CN113726725A - Data encryption and decryption method and device, electronic equipment and storage medium - Google Patents

Data encryption and decryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113726725A
CN113726725A CN202011598550.XA CN202011598550A CN113726725A CN 113726725 A CN113726725 A CN 113726725A CN 202011598550 A CN202011598550 A CN 202011598550A CN 113726725 A CN113726725 A CN 113726725A
Authority
CN
China
Prior art keywords
key
data
encryption
decryption
generated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011598550.XA
Other languages
Chinese (zh)
Inventor
王红斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202011598550.XA priority Critical patent/CN113726725A/en
Publication of CN113726725A publication Critical patent/CN113726725A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data encryption and decryption method, a device, electronic equipment and a storage medium, wherein the data encryption method comprises the step of executing data encryption at a client, and the data encryption step comprises the following steps: randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key; encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side; wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm. The invention adopts a mode of combining a symmetric encryption algorithm and an asymmetric encryption algorithm, and the encryption key of data transmission is randomly generated when the client runs, thereby realizing the security and the high efficiency of data encryption.

Description

Data encryption and decryption method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data encryption technologies, and in particular, to a data encryption and decryption method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development and popularization of networks, data transmitted on the networks grows in geometric progression. With increasing emphasis on privacy, security of data transmission is important. At present, the processing mode of transmitting data on the network by many applications is as follows: (1) without encryption, plaintext transmission is used; (2) the identity authentication information such as a login password and the like is encrypted by using a hashing mode such as MD5 (English: MD5 Message-Digest Algorithm, Chinese: MD5 information Digest Algorithm) and the like, and the rest is transmitted by using plaintext; (3) using symmetric encryption, the encrypted key is stored in the client after being encrypted; (4) asymmetric encryption is used.
If the data transmission is encrypted by using a symmetric algorithm, the key is easy to crack locally because the key is stored in the client, and the key is fixed and invariable because the data transmission uses the symmetric encryption, so that the key leakage is easy to occur, and the historical transmission data can be decrypted after the key leakage. If the data transmission is encrypted by using an asymmetric algorithm, the performance is poor, and bidirectional encryption cannot be performed.
Disclosure of Invention
The invention provides a data encryption and decryption method, a data encryption and decryption device, electronic equipment and a storage medium, which are used for solving the problems that in the prior art, data transmission is easy to leak due to the fact that a secret key is fixed and unchanged when symmetric encryption is used, and low performance and bidirectional encryption cannot be achieved when asymmetric encryption is used.
The invention provides a data encryption method, which comprises a step of executing data encryption at a client, wherein the data encryption step comprises the following steps:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
According to a data encryption method of the present invention, before the step of randomly generating the first key is performed, the method includes:
and acquiring the second key generated by the server, wherein the second key is stored in the server.
According to the data encryption method, the obtaining of the second key generated by the server side includes:
and acquiring the second key generated by the server side by using an asymmetric encryption algorithm (RSA), wherein the second key comprises a public key for encryption and a private key for decryption.
According to a data encryption method of the present invention, the randomly generating a first key includes:
before a client initiates a request each time, the first secret key is randomly generated by using a symmetric encryption algorithm AES;
and caching the first key at the client.
The invention provides a data decryption method, which comprises a step of executing data decryption at a server side, wherein the step of executing data decryption comprises the following steps:
decrypting the third key by using the second key to obtain a first key;
decrypting the first encrypted data by using the first key to obtain data to be encrypted;
the second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
According to the data decryption method, the second secret key is generated by using an asymmetric encryption algorithm (RSA), and comprises a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
The invention provides a data encryption and decryption method, which comprises the steps of executing data encryption at a client side and/or executing data decryption at a server side, wherein,
the data encryption step comprises:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
the data decryption step includes:
decrypting the third key by using the second key to obtain the first key;
decrypting the first encrypted data by using the first key to obtain the data to be encrypted;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
According to a data encryption and decryption method provided by the present invention, after the decrypting the encrypted data by using the first key to obtain the data to be encrypted, the method comprises:
receiving second encrypted data returned by the server, wherein the second encrypted data is obtained by processing request data initiated by the client by the server and encrypting the processed response data by using the first key;
decrypting the second encrypted data using the first key.
According to a data encryption and decryption method provided by the invention, before the step of randomly generating the first key is executed, the method comprises the following steps:
and acquiring the second key generated by the server, wherein the second key is stored in the server.
According to the data encryption and decryption method provided by the invention, the acquiring the second key generated by the server side comprises the following steps:
and acquiring the second key generated by the server side by using an asymmetric encryption algorithm (RSA), wherein the second key comprises a public key for encryption and a private key for decryption.
According to a data encryption and decryption method provided by the present invention, the randomly generating a first key includes:
before a client initiates a request each time, the first secret key is randomly generated by using a symmetric encryption algorithm AES;
and caching the first key at the client.
The invention provides a data encryption device, which comprises an encryption module for executing a data encryption step at a client, wherein the encryption module is used for randomly generating a first key, encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key, encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to the server end; wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
According to the data encryption device, the second secret key is generated by using an asymmetric encryption algorithm (RSA), and comprises a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
The invention provides a data decryption device, which comprises a decryption module for executing a data decryption step at a server side, wherein the decryption module is used for decrypting a third key by using a second key to obtain a first key and decrypting first encrypted data by using the first key to obtain data to be encrypted;
the second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
According to the data decryption device, the second secret key is generated by using an asymmetric encryption algorithm (RSA), and comprises a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
The invention provides a data encryption and decryption device, which comprises an encryption module for executing data encryption step at a client side and/or a decryption module for executing data decryption step at a server side, wherein,
the encryption module is used for randomly generating a first key, encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key, encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to the server end;
the decryption module is used for decrypting the third key by using the second key to obtain the first key and decrypting the first encrypted data by using the first key to obtain the data to be encrypted;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
The data encryption and decryption device provided by the invention further comprises:
and the encryption and decryption module is used for processing request data initiated by the client, encrypting the processed response data by using the first key to obtain second encrypted data, returning the second encrypted data to the client and decrypting the second encrypted data by using the first key.
The data encryption and decryption device provided by the invention further comprises:
and the second key generation module is used for generating the second key at the server side and storing the second key at the server side.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the steps of the data encryption and decryption method.
The present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the data encryption and decryption method as described in any one of the above.
The invention provides a data encryption and decryption method, a data encryption and decryption device, electronic equipment and a storage medium, which are used for solving the problems that in the prior art, data transmission is easy to leak due to the fact that a secret key is fixed and unchanged when the data transmission is carried out, and the problems that low performance and bidirectional encryption cannot be achieved when asymmetric encryption is adopted.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a data encryption method provided by the present invention;
FIG. 2 is a flow chart of a data decryption method provided by the present invention;
FIG. 3 is a flow chart of a data encryption and decryption method provided by the present invention;
FIG. 4 is a flow diagram of response data processing provided by the present invention;
FIG. 5 is a schematic flow chart of generating an RSA public key according to the present invention;
FIG. 6 is a schematic diagram of the RSA encryption and decryption process provided by the present invention;
FIG. 7 is a schematic flow chart of AES key generation provided by the present invention;
FIG. 8 is a schematic diagram of AES encryption and decryption process provided by the present invention
FIG. 9 is a timing diagram illustrating a data encryption/decryption method according to the present invention;
FIG. 10 is a schematic structural diagram of a data encryption/decryption apparatus provided in the present invention;
fig. 11 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and in the claims, and in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprise" and "have," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules expressly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus, wherein the division into blocks presented herein is merely a logical division and may be implemented in a practical application in a different manner, such that multiple blocks may be combined or integrated into another system or some feature vectors may be omitted or not implemented, and such that mutual or direct coupling or communicative coupling between blocks shown or discussed may be through interfaces, and indirect coupling or communicative coupling between blocks may be electrical or other similar, the present invention is not limited to these examples. The modules or sub-modules described as separate parts may or may not be physically separated, may or may not be physical modules, or may be distributed in a plurality of circuit modules, and some or all of the modules may be selected according to actual needs to achieve the purpose of the present invention.
Data encryption means that plaintext is converted into ciphertext through an encryption algorithm and an encryption key, and decryption means that ciphertext is recovered into plaintext through a decryption algorithm and a decryption key, and the core of the data encryption is cryptography. Data encryption is still the most reliable way for computer systems to protect information. The information is encrypted by utilizing a cryptographic technology, so that the information is concealed, and the effect of protecting the safety of the information is achieved.
Common encryption algorithms can be classified into three categories, symmetric encryption algorithms, asymmetric encryption algorithms, and Hash algorithms. Among them, the common symmetric encryption algorithm: DES, 3DES, DESX, Blowfish, IDEA, RC4, RC5, RC6, and AES. Common asymmetric encryption algorithms: RSA, ECC (for mobile devices), Diffie-Hellman, El Gamal, DSA (for digital signatures). The common Hash algorithm: MD2, MD4, MD5, HAVAL, SHA-1, HMAC-MD5, HMAC-SHA 1.
The invention provides a data encryption and decryption method, a data encryption and decryption device, electronic equipment and a storage medium, which are used for solving the problems that in the prior art, data transmission is easy to leak due to the fact that a secret key is fixed and unchanged when symmetric encryption is used, and low performance and bidirectional encryption cannot be achieved when asymmetric encryption is used.
The following describes a data encryption and decryption method, apparatus, electronic device and storage medium provided by the present invention with reference to fig. 1 to 11.
Fig. 1 is a schematic flow chart of a data encryption method provided by the present invention, as shown in the figure. A data encryption method comprising performing a data encryption step at a client, the data encryption step comprising:
step 101, randomly generating a first key, and encrypting the first key by using a second key obtained in advance from a server to obtain a third key.
Optionally, the first key is randomly generated by using a symmetric encryption algorithm AES before the client initiates a request each time, and is cached at the client and called by subsequent encrypted data.
Optionally, the second key is generated by the server side in advance and stored at the server side.
Optionally, the second key is generated by the server side using an asymmetric encryption algorithm RSA, and the second key includes a public key for encryption and a private key for decryption.
And 102, encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server.
Fig. 2 is a schematic flow chart of a data decryption method provided by the present invention, as shown in the figure. A data decryption method, comprising performing a data decryption step at a server side, the data decryption step comprising:
step 201, the third key is decrypted by using the second key to obtain the first key.
Step 202, decrypting the first encrypted data by using the first key to obtain the data to be encrypted.
The second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key.
Optionally, the second key is generated by using an asymmetric encryption algorithm RSA, and the second key includes a public key for encryption and a private key for decryption;
the first key is randomly generated using the symmetric encryption algorithm AES.
Fig. 3 is a schematic flow chart of a data encryption and decryption method provided by the present invention, as shown in the figure. A data encryption and decryption method comprises a data encryption step 310 performed at a client and/or a data decryption step 320 performed at a server, wherein,
the data encryption step 310 includes:
step 311, randomly generating a first key, and encrypting the first key by using a second key obtained in advance from the server to obtain a third key.
Step 312, encrypting the data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to the server.
The data decryption step 320 includes:
step 321, decrypting the third key by using the second key to obtain the first key.
Step 322, decrypting the first encrypted data by using the first key to obtain the data to be encrypted.
In the data encryption and decryption method, the second key in data transmission is stored in the server, the first key is generated by the client when the client initiates a request each time, each client is different, and the first key is randomly changed when the client initiates a request each time, so that the security of data transmission is improved.
The data transmission comprises two parts, wherein one part is actually transmitted data, and first encrypted data is generated after the data transmission is encrypted by using a first key; the other part is a third key which is generated by encrypting the first key by using the second key.
The above steps of the present invention are described below.
Fig. 4 is a flow chart of response data processing provided by the present invention, as shown. After the decrypting of the encrypted data by using the first key is executed to obtain the data to be encrypted, the method comprises the following steps:
step 401, the server processes the request data initiated by the client, and encrypts the processed response data by using the first key to obtain second encrypted data.
Step 402, returning the second encrypted data to the client, and decrypting the second encrypted data by the client using the first key.
The above steps are data transmission of response data returned by a server to a client initiating a request, the data transmission only includes second encrypted data, the second encrypted data is encrypted by using the first key, and the first key is randomly generated by the client and is not stored in the server, so that the encryption keys of the response data returned each time are different, and the security of data transmission is improved.
Fig. 5 is a schematic flow chart of generating an RSA public key according to the present invention, as shown in the figure. Before the step of randomly generating the first key is executed, the method comprises the following steps:
step 501, the server generates the second key.
Optionally, the second key is generated by using an asymmetric encryption algorithm RSA, and the second key includes a public key for encryption and a private key for decryption.
The rsa (rsaalgorithm) encryption algorithm consists of five parts:
(1) text (Message): the information to be encrypted can be numbers, characters, video, audio and the like, and is represented by M.
(2) Ciphertext (cipertext): the information obtained after encryption is denoted by C.
(3) Public Key (Public Key) and Private Key (Private Key), denoted PU and PR.
(4) Encryption algorithm (Encryption): if e (x) is an encryption algorithm, the encryption process may be understood as C ═ e (m), and a ciphertext is obtained according to the original text and the encryption algorithm.
(5) Decryption algorithm (Decryption): if d (x) is a decryption algorithm, the decryption process may be understood as M ═ d (c), and the original text is obtained according to the ciphertext and the decryption algorithm.
Assuming that the client and the server are to perform encrypted communication, the steps of RSA encrypting and decrypting information are as follows:
first, two different prime numbers p, q are randomly selected.
Secondly, p and q are multiplied by each other, and n is represented as p q.
Thirdly, an euler function ψ (n) of n is calculated, and the euler function proves that when p and q are prime numbers which are not the same, ψ (n) is (p-1) × (q-1).
Fourthly, randomly selecting an integer e, and meeting two conditions: ψ (n) is coprime to e, and 1< e < ψ (n).
Fifth, the modulo element d for ψ (n) is calculated e, that is to say one d is found which satisfies ed 1mod ψ (n). This equation is equivalent to ed-1 k ψ (n), which is actually an integer solution of (d, k) for the equation ed-k ψ (n) 1. This equation can be solved using an extended euclidean algorithm.
Sixthly, finally packaging (e, n) into a public key and (d, n) into a private key.
Optionally, the embodiment of the present invention may adopt an asymmetric encryption algorithm RSA-2048, where RSA-2048 has 617 decimal digits and total 2048bits, which is the largest RSA digit at present.
Fig. 6 is a schematic diagram of RSA encryption and decryption provided by the present invention, as shown in the figure. Sender
And encrypting the plaintext P by using a public key through an RSA encryption function to obtain a ciphertext C. And the receiver decrypts by using the private key through an RSA decryption function to obtain the plaintext P.
Step 502, storing the second key at the server side.
Fig. 7 is a schematic flowchart of the AES key generation provided in the present invention, and as shown in the figure, the randomly generating the first key includes:
step 601, before the client initiates a request each time, the first key is randomly generated by using a symmetric encryption algorithm AES.
In AES (english: Advanced Encryption Standard, chinese: Advanced Encryption Standard), the symmetric Encryption algorithm is the same cipher for Encryption and decryption, and the specific Encryption and decryption flow is shown in fig. 8:
(1) a sender:
and encrypting the plaintext P and the key K through an AES encryption function to obtain a ciphertext C for network transmission.
(2) The receiving side:
and decrypting the received ciphertext C through the key K by using an AES decryption function to obtain a plaintext P.
Here, the plaintext P refers to data that has not been encrypted.
The invention encrypts the key through an asymmetric encryption algorithm, and then transmits the key to the opposite side through a network or directly transmits the key to the face-to-face trading volume key. If the secret key is leaked, an attacker can restore the ciphertext and steal confidential data.
Wherein, the AES encryption function: assuming the AES encryption function is E, C is E (K, P), where P is plaintext, K is a secret key, and C is ciphertext. That is, the encryption function E outputs the ciphertext C by inputting the plaintext P and the key K as parameters of the encryption function.
The ciphertext C is data processed by the encryption function.
Wherein the AES decryption function: let AES decrypt function be D, then P ═ D (K, C), where C is ciphertext, K is secret key, and P is plaintext. That is, the ciphertext C and the key K are input as parameters of the decryption function, and the decryption function outputs the plaintext P.
AES is a block cipher that divides the plaintext into groups of equal length, and encrypts one set of data at a time until the entire plaintext is encrypted. In the AES standard specification, the packet length can only be 128 bits, that is, 16 bytes per packet (8 bits per byte). The length of the key may use 128 bits, 192 bits, or 256 bits. The length of the key is different, and the number of encryption rounds is also different, such as AES-128, the length of the key is 128 bits, and the number of encryption rounds is 10 rounds; AES-256, the key length is 128, and the number of encryption rounds is 14.
It should be noted that, the keys used for encryption and decryption of the symmetric encryption algorithm are the same, and the encryption method has very high encryption speed and is suitable for occasions where data is often sent, and the defect is that the transmission of the keys is relatively troublesome. The keys for encryption and decryption of the asymmetric encryption algorithm are different, and the encryption mode is constructed by using a problem which is difficult to solve mathematically, so that the encryption and decryption speed is low generally, the method is suitable for occasions which send data occasionally, and the method has the advantage of convenient key transmission.
The data encryption and decryption method adopts a mode of combining a symmetric encryption algorithm and an asymmetric encryption algorithm for encryption, namely, a key of a symmetric AES algorithm is encrypted through an asymmetric RSA algorithm and transmitted to a receiving party, the receiving party decrypts to obtain the AES key, and then the transmitting party and the receiving party communicate by using the AES key.
Optionally, in data transmission, in order to ensure the integrity and security of data, the invention uses a combination of an asymmetric RSA-2048 algorithm and a symmetric AES-256 algorithm, and includes the following steps:
first, a random AES-256key is generated.
Second, the SHA-256 digest of the file plaintext is computed.
Third, the file is encrypted using AES-256.
Fourthly, carrying out a front operation on the encrypted file. The method comprises the following steps: (1) encrypting the AES-256key by using the RSA-2048 public key of the receiver to ensure that only the specified receiver can recover the corresponding AES-256 key; (2) SHA-256 digest, which the recipient may use to determine to confirm that the received decrypted file is correct.
Step 702, caching the first key at the client so as to decrypt the response data returned by the server.
Fig. 9 is a timing chart of the data encryption and decryption method provided by the present invention, as shown in the figure. The data encryption and decryption method comprises the following steps:
step 1, a client requests a server to obtain an RSA public key from the server, wherein the RSA public key is generated in advance by the server and is stored in the server.
And 2, the server returns the RSA public key to the client, and the client receives the RSA public key sent by the server and temporarily stores the RSA public key to be called when the RSA public key is subsequently encrypted.
And 3, randomly generating a group of AES keys by the client when the client initiates a request, and temporarily storing the AES keys in the client to be called by a subsequent decryption step.
And 4, encrypting the AES key by the client by using the RSA public key to obtain a key encryptedKey.
And step 5, the client encrypts the transmitted data by using the AES key to obtain first encrypted data encryptedData 1.
Optionally, the sequence of the step 4 and the step 5 may be exchanged, which does not affect the implementation of the data encryption and decryption method of the present invention.
And 6, the client sends the key encryptedKey and the first encrypted data encryptedData1 to the server together according to the agreed format.
And step 7, after the server receives the key encryptedKey and the first encrypted data encryptedData1, the server decrypts the key encryptedKey by using an RSA private key to obtain the AES key.
And 8, the server side decrypts the first encrypted data encryptedData1 by using the AES key in the step 7 to obtain plaintext data.
And 9, after the server side processes the request book sent by the client side, encrypting the response data returned to the client side by using the AES key in the step 7 to obtain second encrypted data encryptedData 2.
In step 10, the server side returns the second encrypted data encryptedData2 to the client side.
In step 11, the client decrypts the second encrypted data encryptedData2 returned by the server by using the AES key generated in step 3.
And (3) finishing the interactive request between the client and the server, and repeatedly executing the step 3 to the step 11 when the client sends a request to the server next time.
Therefore, the data encryption and decryption method does not store the encryption key at the client, but randomly generates the encryption key every time when a request is initiated, and combines the performance of data encryption and the security of data transmission by using a mode of combining a symmetric encryption algorithm and an asymmetric encryption algorithm.
The following describes the data encryption and decryption apparatus provided by the present invention, and the data encryption and decryption apparatus described below and the data encryption and decryption method described above may be referred to correspondingly.
Fig. 10 is a schematic structural diagram of a data encryption and decryption apparatus provided by the present invention, as shown in the figure. A data encryption/decryption apparatus 1000 includes an encryption module 1010 for performing a data encryption step at a client and/or a decryption module 1020 for performing a data decryption step at a server, wherein,
the encryption module 1010 is configured to randomly generate a first key, encrypt the first key with a second key that is obtained in advance from a server to obtain a third key, encrypt data to be encrypted with the first key to obtain first encrypted data, and transmit the first encrypted data and the third key to the server.
A decryption module 1020, configured to decrypt the third key with the second key to obtain the first key, and decrypt the first encrypted data with the first key to obtain the data to be encrypted;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
Optionally, the data encryption and decryption apparatus 1000 further includes an encryption and decryption module 1030 and a second key generation module 1040.
The encryption and decryption module 1030 is configured to process request data initiated by the client, encrypt the processed response data using the first key to obtain second encrypted data, return the second encrypted data to the client, and decrypt the second encrypted data using the first key.
The second key generation module 1040 is configured to generate the second key at the server side, and store the second key at the server side.
Based on another embodiment of the present invention, the present invention provides a data encryption apparatus, including an encryption module for performing a data encryption step at a client, where the encryption module is configured to randomly generate a first key, encrypt the first key with a second key obtained in advance at a server to obtain a third key, encrypt data to be encrypted with the first key to obtain first encrypted data, and transmit the first encrypted data and the third key to the server; wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
Optionally, the second key is generated by using an asymmetric encryption algorithm RSA, and the second key includes a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
Based on another embodiment of the present invention, the present invention provides a data decryption apparatus, including a decryption module executing a data decryption step at a server, where the decryption module is configured to decrypt the third key using the second key to obtain the first key, and decrypt the first encrypted data using the first key to obtain the data to be encrypted;
the second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
Optionally, the second key is generated by using an asymmetric encryption algorithm RSA, and the second key includes a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
The data encryption and decryption method of the present invention is described by experimental data provided by an application example as follows:
example (b):
(1) and generating an RSA-2048 key at the server, wherein the key comprises an RSA public key and an RSA private key, and the RSA public key comprises the following steps:
RSA public key:
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6pXi9Wbn3shVKTxS2fiv/TqOuwLhXGSMqNsqlFOhSK//Rj8Bx/yuerm5SAuKWOEXXaHXHhMLMaTMdBfaSAIvH++vLESkK4dHNumffV153PXo0YE9Y70MwNpjPwrXWUvWxre2KvjbwxAJSaRPTn9nTwfN6O3rkgy4TPr3xnflAuTI5ORzKdDYWcYvkER47P9lwGTD9BOmQvGW80/+gGbA7U25NxRzhiqFPZ/DV+l9r+083553qGjXytVrRodldj7PN9rsN+BJTo1Zl3wwM7I2QQiOECbGz+0x7z7lZA4qBMtAuq9CVcbAvZBGt0zqFf508L5cR9P9Hy59H6TynlS3mQIDAQAB。
RSA private key:
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDqleL1ZufeyFUpPFLZ+K/9Oo67AuFcZIyo2yqUU6FIr/9GPwHH/K56ublIC4pY4RddodceEwsxpMx0F9pIAi8f768sRKQrh0c26Z99XXnc9ejRgT1jvQzA2mM/CtdZS9bGt7Yq+NvDEAlJpE9Of2dPB83o7euSDLhM+vfGd+UC5Mjk5HMp0NhZxi+QRHjs/2XAZMP0E6ZC8ZbzT/6AZsDtTbk3FHOGKoU9n8NX6X2v7TzfnneoaNfK1WtGh2V2Ps832uw34ElOjVmXfDAzsjZBCI4QJsbP7THvPuVkDioEy0C6r0JVxsC9kEa3TOoV/nTwvlxH0/0fLn0fpPKeVLeZAgMBAAECggEBAJBQ0aVjP3aBDFMn91h9c9d3tOM77GSovxgKbPF/WZOcIpGWpYPg4X5Cz8eQwfXX1EYYEH1B/fr2hYlOO01depxNGhlDyTO2L4uKwkGfxh63chmhRqEbZsMmFzRrePxIecMatglNu/UO4ofZe6ixHF80T+rio6/f/2nsY45HqC3UYG41YxWyilTwXSXJLK1pcR1Z3xEhOzeQU+Mzye5NuGOrr++vQDhPggjCSKtYNzcJXgSYSK4FgDWpMopJ2zz13nzzvHzxoNveNq3PSg0pPRirVf5+y/pUw0GA8VRrhwD2Sh18BD+S0tQUYst6Mwhqx+ICULQxOjPSMjb1Jlxvi7kCgYEA+F1UkHwAFnrcaHCCSz3XFuBkcpEJbUog6/Vkpq9Jv+YZ4ubfnyd6nW4jCaHIj5cRPOxelWHHlLY8Dp6IXddKxL81CW/tpnFirQE/8IH90d9zTNlzFAW5BJkUjdmfQfPsW3ch1AabTUu6ThuXlvB8YVIHGDGqOFxDK+PYJN4g9VsCgYEA8cwc1i0c8E1AMbtIGYBv2eYqreSee06C2gg4ZMTv58LK0Y4ejlmid71gWMGxHIeQ4NZ4urqo8YhURyJ2mCF+Dr7ijYCuFoeuwOE5MHCTZftaXXUZmu8TvxGw3s1jzGq/DV5vfP3wmd3B3OzZT4X74kq5INFvtmEiUQ+phHRdNRsCgYEAxT/SVoG0zCW9gNDCGiG9/nQuMnMP6pVx+hRFYMBcMST9MCCuP0dqcTe0agTsNWYEEb+kCr3CdVAZ+H5dzTGcNw+ofps/Qe5RMReKAWgr/o+ZkdItPByjaYxuL45Dlmy0LZw66JpqowPergPp672I+v3blpJzHxnfWy80TWuA/3sCgYEAj3YvVdQGa30qLVeU+6x8sKgjgnE2pqp6cKqX6xH91WB5vcO41XTRNIIj/AVP9EFq8DvP/dpqCoR8nIgSHUkh5dXTzWkf4TY3tTDsIZVpnwR3JSQpQQfAi4kPi+II6GwdVu1E8MAqVOCB+XZ9qPUx8Z2sIZCh22/eUIIebfwsoSkCgYAFMQ4DXupzdM1xHZQ5BztW5/50UgZMvy9Z/d0KojSpoSMqTixIUGqgzh29rxE3u1KRanqg19rUli/5DfP1NEDJ5bX7c7os4LPpzzzXuJZJURRil2VipxlRbW2k5VqJ0qadgecQGL3DmfnoJEfgAEeeds0lsoH7JMKOnbAh8y2Q6Q==。
(2) generating an AES-128 key at the client: vwrloo 46m5LdbGJLJOLQ ═ is given.
(3) And encrypting the AES key by using the RAS public key at the client to obtain an encryptedKey:
LriTU+rVOZLVGFpF3T3pDYC8+dNJcl+nOX5KV3u/l3b52sOMbdwStQXNO751moX6hanwZCsxQ0yNawShLKavqcSEMJJqWZEMxVpVryq7mw/9griYG+8rORehNdrvAQ3b7xgtjnogrQ85TfKPkiSPrmlGJS7qlogiV/hLv3f/8O49x+OTdXYYLcD57osXN5LmhLWTtn8KatkqHEHE9sXk9e77K0CJAXQZ0v0wg5Nc/mWt8NScs9K9u89jXF3CjrfZiyfvRMb7XGs2wfORFMGHCq+uDFfi6XCnIF86p1WWdsxGRzPJSOjZZiA9O541nCtBRb6s6zCJOcpWK0cMOwJ1sw==。
(4) the requested data is encrypted at the client using the AES key to obtain encryptedData 1. Wherein, the request data: username & password 123456;
encryptedData1:
0yzPXQql8Vkson53/dTh07HDCJ6f9x7XYQJSIdETb9ew4V5BxtUJLINW6g/rfvJ1。
(5) and decrypting the encryptedKey by using the RSA private key at the server to obtain the AES key: vwrloo 46m5LdbGJLJOLQ ═ is given.
(6) The server decrypts encrypted data1 using the AES key to obtain the requested data: username & password 123456.
(7) The server encrypts the response data using the AES key to obtain encryptedData 2.
Wherein the response data: success, then encrypted encryptedData 2: pQXw9v25oSpJx6bTCk2b6w ═ o.
(8) The client decrypts encryptedData2 using the AES key to obtain response data, the plaintext of which: success.
According to the embodiment, the mode of combining the symmetric encryption algorithm and the asymmetric encryption algorithm is adopted, and the encryption key for data transmission is randomly generated during the operation of the client, so that the safety and the high efficiency of data encryption are realized.
Fig. 11 illustrates a physical structure diagram of an electronic device, and as shown in fig. 11, the electronic device may include: a processor (processor)1110, a communication Interface (Communications Interface)1120, a memory (memory)1130, and a communication bus 1140, wherein the processor 1110, the communication Interface 1120, and the memory 1130 communicate with each other via the communication bus 1140. The processor 1110 may invoke logic instructions in the memory 1130 to perform the steps of a data encryption/decryption method that includes performing data encryption steps at the client and/or data decryption steps at the server, wherein,
the data encryption step comprises:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
the data decryption step includes:
decrypting the third key by using the second key to obtain the first key;
and decrypting the first encrypted data by using the first key to obtain the data to be encrypted.
In addition, the logic instructions in the memory 1130 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the steps of the above-provided data encryption and decryption method, the data encryption and decryption method comprising performing a data encryption step at a client and/or performing a data decryption step at a server, wherein,
the data encryption step comprises:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
the data decryption step includes:
decrypting the third key by using the second key to obtain the first key;
and decrypting the first encrypted data by using the first key to obtain the data to be encrypted.
In yet another aspect, the present invention also provides a non-transitory computer readable storage medium, on which a computer program is stored, the computer program being implemented by a processor to perform the steps of the above-provided data encryption and decryption method provided in each of the above, the data encryption and decryption method comprising performing a data encryption step at a client and/or performing a data decryption step at a server, wherein,
the data encryption step comprises:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
the data decryption step includes:
decrypting the third key by using the second key to obtain the first key;
and decrypting the first encrypted data by using the first key to obtain the data to be encrypted.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (20)

1. A data encryption method comprising performing a data encryption step at a client, the data encryption step comprising:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
2. The data encryption method of claim 1, wherein before performing the step of randomly generating the first key, comprising:
and acquiring the second key generated by the server, wherein the second key is stored in the server.
3. The data encryption method according to claim 2, wherein the obtaining the second key generated by the server side comprises:
and acquiring the second key generated by the server side by using an asymmetric encryption algorithm (RSA), wherein the second key comprises a public key for encryption and a private key for decryption.
4. The data encryption method of claim 1, wherein the randomly generating a first key comprises:
before a client initiates a request each time, the first secret key is randomly generated by using a symmetric encryption algorithm AES;
and caching the first key at the client.
5. A data decryption method, comprising a step of performing data decryption at a server, wherein the step of performing data decryption comprises:
decrypting the third key by using the second key to obtain a first key;
decrypting the first encrypted data by using the first key to obtain data to be encrypted;
the second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
6. The data decryption method of claim 5,
the second key is generated by using an asymmetric encryption algorithm (RSA), and comprises a public key for encryption and a private key for decryption;
the first key is randomly generated using the symmetric encryption algorithm AES.
7. A data encryption and decryption method is characterized by comprising a step of performing data encryption on a client side and a step of performing data decryption on a server side, wherein,
the data encryption step comprises:
randomly generating a first key, and encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key;
encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to a server side;
the data decryption step includes:
decrypting the third key by using the second key to obtain the first key;
decrypting the first encrypted data by using the first key to obtain the data to be encrypted;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
8. The data encryption and decryption method according to claim 7, wherein after the decrypting the encrypted data by using the first key is performed to obtain the data to be encrypted, the method comprises:
receiving second encrypted data returned by the server, wherein the second encrypted data is obtained by processing request data initiated by the client by the server and encrypting the processed response data by using the first key;
decrypting the second encrypted data using the first key.
9. The data encryption and decryption method according to claim 7, wherein before the step of randomly generating the first key, the method comprises:
and acquiring the second key generated by the server, wherein the second key is stored in the server.
10. The data encryption and decryption method according to claim 9, wherein the obtaining the second key generated by the server side includes:
and acquiring the second key generated by the server side by using an asymmetric encryption algorithm (RSA), wherein the second key comprises a public key for encryption and a private key for decryption.
11. The data encryption and decryption method according to claim 7, wherein the randomly generating the first key comprises:
before a client initiates a request each time, the first secret key is randomly generated by using a symmetric encryption algorithm AES;
and caching the first key at the client.
12. A data encryption device is characterized by comprising an encryption module for executing a data encryption step at a client, wherein the encryption module is used for randomly generating a first key, encrypting the first key by using a second key which is obtained in advance at a server to obtain a third key, encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to the server; wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
13. The data encryption apparatus of claim 12, wherein the second key is generated using an asymmetric encryption algorithm (RSA), the second key comprising a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
14. A data decryption apparatus, comprising a decryption module for performing a data decryption step at a server, where the decryption module is configured to decrypt the third key using the second key to obtain the first key, and decrypt the first encrypted data using the first key to obtain the data to be encrypted;
the second key is generated at the server in advance, the first key is generated randomly before a client initiates a request, the third key is obtained by encrypting the first key by using the second key, and the first encrypted data is obtained by encrypting the required encrypted data by using the first key;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
15. The data decryption apparatus according to claim 14, wherein the second key is generated using an asymmetric encryption algorithm RSA, the second key including a public key for encryption and a private key for decryption; the first key is randomly generated using the symmetric encryption algorithm AES.
16. A data encryption and decryption apparatus, comprising an encryption module for performing a data encryption step at a client side and/or a decryption module for performing a data decryption step at a server side, wherein,
the encryption module is used for randomly generating a first key, encrypting the first key by using a second key which is obtained in advance at a server end to obtain a third key, encrypting data to be encrypted by using the first key to obtain first encrypted data, and transmitting the first encrypted data and the third key to the server end;
the decryption module is used for decrypting the third key by using the second key to obtain the first key and decrypting the first encrypted data by using the first key to obtain the data to be encrypted;
wherein the first key is generated using a symmetric encryption algorithm and the second key is generated using an asymmetric encryption algorithm.
17. The data encryption/decryption device according to claim 16, further comprising:
and the encryption and decryption module is used for processing request data initiated by the client, encrypting the processed response data by using the first key to obtain second encrypted data, returning the second encrypted data to the client and decrypting the second encrypted data by using the first key.
18. The data encryption/decryption device according to claim 16, further comprising:
and the second key generation module is used for generating the second key at the server side and storing the second key at the server side.
19. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the data encryption method according to any one of claims 1 to 4 are implemented when the program is executed by the processor.
20. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the data encryption method according to any one of claims 1 to 4.
CN202011598550.XA 2020-12-29 2020-12-29 Data encryption and decryption method and device, electronic equipment and storage medium Pending CN113726725A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011598550.XA CN113726725A (en) 2020-12-29 2020-12-29 Data encryption and decryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011598550.XA CN113726725A (en) 2020-12-29 2020-12-29 Data encryption and decryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113726725A true CN113726725A (en) 2021-11-30

Family

ID=78672431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011598550.XA Pending CN113726725A (en) 2020-12-29 2020-12-29 Data encryption and decryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113726725A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172719A (en) * 2021-12-03 2022-03-11 杭州安恒信息技术股份有限公司 Encryption and decryption method, device, equipment and computer readable storage medium
CN114338239A (en) * 2022-03-03 2022-04-12 福建天晴数码有限公司 Data encryption transmission method and system
CN114362934A (en) * 2021-12-20 2022-04-15 卓尔智联(武汉)研究院有限公司 Key generation method and device, electronic equipment and storage medium
CN114500037A (en) * 2022-01-24 2022-05-13 深圳壹账通智能科技有限公司 Configurable interface encryption method and device, computer equipment and storage medium
CN114978769A (en) * 2022-07-19 2022-08-30 济南慧天云海信息技术有限公司 Unidirectional lead-in device, method, medium, and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encryption network data security method and system
CN104868996A (en) * 2014-02-25 2015-08-26 中兴通讯股份有限公司 Data encryption and decryption method, device thereof, and terminal
CN110535868A (en) * 2019-09-05 2019-12-03 山东浪潮商用系统有限公司 Data transmission method and system based on Hybrid Encryption algorithm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104868996A (en) * 2014-02-25 2015-08-26 中兴通讯股份有限公司 Data encryption and decryption method, device thereof, and terminal
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encryption network data security method and system
CN110535868A (en) * 2019-09-05 2019-12-03 山东浪潮商用系统有限公司 Data transmission method and system based on Hybrid Encryption algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴功宜 等: "《计算机网络技术教程 自顶向下分析与设计方法》", vol. 2, 机械工业出版社, pages: 342 - 342 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172719A (en) * 2021-12-03 2022-03-11 杭州安恒信息技术股份有限公司 Encryption and decryption method, device, equipment and computer readable storage medium
CN114362934A (en) * 2021-12-20 2022-04-15 卓尔智联(武汉)研究院有限公司 Key generation method and device, electronic equipment and storage medium
CN114500037A (en) * 2022-01-24 2022-05-13 深圳壹账通智能科技有限公司 Configurable interface encryption method and device, computer equipment and storage medium
CN114500037B (en) * 2022-01-24 2023-02-28 深圳壹账通智能科技有限公司 Configurable interface encryption method and device, computer equipment and storage medium
CN114338239A (en) * 2022-03-03 2022-04-12 福建天晴数码有限公司 Data encryption transmission method and system
CN114338239B (en) * 2022-03-03 2023-09-01 福建天晴数码有限公司 Method and system for data encryption transmission
CN114978769A (en) * 2022-07-19 2022-08-30 济南慧天云海信息技术有限公司 Unidirectional lead-in device, method, medium, and apparatus
CN114978769B (en) * 2022-07-19 2023-08-18 济南慧天云海信息技术有限公司 Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
Harba Secure data encryption through a combination of AES, RSA and HMAC
CN107294937B (en) Data transmission method based on network communication, client and server
US9172529B2 (en) Hybrid encryption schemes
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN108347419A (en) Data transmission method and device
US20150229621A1 (en) One-time-pad data encryption in communication channels
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN104023013A (en) Data transmission method, server side and client
CN110999202B (en) Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN1820448B (en) System and method for encrypting and verifying messages using three-phase encryption
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
KR20160020866A (en) Method and system for providing service encryption in closed type network
CN114095170A (en) Data processing method, device, system and computer readable storage medium
CN114362912A (en) Identification password generation method based on distributed key center, electronic device and medium
WO2013039659A1 (en) Hybrid encryption schemes
CN116248316A (en) File encryption method, file decryption method, device and storage medium
CN112995210B (en) Data transmission method and device and electronic equipment
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
KR100388059B1 (en) Data encryption system and its method using asymmetric key encryption algorithm
Abdelgader et al. Design of a secure file transfer system using hybrid encryption techniques
CN115549987B (en) Mixed encryption method based on data security privacy protection
EP4123956A1 (en) Method for securely transferring data elements values
KR100864092B1 (en) Packet encryption method using block chaining mode of block cipher
Parsovs Security of the proposed Mobile-ID document decryption feature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211130