CN114513297A - POS machine data encryption method and device - Google Patents
POS machine data encryption method and device Download PDFInfo
- Publication number
- CN114513297A CN114513297A CN202210092812.8A CN202210092812A CN114513297A CN 114513297 A CN114513297 A CN 114513297A CN 202210092812 A CN202210092812 A CN 202210092812A CN 114513297 A CN114513297 A CN 114513297A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- pos machine
- information
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a POS machine data encryption method, which comprises the following steps: encrypting the transaction information and the identification information of the POS machine and sending the encrypted transaction information and the identification information to a Unionpay background management system, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data; the encryption method is based on an improved AES and RSA mixed algorithm, and the transaction data with high privacy degree of the POS machine is encrypted in an enhanced mode through the mixed algorithm combining the improved AES algorithm combined with the time stamp technology and the RSA algorithm for enhancing prime number judgment. The invention also provides a POS machine device. The invention improves the data encryption method of the POS machine, realizes the reduction of the data encryption time and complexity and ensures the security quality of encryption.
Description
Technical Field
The invention relates to the technical field of financial data encryption, in particular to a POS machine data encryption method and device.
Background
The POS machine is a sale terminal with a non-cash settlement function, and because the transaction of a bank card is involved, the POS machine has high requirements on the safety performance of the bank card, and important data in the POS machine must be ensured not to be stolen. The wireless POS realizes an efficient, quick and safe consumption mode, so that the use site of the POS is not limited by wired communication, the difficulty or impossible factor of card holding consumption is solved, and the card can be swiped for payment in any place with a mobile phone signal.
In the prior art, a data encryption mode of a POS machine generally adopts a DES or 3DES algorithm to encrypt data, and an international standard encryption algorithm 3DES is adopted to encrypt and protect sensitive data such as a user account number, a password and the like, so as to ensure the security of transaction data of a wireless POS system.
Therefore, the following problems exist in the prior art:
1. because the DES algorithm has short key length, the original DES password has strong key length easy to be cracked due to the enhancement of the computer operation capacity; the 3DES algorithm is designed to provide a relatively simple method of avoiding similar attacks by increasing the key length of DES, which is more secure than the original DES algorithm, but still has limited security performance.
2. The encryption transmission data by adopting other complex algorithms has low operation speed, influences the data transmission efficiency of the POS machine and limits the use of the POS machine.
Disclosure of Invention
Technical problem to be solved
In order to solve the technical problems, the invention provides a data encryption method and a data encryption device for a POS machine, wherein the data encryption safety is improved through an improved AES and RSA mixed algorithm, and the data transmission efficiency is ensured by selectively enhancing encryption on user information with high privacy degree, such as a user account and a password.
(II) technical scheme
In order to solve the technical problems and achieve the purpose of the invention, the invention is realized by the following technical scheme:
a POS machine data encryption method comprises the following steps:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces; the information with high privacy comprises a user account and a password; the information with low privacy comprises merchant information, commodity data and time data;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and S4, sending the encrypted data and the identification information to the Unionpay background management system.
The improved AES and RSA mixing algorithm in step S3 is specifically:
and encrypting the AES key by using the RSA public key to obtain an encrypted key, and encrypting the data of the POS machine by combining the encrypted key with an improved AES algorithm.
The improved AES algorithm, specifically step S31, is:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: performing despreading according to the initial key to obtain a key required by each round, specifically generating a key W [ n ] related to time by using a timestamp; the key expansion method is as follows:
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
(1) word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
(2) byte replacement: and carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution step in the encryption process.
(3) Round constant XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds. Rcon is implemented using a look-up table.
S313, performing round key addition operation on the plaintext S [0,15] to be encrypted and the initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, carrying out byte substitution, row shifting and round key addition operations on the intermediate state matrix S2[0,15] in sequence to obtain an output ciphertext C [0,15 ].
Furthermore, in order to improve the operation speed, an M matrix is used for replacing a matrix in forward column confusion and reverse column confusion operation in the original AES algorithm, so that the time consumed by reverse column confusion operation is reduced, the forward column confusion operation and the reverse column confusion operation consume the same operation resources, and the problems of time consumption, non-coincidence encryption and decryption and the like are solved;
The column obfuscation operation is specifically:
the matrix S is a state matrix;
the encryption of the AES key by the RSA algorithm can realize the effect of improving the security of the key, but can also increase the operation time, in order to further shorten the encryption time, the invention improves the RSA algorithm, and shortens the encryption time by the RSA algorithm for enhancing the prime number judgment.
The modified RSA algorithm specifically comprises step S32:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
The present invention also provides a POS device, which specifically includes:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
In addition, to achieve the above object, the present invention also provides a computer readable storage medium having stored thereon POS data encryption program instructions executable by one or more processors to implement the steps of the POS data encryption method as described above.
(III) advantageous effects
Compared with the prior art, the invention has the beneficial effects that:
(1) the data with high privacy in the transaction data of the POS machine is encrypted in an original mode by selecting improved encryption, so that the encryption security is selectively improved, and the encryption complexity is controlled.
(2) By combining the time stamp AES algorithm, the time information of POS machine transaction data is utilized to improve the encryption algorithm, the safe updating and synchronization of the secret key are realized, and the problem of potential threat from a source node to a destination node is solved.
(3) By improving the matrix in the column confusion operation, the time consumed by the reverse column confusion operation is reduced, and the forward column confusion operation and the reverse column confusion operation consume the same operation resource.
(4) The complexity of the encryption time of the RSA is reduced through the RSA algorithm for enhancing the prime number judgment, and meanwhile, the encryption safety quality is not influenced.
Drawings
FIG. 1 is a flow chart of a POS transaction processing method provided by an embodiment of the invention;
FIG. 2 is a schematic diagram of a hybrid encryption method based on AES and RSA algorithms according to an embodiment of the present invention;
fig. 3 is a schematic diagram of generating a time-dependent key using a timestamp according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to explain the technical content of the present invention in detail, the purpose and technical effects achieved are explained in detail below with reference to the embodiments and the accompanying drawings.
Referring to fig. 1, the POS transaction processing method includes:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the transaction data comprises a plurality of categories, and if all data are encrypted by adopting a traditional encryption method, the transmission safety of the data with higher privacy is difficult to ensure; because the improved encryption method is complex and the arithmetic operation time is long, if the improved encryption method is used for encrypting all data, the problem of overlong encryption time is inevitably brought, and therefore, the following method is adopted for data encryption:
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces; the information with high privacy comprises a user account and a password; the information with low privacy comprises merchant information, commodity data and time data;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
the encryption mode can realize that data with higher privacy is encrypted more safely, meanwhile, the effectiveness of encryption time is considered, and a proper traditional encryption method is adopted for the data with lower privacy, so that the calculation resource and the calculation time are saved while the targeted data encryption is realized.
Step S3, encrypting the high-privacy data by using the improved AES and RSA mixture algorithm specifically includes: the AES key is encrypted by using the RSA public key to obtain an encrypted key, the data of the POS machine is encrypted by combining the encrypted key with an improved AES algorithm, and a mixed encryption method based on the AES and the RSA algorithm is briefly described in figure 2;
for the reason that the key of the traditional AES algorithm is relatively fixed and still the threat of brute force cracking cannot be avoided, the invention provides the method for generating the key related to time by utilizing the timestamp, thereby realizing the safe updating and synchronization of the key, being more suitable for solving the potential threat from a source node to a target node and improving the safety of the algorithm, and the specific implementation steps are as follows:
further, in step S31 of the modified AES algorithm, referring to fig. 3, a schematic diagram of generating a time-dependent key expansion by using a timestamp includes the following specific steps:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: according to the initial key de-expansion, the key needed by each round is obtained, in particular, the time-related key W is generated by utilizing the time stampn(ii) a The key expansion method is as follows:
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
(1) word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
(2) byte replacement: and carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution step in the encryption process.
(3) The round constants XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds. Rcon is implemented using a look-up table.
S313, performing round key addition operation on plaintext S [0,15] to be encrypted and an initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, carrying out byte substitution, row shifting and round key addition operations on the intermediate state matrix S2[0,15] in sequence to obtain an output ciphertext C [0,15 ].
Furthermore, in order to improve the operation speed, an M matrix is used for replacing a matrix in forward column confusion and reverse column confusion operation in the original AES algorithm, so that the time consumed by reverse column confusion operation is reduced, and the forward column confusion operation and the reverse column confusion operation consume the same operation resources; the method comprises the following steps of reducing the execution of XOR operation for both forward column confusion and reverse column confusion, and improving the operation speed by reducing the encryption time consumption and the decryption time consumption together, wherein the specific operations are as follows:
the column obfuscation operation is specifically:
the encryption of the AES key by the RSA algorithm can achieve the effect of improving the security of the key, but also can increase the operation time, in order to further shorten the encryption time, the invention improves the RSA algorithm, and shortens the encryption time by the RSA algorithm for enhancing prime number judgment.
The modified RSA algorithm step S32 includes the following steps:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
The data with high privacy in the transaction data of the POS machine is encrypted in an original mode by selecting improved encryption, so that the encryption safety is selectively improved, and the encryption complexity is controlled; by combining the AES algorithm of the timestamp, the time information of the transaction data of the POS machine is utilized to improve the encryption algorithm, so that the safe updating and synchronization of the secret key are realized, and the potential threat from a source node to a destination node is solved; by improving the matrix in the column confusion operation, the time consumed by the reverse column confusion operation is reduced, so that the forward column confusion operation and the reverse column confusion operation consume the same operation resource; the complexity of the encryption time of the RSA is reduced through the RSA algorithm for enhancing the prime number judgment, and meanwhile, the encryption safety quality is not influenced.
And S4, sending the encrypted data and the identification information to the Unionpay background management system.
In the embodiment, the improved encryption algorithm is combined with the characteristics of the data to be encrypted, so that the transmission safety of the whole data is improved, the encryption time and the operation resources are effectively controlled, and the effective improvement of the conventional POS machine data encryption method is realized.
An embodiment of the present invention further provides a POS device, which specifically includes:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
Furthermore, an embodiment of the present invention also provides a computer-readable storage medium, where the computer-readable storage medium stores POS data encryption program instructions, and the POS data encryption program instructions are executable by one or more processors to implement the steps of the POS data encryption method described above.
The above-mentioned embodiments are merely illustrative of the preferred embodiments of the present invention, and do not limit the scope of the present invention, and various modifications and improvements made to the technical solution of the present invention by those skilled in the art without departing from the spirit of the present invention shall fall within the protection scope defined by the claims of the present invention.
Claims (10)
1. A POS machine data encryption method is characterized by comprising the following steps:
s1, acquiring transaction information and identification information generated by the POS machine, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
s2, dividing the transaction information into two kinds of data information with high privacy and low privacy, and respectively storing the two kinds of data information into corresponding storage spaces;
s3, encrypting the two kinds of data information with high privacy and low privacy respectively, specifically: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and S4, sending the encrypted data and the identification information to the Unionpay background management system.
2. The data encryption method for the POS machine according to claim 1, wherein the step S3 of encrypting the high-privacy data by using the modified AES and RSA mixture algorithm specifically comprises: the method comprises the steps that an RSA public key is used for encrypting an AES key to obtain an encrypted key, and data of the POS machine are encrypted through the encrypted key and an improved AES algorithm;
the improved AES algorithm comprises the following specific steps:
s311, selecting encryption parameters: selecting a 128-bit key, selecting 10 encryption rounds, determining an initial key W [0, 3], and creating a new S box;
s312, key expansion: and obtaining the key needed by each round according to the initial key despreading, specifically generating a time-dependent key W [ n ] by using a time stamp.
3. The data encryption method of the POS machine according to claim 2, wherein the key expansion mode is as follows:
wherein, 43 is more than or equal to n and is an integer, t is a time stamp, the function g is composed of three parts, namely word circulation, byte substitution and round constant XOR:
word circulation: 4 bytes in the key W [ n ] are circularly left-shifted by one byte;
byte replacement: carrying out byte substitution on the result of the first step by using an S box, wherein the byte substitution is the same as the byte substitution in the encryption process;
round constant XOR: the result of the second step is xored with a round constant Rcon j, j representing the number of rounds, Rcon being implemented with a look-up table.
4. The POS machine data encryption method according to claim 3, wherein the step S3 further comprises:
s313, performing round key addition operation on plaintext S [0,15] to be encrypted and an initial key W [0, 3] to obtain an intermediate state matrix S1[0,15 ];
s314, carrying out byte substitution, row shifting, column confusion and round key addition operation on S1[0,15] in sequence, and repeating for 8 times to obtain an intermediate state matrix S2[0,15 ];
s315, the intermediate state matrix S2[0,15] obtained in the step S314 is subjected to byte substitution, row shifting and round key adding operation in sequence to obtain an output ciphertext C [0,15 ].
5. The POS machine data encryption method according to claim 1 or 3, wherein the forward column confusion operation matrix and the reverse column confusion operation matrix in the column confusion operation are equal.
7. the POS machine data encryption method according to claim 3 or 6, wherein the modified RSA algorithm comprises the following specific steps:
s321, random large number generation: randomly generating a group of large arrays N;
s322, large array screening: screening the large array N through a Kamichael special sum table;
s323, optimizing a Solovay-Strassen algorithm by utilizing a Montgomery rapid power algorithm;
s324, generating large prime numbers p and q: combining the steps S321-S323 and the enhanced prime number judgment algorithm to generate two large prime numbers p and q;
s325, RSA encryption AES key: inputting an AES key, and generating an RSA key by using two large prime numbers p and q to encrypt the AES key to generate an encrypted AES key.
8. The POS machine data encryption method according to claim 1, wherein the information with high privacy comprises a user account number and a password; the information with low privacy comprises merchant information, commodity data and time data.
9. A POS device of the POS device data encryption method of any one of claims 1-8, wherein the device comprises:
the data generation module is used for generating transaction information and identification information, wherein the transaction information comprises a user account number, a password, merchant information, commodity data and time data of the POS machine; the identification information is used for determining a secret key and encrypting transaction data;
the data classification module is used for acquiring the transaction information and the identification information generated by the POS machine, dividing the transaction information into two kinds of data information, namely high privacy and low privacy, and storing the two kinds of data information into corresponding storage spaces respectively;
the data encryption module is used for encrypting two kinds of data information with high privacy and low privacy respectively, and specifically comprises the following steps: directly encrypting data with low privacy by adopting a traditional AES encryption algorithm, and encrypting data with high privacy by adopting an improved AES and RSA mixed algorithm;
and the data sending module is used for sending the encrypted data and the identification information to the Unionpay background management system.
10. A computer readable storage medium having stored thereon POS data encryption program instructions executable by one or more processors to perform the steps of the POS data encryption method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210092812.8A CN114513297A (en) | 2022-01-26 | 2022-01-26 | POS machine data encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210092812.8A CN114513297A (en) | 2022-01-26 | 2022-01-26 | POS machine data encryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114513297A true CN114513297A (en) | 2022-05-17 |
Family
ID=81549189
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210092812.8A Pending CN114513297A (en) | 2022-01-26 | 2022-01-26 | POS machine data encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114513297A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115760126A (en) * | 2023-01-10 | 2023-03-07 | 北京厚方科技有限公司 | Financial transaction information encryption method |
CN116361840A (en) * | 2023-06-02 | 2023-06-30 | 深圳市力博实业有限公司 | Bank self-service equipment data security management system |
-
2022
- 2022-01-26 CN CN202210092812.8A patent/CN114513297A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115760126A (en) * | 2023-01-10 | 2023-03-07 | 北京厚方科技有限公司 | Financial transaction information encryption method |
CN116361840A (en) * | 2023-06-02 | 2023-06-30 | 深圳市力博实业有限公司 | Bank self-service equipment data security management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map | |
US6125185A (en) | System and method for encryption key generation | |
EP1440535B1 (en) | Memory encrytion system and method | |
CN114513297A (en) | POS machine data encryption method and device | |
JPH10511778A (en) | Method of executing a communication protocol between two processing devices using a secret key | |
Thangavel et al. | Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud | |
CN107078904A (en) | Mixed cipher key is exported | |
CN102904712A (en) | Information encrypting method | |
Song et al. | A fast parallel batch image encryption algorithm using intrinsic properties of chaos | |
Bashir et al. | A novel gray scale image encryption scheme based on pixels’ swapping operations | |
Alarood et al. | IES: Hyper-chaotic plain image encryption scheme using improved shuffled confusion-diffusion | |
CN107491317A (en) | A kind of symmetrical encryption and decryption method and systems of AES for accelerating platform based on isomery | |
US8619985B2 (en) | Table splitting for cryptographic processes | |
CN106651734A (en) | Binary two-dimensional code image encryption and decryption method and device | |
Abd El-Wahed et al. | Efficiency and security of some image encryption algorithms | |
CN107425971A (en) | Terminal and its data method for encryption/decryption and device without certificate | |
Vyakaranal et al. | Performance analysis of symmetric key cryptographic algorithms | |
Majumdar et al. | A novel DNA-inspired encryption strategy for concealing cloud storage | |
Zhou et al. | Implementation of cryptographic algorithm in dynamic QR code payment system and its performance | |
Ahmad et al. | A secure network communication protocol based on text to barcode encryption algorithm | |
Shoukat et al. | A survey about latest trends and research issues of cryptographic elements | |
Zinabu et al. | Enhanced efficiency of advanced encryption standard (EE-AES) algorithm | |
Thangapalani et al. | Securing Medical Image Transmission using Memetic Algorithm | |
Abusukhon et al. | Analyzing the efficiency of Text-to-Image encryption algorithm | |
Kar et al. | An improved data security using DNA sequencing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |