CN109005151A - A kind of encryption of information, decryption processing method and processing terminal - Google Patents

A kind of encryption of information, decryption processing method and processing terminal Download PDF

Info

Publication number
CN109005151A
CN109005151A CN201810607013.3A CN201810607013A CN109005151A CN 109005151 A CN109005151 A CN 109005151A CN 201810607013 A CN201810607013 A CN 201810607013A CN 109005151 A CN109005151 A CN 109005151A
Authority
CN
China
Prior art keywords
encryption
information
key
terminal
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810607013.3A
Other languages
Chinese (zh)
Inventor
王培海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Feixun Information Technology Co Ltd
Original Assignee
Sichuan Feixun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Feixun Information Technology Co Ltd filed Critical Sichuan Feixun Information Technology Co Ltd
Priority to CN201810607013.3A priority Critical patent/CN109005151A/en
Publication of CN109005151A publication Critical patent/CN109005151A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encryption of information, decryption processing method and processing terminals, are related to field of information transmission.Include: first terminal according to the first encryption keys information to be transmitted, obtains the first encryption information;For the first terminal according to first encryption key and the second encryption key, the first encryption information described in common cryptographic obtains Hybrid Encryption information;The first terminal obtains the second encryption information according to Hybrid Encryption information described in second encryption keys;Characteristic information and second encryption information are sent to second terminal by the first terminal.The complexity for increasing cipher mode reduces the possibility of interceptor's breaking encryption information, protects the safety of information to be transmitted.

Description

A kind of encryption of information, decryption processing method and processing terminal
Technical field
The present invention relates to field of information transmission, espespecially a kind of information encryption, decryption processing method and processing terminal.
Background technique
With the development of internet technology with application, the function of instant messaging application program also gradually becoming strong, user it Between and user and server between there is more information interchange, therefore the security performance in order to protect information, Yong Hu When sending corresponding information, the information sent to needs is needed to encrypt, form encryption information and sent, avoids other equipment It decodes, reduces the possibility of user information leakage, while receiving the equipment of the encryption information also specific mode is come to decryption, Obtain corresponding information.
Currently, information before carrying out data transmission, generallys use single layer cipher mode, but either symmetry encryption side Method or unsymmetrical tridiagonal matrix method, it is larger with the information association degree that needed to send originally due to encrypted information, it cuts When the person of obtaining gets corresponding decruption key, the information of intercepting and capturing can be decrypted, user needs information to be protected to be easy to let out Dew, security performance when information is transmitted is lower, is unfavorable for the protection of information security.
Summary of the invention
The object of the present invention is to provide a kind of encryption of information, decryption processing method and processing terminals, increase cipher mode Complexity, reduce the possibility of interceptor's breaking encryption information, protect the safety of information to be transmitted.
Technical solution provided by the invention is as follows:
A kind of information cipher processing method, comprising: first terminal is obtained according to the first encryption keys information to be transmitted First encryption information;The first terminal is according to first encryption key and the second encryption key, first described in common cryptographic Encryption information obtains Hybrid Encryption information;The first terminal is believed according to Hybrid Encryption described in second encryption keys Breath, obtains the second encryption information;Characteristic information and second encryption information are sent to second terminal by the first terminal.
Further, the first terminal is according to first encryption key and the second encryption key, described in common cryptographic One encryption information obtains Hybrid Encryption information, comprising: in conjunction with first encryption key and the second encryption key, according to default The first interference code is calculated in algorithm;At least one first interference code is added in any position of first encryption information, Obtain Hybrid Encryption information.
An object of the present invention also resides in a kind of information decryption processing method, comprising: second terminal receive first When the characteristic information that terminal is sent, corresponding first decruption key of the characteristic information and the second decruption key are obtained;Described Two terminals are decrypted the second encryption information that the first terminal received is sent, are mixed according to second decruption key Close encryption information;The second terminal is according to Hybrid Encryption described in first decruption key and second decryption key decryption Information obtains the first encryption information;The second terminal is obtained according to the first encryption information described in first decryption key decryption To information to be transmitted.
Further, the second terminal is according to Hybrid Encryption described in first decruption key and the second decryption key decryption Information obtains the first encryption information, comprising: in conjunction with first decruption key and the second decruption key, and according to preset algorithm, The second interference code is calculated;Judge dry with the presence or absence of being exactly matched with second interference code in the Hybrid Encryption information Disturb information;Interference information in the Hybrid Encryption information with second interference code exact matching is deleted, first is obtained and adds Confidential information.
Further, the method also includes: the second terminal is after the completion of second encryption information is decrypted, described Two terminals regenerate third key pair and the 4th key pair;The third key pair includes third encryption key and third decryption Key, the 4th encryption key of the 4th key pair and the 4th decruption key, the third encryption key and the 4th encryption key According to preset algorithm, the third interference code being calculated, with the third decruption key and the 4th decruption key according to pre- imputation Method, the 4th interference code being calculated are identical;The second terminal is close by third decruption key replacement first decryption 4th decruption key is replaced second decruption key by key;The second terminal is by the third encryption key, described The feedback information is sent to the first terminal as feedback information by the 4th encryption key and decrypted result.
An object of the present invention, which also resides in, provides a kind of information encryption terminal, comprising: direct encrypting module is used for According to the first encryption keys information to be transmitted, the first encryption information is obtained;And for according to the second encryption keys Hybrid Encryption information obtains the second encryption information;Hybrid Encryption module, for being encrypted according to first encryption key and second Key, the first encryption information described in common cryptographic, obtains Hybrid Encryption information;First communication module, for by characteristic information and Second encryption information is sent to second terminal.
Further, the Hybrid Encryption module includes: the first computational submodule, in conjunction with first encryption key and The first interference code is calculated according to preset algorithm in second encryption key;First change submodule, for by least one the One interference code is added in any position of first encryption information, obtains Hybrid Encryption information.
An object of the present invention, which also resides in, provides a kind of information decryption processing terminal, comprising: second communication module is used for Receive the characteristic information and the second encryption information that first terminal is sent;Cipher key match module, for obtaining the characteristic information Corresponding first decruption key and the second decruption key;Direct deciphering module, for decrypting institute according to second decruption key The second encryption information is stated, Hybrid Encryption information is obtained;And be used for according to first encryption information of the first decryption key decryption, Obtain information to be transmitted;Deciphering module is mixed, for according to first decruption key and the second decryption key decryption institute Hybrid Encryption information is stated, the first encryption information is obtained.
Further, the mixing deciphering module includes: the second computational submodule, in conjunction with first decruption key and Second decruption key, and according to preset algorithm, the second interference code is calculated;Information matches submodule, it is described mixed for judging It closes in encryption information with the presence or absence of the interference information exactly matched with second interference code;Second change submodule, being used for will Interference information in the Hybrid Encryption information with second interference code exact matching is deleted, and the first encryption information is obtained.
Further, the system also includes key production module, for after the completion of second encryption information decryption, The second terminal regenerates third key pair and the 4th key pair;The third key pair includes third encryption key and Three decruption keys, the 4th encryption key of the 4th key pair and the 4th decruption key, the third encryption key and the 4th add Key is according to preset algorithm, the third interference code being calculated, with the third decruption key and the 4th decruption key according to Preset algorithm, the 4th interference code being calculated are identical;
Second key changes module, for the third decruption key to be replaced first decruption key, by described the Four decruption keys replace second decruption key;Generation module is fed back, for adding the third encryption key, the described 4th The feedback information is sent to the first terminal as feedback information by key and decrypted result.
Compared with prior art, a kind of encryption of information, decryption processing method and processing terminal provided by the invention have with It is lower the utility model has the advantages that
1, after being encrypted for the first time to information to be transmitted, the first encryption information is encrypted jointly by two encryption keys, Obtained Hybrid Encryption information, avoid it is original using Crypted password gradually encryption information the step of, pass through common cryptographic Encryption method increases the complexity of cipher mode, reduces the possibility of interceptor's breaking encryption information, protects letter to be transmitted The safety of breath.
2, the mode of common cryptographic is realized the first interference code is calculated as the factor by two encryption keys, Again by the first interference code addition in the first encryption information, destroy original information characteristics, reduce Hybrid Encryption information with Difference between first encryption information increases the complexity of cipher mode, reduces the possibility of interceptor's breaking encryption information, Protect the safety of information to be transmitted.
3, for first terminal after being sent completely the second encryption information, first terminal can receive second terminal transmission Feedback information, realize information transmission negative-feedback;And when receiving feedback information, it is current that first terminal can replace it The first encryption key and the second encryption key, the effect of a transmission primaries key is realized, even if then interceptor obtains After having got the first encryption key and the second encryption key, it is also difficult to continue to decode the possibility of remaining information to be transmitted, increase Safety when information transmission.
Detailed description of the invention
Below by clearly understandable mode, preferred embodiment is described with reference to the drawings, at a kind of encryption of information, decryption Above-mentioned characteristic, technical characteristic, advantage and its implementation of reason method and processing terminal are further described.
Fig. 1 is a kind of flow diagram of information cipher processing method of the present invention;
Fig. 2 is the flow diagram of another information cipher processing method of the invention;
Fig. 3 is the flow diagram of another information cipher processing method of the invention;
Fig. 4 is a kind of flow diagram of information decryption processing method of the present invention;
Fig. 5 is the flow diagram of another information decryption processing method of the invention;
Fig. 6 is the flow diagram of another information decryption processing method of the invention;
Fig. 7 is a kind of structural schematic diagram of information encryption terminal of the present invention;
Fig. 8 is the structural schematic diagram of Hybrid Encryption module in a kind of information encryption terminal of the present invention;
Fig. 9 is a kind of structural schematic diagram of information decryption processing terminal of the present invention;
Figure 10 is the structural schematic diagram that deciphering module is mixed in a kind of information decryption processing terminal of the present invention.
Drawing reference numeral explanation: 11. direct encrypting modules, 12. Hybrid Encryption modules, 121. first computational submodules, 122. First change submodule, 13. first communication modules, 14. first keys change module, 21. second communication modules, 22. keys With module, 23. direct deciphering modules, 24. mixing deciphering modules, 241. second computational submodules, 242. information matches submodules Block, 243. second change submodules, 25. key production modules, 26. second keys change module, 27. feedback generation modules.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed below A specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented Its practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understand Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated " only this ", can also indicate the situation of " more than one ".
A kind of embodiment provided according to the present invention, as shown in Figure 1, a kind of information cipher processing method, comprising:
First terminal obtains the first encryption information according to the first encryption keys information to be transmitted.
The first terminal is according to first encryption key and the second encryption key, the first encryption letter described in common cryptographic Breath, obtains Hybrid Encryption information.
The first terminal obtains the second encryption letter according to Hybrid Encryption information described in second encryption keys Breath.
Characteristic information and second encryption information are sent to second terminal by the first terminal.
Specifically, in the present embodiment, first terminal and second terminal refer mainly to two terminals of information transmission, and first eventually End refers mainly to client, and second terminal refers mainly to server.And information transmission before, server need to firstly generate two it is close Key pair, and the encryption key of two cipher key pairs is sent to corresponding client, and in server, remaining two are solved Key and the characteristic information of equipment establish corresponding mapping, that is, form a set;Characteristic information refers mainly to the MAC of equipment The IP address and/or device name of address and/or fixation.
The first encryption keys information to be transmitted can be used in first terminal, encrypts it for the first time to information to be transmitted Afterwards, the first encryption information is encrypted jointly by two encryption keys, has obtained Hybrid Encryption information, has avoided original use Crypted password gradually encryption information the step of.
By the encryption method of common cryptographic, the complexity of cipher mode is increased, reduces interceptor's breaking encryption letter The possibility of breath protects the safety of information to be transmitted.
Another embodiment provided according to the present invention, as shown in Fig. 2, a kind of information cipher processing method, comprising:
First terminal obtains the first encryption information according to the first encryption keys information to be transmitted.
The first terminal is calculated in conjunction with first encryption key and the second encryption key according to preset algorithm First interference code.
By the addition of at least one first interference code in any position of first encryption information, Hybrid Encryption letter is obtained Breath.
The first terminal obtains the second encryption letter according to Hybrid Encryption information described in second encryption keys Breath.
Characteristic information and second encryption information are sent to second terminal by the first terminal.
Specifically, in the present embodiment, real the first interference code is calculated by two encryption keys as the factor The mode of common cryptographic is showed, then the addition of the first interference code is destroyed original information characteristics, subtracted in the first encryption information Small difference between Hybrid Encryption information and the first encryption information, increases the complexity of cipher mode, reduces interceptor The possibility of breaking encryption information protects the safety of information to be transmitted.
Specifically, preset algorithm can be the first encryption key and the addition of the second encryption key, and exclusive or makes the difference or congruence The methods of, it is preferred that preset algorithm is congruence, i.e. the first encryption key and the second encryption key to the first interference code congruence, into One step reduces directly contacting between the first interference code and the first encryption key and the second encryption key, reduces code breaker and exists After getting the first encryption key and the second encryption key, analysis obtains the possibility of the first interference code.
In the present embodiment, by the addition of several first interference codes in the first encryption information, multiple first is dry if it exists Scrambling code, multiple first interference codes are mutually indepedent, and in the first interference code adding procedure, do not destroy original first interference code Structure, i.e., each first interference code keeps its complete structure, and multiple first interference codes can be continuously arranged, mutually not shadow It rings;Therefore, in decrypting process, the first interference code is able to maintain its integrality, is detected, the decoding process of realization.
Preferably, in the present embodiment, the first interference code only needs to be arranged in the front end and/or most of the first encryption information Rear end, and first interference code is at least set, the change of the first encryption information can be completed, and without changing original first Encryption information.
Another embodiment provided according to the present invention, as shown in figure 3, a kind of information cipher processing method, comprising:
First terminal obtains the first encryption information according to the first encryption keys information to be transmitted.
The first terminal is according to first encryption key and the second encryption key, the first encryption letter described in common cryptographic Breath, obtains Hybrid Encryption information.
The first terminal obtains the second encryption letter according to Hybrid Encryption information described in second encryption keys Breath.
Characteristic information and second encryption information are sent to second terminal by the first terminal.
The first terminal adds the third in feedback information when receiving the feedback information that the second terminal is sent Key replaces first encryption key, and the 4th encryption key replacement second encryption in the feedback information is close Key.
Preferably, the first terminal is according to first encryption key and the second encryption key, described in common cryptographic One encryption information obtains Hybrid Encryption information, comprising:
The first interference code is calculated according to preset algorithm in conjunction with first encryption key and the second encryption key.
By the addition of at least one first interference code in any position of first encryption information, Hybrid Encryption letter is obtained Breath.
Specifically, in the present embodiment, for first terminal after being sent completely the second encryption information, first terminal can The feedback information for receiving second terminal transmission realizes the negative-feedback of information transmission, so that first terminal is when sending failure, It will be sent to second terminal after information to be transmitted encryption again, realizes the retransmission of information to be transmitted.
For first terminal when receiving feedback information, first terminal can replace its current the first encryption key and second Encryption key realizes the effect of a transmission primaries key, though then interceptor got the first encryption key and After second encryption key, it is also difficult to continue to decode the possibility of remaining information to be transmitted, increase safety when information transmission.
A kind of embodiment provided according to the present invention, as shown in figure 4, a kind of information decryption processing method, comprising:
When the characteristic information that the first terminal that second terminal receives is sent, corresponding first solution of the characteristic information is obtained Key and the second decruption key.
The second terminal is decrypted the first terminal received is sent second and is added according to second decruption key Confidential information obtains Hybrid Encryption information.
The second terminal is believed according to Hybrid Encryption described in first decruption key and second decryption key decryption Breath, obtains the first encryption information.
The second terminal obtains information to be transmitted according to the first encryption information described in first decryption key decryption.
Specifically, in the present embodiment, second terminal can find this feature information after receiving characteristic information Corresponding first decruption key and the second decruption key, complete key preliminary matches.And after matching, according to letter to be transmitted The reverse procedure in encryption for information direction is decrypted, and while decrypting is close using obtained the first decruption key of matching and the second decryption Key.
And in the present embodiment, the first encryption key and the first decruption key are capable of forming a first key pair, and One encryption key and the first decruption key can be identical, as symmetrical encryption and decryption mode, the first encryption key and the first solution Key can not also be identical, the encryption and decryption mode as asymmetric, it is preferable that the first encryption key and the second encryption key It is not identical.Similarly the second key pair that the second encryption key and the second decruption key are formed, or symmetrical encryption and decryption The encryption and decryption mode of mode or asymmetric.
Another embodiment provided according to the present invention, as shown in figure 5, a kind of information decryption processing method, comprising:
When the characteristic information that the first terminal that second terminal receives is sent, corresponding first solution of the characteristic information is obtained Key and the second decruption key.
The second terminal is decrypted the first terminal received is sent second and is added according to second decruption key Confidential information obtains Hybrid Encryption information.
The second terminal is calculated in conjunction with first decruption key and the second decruption key, and according to preset algorithm To the second interference code.
Judge in the Hybrid Encryption information with the presence or absence of the interference information exactly matched with second interference code.
Interference information in the Hybrid Encryption information with second interference code exact matching is deleted, first is obtained and adds Confidential information.
The second terminal obtains information to be transmitted according to the first encryption information described in first decryption key decryption.
Specifically, in the present embodiment, second terminal can be first depending on the first decruption key and the second decruption key obtains The second interference code is got, and the preset algorithm in second terminal is identical as the preset algorithm in first terminal, and by pre- imputation After method calculates, the second interference code is identical with the first interference code, and therefore, second terminal only needs to judge in Hybrid Encryption information With the presence or absence of the interference information, since each interference information is mutually indepedent, the interference information in mixed information is directly deleted After removing, the first encryption information can be directly obtained, the mixing for realizing the first decruption key and the second decruption key is decrypted.
A kind of embodiment provided according to the present invention, as shown in fig. 6, a kind of information decryption processing method, comprising:
When the characteristic information that the first terminal that second terminal receives is sent, corresponding first solution of the characteristic information is obtained Key and the second decruption key.
The second terminal is decrypted the first terminal received is sent second and is added according to second decruption key Confidential information obtains Hybrid Encryption information.
The second terminal is believed according to Hybrid Encryption described in first decruption key and second decryption key decryption Breath, obtains the first encryption information.
The second terminal obtains information to be transmitted according to the first encryption information described in first decryption key decryption.
For the second terminal after the completion of second encryption information is decrypted, the second terminal regenerates third key To and the 4th key pair;The third key pair includes third encryption key and third decruption key, the 4th key pair Four encryption keys and the 4th decruption key, the third encryption key and the 4th encryption key are calculated according to preset algorithm Third interference code, with the third decruption key and the 4th decruption key according to preset algorithm, be calculated the 4th interference Code is identical.
The third decruption key is replaced first decruption key by the second terminal, by the 4th decruption key Replace second decruption key.
The second terminal is using the third encryption key, the 4th encryption key and decrypted result as feedback letter Breath, is sent to the first terminal for the feedback information.
Preferably, the second terminal is according to Hybrid Encryption described in first decruption key and the second decryption key decryption Information obtains the first encryption information, comprising:
In conjunction with first decruption key and the second decruption key, and according to preset algorithm, the second interference code is calculated.
Judge in the Hybrid Encryption information with the presence or absence of the interference information exactly matched with second interference code.
Interference information in the Hybrid Encryption information with second interference code exact matching is deleted, first is obtained and adds Confidential information.
Specifically, in the present embodiment, after the completion of the decryption of the second encryption information, successful decryption or decryption failure can be obtained As a result, the decrypted result can be sent to first terminal by second terminal.Second terminal decryption after the completion of, second terminal with Carry out the encryption method for once transmitting a kind of key between first terminal, second terminal can generate new first key to and Two key pairs, new second the second encryption key of key pair and the second decruption key, the first encryption key and the second encryption key According to preset algorithm, the first interference code being calculated, with the first decruption key and the second decruption key according to preset algorithm, meter The second obtained interference code is identical, can be realized the corresponding first key of generation to and the second key pair match.
And in the present embodiment, when sending decrypted result, second terminal can be using newly-generated decruption key as itself The key of subsequent decryption, while decrypted result and two encryption keys being transmitted to first terminal, on the one hand complete decryption Feedback, on the other hand, realize the transmission of encryption key.
A kind of embodiment provided according to the present invention, as shown in Figure 7 and Figure 8, a kind of information encryption terminal, comprising:
Direct encrypting module 11, for obtaining the first encryption information according to the first encryption keys information to be transmitted;With And for obtaining the second encryption information according to the second encryption keys Hybrid Encryption information.
Hybrid Encryption module 12, for according to first encryption key and the second encryption key, the described in common cryptographic One encryption information obtains Hybrid Encryption information.
The Hybrid Encryption module 12 includes:
First computational submodule 121, for being imputed according to pre- in conjunction with first encryption key and the second encryption key The first interference code is calculated in method.
First change submodule 122, for the appointing in first encryption information by the addition of at least one first interference code Meaning position, obtains Hybrid Encryption information.
First communication module 13, for characteristic information and second encryption information to be sent to second terminal.
First key changes module 14, when the first communication module 13 is in the feedback for receiving the second terminal transmission When information, the third encryption key in feedback information is replaced the first encryption key by the first key change module 14, and will The 4th encryption key in the feedback information replaces the second encryption key.
By the addition of above-mentioned module, the ciphering process of first terminal can be realized, specific method is shown in that corresponding method is real Apply example.
A kind of embodiment provided according to the present invention, as shown in Figure 9 and Figure 10, a kind of information decryption processing terminal, comprising:
Second communication module 21, for receiving the characteristic information and the second encryption information of first terminal transmission.
Cipher key match module 22, for close in corresponding first decruption key of the acquisition characteristic information and the second decryption Key.
Direct deciphering module 23, for decrypting second encryption information, being mixed according to second decruption key Encryption information;And for obtaining information to be transmitted according to first encryption information of the first decryption key decryption.
Deciphering module 24 is mixed, for mixing according to described in first decruption key and second decryption key decryption Encryption information obtains the first encryption information.
The mixing deciphering module 24 includes:
Second computational submodule 241, for being imputed in conjunction with first decruption key and the second decruption key, and according to pre- The second interference code is calculated in method.
Information matches submodule 242 whether there is and second interference code in the Hybrid Encryption information for judging The interference information of exact matching.
Second change submodule 243, for by the Hybrid Encryption information with second interference code exact matching Interference information is deleted, and the first encryption information is obtained.
Key production module 25, for after the completion of second encryption information decryption, the second terminal to be regenerated Third key pair and the 4th key pair;The third key pair includes third encryption key and third decruption key, and the described 4th The 4th encryption key of key pair and the 4th decruption key, the third encryption key and the 4th encryption key according to preset algorithm, The third interference code being calculated is calculated with the third decruption key and the 4th decruption key according to preset algorithm 4th interference code is identical.
Second key changes module 26, will be described for the third decruption key to be replaced first decruption key 4th decruption key replaces second decruption key.
Feed back generation module 27, for using the third encryption key, the 4th encryption key and decrypted result as The feedback information is sent to the first terminal by feedback information.
The decrypting process of second terminal can be completed in addition through the above steps, and specific steps are shown in that corresponding method is implemented Example.
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferred Embodiment, it is noted that for those skilled in the art, in the premise for not departing from the principle of the invention Under, several improvements and modifications can also be made, these modifications and embellishments should also be considered as the scope of protection of the present invention.

Claims (10)

1. a kind of information cipher processing method characterized by comprising
First terminal obtains the first encryption information according to the first encryption keys information to be transmitted;
The first terminal is according to first encryption key and the second encryption key, the first encryption information described in common cryptographic, Obtain Hybrid Encryption information;
The first terminal obtains the second encryption information according to Hybrid Encryption information described in second encryption keys;
Characteristic information and second encryption information are sent to second terminal by the first terminal.
2. a kind of information cipher processing method according to claim 1, it is characterised in that: the first terminal is according to described in First encryption key and the second encryption key, the first encryption information described in common cryptographic, obtain Hybrid Encryption information, comprising:
The first interference code is calculated according to preset algorithm in conjunction with first encryption key and the second encryption key;
At least one first interference code is added in any position of first encryption information, Hybrid Encryption information is obtained.
3. a kind of information decryption processing method characterized by comprising
When the characteristic information that the first terminal that second terminal receives is sent, it is close to obtain corresponding first decryption of the characteristic information Key and the second decruption key;
The second terminal decrypts the second encryption letter that the first terminal received is sent according to second decruption key Breath, obtains Hybrid Encryption information;
The second terminal is obtained according to Hybrid Encryption information described in first decruption key and second decryption key decryption To the first encryption information;
The second terminal obtains information to be transmitted according to the first encryption information described in first decryption key decryption.
4. a kind of information decryption processing method according to claim 3, it is characterised in that: the second terminal is according to described in Hybrid Encryption information described in first decruption key and the second decryption key decryption, obtains the first encryption information, comprising:
In conjunction with first decruption key and the second decruption key, and according to preset algorithm, the second interference code is calculated;
Judge in the Hybrid Encryption information with the presence or absence of the interference information exactly matched with second interference code;
Interference information in the Hybrid Encryption information with second interference code exact matching is deleted, the first encryption letter is obtained Breath.
5. a kind of information decryption processing method according to claim 3 or 4, which is characterized in that the method also includes:
The second terminal after the completion of second encryption information is decrypted, the second terminal regenerate third key pair and 4th key pair;The third key pair includes third encryption key and third decruption key, and the 4th key pair the 4th adds Key and the 4th decruption key, the third encryption key and the 4th encryption key according to preset algorithm, be calculated Three interference codes, with the third decruption key and the 4th decruption key according to preset algorithm, the 4th interference code phase that is calculated Together;
The third decruption key is replaced first decruption key by the second terminal, and the 4th decruption key is replaced Second decruption key;
The second terminal, will using the third encryption key, the 4th encryption key and decrypted result as feedback information The feedback information is sent to the first terminal.
6. a kind of information encryption terminal characterized by comprising
Direct encrypting module, for obtaining the first encryption information according to the first encryption keys information to be transmitted;And it is used for According to the second encryption keys Hybrid Encryption information, the second encryption information is obtained;
Hybrid Encryption module, for according to first encryption key and the second encryption key, the first encryption described in common cryptographic Information obtains Hybrid Encryption information;
First communication module, for characteristic information and second encryption information to be sent to second terminal.
7. a kind of information encryption terminal according to claim 6, which is characterized in that the Hybrid Encryption module packet It includes:
First computational submodule, for being calculated in conjunction with first encryption key and the second encryption key according to preset algorithm To the first interference code;
First change submodule, for adding at least one first interference code in any position of first encryption information, Obtain Hybrid Encryption information.
8. a kind of information decryption processing terminal characterized by comprising
Second communication module, for receiving the characteristic information and the second encryption information of first terminal transmission;
Cipher key match module, for obtaining corresponding first decruption key of the characteristic information and the second decruption key;
Direct deciphering module obtains Hybrid Encryption letter for decrypting second encryption information according to second decruption key Breath;And for obtaining information to be transmitted according to first encryption information of the first decryption key decryption;
Deciphering module is mixed, for believing according to Hybrid Encryption described in first decruption key and second decryption key decryption Breath, obtains the first encryption information.
9. a kind of information decryption processing terminal according to claim 8, which is characterized in that the mixing deciphering module packet It includes:
Second computational submodule is used in conjunction with first decruption key and the second decruption key, and according to preset algorithm, is calculated Obtain the second interference code;
Information matches submodule exactly matches in the Hybrid Encryption information with the presence or absence of with second interference code for judging Interference information;
Second change submodule, the interference information for will be exactly matched in the Hybrid Encryption information with second interference code It deletes, obtains the first encryption information.
10. a kind of information decryption processing terminal according to claim 8 or claim 9, which is characterized in that the system also includes:
Key production module, for after the completion of second encryption information decryption, it is close that the second terminal regenerates third Key to and the 4th key pair;The third key pair includes third encryption key and third decruption key, the 4th key pair 4th encryption key and the 4th decruption key, the third encryption key and the 4th encryption key are calculated according to preset algorithm The third interference code arrived, with the third decruption key and the 4th decruption key according to preset algorithm, the 4th be calculated is dry Scrambling code is identical;
Second key changes module, for the third decruption key to be replaced first decruption key, by the 4th solution Key replaces second decruption key;
Generation module is fed back, for using the third encryption key, the 4th encryption key and decrypted result as feedback letter Breath, is sent to the first terminal for the feedback information.
CN201810607013.3A 2018-06-13 2018-06-13 A kind of encryption of information, decryption processing method and processing terminal Pending CN109005151A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810607013.3A CN109005151A (en) 2018-06-13 2018-06-13 A kind of encryption of information, decryption processing method and processing terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810607013.3A CN109005151A (en) 2018-06-13 2018-06-13 A kind of encryption of information, decryption processing method and processing terminal

Publications (1)

Publication Number Publication Date
CN109005151A true CN109005151A (en) 2018-12-14

Family

ID=64601928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810607013.3A Pending CN109005151A (en) 2018-06-13 2018-06-13 A kind of encryption of information, decryption processing method and processing terminal

Country Status (1)

Country Link
CN (1) CN109005151A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401542A (en) * 2019-08-05 2019-11-01 中国工商银行股份有限公司 Electronic identity voucher generation method, terminal and server
CN110636502A (en) * 2019-09-23 2019-12-31 华南理工大学 Wireless encryption communication method and system
CN110995431A (en) * 2019-12-27 2020-04-10 北京车和家信息技术有限公司 Method and device for replacing secret key
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN106899607A (en) * 2017-03-21 2017-06-27 杭州迪普科技股份有限公司 The method and device that a kind of information encryption is sent and decryption is received
CN107222501A (en) * 2017-07-06 2017-09-29 中国电子科技集团公司第二十九研究所 A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
CN107395603A (en) * 2017-07-28 2017-11-24 移康智能科技(上海)股份有限公司 The encryption and decryption method of control instruction transmission, terminal device/server
CN107800716A (en) * 2017-11-14 2018-03-13 中国银行股份有限公司 A kind of data processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN106899607A (en) * 2017-03-21 2017-06-27 杭州迪普科技股份有限公司 The method and device that a kind of information encryption is sent and decryption is received
CN107222501A (en) * 2017-07-06 2017-09-29 中国电子科技集团公司第二十九研究所 A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
CN107395603A (en) * 2017-07-28 2017-11-24 移康智能科技(上海)股份有限公司 The encryption and decryption method of control instruction transmission, terminal device/server
CN107800716A (en) * 2017-11-14 2018-03-13 中国银行股份有限公司 A kind of data processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401542A (en) * 2019-08-05 2019-11-01 中国工商银行股份有限公司 Electronic identity voucher generation method, terminal and server
CN110636502A (en) * 2019-09-23 2019-12-31 华南理工大学 Wireless encryption communication method and system
CN110995431A (en) * 2019-12-27 2020-04-10 北京车和家信息技术有限公司 Method and device for replacing secret key
CN114221792A (en) * 2021-11-23 2022-03-22 杭州天宽科技有限公司 Internet data transmission encryption system
CN114221792B (en) * 2021-11-23 2023-06-16 杭州天宽科技有限公司 Internet data transmission encryption system

Similar Documents

Publication Publication Date Title
CN107086915B (en) Data transmission method, data sending end and data receiving end
US8687800B2 (en) Encryption method for message authentication
CN105162599B (en) A kind of data transmission system and its transmission method
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN107342977A (en) Suitable for the information security method of point-to-point instant messaging
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
CN112702318A (en) Communication encryption method, decryption method, client and server
CN109005027B (en) Random data encryption and decryption method, device and system
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN112073115B (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
CN104243494A (en) Data processing method
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
JPH09312643A (en) Key sharing method and ciphering communication method
CN110022204B (en) Method for enhancing security of file secret communication based on content true randomization segmentation
CN112702332B (en) Chain key exchange method, client, server and system
CN107566119A (en) A kind of guard method of eSIM cards data safety and system
CN101500146A (en) Digital television receiving control method and apparatus based on bi-directional network
CN108494554A (en) A kind of data symmetric encryption method based on double plaintexts
Nithya et al. An Analysis on Cryptographic Algorithms for Handling Network Security Threats
CN112235789A (en) Interrupt recoverable secret communication processing method, device and system
CN101500147B (en) Digital television receiving control method and apparatus based on bi-directional network
CN117459325B (en) Three-party data communication method combining quantum communication and conventional communication
CN116886208B (en) Information encryption transmission method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181214