CN112714112B - Data encryption and decryption method for server data storage, storage medium and terminal equipment - Google Patents
Data encryption and decryption method for server data storage, storage medium and terminal equipment Download PDFInfo
- Publication number
- CN112714112B CN112714112B CN202011535149.1A CN202011535149A CN112714112B CN 112714112 B CN112714112 B CN 112714112B CN 202011535149 A CN202011535149 A CN 202011535149A CN 112714112 B CN112714112 B CN 112714112B
- Authority
- CN
- China
- Prior art keywords
- encryption
- data
- order
- encrypted
- data stream
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a data encryption and decryption method for server data storage, which comprises the steps of adopting a second-order encryption method for data or files needing to be encrypted after the data or files needing to be encrypted are compressed according to the types of the data or the files before the data are operated and prepared to be stored, splitting the data stream, generating random numbers, adding the random numbers in the front, between and at the end of the split sub-data stream to form a new data stream, operating according to a time stamp, selecting one of a plurality of encryption algorithms as a second-order encryption algorithm according to an operation result, and storing after an encrypted piece is obtained; before the data or the file needs to be sent, the encryption piece is decrypted, and the safety of the data in the storage process is guaranteed.
Description
Technical Field
The invention relates to the technical field of data encryption and decryption, in particular to a data encryption and decryption method for server data storage.
Background
The development of the internet has made the security protection of data a major part, and encrypting data is a common method for data security, and accordingly, decrypting encrypted data is accompanied. The places where data is most vulnerable to attacks include: in the data transmission process and the database storage process, once the database is attacked, the loss caused by the attack cannot be calculated, so that the method is particularly important for the safety protection of the data in the database.
The prior art protects a database, which can only provide one protection, and the security is not high, and how to realize encryption and decryption of data in order to improve the security of the data is a problem to be solved urgently at present.
Disclosure of Invention
The invention aims to provide a data encryption and decryption method for server data storage, which is characterized in that a second-order encryption method is adopted before data are calculated and prepared to be stored, data streams are split, random numbers are added among split sub-data streams to form new data streams, one of the multiple encryption algorithms is selected as a second-order encryption algorithm according to a time stamp, and an encryption piece is obtained and then stored; before the data or the file needs to be sent, the encryption piece is decrypted, and the safety of the data in the storage process is guaranteed.
In a first aspect, the above object of the present invention is achieved by the following technical solutions:
a data encryption and decryption method for server data storage is characterized in that after data or files enter a server to perform corresponding operation, a piece to be encrypted is split and added with random numbers in a second-order encryption mode according to the type of the data or files, and a second-order encryption algorithm is selected according to a timestamp to obtain an encrypted piece and the encrypted piece is stored; before the data or file needs to be sent, the encrypted piece is decrypted.
The invention is further configured to: the encryption comprises the following steps: according to the data or file type, compressing the non-compilable file to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password by adopting a second-order encryption mode; encrypting data to be encrypted and stored and a file which can be compiled by adopting a second-order encryption mode; and storing the plaintext which does not need to be encrypted without encryption.
The invention is further configured to: the second-order encryption mode comprises the following steps: the method comprises the steps of compressing a piece to be encrypted to obtain a data stream, carrying out first-order encryption on the data stream to obtain a first-order encryption piece, carrying out secondary compression on the first-order encryption piece to obtain a first-order encryption compression piece, carrying out second-order encryption on the first-order encryption compression piece after a timestamp node is obtained, and storing the obtained second-order encryption piece.
The invention is further configured to: and performing first-stage encryption by adopting a value length encryption algorithm, taking the length of a character string of the data stream to be encrypted as a pointer, splitting the character string into N sections, and adding at least one random number to obtain a first-stage encryption element.
The invention is further configured to: the character string is divided into N sections, a first random number is added at the beginning of a first sub-character string in a mode that the random number is spaced from the sub-character string, the random number is added between every two adjacent sub-character strings, and an N +1 th random number is added at the end of an N-th sub-character string.
The invention is further configured to: acquiring the length X of a current data stream character string, splitting the current data stream character string into two sub-data stream character strings StrD and StrE, acquiring a random character string StrA with the length X by using a random number function, dividing the X into two parts X1/X2, and acquiring two random character strings StrB and StrC with the length X1/X2 by using the random number function at the same time with the length X1/X2; and splicing StrB, StrE, StrA, StrD and StrC to obtain a first-stage encrypted part.
The invention is further configured to: when X is an odd number, X1 ═ 0.5, (X/2) —, X2 ═ 0.5; when X is an even number, X1 ═ X2 ═ X/2; the splicing sequence comprises StrB, StrE, StrA, StrD, StrC, or StrB, StrD, StrA, StrE, StrC.
The invention is further configured to: the second-order encryption comprises M encryption algorithms, one of the encryption algorithms is selected based on the operation result of the timestamp, and the data stream to be encrypted is encrypted, wherein M is a positive integer greater than 1.
The invention is further configured to: the encryption algorithm comprises reverse order encryption, word conversion encryption, bit insertion encryption, reverse conversion encryption and splicing encryption.
The invention is further configured to: the decryption includes: storing the unencrypted plaintext without decrypting; a decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
The invention is further configured to: the decryption algorithm comprises: the method comprises the steps of obtaining a second-order ciphertext and a time stamp of an encryption piece, obtaining a second-order encryption key according to the time stamp, decrypting the second-order ciphertext and the second-order encryption key to obtain a second-order decryption ciphertext, decompressing the second-order decryption ciphertext to obtain a first-order ciphertext, performing encryption solution operation on the first-order ciphertext to obtain a data stream, and decompressing to obtain plaintext data.
In a second aspect, the above object of the present invention is achieved by the following technical solutions:
a computer-readable storage medium having stored thereon a computer program which, when executed, implements the data encryption and decryption method for server data storage.
In a third aspect, the above object of the present invention is achieved by the following technical solutions:
a data encryption and decryption terminal device for server data storage comprises a processor and a memory, wherein the memory stores a computer program capable of running on the processor, and the processor can realize the data encryption and decryption method for server data storage when executing the computer program.
Compared with the prior art, the beneficial technical effects of this application do:
1. the data stream is encrypted in the second order, so that the safety of data storage is improved;
2. furthermore, the data stream is split and then the random number is added, so that the value length of the data stream is changed, and the data security is improved;
3. furthermore, in the second-order encryption process, calculation is carried out according to the time stamp, and one of a plurality of encryption algorithms is selected for encryption, so that the uniqueness of data encryption is ensured, and the data security is improved;
4. furthermore, the application decrypts the encrypted data by performing reverse operation, so as to ensure data recovery.
Drawings
FIG. 1 is a schematic diagram of a data encryption flow of an embodiment of the present application;
fig. 2 is a schematic diagram of a data decryption process according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Detailed description of the preferred embodiment
The data encryption method for server data storage comprises the steps that before data or files enter a server to be subjected to corresponding operation and are prepared to be stored, the data or file types are analyzed, plaintext data which do not need to be encrypted are directly stored, a second-order encryption mode is adopted for the data or files which need to be encrypted, in a first-order encryption process, data streams are split into a plurality of sub data streams, random numbers are added among the sub data streams or between the sub data streams, a new data stream is formed, the new data stream is compressed, a timestamp node is obtained, and a timestamp is recorded; in the second-order encryption process, operation is carried out according to the time stamp, one of a plurality of encryption algorithms is selected as a second-order encryption algorithm according to the operation result, the compressed new data stream is encrypted, and a final encryption piece is obtained and then stored; before data or files need to be sent, inverse operation is carried out, and the encrypted piece is decrypted.
Data or files needing encryption comprise data needing encryption, compilable files and non-compilable files.
The method comprises the steps of encrypting data to be encrypted and files which can be compiled in a second-order encryption mode, compressing files which cannot be compiled to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password in the second-order encryption mode.
The second-order encryption mode comprises the following steps: the method comprises the steps of compressing a piece to be encrypted to obtain a data stream, carrying out first-order encryption on the data stream to obtain a first-order encryption piece, carrying out secondary compression on the first-order encryption piece to obtain a first-order encryption compression piece, carrying out second-order encryption on the first-order encryption compression piece after a timestamp node is obtained, and storing the obtained second-order encryption piece.
As shown in fig. 1, the second-order encryption method includes the following steps:
s1, compressing the piece to be encrypted into data flow, wherein the piece to be encrypted comprises: data needing to be encrypted, a file capable of being compiled and a first decompression password;
s2, performing first-order encryption on the data stream by adopting value length operation to obtain a first-order encryption piece;
s3, compressing the first-order encryption piece to obtain a first-order encryption compression piece;
s4, acquiring and recording the timestamp node;
and S5, performing operation according to the timestamp nodes, selecting one of a plurality of encryption algorithms according to the operation result, and encrypting the first-order encryption compression piece to obtain a directional random encryption key and a second-order encryption piece.
In step S2, the value length calculation includes: reading the length X of the string StrBegin of the data stream to be encrypted, and splitting the string StrBegin into N sections to obtain N sections of sub-strings.
N is a positive integer of 2 or more.
For simplicity of description, the present embodiment is described with N being 2, and so on for the case where N is greater than 2.
Acquiring a random character string with the length of X by using a random number function: StrA.
When X is an odd number, X1 ═ 0.5, (X/2) +0.5, and X2 ═ 0.5.
When X is an even number, X1 ═ X2 ═ X/2 is assumed.
The random string StrB of length X1 and the random string StrC of length X2 are obtained separately using a random function.
The character string StrBegin is divided into two sub-character strings StrD and StrE, wherein the length of the sub-character string StrD is X1, and the length of the sub-character string StrE is X2.
And splicing the random number and the substring in a mode of random number 1+ substring 1+ random number 2+ substring 2+ random number 3 to form a first-stage encryption piece.
In a specific embodiment of the present application, the concatenation is performed by placing the random number of the same length as the string in a middle position and placing the random numbers of the same length as the substring in the remaining positions, e.g., in the order of StrB, StrE, StrA, StrD, StrC, or in the order of StrB, StrD, StrA, StrE, StrC.
The data stream is divided into two parts, and a new data with 5 parts, namely a first-order encryption element, is formed through random numbers, so that the character string is prolonged, and the actual character content is hidden.
In step S5, M encryption algorithms are set, the operation is performed according to the time stamp, one of the encryption algorithms is selected according to the operation result, and the second-order encryption is performed on the compression element of the first-order encryption element.
In this embodiment, M is 5, and so on.
The five encryption algorithms include: reverse order encryption, word-changing encryption, bit-inserting encryption, reverse-changing encryption and splicing encryption.
Wherein, the reverse order encryption: and taking the last bit of the data stream to be encrypted as the first bit and the second last bit as the second bit, and repeating the steps in the same way, completely reversing the sequence and recombining a new character data stream.
For example: before encryption, the following steps are carried out: a23b1h 67; after encryption, the method comprises the following steps: 76h1b32 a.
Word changing and encryption: according to 36-bit operation, orienting + W bit of each bit character in the data stream to be encrypted, if the + W bit exceeds 36 bit, entering circulation, not participating in operation of symbols, and converting capital letters to be in a rear + symbol.
And 2, carrying out binary system: 01
And (5) carrying 10 systems: 0123456789
16, carrying out the following steps: 0123456789ABCDEF
36, carry in the system: 0123456789 ABCDEFGHIJKLMNOPQRSTHWXYZ
For example: before encryption, the following steps are carried out: siH8+74/K2gs3, encrypted as: yon & + da/q &2my 9.
Inserting and encrypting: and splitting the data stream to be encrypted in half, splicing the data stream together in the air, removing the last bit if the data stream is odd, ensuring that the lengths of the left side and the right side of the split data are the same, and supplementing the last bit at the tail after splicing.
For example: before encryption, the following steps are carried out: 0123456789ab, encrypted as: 061728394a5 b.
Reverse encryption: and correspondingly replacing all letters/numbers in the characters from beginning to end in a 36-system corresponding sequence, wherein symbols do not participate in operation, and capital letters are converted and then are + &atthe rear.
For example: before encryption, the following steps are carried out: 0123456789ab, encrypted as: ZYXWVUTSRQPO.
E: splicing and encrypting: taking 10 remainders of the length of the character string of the data stream to be encrypted, intercepting the character string by using the remainders to generate an array, and splicing the array head and tail;
for example: before encryption, the following steps are carried out: 0123456789abc, length 13, remaining 13% 10 to 3, encrypted as: 012c3459ab 678.
And performing second-order encryption on the compression element of the first-order encryption element by adopting one encryption algorithm to obtain a second-order encryption element for storage.
And each file or data needing encryption is encrypted, so that the safety of the data is improved.
Before data is sent, the second-order encryption element needs to be subjected to inverse operation, and after decryption, a data stream is obtained and then sent.
The unencrypted plaintext is stored without decryption. A decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
As shown in fig. 2, the second-order decryption algorithm includes the following steps:
a1, acquiring a second-order encryption piece and a time stamp corresponding to the second-order encryption piece;
a2, acquiring a directional random encryption key corresponding to the second-order encryption according to the timestamp, and decrypting the second-order encryption element to obtain a second-order decrypted ciphertext;
a3, decompressing the second-order decrypted ciphertext to obtain a first-order ciphertext;
a4, operating a value length encryption solution of an indefinite number on a first-order ciphertext to obtain a data stream;
and A5, decompressing the data stream to obtain decompressed plaintext data, a compliable file and a decompressed password.
And decrypting the first compression part again by combining the decompression password of the uncompiled file to obtain the uncompiled file.
And sending the plaintext data, the compilable file and the uncompilable file to the client.
Detailed description of the invention
An embodiment of the present invention provides a data encryption/decryption terminal device for server data storage, where the terminal device in the embodiment includes: a processor, a memory, and a computer program, such as a data encryption and decryption computer program, stored in the memory and executable on the processor, the processor implementing the encryption and decryption steps in embodiment 1 when executing the computer program;
illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used for describing the execution process of the computer program in the data encryption and decryption terminal device for server data storage. For example, the computer program may be divided into a plurality of modules, each module having the following specific functions:
1. the encryption module is used for encrypting the data;
2. and the decryption module is used for decrypting the data.
The data encryption and decryption terminal device for the server data storage can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing devices. The terminal device may include, but is not limited to, a processor, a memory. It will be understood by those skilled in the art that the above examples are merely examples of the data encryption and decryption terminal device of the server data storage, and do not constitute a limitation on the data encryption and decryption terminal device of the server data storage, and may include more or less components than those shown, or combine some components, or different components, for example, the data encryption and decryption terminal device of the server data storage may further include an input and output device, a network access device, a bus, and the like.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor is a control center of the data encryption and decryption terminal device of the server data storage, and various interfaces and lines are used for connecting various parts of the whole terminal device.
The memory may be used for storing the computer programs and/or modules, and the processor may implement the various functions of the terminal device by running or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the mobile phone, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Detailed description of the preferred embodiment
The integrated module/unit of the data encryption and decryption terminal device for server data storage can be stored in a computer readable storage medium if the module/unit is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The embodiments of the present invention are preferred embodiments of the present invention, and the scope of the present invention is not limited by these embodiments, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.
Claims (11)
1. A data encryption and decryption method for server data storage is characterized by comprising the following steps: after data or files enter a server to perform corresponding operation, according to the type of the data or files, a second-order encryption mode is adopted for an encrypted piece, wherein the encrypted piece comprises the data to be encrypted, a file capable of being compiled and a first decompression password, in the first-order encryption process, a data stream is split into a plurality of sub-data streams, a random number with the same length as the data stream and random numbers with the same length as each sub-data stream are obtained by utilizing a random function, the random numbers are added among the sub-data streams and before and after the sub-data streams to form a new data stream, the new data stream is compressed, a time stamp node is obtained, and a time stamp is recorded; in the second-order encryption process, operation is carried out according to the time stamp, one of M encryption algorithms is selected as a second-order encryption algorithm according to the operation result, wherein M is a positive integer larger than 1, the compressed new data stream is encrypted, and an encrypted piece is obtained and stored; before the data or file needs to be sent, the encrypted piece is decrypted.
2. The data encryption and decryption method for server data storage according to claim 1, wherein: according to the data or file type, compressing the non-compilable file to obtain a first compression piece, setting a first decompression password, and encrypting the first decompression password by adopting a second-order encryption mode; encrypting data to be encrypted and stored and a file which can be compiled by adopting a second-order encryption mode; and storing the plaintext which does not need to be encrypted without encryption.
3. The data encryption and decryption method for server data storage according to claim 1, wherein: and compressing the piece to be encrypted to obtain the data stream.
4. The data encryption and decryption method for server data storage according to claim 1, wherein: in the first-order encryption process, a value length encryption algorithm is adopted, the length of a data stream to be encrypted is used as a pointer, the data stream string is divided into N sections, N sub-data streams are formed, a first random number is added at the beginning of a first sub-data stream in a mode of interval between the random number and the sub-data streams, random numbers are added between every two adjacent sub-data streams, and an N +1 th random number is added at the end of an Nth sub-data stream.
5. The data encryption and decryption method for server data storage according to claim 1, wherein: acquiring the length X of a data stream, splitting the data stream into two sub-data streams StrD and StrE, acquiring a random character string StrA with the length X by using a random number function, dividing the X into two parts of X1 and X2, and acquiring two random character strings StrB and StrC with the length X1 or X2 by using the random number function at the same time according to the length of X1 or X2; and placing the random number with the same length as the data stream at the middle position, placing the random numbers with the same length as the sub-data stream at the other positions, and splicing StrB, StrE, StrA, StrD and StrC or splicing StrB, StrD, StrA, StrE and StrC to obtain a first-stage encryption element.
6. The data encryption and decryption method for server data storage according to claim 5, wherein: when X is an odd number, X1 = (X ⁄ 2) -0.5, X2 = (X ⁄ 2) + 0.5; when in use
X1 = X2 = X ⁄ 2 when X is even; the splicing sequence comprises StrB, StrE, StrA, StrD, StrC, or StrB, StrD, StrA, StrE, StrC.
7. The data encryption and decryption method for server data storage according to claim 1, wherein: the encryption algorithm comprises reverse encryption or/and word-changing encryption or/and bit-inserting encryption or/and reverse encryption or/and splicing encryption.
8. The data encryption and decryption method for server data storage according to claim 2, wherein: the decryption includes: storing the unencrypted plaintext without decrypting; a decryption algorithm is adopted for the compressed file to obtain a first decompression password, and the first compression part is combined with the first decompression password for decryption; and decrypting the encrypted part by adopting a decryption algorithm to obtain a decrypted part.
9. The data encryption and decryption method for server data storage according to claim 8, wherein: the decryption algorithm comprises: the method comprises the steps of obtaining a second-order encryption piece and a time stamp corresponding to the second-order encryption piece, obtaining a second-order random encryption key according to the time stamp, decrypting the second-order encryption piece to obtain a second-order decrypted ciphertext, decompressing the second-order decrypted ciphertext to obtain a first-order ciphertext, performing decryption operation on the first-order ciphertext to obtain a data stream, and decompressing to obtain plaintext data.
10. A computer-readable storage medium characterized by: the storage medium having stored thereon a computer program which, when executed, implements the method of any of claims 1-9.
11. A data encryption/decryption terminal device for server data storage, comprising a processor, a memory, said memory storing a computer program capable of running on said processor, said processor being capable of implementing the method according to any one of claims 1 to 9 when executing said computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535149.1A CN112714112B (en) | 2020-12-22 | 2020-12-22 | Data encryption and decryption method for server data storage, storage medium and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535149.1A CN112714112B (en) | 2020-12-22 | 2020-12-22 | Data encryption and decryption method for server data storage, storage medium and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112714112A CN112714112A (en) | 2021-04-27 |
CN112714112B true CN112714112B (en) | 2022-05-17 |
Family
ID=75543642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011535149.1A Active CN112714112B (en) | 2020-12-22 | 2020-12-22 | Data encryption and decryption method for server data storage, storage medium and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112714112B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114401288A (en) * | 2021-12-28 | 2022-04-26 | 四川瑞霆智汇科技有限公司 | Low-power-consumption access system and method based on edge Internet of things agent and storage medium thereof |
CN114598470B (en) * | 2022-03-17 | 2023-12-19 | 北京启明星辰信息安全技术有限公司 | Encryption method, decryption method, device, and computer-readable storage medium |
CN114629649B (en) * | 2022-05-10 | 2022-09-13 | 深圳市搜了网络科技股份有限公司 | Data processing method and device based on cloud computing and storage medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060036852A1 (en) * | 2004-08-16 | 2006-02-16 | Kwok-Yan Leung | Byte-based data-processing device and the processing method thereof |
CN101621677A (en) * | 2008-06-30 | 2010-01-06 | 北京中星微电子有限公司 | Method, device and system for multi-level encryption and decryption of audios and videos for monitoring |
CN104268480A (en) * | 2014-10-10 | 2015-01-07 | 重庆邮电大学 | XML (extensive markup language) configuration file security protection processing method and system |
CN105574424B (en) * | 2014-10-16 | 2018-10-16 | 中国移动通信集团广东有限公司 | A kind of big data encrypting and deciphering processing method and system |
CN106612264A (en) * | 2015-10-26 | 2017-05-03 | 广州市动景计算机科技有限公司 | Method and device for acquiring file decompression password |
JP2017005682A (en) * | 2016-02-16 | 2017-01-05 | 国立大学法人京都大学 | Data processing device, data transmission method, computer program and data server |
CN111698253A (en) * | 2020-06-13 | 2020-09-22 | 郑州智利信信息技术有限公司 | Computer network safety system |
CN111917555B (en) * | 2020-07-13 | 2024-03-15 | 上海明略人工智能(集团)有限公司 | Data processing method and device |
-
2020
- 2020-12-22 CN CN202011535149.1A patent/CN112714112B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112714112A (en) | 2021-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112714112B (en) | Data encryption and decryption method for server data storage, storage medium and terminal equipment | |
Souyah et al. | An image encryption scheme combining chaos-memory cellular automata and weighted histogram | |
KR100415410B1 (en) | Encryption device and method, arithmetic unit, and decryption device and method | |
AU767323B2 (en) | Block encryption device using auxiliary conversion | |
US8504845B2 (en) | Protecting states of a cryptographic process using group automorphisms | |
CN108173640B (en) | High-security symmetric encryption and decryption method for character strings | |
US10419207B2 (en) | Cryptographic apparatuses and methods for encrypting and decrypting data using automata | |
CN110768785A (en) | Encoding and decoding methods, related devices and computer equipment | |
US11329799B2 (en) | Calculation device for encryption using public key and encryption method thereof | |
CN114221766B (en) | Data encryption method, data decryption method and data encryption device | |
JP6044738B2 (en) | Information processing apparatus, program, and storage medium | |
CN116961958A (en) | Data encryption method and device, electronic equipment and storage medium | |
Chen et al. | Image encryption using progressive cellular automata substitution and SCAN | |
CN113282947A (en) | Data encryption method and device based on SM4 algorithm and computer platform | |
CN116318660B (en) | Message expansion and compression method and related device | |
CN110515591B (en) | Random number generation method and device based on block chain | |
CN114390317B (en) | Encryption method and system for streaming video | |
RU2708439C1 (en) | Computing device and method | |
Cusack et al. | Using graphic methods to challenge cryptographic performance | |
Zhou et al. | Joint security and performance enhancement for secure arithmetic coding | |
CN111342951B (en) | Method and device for generating stream cipher system and terminal equipment | |
Chou | McBits revisited: toward a fast constant-time code-based KEM | |
Pal et al. | A random block length based cryptosystem through multiple cascaded permutation-combinations and chaining of blocks | |
CN116484407B (en) | Data security protection method and device, electronic equipment and storage medium | |
WO2022239163A1 (en) | Authenticated encryption device, authenticated decryption device, authenticated cryptograph system, method and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |