技术有限公司 Computer network safety system
CN111917555B (en) * 2020-07-13 2024-03-15 上海明略人工智能(集团)有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN112714112A (en) 2021-04-27

Similar Documents

Publication Publication Date Title
CN112714112B (en) Data encryption and decryption method for server data storage, storage medium and terminal equipment
Souyah et al. An image encryption scheme combining chaos-memory cellular automata and weighted histogram
KR100415410B1 (en) Encryption device and method, arithmetic unit, and decryption device and method
AU767323B2 (en) Block encryption device using auxiliary conversion
US8504845B2 (en) Protecting states of a cryptographic process using group automorphisms
CN108173640B (en) High-security symmetric encryption and decryption method for character strings
US10419207B2 (en) Cryptographic apparatuses and methods for encrypting and decrypting data using automata
CN110768785A (en) Encoding and decoding methods, related devices and computer equipment
US11329799B2 (en) Calculation device for encryption using public key and encryption method thereof
CN114221766B (en) Data encryption method, data decryption method and data encryption device
JP6044738B2 (en) Information processing apparatus, program, and storage medium
CN116961958A (en) Data encryption method and device, electronic equipment and storage medium
Chen et al. Image encryption using progressive cellular automata substitution and SCAN
CN113282947A (en) Data encryption method and device based on SM4 algorithm and computer platform
CN116318660B (en) Message expansion and compression method and related device
CN110515591B (en) Random number generation method and device based on block chain
CN114390317B (en) Encryption method and system for streaming video
RU2708439C1 (en) Computing device and method
Cusack et al. Using graphic methods to challenge cryptographic performance
Zhou et al. Joint security and performance enhancement for secure arithmetic coding
CN111342951B (en) Method and device for generating stream cipher system and terminal equipment
Chou McBits revisited: toward a fast constant-time code-based KEM
Pal et al. A random block length based cryptosystem through multiple cascaded permutation-combinations and chaining of blocks
CN116484407B (en) Data security protection method and device, electronic equipment and storage medium
WO2022239163A1 (en) Authenticated encryption device, authenticated decryption device, authenticated cryptograph system, method and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant