CN104038336A - Data encryption method based on 3DES - Google Patents

Data encryption method based on 3DES Download PDF

Info

Publication number
CN104038336A
CN104038336A CN201410280775.9A CN201410280775A CN104038336A CN 104038336 A CN104038336 A CN 104038336A CN 201410280775 A CN201410280775 A CN 201410280775A CN 104038336 A CN104038336 A CN 104038336A
Authority
CN
China
Prior art keywords
data
3des
key
encryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410280775.9A
Other languages
Chinese (zh)
Inventor
沈勇坚
王翔平
胡永刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dynamicode Co Ltd
Original Assignee
Dynamicode Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dynamicode Co Ltd filed Critical Dynamicode Co Ltd
Priority to CN201410280775.9A priority Critical patent/CN104038336A/en
Publication of CN104038336A publication Critical patent/CN104038336A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data encryption method based on 3DES. The encryption method endows data to be encrypted with a cipher by using a 3DES data encryption mode, and a secret key in the encryption mode is deformed before encryption. According to the data encryption method, the secret key is deformed, so that complexity of data encryption is greatly improved, and thus cracking difficulty of the data is strengthened, leakage of critical data is effectively avoided, and safety of data communication is greatly improved.

Description

A kind of data ciphering method based on 3DES
Technical field
The present invention relates to network data security technology, be specifically related to a kind of data encryption technology.
Background technology
Along with extensively popularizing of Data Communication in Computer Networks, the problem meriting attention that the fail safe of communication data is, common data encryption at present is generally used 3DES data encryption mode.
3DES claims again Triple DES, is a kind of pattern of des encryption algorithm, and it uses the key of 3 56 to carry out three encryptions to data.Data encryption standard (DES) is a kind of long-standing encryption standard of the U.S., and it uses symmetric key cryptography, and in 1981 by ANSI organize specification be ANSI X.3.92.DES uses the method for 56 keys and cryptographic block, and in the method for cryptographic block, text is divided into 64 big or small text block and then is encrypted.Compared with initial DES, 3DES is safer.
3DES (being Triple DES) is DES to the cryptographic algorithm of AES transition (1999, NIST is appointed as 3-DES the encryption standard of transition), cryptographic algorithm, it is implemented as follows: the encryption and decryption process of establishing Ek () and Dk () and represent DES algorithm, K represents the key that DES algorithm uses, P represents that expressly C represents ciphertext, like this:
3DES ciphering process is: C=Ek3 (Dk2 (Ek1 (P)))
3DES decrypting process is: P=Dk1 (EK2 (Dk3 (C))).
If only adopt the cipher mode of 3DES to be encrypted, it uses original secret key to be encrypted to original text, and cipher mode is fairly simple, is easily cracked, and exists potential safety hazard.
Summary of the invention
Be cracked for adopting 3DES data encryption mode to exist easily in existing network data communication, the problem that fail safe is not high, the object of the present invention is to provide a kind of can increasing to crack difficulty, improve the data encryption mode of Information Security.
In order to achieve the above object, the present invention adopts following technical scheme:
Based on a data ciphering method of 3DES, described encryption method is adopting 3DES data encryption mode to carry out password to be-encrypted data, and described method is out of shape the key in cipher mode before cryptographic operation.
In preferred version, described method is carried out MD5, front 16 distortion to key.
Further, the concrete steps of described method are as follows:
1) obtain the unique identifier of smart mobile phone as the prototype of encryption key, carry out obtaining first 16 after SHA1 processing, and change 16 systems;
2) carry out PBOC computing, obtain encryption key;
The concrete grammar of PBOC computing is:
(21) dispersion factor is got first 8 and is carried out inversion operation;
(22) by the result of front 8 and front 8 negates of dispersion factor, carry out respectively 3DES operation, obtain result A and B;
(23) by the result of 3DES operation, combine according to B+A+B, obtain final result;
3) plaintext to be encrypted is changed after 16 systems, used the key after distortion to be encrypted operation.
Scheme provided by the invention, by the distortion to key, improves the complexity of data encryption greatly, makes data crack difficulty and strengthens, and effectively avoids critical data to reveal, the fail safe that greatly improves data communication.
Brief description of the drawings
Further illustrate the present invention below in conjunction with the drawings and specific embodiments.
Fig. 1 is fundamental diagram of the present invention.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach object and effect is easy to understand, below in conjunction with concrete diagram, further set forth the present invention.
The present invention by carrying out deformation process to the key using in cipher mode before encryption and decryption, and utilize the key after distortion to carry out encryption and decryption operation, make thus ciphering process more complicated, increase the difficulty that cracks, effectively solve critical data and exist the problem of potential safety hazard in communication process.
Based on this principle, in the time carrying out data communication, the present invention carries out MD5, front 16 capitalization distortion by the key in 3DES cipher mode, and then the key based on after this distortion is encrypted operation by 3DES cipher mode to be-encrypted data.
Referring to Fig. 1, the schematic diagram that it is depicted as the present invention program and carries out concrete operations.
Whole scheme is only implemented based on smart mobile phone, without other auxiliary equipment, has so both ensured the ease for operation of scheme implementation, avoids again the repeatedly transduction of data to cause significant data to leak, and affects the problem of fail safe.
As seen from the figure, whole cryptographic operation carries out based on 3DES cipher mode, is mainly divided into two parts: 1, key handling part; 2, encryption part.
First,, before encryption and decryption, the key in final cipher mode is carried out to deformation process.
1) unique identifier of smart mobile phone automatic acquisition the machine (hereinafter to be referred as UUID), and the unique identifier getting is carried out getting first 16 after SHA1 processing conversion 16 systems.
Concrete, smart mobile phone is the identifier of the current smart mobile phone of automatic acquisition first, as the prototype of key.
Then, the identifier of smart mobile phone is adopted SHA1 (Secure Hash Algorithm (Secure Hash Algorithm) is mainly applicable to the Digital Signature Algorithm (Digital Signature Algorithm DSA) of DSS (Digital Signature Standard DSS) the inside definition) process.
Finally, will intercept first 16 by length through SHA1 data after treatment, and this data transaction of 16 will be become to 16 systems.
Process through above, the UUID reading is carried out to deformation process as key, increase thus and crack, the reliability of encryption is provided.
2) UUID processing through step (1) is carried out to PBOC distortion computing (the People's Bank's key dispersing mode), obtain corresponding encryption key.
Concrete, PBOC distortion calculating process is as follows:
1, dispersion factor is got to first 8 and carried out inversion operation;
2, by the result of front 8 and front 8 negates of dispersion factor, carry out respectively 3DES operation, obtain result A and B;
3, by the result of 3DES operation, combine according to B+A+B, obtain final result, this result is the key of distortion.
Here UUID is carried out to PBOC processing, processed and made the key of encryption and decryption more complicated by PBOC, increase key cracks, and improves degree of safety.
Then, completing after key distortion, clear data to be encrypted is converted to after 16 systems, use the distortion key after PBOC computing to be encrypted operation, specifically adopt 3DES cipher mode to be encrypted operation.
For because such scheme is encrypted the data that obtain, can, by the UUID after distortion to the data after encrypting, carry out 3DES and be decrypted.
Below, by a concrete application example, further illustrate this programme:
In the time that smart mobile phone need to obtain vital document from server, smart mobile phone will send and obtain request of data to server.
Server authenticates smart mobile phone according to this request, after certification is passed through, sets up communication link, and sends and require smart mobile phone that the request of corresponding encryption key is provided to smart mobile phone.
Smart mobile phone is after the request of obtaining, to obtain the unique identifier UUID of self, and obtain the encryption key (detailed process as above, is not repeated) after distortion herein by deformation process, storage is local, and is sent to server by the communication link of setting up.
Server, receiving the encryption key after distortion of smart mobile phone transmission, by the encryption key using after distortion, is encrypted the data of request, and returns to smart mobile phone end.
After the data that smart mobile phone end returns at reception server, the key after the distortion of this locality storage is decrypted the data after encrypting.
Known by above-mentioned application example, in whole ciphering process, of paramount importance key is generated voluntarily by smart mobile phone, avoids the possibility leaking; Moreover by deformation process, greatly improve decrypted difficulty, further improve the fail safe of data; In addition, smart mobile phone is unique corresponding with key, and miscellaneous equipment cannot use, and ensures the fail safe of data.
More than show and described general principle of the present invention, principal character and advantage of the present invention.The technical staff of the industry should understand; the present invention is not restricted to the described embodiments; that in above-described embodiment and specification, describes just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and equivalent thereof.

Claims (3)

1. the data ciphering method based on 3DES, described encryption method is carried out password in employing 3DES data encryption mode to be-encrypted data, it is characterized in that, and described method is out of shape the key in cipher mode before cryptographic operation.
2. a kind of data ciphering method based on 3DES according to claim 1, is characterized in that, described method is carried out MD5, front 16 distortion to key.
3. a kind of data ciphering method based on 3DES according to claim 2, is characterized in that, the concrete steps of described method are as follows:
1) obtain the unique identifier of smart mobile phone as the prototype of encryption key, carry out obtaining first 16 after SHA1 processing, and change 16 systems;
2) to processing through step (1) the 16 system data that obtain, carry out PBOC computing, obtain encryption key; Concrete steps are as follows:
(21) dispersion factor is got to first 8, and carried out inversion operation;
(22) by the result of front 8 and front 8 negates of dispersion factor, carry out respectively 3DES operation, obtain result A and B;
(23) by the result of 3DES operation, combine according to B+A+B, obtain final result, as key.
3) plaintext to be encrypted is changed after 16 systems, use is out of shape through step (2) key obtaining and is encrypted operation.
CN201410280775.9A 2014-06-20 2014-06-20 Data encryption method based on 3DES Pending CN104038336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410280775.9A CN104038336A (en) 2014-06-20 2014-06-20 Data encryption method based on 3DES

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410280775.9A CN104038336A (en) 2014-06-20 2014-06-20 Data encryption method based on 3DES

Publications (1)

Publication Number Publication Date
CN104038336A true CN104038336A (en) 2014-09-10

Family

ID=51468934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410280775.9A Pending CN104038336A (en) 2014-06-20 2014-06-20 Data encryption method based on 3DES

Country Status (1)

Country Link
CN (1) CN104038336A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618093A (en) * 2015-01-16 2015-05-13 深圳市中兴物联科技有限公司 Data encrypting method and device
CN107688729A (en) * 2017-07-27 2018-02-13 大唐高鸿信安(浙江)信息科技有限公司 Protection system of application program and method based on trusted host
CN107979458A (en) * 2016-10-25 2018-05-01 北京计算机技术及应用研究所 A kind of two-dimensional bar data ciphering method
CN109327516A (en) * 2018-10-08 2019-02-12 马鞍山沐及信息科技有限公司 A kind of Energy Efficiency Analysis system based on big data
CN109698839A (en) * 2019-02-21 2019-04-30 湖南智远数通科技股份有限公司 A kind of desensitization data comparison method and device based on asymmetric arithmetic
CN110535816A (en) * 2018-05-24 2019-12-03 广东技术师范学院 A kind of safe data information transmission method
CN116667993A (en) * 2023-04-28 2023-08-29 江苏芯信电子科技有限公司 Block chain identity confirmation system based on big data and using device thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645288A (en) * 2003-12-16 2005-07-27 微软公司 Ensuring that a software update may be installed or run only on a specific device or class of devices
CN102082664A (en) * 2009-11-30 2011-06-01 腾讯科技(深圳)有限公司 Network data safety transmission system and network data safety transmission method
CN102571702A (en) * 2010-12-22 2012-07-11 中兴通讯股份有限公司 Key generation method, system and equipment in Internet of things

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645288A (en) * 2003-12-16 2005-07-27 微软公司 Ensuring that a software update may be installed or run only on a specific device or class of devices
CN102082664A (en) * 2009-11-30 2011-06-01 腾讯科技(深圳)有限公司 Network data safety transmission system and network data safety transmission method
CN102571702A (en) * 2010-12-22 2012-07-11 中兴通讯股份有限公司 Key generation method, system and equipment in Internet of things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
***通信有限公司: "移动公话专用SIM卡技术规范", 《***通信企业标准》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618093A (en) * 2015-01-16 2015-05-13 深圳市中兴物联科技有限公司 Data encrypting method and device
CN104618093B (en) * 2015-01-16 2019-07-19 高新兴物联科技有限公司 Data ciphering method and device
CN107979458A (en) * 2016-10-25 2018-05-01 北京计算机技术及应用研究所 A kind of two-dimensional bar data ciphering method
CN107688729A (en) * 2017-07-27 2018-02-13 大唐高鸿信安(浙江)信息科技有限公司 Protection system of application program and method based on trusted host
CN110535816A (en) * 2018-05-24 2019-12-03 广东技术师范学院 A kind of safe data information transmission method
CN109327516A (en) * 2018-10-08 2019-02-12 马鞍山沐及信息科技有限公司 A kind of Energy Efficiency Analysis system based on big data
CN109698839A (en) * 2019-02-21 2019-04-30 湖南智远数通科技股份有限公司 A kind of desensitization data comparison method and device based on asymmetric arithmetic
CN109698839B (en) * 2019-02-21 2021-07-06 湖南智远数通科技股份有限公司 Desensitization data comparison method and device based on asymmetric algorithm
CN116667993A (en) * 2023-04-28 2023-08-29 江苏芯信电子科技有限公司 Block chain identity confirmation system based on big data and using device thereof

Similar Documents

Publication Publication Date Title
US11930103B2 (en) Method, user device, management device, storage medium and computer program product for key management
CN104038336A (en) Data encryption method based on 3DES
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
TWI536790B (en) Communication method using fingerprint information authentication
WO2019109097A1 (en) Identity verification document request handling utilizing a user certificate system and user identity document repository
CN110677382A (en) Data security processing method, device, computer system and storage medium
CN106506479B (en) Method, system and the client of cipher authentication, server and smart machine
CN104243149A (en) Encrypting and decrypting method, device and server
CN112966287B (en) Method, system, device and computer readable medium for acquiring user data
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN103051459B (en) The management method of the transaction key of safety card and device
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN103731423A (en) Safe method for repeated data deleting
WO2017080356A1 (en) Secure input method, device and system
CN102222188A (en) Information system user password generation method
CN113422832B (en) File transmission method, device, equipment and storage medium
CN102932345B (en) A kind of information transferring method, Apparatus and system
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
CN104038337A (en) Data encryption method based on AES128
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal
CN115883199A (en) File transmission method and device, electronic equipment and storage medium
CN104579692A (en) Information processing method on basis of intelligent card
CN112565156B (en) Information registration method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140910