CN114978711A - Data transmission method and system for symmetric encryption of dynamic secret key - Google Patents
Data transmission method and system for symmetric encryption of dynamic secret key Download PDFInfo
- Publication number
- CN114978711A CN114978711A CN202210575469.2A CN202210575469A CN114978711A CN 114978711 A CN114978711 A CN 114978711A CN 202210575469 A CN202210575469 A CN 202210575469A CN 114978711 A CN114978711 A CN 114978711A
- Authority
- CN
- China
- Prior art keywords
- character string
- decryption
- data
- encryption
- data transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 74
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000004364 calculation method Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present disclosure belongs to the technical field of data transmission security, and in particular relates to a data transmission method and system for symmetric encryption of a dynamic key, which includes: acquiring original data to be transmitted; encrypting the acquired original data by using a dynamic key based on an algorithm to obtain encrypted data; analyzing the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
Description
Technical Field
The disclosure belongs to the technical field of data transmission security, and particularly relates to a data transmission method and system for symmetric encryption of a dynamic key.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Data security transmission is more and more important, and in order to ensure data security transmission, the following three forms are generally adopted:
firstly, Base64 encoding data transmission, namely, transmitting original data after Base64 encoding, which can be understood as a simple encoding and encryption mode; after the data transmission is intercepted, data decoding can be easily carried out, so that the original data can be obtained; in addition, the keyword combination generated in the encoding process of the base64 can be intercepted by safety protection equipment, and the normal transmission of data is directly influenced;
secondly, the data is encrypted by the fixed secret key for safe transmission, the data is encrypted by the fixed secret key, and the original data is acquired based on the fixed decryption secret key after the data is intercepted; however, because the secret key is fixed, the secret key can be obtained by comparing the plurality of segments of the intercepted data and performing reverse calculation, and then the original data is obtained, which affects the safety of data transmission.
Thirdly, based on TLS data safety transmission, a technology for carrying out safety transmission on original data in a network transmission layer, and carrying out safety transmission on data by https protocol; however, the data transmitted by using the TLS technology is directly decrypted by other methods to obtain the original data, which affects the security of data transmission.
The conventional data security transmission technology can easily acquire original data, so that an attacker can easily use the original data to attack and steal key data.
Disclosure of Invention
In order to solve the above problems, the present disclosure provides a data transmission method and system for symmetric encryption of a dynamic key, which effectively avoid the situation that data cannot be normally transmitted due to data interception and data tampering in the data transmission process, and improve the security of data transmission.
According to some embodiments, a first aspect of the present disclosure provides a data transmission method for symmetric encryption of a dynamic key, which adopts the following technical scheme:
a data transmission method for symmetric encryption of dynamic keys comprises the following steps:
acquiring original data to be transmitted;
encrypting the obtained original data by using a dynamic key based on an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
As a further technical limitation, after the original data to be transmitted is acquired, the acquired original data is formatted according to a specific format, and a GUID of 32 bits is added to the formatted original data to obtain a first encryption character string.
Further, performing base64 encoding on the obtained first encrypted character string to obtain an encoded second encrypted character string; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; and performing sensitive hash operation on the obtained first encryption character string to obtain the original data with the unique hexadecimal signature, namely the fourth encryption character string.
Further, in the process of the sensitive hash operation, based on a secret key of the algorithm, the algorithm is used for performing the sensitive hash operation, the sensitive hash values obtained by data transmission are different each time, and the sensitive hash values are used as secret keys for symmetric encryption to perform symmetric encryption on the original data.
Further, acquiring characters at fixed positions based on the obtained third encryption character string to obtain a symmetric encryption key, namely a fifth encryption character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a secret key to obtain a first encrypted binary number group; performing base16 processing on the obtained first encryption binary digit group to obtain a seventh encryption character string; and carrying out data transmission on the obtained seventh encrypted character string, the obtained fourth encrypted character string and the obtained third encrypted character string according to a preset format, namely completing the transmission of the encrypted data.
Further, analyzing the received encrypted data to obtain a seventh decryption character string, a fourth decryption character string and a third decryption character string; acquiring characters with fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; performing base16 decoding on the obtained seventh decryption character string to obtain a first decryption binary array; decrypting the obtained first decrypted binary number group based on the fifth decrypted character string to obtain a second decrypted character string; and performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string.
Further, performing sensitive hash operation on the obtained second decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a third decryption character string, and if the values of the two decryption character strings are equal, the data is not tampered; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the fourth decryption character string, and if the values of the two decryption character strings are equal, the data is not tampered.
According to some embodiments, a second aspect of the present disclosure provides a data transmission system for symmetric encryption of a dynamic key, which adopts the following technical solutions:
a data transmission system for symmetric encryption of dynamic keys, comprising:
an acquisition module configured to acquire original data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
the decryption module is configured to analyze the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
According to some embodiments, a third aspect of the present disclosure provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having stored thereon a program which, when executed by a processor, implements the steps in the method for data transmission of dynamic key symmetric encryption according to the first aspect of the present disclosure.
According to some embodiments, a fourth aspect of the present disclosure provides an electronic device, which adopts the following technical solutions:
an electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, the processor implementing the steps in the method for data transmission with symmetric encryption of dynamic keys according to the first aspect of the disclosure when executing the program.
Compared with the prior art, the beneficial effect of this disclosure is:
according to the method, the data transmission is carried out by adopting a base16 coding mode, the safety protection equipment can be easily penetrated, and the condition that the data cannot be normally transmitted due to the fact that the data transmission is intercepted by the safety protection equipment in the base64 coding mode is effectively avoided; compared with the traditional fixed secret key encryption mode, the dynamic secret key encryption based on the algorithm has no decryption rule, enhances the data security and increases the decryption difficulty; special equipment and security certificates do not need to be purchased, cost is greatly saved, and the problem that the certificate cannot be accessed due to the problems of overdue and the like is solved; the encryption and decryption keys are hidden in the parameters, and the fixed positions of the keys are mutually agreed by the client and the server, so that the keys can be changed at any time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure and are not to limit the disclosure.
Fig. 1 is a flowchart of a data transmission method for symmetric encryption of a dynamic key according to a first embodiment of the disclosure;
fig. 2 is a block diagram of a data transmission system with symmetric encryption of dynamic keys according to a second embodiment of the disclosure.
Detailed Description
The present disclosure is further described with reference to the following drawings and examples.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
Interpretation of terms:
original data: the original data is also called plaintext data, which means data that is not encoded and can be easily read by people.
Secret key: the key is a digital key used for encrypting and decrypting data.
Symmetric encryption: the symmetric encryption is to encrypt the original data and decrypt the original data by the secret key.
Sensitive hashing: sensitive hashing means that when the original data is calculated, even if the original data has different bytes, the calculated hash value has great change, the MD5 belongs to sensitive hashing, and the sensitive hashing belongs to asymmetric encryption.
GUID: a globally unique identifier is a numeric identifier of binary length generated by an algorithm, globally unique.
Example one
The first embodiment of the present disclosure introduces a data transmission method for symmetric encryption of a dynamic key.
Fig. 1 shows a data transmission method for symmetric encryption of dynamic keys, which includes:
acquiring original data to be transmitted;
encrypting the acquired original data by using a dynamic key based on an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
As one or more embodiments, the first step of the data transmission method with symmetric encryption of dynamic keys is data encryption transmission, specifically:
(1) formatting original data according to a specific format, and adding a segment of 32-bit GUID to the formatted data to form a globally unique formatted character string, namely a first encrypted character string;
(2) performing base64 encoding on the formed first encrypted character string to obtain an encoded second encrypted character string, wherein the purpose of the operation is mainly to perform standardized encoding on some special data or characters in the original data, so that the problem of inaccurate data operation caused by disorder of part of special characters in the calculation process is avoided;
(3) performing sensitive hash operation on the obtained second encrypted character string to obtain unique hexadecimal signature data, namely a third encrypted character string;
(4) sensitive hash operation is carried out on the obtained first encryption character string to obtain hexadecimal signature data with uniqueness of the original data, namely a fourth encryption character string;
(5) collecting 8 characters with fixed positions as a symmetric encryption key from the obtained third encryption character string to obtain a fifth encryption character string; for example: collecting the following 8 index position characters of 0, 3, 18, 24, 19, 30, 12 and 15 from the third encryption character string, thus obtaining an 8-bit hexadecimal encryption key;
(6) symmetrically encrypting the obtained second encrypted character string by using the fifth encrypted character string as a secret key to obtain a first encrypted binary number group;
(7) performing base16 encryption processing on the obtained first encrypted binary digit group to obtain a seventh encrypted character string;
(8) and carrying out data transmission on the obtained seventh encrypted character string, the fourth encrypted character string and the third encrypted character string according to a specific format to obtain encrypted data.
It can be understood that the transmitted data contains a signature with data uniqueness, the validity of the data can be verified through the signature with data uniqueness when the data is decrypted, and in addition, the encryption key is hidden in the third encryption character string and is fixedly acquired according to the signature; therefore, the secret key has strong randomness, and the cracking difficulty is enhanced.
As one or more embodiments, the second step of the data transmission method with symmetric encryption by using dynamic keys is to receive and decrypt data, specifically:
(1) analyzing the received encrypted data according to the transmitted data format to respectively obtain a seventh decryption character string, a fourth decryption character string and a third decryption character string;
(2) acquiring characters of 8 fixed positions as a decryption key based on the obtained third decryption character string to obtain a fifth decryption character string;
(3) performing base16 decoding on the obtained seventh decryption character string to obtain a first decryption binary array;
(4) decrypting by using a fifth decryption character string based on the obtained first decryption binary array to obtain a second decryption character string;
(5) performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string;
(6) performing sensitive hash operation on the obtained second decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained third decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(7) performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained fourth decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(8) and (7) repeating the step (6) and the step (7), and if all the data are verified, the first encryption character string representing the decrypted original data is available, namely, the secure transmission of the data is realized.
In the data encryption transmission in the embodiment, the original data is encrypted in the network data security transmission process; based on the secret key of the algorithm, sensitive hash operation is carried out on the original data by using the algorithm, because the sensitive hash operation is sensitive hash, sensitive hash values obtained by original data transmission each time are different, and then the sensitive hash values are used as secret keys for symmetric encryption to carry out symmetric encryption on the original data and then transmit the original data; the dynamic change of the original data, because the sensitive hash operation is carried out on the original data, the sensitive hash values of different original data are different definitely, but if the original data is not changed, the transmitted symmetric encrypted ciphertext is still the same, so a certain rule can be generated, and the risk of being cracked is increased. Therefore, the original data needs to be changed dynamically; the base16 coding mode is adopted, so that the safety protection equipment can be effectively penetrated, and the normal transmission of data cannot be influenced; and the encryption key is hidden, and the encryption key is hidden in the transmitted parameters in the transmission process, so that the acquisition difficulty is increased.
Example two
The second embodiment of the present disclosure introduces a data transmission system with symmetric encryption of dynamic keys.
A data transmission system with symmetric encryption of dynamic keys as shown in fig. 2 comprises:
an acquisition module configured to acquire original data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
the decryption module is configured to analyze the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
The detailed steps are the same as the data transmission method for symmetric encryption of dynamic keys provided in the first embodiment, and are not described herein again.
EXAMPLE III
The third embodiment of the disclosure provides a computer-readable storage medium.
A computer-readable storage medium, on which a program is stored, which when executed by a processor implements the steps in the data transmission method for dynamic key symmetric encryption according to one embodiment of the present disclosure.
The detailed steps are the same as the data transmission method for symmetric encryption of dynamic keys provided in the first embodiment, and are not described herein again.
Example four
The fourth embodiment of the disclosure provides an electronic device.
An electronic device includes a memory, a processor, and a program stored in the memory and executable on the processor, where the processor executes the program to implement the steps in the data transmission method for symmetric encryption of dynamic keys according to an embodiment of the present disclosure.
The detailed steps are the same as the data transmission method for symmetric encryption of dynamic keys provided in the first embodiment, and are not described herein again.
The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.
Claims (10)
1. A data transmission method for symmetric encryption of dynamic keys is characterized by comprising the following steps:
acquiring original data to be transmitted;
encrypting the acquired original data by using a dynamic key based on an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
2. The data transmission method for symmetric encryption of dynamic keys as claimed in claim 1, wherein after the original data to be transmitted is obtained, the obtained original data is formatted according to a specific format, and 32-bit GUID is added to the formatted original data to obtain the first encryption string.
3. The data transmission method for symmetric encryption of dynamic keys as claimed in claim 2, wherein the obtained first encryption string is subjected to base64 encoding to obtain an encoded second encryption string; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; and performing sensitive hash operation on the obtained first encryption character string to obtain the original data with the unique hexadecimal signature, namely the fourth encryption character string.
4. The data transmission method for symmetric encryption of dynamic keys as claimed in claim 3, wherein in the process of the sensitive hash operation, the sensitive hash operation is performed by using the algorithm based on the key of the algorithm, the sensitive hash values obtained by each data transmission are different, and the sensitive hash values are used as the symmetric encryption key to perform symmetric encryption on the original data.
5. A data transmission method using symmetric encryption with dynamic keys as claimed in claim 3, wherein the fixed position characters are collected based on the obtained third encryption string to obtain the symmetric encryption key, i.e. the fifth encryption string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a secret key to obtain a first encrypted binary number group; performing base16 processing on the obtained first encryption binary digit group to obtain a seventh encryption character string; and carrying out data transmission on the obtained seventh encrypted character string, the obtained fourth encrypted character string and the obtained third encrypted character string according to a preset format, namely completing the transmission of the encrypted data.
6. The data transmission method for symmetric encryption of dynamic keys as claimed in claim 5, wherein the received encrypted data is parsed to obtain a seventh decryption string, a fourth decryption string and a third decryption string; acquiring characters with fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; performing base16 decoding on the obtained seventh decryption character string to obtain a first decryption binary array; decrypting the obtained first decrypted binary number group based on the fifth decrypted character string to obtain a second decrypted character string; and performing base64 decoding on the obtained second decryption character string to obtain the first decryption character string.
7. The data transmission method for symmetric encryption of dynamic keys as claimed in claim 6, wherein the obtained second decryption string is subjected to a sensitive hash operation, the decryption string obtained after the sensitive hash operation is compared with a third decryption string, and if the values of the two decryption strings are equal, the data is not tampered; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a fourth decryption character string, and if the values of the two decryption character strings are equal, the data is not tampered.
8. A data transmission system with symmetric encryption using dynamic keys, comprising:
an acquisition module configured to acquire original data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
the decryption module is configured to analyze the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to finish data transmission.
9. A computer-readable storage medium, on which a program is stored, which, when being executed by a processor, carries out the steps in the data transmission method for dynamic key symmetric encryption according to any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor implements the steps in the method for data transmission with symmetric encryption of dynamic keys according to any one of claims 1 to 7 when executing the program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210575469.2A CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210575469.2A CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978711A true CN114978711A (en) | 2022-08-30 |
CN114978711B CN114978711B (en) | 2024-06-25 |
Family
ID=82955115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210575469.2A Active CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978711B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579392A (en) * | 2024-01-16 | 2024-02-20 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236767A (en) * | 2011-06-10 | 2011-11-09 | 上海市金山区青少年活动中心 | File encryption method in combination with hash value |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
KR101942033B1 (en) * | 2018-11-19 | 2019-01-24 | 동국대학교 산학협력단 | Electronic device capable of decrypting code-based encrypted data in which t+a error codes are inserted and operating method thereof |
CN112822228A (en) * | 2019-11-15 | 2021-05-18 | 北京中电普华信息技术有限公司 | Browser file encryption uploading method and system based on state cryptographic algorithm |
CN112887311A (en) * | 2021-01-26 | 2021-06-01 | 北京高因科技有限公司 | Safety encryption method and device based on data transmission process |
CN113259132A (en) * | 2021-06-30 | 2021-08-13 | 平安普惠企业管理有限公司 | Data transmission encryption and decryption method and device, computer equipment and storage medium |
-
2022
- 2022-05-25 CN CN202210575469.2A patent/CN114978711B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236767A (en) * | 2011-06-10 | 2011-11-09 | 上海市金山区青少年活动中心 | File encryption method in combination with hash value |
CN109150499A (en) * | 2018-08-29 | 2019-01-04 | 深圳市迷你玩科技有限公司 | Method, apparatus, computer equipment and the storage medium of dynamic encryption data |
KR101942033B1 (en) * | 2018-11-19 | 2019-01-24 | 동국대학교 산학협력단 | Electronic device capable of decrypting code-based encrypted data in which t+a error codes are inserted and operating method thereof |
CN112822228A (en) * | 2019-11-15 | 2021-05-18 | 北京中电普华信息技术有限公司 | Browser file encryption uploading method and system based on state cryptographic algorithm |
CN112887311A (en) * | 2021-01-26 | 2021-06-01 | 北京高因科技有限公司 | Safety encryption method and device based on data transmission process |
CN113259132A (en) * | 2021-06-30 | 2021-08-13 | 平安普惠企业管理有限公司 | Data transmission encryption and decryption method and device, computer equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
余应刚: ""巧用Base64编码和GUID实现数据加密"", 《电脑编程技巧与维护》, 18 June 2009 (2009-06-18), pages 1 - 5 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579392A (en) * | 2024-01-16 | 2024-02-20 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
CN117579392B (en) * | 2024-01-16 | 2024-04-16 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
Also Published As
Publication number | Publication date |
---|---|
CN114978711B (en) | 2024-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8687800B2 (en) | Encryption method for message authentication | |
CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
CN109840425B (en) | File encryption method and device | |
CN102904712B (en) | Information ciphering method | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
Alemami et al. | Research on various cryptography techniques | |
JPH1041932A (en) | Ciphering key recovery method and equipment | |
CN111797431B (en) | Encrypted data anomaly detection method and system based on symmetric key system | |
CN112073467A (en) | Block chain-based data transmission method and device, storage medium and electronic equipment | |
WO2023005734A1 (en) | Vehicle data uploading method and apparatus, and vehicle, system and storage medium | |
CN106778292B (en) | A kind of quick restoring method of Word encrypted document | |
CN117640256B (en) | Data encryption method, recommendation device and storage medium of wireless network card | |
CN117278324B (en) | Message encryption transmission method and system | |
CN114978711B (en) | Dynamic key symmetric encryption data transmission method and system | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN116886276B (en) | Data transmission method and system based on dynamic key | |
CN117439799A (en) | Anti-tampering method for http request data | |
CN117375836A (en) | Encryption and decryption method and system for long text segment based on RSA encryption algorithm | |
CN115001758B (en) | Quantum encryption-based short byte message security encryption method | |
Quilala et al. | Modified Blowfish algorithm analysis using derivation cases | |
CN114157453B (en) | Communication system for encrypting information | |
AU2021102898A4 (en) | Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data | |
CN110247878A (en) | A kind of data transfer encryption method | |
Tian et al. | Amount-Based Covert Communication Over Blockchain | |
CN114390518A (en) | Encryption method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |