CN113037487A - File encryption data processing method and device - Google Patents

File encryption data processing method and device Download PDF

Info

Publication number
CN113037487A
CN113037487A CN202110266570.5A CN202110266570A CN113037487A CN 113037487 A CN113037487 A CN 113037487A CN 202110266570 A CN202110266570 A CN 202110266570A CN 113037487 A CN113037487 A CN 113037487A
Authority
CN
China
Prior art keywords
bit stream
file
sequence
determining
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110266570.5A
Other languages
Chinese (zh)
Inventor
罗亚明
王亚新
金潇泽
杨洁琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110266570.5A priority Critical patent/CN113037487A/en
Publication of CN113037487A publication Critical patent/CN113037487A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a file encrypted data processing method and a device, which can also be used in the financial field, and the method comprises the following steps: shifting encrypted files obtained by encrypting the same file by different encryption algorithms to obtain shifted bit stream sequences; performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing; determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value; the method and the device can accurately determine the encryption effect of different encryption algorithms on the same file, and can visually perform quantitative comparison, so that the optimal encryption algorithm is determined.

Description

File encryption data processing method and device
Technical Field
The application relates to the field of information security and can also be used in the field of finance, in particular to a method and a device for processing file encrypted data.
Background
In the file transmission process, in order to prevent a malicious third party from obtaining information, an encryption algorithm is usually used to encrypt a file. And combining the key generated by the grouping and sequence encryption algorithm with the original text to obtain the encrypted file. Generally, encrypted files have a certain degree of randomness and cannot be cracked in a short time by means of brute force exhaustion and other methods. The security of the encrypted file depends on the degree of randomness. To measure the randomness of data, the current mainstream method is to simply judge whether the data has randomness according to the NIST randomness test result. The method only depends on the test result, and can only judge whether the group of data has randomness, and a more intuitive scale is lacked to evaluate the specific degree of randomness, so that the quality of the encryption effect of different encryption algorithms for the same file after encryption is difficult to judge in the prior art.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a file encryption data processing method and device, which can accurately determine the encryption effect of different encryption algorithms on the same file, and can visually perform quantitative comparison, so as to determine the optimal encryption algorithm.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides a file encryption data processing method, including:
shifting encrypted files obtained by encrypting the same file by different encryption algorithms to obtain shifted bit stream sequences;
performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing;
and determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
Further, the shifting the encrypted file obtained by encrypting the same file by using different encryption algorithms to obtain a shifted bit stream sequence includes:
converting encrypted files obtained by encrypting the same file by different encryption algorithms into corresponding bit stream sequences;
and shifting each bit stream sequence according to a set shift length to obtain a shifted bit stream sequence.
Further, the performing sequence segmentation processing on each bit stream sequence and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence after the segmentation processing includes:
performing sequence segmentation processing on each bit stream sequence according to a set sequence length to obtain a plurality of bit stream subsequences with fixed lengths;
and carrying out probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determining corresponding probability statistical distribution according to the probability statistical result of each bit stream subsequence.
Further, the determining an optimal encryption algorithm according to the complexity quantization value includes:
and determining the encryption algorithm adopted by the encryption file with the maximum complexity quantization value as the optimal encryption algorithm.
In a second aspect, the present application provides a file encryption data processing apparatus, comprising:
the shift processing module is used for shifting encrypted files obtained by encrypting the same file by different encryption algorithms to obtain shifted bit stream sequences;
the segmentation statistical module is used for carrying out sequence segmentation processing on each bit stream sequence and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence after the segmentation processing;
and the information entropy calculation module is used for determining the complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
Further, the shift processing module includes:
the sequence conversion unit is used for converting encrypted files obtained by encrypting the same file by different encryption algorithms into corresponding bit stream sequences;
and the sequence shifting unit is used for shifting each bit stream sequence according to a set shifting length to obtain a shifted bit stream sequence.
Further, the segment statistics module comprises:
a sequence segmentation unit, configured to perform sequence segmentation processing on each bit stream sequence according to a set sequence length to obtain multiple bit stream subsequences with fixed lengths;
and the probability statistical unit is used for carrying out probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determining corresponding probability statistical distribution according to the probability statistical result of each bit stream subsequence.
Further, the information entropy calculation module comprises:
and the optimal determining unit is used for determining the encryption algorithm adopted by the encrypted file with the maximum complexity quantization value as the optimal encryption algorithm.
In a third aspect, the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the file encryption data processing method when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the file encryption data processing method described herein.
According to the technical scheme, the file encryption data processing method and device are characterized in that shift operation amplification statistical distribution characteristics are introduced through information entropy quantization indexes, and the encryption security of different encryption algorithms for the same file is rapidly judged, so that the optimal encryption algorithm is determined, and the security quality of data is effectively guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for processing encrypted file data according to an embodiment of the present application;
FIG. 2 is a second flowchart illustrating a file encryption data processing method according to an embodiment of the present application;
FIG. 3 is a third flowchart illustrating a file encryption data processing method according to an embodiment of the present application;
FIG. 4 is a diagram showing one of the structures of a file encryption data processing apparatus according to the embodiment of the present application;
FIG. 5 is a second block diagram of a file encryption data processing apparatus according to an embodiment of the present application;
FIG. 6 is a third block diagram of a file encryption data processing apparatus according to an embodiment of the present application;
FIG. 7 is a fourth block diagram of a file encryption data processing apparatus according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a shift process in an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In consideration of the problem that the encryption effect of different encryption algorithms for the same file after encryption is difficult to judge in the prior art, the application provides a file encryption data processing method and device.
In order to accurately determine the encryption effects of different encryption algorithms on the same file and visually perform quantitative comparison, so as to determine an optimal encryption algorithm, the present application provides an embodiment of a file encryption data processing method, which specifically includes the following contents, with reference to fig. 1:
step S101: and shifting the encrypted files obtained by encrypting the same file by different encryption algorithms to obtain a shifted bit stream sequence.
Optionally, the present application may convert an encrypted file obtained by encrypting a same file by using different encryption algorithms into a bit stream sequence, and then shift the bit stream sequence to the right or left, see fig. 8, to obtain a plurality of shifted bit stream sequences, and by introducing a shift operation, the present application may amplify the statistical distribution characteristics.
Step S102: and performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing.
Optionally, the present application may perform sequence segmentation processing on each bit stream sequence according to different preset shift lengths to obtain a plurality of bit stream subsequences, and it can be understood that, compared with an original sequence, bit stream subsequences after shifting are only initially different, and theoretically, there is no difference in statistical distribution characteristics.
Optionally, the present application may perform probability statistics on the segmented bit stream subsequences according to different probability measures (e.g., true probability measure P measure, risk neutral measure Q measure), and converge the phase space of the data, so that the data can be relatively and intensively characterized in a fixed range.
Step S103: and determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
Optionally, the probability statistical distribution obtained by the method can be used as input, the preset information entropy calculation formula is substituted, and the information entropy is calculated.
From the above description, it can be known that the file encryption data processing method provided in the embodiment of the present application can introduce the shift operation amplification statistical distribution feature through the information entropy quantization index, and perform relatively fast discrimination on the security of different encryption algorithms for the same file encryption, thereby determining an optimal encryption algorithm and effectively ensuring the security quality of data.
In order to enlarge the statistical distribution characteristic, in an embodiment of the file encryption data processing method of the present application, referring to fig. 2, the step S101 may further include the following steps:
step S201: and converting encrypted files obtained by encrypting the same file by different encryption algorithms into corresponding bit stream sequences.
Optionally, the present application may perform sequence segmentation processing on each bit stream sequence according to different preset shift lengths to obtain a plurality of bit stream subsequences, and it can be understood that, compared with an original sequence, bit stream subsequences after shifting are only initially different, and theoretically, there is no difference in statistical distribution characteristics.
Step S202: and shifting each bit stream sequence according to a set shift length to obtain a shifted bit stream sequence.
Optionally, the present application may convert an encrypted file obtained by encrypting a same file by using different encryption algorithms into a bit stream sequence, and then shift the bit stream sequence to the right or left, see fig. 8, to obtain a plurality of shifted bit stream sequences, and by introducing a shift operation, the present application may amplify the statistical distribution characteristics.
In order to reduce file analysis consumption, in an embodiment of the file encryption data processing method of the present application, referring to fig. 3, the step S102 may further include the following steps:
step S301: and carrying out sequence segmentation processing on each bit stream sequence according to the set sequence length to obtain a plurality of bit stream subsequences with fixed length.
Step S302: and carrying out probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determining corresponding probability statistical distribution according to the probability statistical result of each bit stream subsequence.
Optionally, the present application may perform probability statistics on the segmented bit stream subsequences according to different probability measures (e.g., true probability measure P measure, risk neutral measure Q measure), and converge the phase space of the data, so that the data can be relatively and intensively characterized in a fixed range.
For example, taking all the bit stream sequences obtained in step S101 as input, performing a segmentation operation according to a fixed length m to obtain a plurality of subsequences with a length of m, then performing statistics on each subsequence, counting the number of occurrences of "1" in the sequence, which is denoted as Pi, according to the definition of the value of m, limiting the Pi phase space to be 0 ≦ p ≦ m, combining the plurality of subsequences to obtain the statistical distribution of the sequence, and combining the original 01-bit sequence to obtain m statistical distributions.
Meanwhile, each subsequence is counted, the number of continuous 01 occurrences in the sequence is counted and recorded as qi, and the statistics is carried out according toDefinition of the value of m, the phase space of qi is limited to
Figure BDA0002970013190000061
In the above, a plurality of sub-sequences are combined to obtain statistical distribution of the sequence, and m statistical distributions are obtained by combining the original 01-bit sequence.
In order to accurately represent the encryption complexity, in an embodiment of the file encryption data processing method of the present application, the step S103 may further include the following steps:
the encryption algorithm adopted by the encryption file with the largest complexity quantization value is determined as the optimal encryption algorithm, so that the optimal encryption algorithm is used as a basis for transverse comparison among different encryption algorithms, the same file is used, different encryption algorithms can obtain different quantization values, visual comparison is carried out, a reference basis is provided for technical model selection of the encryption algorithms, and the statistical result is relatively limited to a level due to the fact that the information entropy method has certain stability.
In order to accurately determine the encryption effect of different encryption algorithms on the same file and visually perform quantitative comparison to determine the optimal encryption algorithm, the present application provides an embodiment of a file encryption data processing apparatus for implementing all or part of the contents of the file encryption data processing method, and referring to fig. 4, the file encryption data processing apparatus specifically includes the following contents:
and the shift processing module 10 is configured to shift encrypted files obtained by encrypting the same file by using different encryption algorithms to obtain a shifted bit stream sequence.
And a segmentation statistical module 20, configured to perform sequence segmentation processing on each bit stream sequence, and determine corresponding probability statistical distribution according to different probability measures and each bit stream subsequence after the segmentation processing.
And the information entropy calculation module 30 is configured to determine a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determine an optimal encryption algorithm according to the complexity quantization value.
From the above description, it can be known that the file encryption data processing apparatus provided in the embodiment of the present application can introduce the shift operation amplification statistical distribution feature through the information entropy quantization index, and perform relatively fast discrimination on the security of different encryption algorithms for the same file encryption, thereby determining an optimal encryption algorithm and effectively ensuring the security quality of data.
In order to be able to enlarge the statistical distribution characteristic, in an embodiment of the file encryption data processing apparatus of the present application, referring to fig. 5, the shift processing module 10 includes:
and the sequence conversion unit 11 is configured to convert an encrypted file obtained by encrypting the same file with different encryption algorithms into a corresponding bit stream sequence.
A sequence shifting unit 12, configured to perform shifting processing on each bit stream sequence according to a set shifting length to obtain a shifted bit stream sequence.
In order to reduce file analysis consumption, in an embodiment of the file encryption data processing apparatus of the present application, referring to fig. 6, the segment statistics module 20 includes:
a sequence segmentation unit 21, configured to perform sequence segmentation processing on each bit stream sequence according to a set sequence length to obtain multiple bit stream subsequences with fixed lengths.
And the probability statistical unit 22 is configured to perform probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determine corresponding probability statistical distribution according to a probability statistical result of each bit stream subsequence.
In order to accurately characterize the encryption complexity, in an embodiment of the file encryption data processing apparatus of the present application, referring to fig. 7, the information entropy calculation module 30 includes:
and an optimal determining unit 31, configured to determine an encryption algorithm used by the encrypted file with the largest complexity quantization value as an optimal encryption algorithm.
In terms of hardware, in order to accurately determine the encryption effects of different encryption algorithms on the same file and visually perform quantitative comparison to determine an optimal encryption algorithm, the present application provides an embodiment of an electronic device for implementing all or part of the contents in the file encryption data processing method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the file encryption data processing device and relevant equipment such as a core service system, a user terminal, a relevant database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the logic controller may refer to the embodiment of the file encrypted data processing method and the embodiment of the file encrypted data processing apparatus in the embodiment for implementation, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), an in-vehicle device, a smart wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the file encryption data processing method may be executed on the electronic device side as described above, or all operations may be completed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that is communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
Fig. 9 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 9, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this fig. 9 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the file encryption data processing method function may be integrated into the central processing unit 9100.
The central processor 9100 may be configured to control as follows:
step S101: and shifting the encrypted files obtained by encrypting the same file by different encryption algorithms to obtain a shifted bit stream sequence.
Step S102: and performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing.
Step S103: and determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
From the above description, it can be known that, in the electronic device provided in the embodiment of the present application, the shift operation amplification statistical distribution feature is introduced through the information entropy quantization index, and the security of different encryption algorithms for the same file encryption is rapidly determined, so that the optimal encryption algorithm is determined, and the security quality of data is effectively ensured.
In another embodiment, the file encrypted data processing apparatus may be configured separately from the central processing unit 9100, for example, the file encrypted data processing apparatus may be configured as a chip connected to the central processing unit 9100, and the file encrypted data processing method function may be realized by the control of the central processing unit.
As shown in fig. 9, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 9; in addition, the electronic device 9600 may further include components not shown in fig. 9, which may be referred to in the prior art.
As shown in fig. 9, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the file encryption data processing method whose execution subject is the server or the client in the foregoing embodiments, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements all the steps in the file encryption data processing method whose execution subject is the server or the client in the foregoing embodiments, for example, when the processor executes the computer program, the processor implements the following steps:
step S101: and shifting the encrypted files obtained by encrypting the same file by different encryption algorithms to obtain a shifted bit stream sequence.
Step S102: and performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing.
Step S103: and determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
As can be seen from the above description, the computer-readable storage medium provided in the embodiment of the present application introduces shift operation amplification statistical distribution characteristics through information entropy quantization indexes, and performs relatively fast discrimination on the encryption security of different encryption algorithms for the same file, so as to determine an optimal encryption algorithm, and effectively ensure the security quality of data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for processing file encryption data, the method comprising:
shifting encrypted files obtained by encrypting the same file by different encryption algorithms to obtain shifted bit stream sequences;
performing sequence segmentation processing on each bit stream sequence, and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence subjected to segmentation processing;
and determining a complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
2. The method for processing the file encryption data according to claim 1, wherein shifting different encryption algorithms for the encrypted file obtained by encrypting the same file to obtain a shifted bit stream sequence comprises:
converting encrypted files obtained by encrypting the same file by different encryption algorithms into corresponding bit stream sequences;
and shifting each bit stream sequence according to a set shift length to obtain a shifted bit stream sequence.
3. The method according to claim 1, wherein said performing sequence segmentation processing on each of the bit stream sequences and determining a corresponding probability statistical distribution according to different probability measures and each of the bit stream subsequences after the segmentation processing comprises:
performing sequence segmentation processing on each bit stream sequence according to a set sequence length to obtain a plurality of bit stream subsequences with fixed lengths;
and carrying out probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determining corresponding probability statistical distribution according to the probability statistical result of each bit stream subsequence.
4. The method for processing the encrypted data of the file according to claim 1, wherein the determining the optimal encryption algorithm according to the quantization value of the complexity comprises:
and determining the encryption algorithm adopted by the encryption file with the maximum complexity quantization value as the optimal encryption algorithm.
5. A file encryption data processing apparatus, comprising:
the shift processing module is used for shifting encrypted files obtained by encrypting the same file by different encryption algorithms to obtain shifted bit stream sequences;
the segmentation statistical module is used for carrying out sequence segmentation processing on each bit stream sequence and determining corresponding probability statistical distribution according to different probability measures and each bit stream subsequence after the segmentation processing;
and the information entropy calculation module is used for determining the complexity quantization value of each encrypted file according to the probability statistical distribution and a preset information entropy calculation model, and determining an optimal encryption algorithm according to the complexity quantization value.
6. The file encryption data processing apparatus according to claim 5, wherein the shift processing module comprises:
the sequence conversion unit is used for converting encrypted files obtained by encrypting the same file by different encryption algorithms into corresponding bit stream sequences;
and the sequence shifting unit is used for shifting each bit stream sequence according to a set shifting length to obtain a shifted bit stream sequence.
7. The file encryption data processing apparatus according to claim 5, wherein the segment statistics module comprises:
a sequence segmentation unit, configured to perform sequence segmentation processing on each bit stream sequence according to a set sequence length to obtain multiple bit stream subsequences with fixed lengths;
and the probability statistical unit is used for carrying out probability statistics on each bit stream subsequence according to a preset true probability measure and a preset risk neutral measure, and determining corresponding probability statistical distribution according to the probability statistical result of each bit stream subsequence.
8. The file encrypted data processing apparatus according to claim 5, wherein the information entropy calculation module includes:
and the optimal determining unit is used for determining the encryption algorithm adopted by the encrypted file with the maximum complexity quantization value as the optimal encryption algorithm.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the file encryption data processing method according to any one of claims 1 to 4 are implemented when the processor executes the program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the file encryption data processing method according to any one of claims 1 to 4.
CN202110266570.5A 2021-03-10 2021-03-10 File encryption data processing method and device Pending CN113037487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110266570.5A CN113037487A (en) 2021-03-10 2021-03-10 File encryption data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110266570.5A CN113037487A (en) 2021-03-10 2021-03-10 File encryption data processing method and device

Publications (1)

Publication Number Publication Date
CN113037487A true CN113037487A (en) 2021-06-25

Family

ID=76470303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110266570.5A Pending CN113037487A (en) 2021-03-10 2021-03-10 File encryption data processing method and device

Country Status (1)

Country Link
CN (1) CN113037487A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113626846A (en) * 2021-08-23 2021-11-09 中国银行股份有限公司 Encryption mode identification method and device and storage medium
CN115033888A (en) * 2022-06-21 2022-09-09 苏州浪潮智能科技有限公司 Entropy-based firmware encryption detection method and device, computer equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195773A (en) * 2010-03-03 2011-09-21 中国人民解放军信息工程大学 Method and system for analyzing block cipher algorithm
WO2013078556A1 (en) * 2011-11-30 2013-06-06 Certicom Corp. Assessing cryptographic entropy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195773A (en) * 2010-03-03 2011-09-21 中国人民解放军信息工程大学 Method and system for analyzing block cipher algorithm
WO2013078556A1 (en) * 2011-11-30 2013-06-06 Certicom Corp. Assessing cryptographic entropy

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗亚明: "基于变值测量的随机序列平稳随机性研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113626846A (en) * 2021-08-23 2021-11-09 中国银行股份有限公司 Encryption mode identification method and device and storage medium
CN115033888A (en) * 2022-06-21 2022-09-09 苏州浪潮智能科技有限公司 Entropy-based firmware encryption detection method and device, computer equipment and medium
CN115033888B (en) * 2022-06-21 2024-06-25 苏州浪潮智能科技有限公司 Firmware encryption detection method and device based on entropy, computer equipment and medium

Similar Documents

Publication Publication Date Title
CN113037487A (en) File encryption data processing method and device
CN113079139B (en) Block chain-based consensus group master node determination method, device and system
CN112784112A (en) Message checking method and device
CN111931209A (en) Contract information verification method and device based on zero knowledge certification
CN110719526B (en) Video playing method and device
CN113055184B (en) Data encryption and decryption method and device
CN113487423A (en) Personal credit risk prediction model training method and device
CN113051592A (en) File encryption method and device, electronic equipment and storage medium
CN112242978B (en) Method and device for processing data
CN115422584A (en) Data deformation method and device
CN112948815A (en) Off-line weak password checking method and device based on Hash matching
CN113032825A (en) File encrypted data visualization processing method and device
CN113158259A (en) Block chain integrity verification method and device
CN115833847B (en) Polar code decoding method, polar code decoding device, communication equipment and storage medium
CN113538129B (en) Cross-organization privacy query request method and device
CN115187298A (en) Cross-system processing method and device of private data
CN113297587B (en) Data storage method and system
CN114915490B (en) Communication method, apparatus, computer device, storage medium, and program product
CN113342501A (en) System fault processing method and device
CN112866254A (en) Method, terminal and system for obtaining common clients
CN113596636A (en) Optical network unit (DPU) equipment management method and device
CN113191885A (en) Loan collaborative decision method, device and system
CN113420266A (en) Computer system integrated software protection method and device
CN114550726A (en) Voiceprint information processing method and device
CN113705830A (en) Data processing method and device based on DPU

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210625

RJ01 Rejection of invention patent application after publication