CN110474758A - One kind is read based on python dynamic, enciphering configuration method is written - Google Patents
One kind is read based on python dynamic, enciphering configuration method is written Download PDFInfo
- Publication number
- CN110474758A CN110474758A CN201810441384.9A CN201810441384A CN110474758A CN 110474758 A CN110474758 A CN 110474758A CN 201810441384 A CN201810441384 A CN 201810441384A CN 110474758 A CN110474758 A CN 110474758A
- Authority
- CN
- China
- Prior art keywords
- encryption
- aes
- saes
- key
- configuration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000009434 installation Methods 0.000 claims abstract description 8
- 238000006243 chemical reaction Methods 0.000 claims abstract description 7
- 238000001275 scanning Auger electron spectroscopy Methods 0.000 claims description 43
- 125000004122 cyclic group Chemical group 0.000 claims description 6
- 238000012795 verification Methods 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
In order to overcome existing development technique often to there is safety issue, data are easily read and check the present invention;Data are easily tampered, and lack the shortcoming of verification scheme, provide a kind of one kind using AES Advanced Encryption Standard be based on python dynamic read, write-in enciphering configuration method.It the described method comprises the following steps: obtaining configuration information, during configuring JSON sequence chemical conversion binary file, carry out AES encryption, generate configuration file;Configuration file is written in IOS application installation package.The python dynamic that this programme is intended to for AES Advanced Encryption Standard being applied to IOS system is read, in write-in encryption configuration.Data in the prior art are solved easily to be read and check;Data are easily tampered, and lack the safety issue of verification scheme.
Description
Technical field
The present invention relates to field of computer technology, especially device configuration wiring method.
Background technique
IOS system is the mobile terminal operating system that smart terminal product uses under apple, in ios platform development process
It needs to configure and be read by python dynamic, by JSON serializing at file, IOS application installation package is written.But it is existing
Development technique often there is safety issue, data are easily read and check;Data are easily tampered, and lack verification scheme.
AES Advanced Encryption Standard is same as its former standard DES, and Rijndael uses replacement-permutation network, and
Non- Feistel framework.AES on software and hardware can rapidly encryption and decryption, be comparatively relatively easy to implementation, and only need very
Few memory.The encryption standard new as one, at present just by application deployment to more vast range.This programme be intended to by
The python dynamic that AES Advanced Encryption Standard is applied to IOS system is read, in write-in encryption configuration, effectively solves existing exploitation
The above problem in technology.
Summary of the invention
The present invention is to overcome existing development technique often to there is safety issue, and data are easily read and check;Number
According to being easily tampered, lack the shortcoming of verification scheme, a kind of one kind using AES Advanced Encryption Standard is provided and is based on python
Dynamic reads, enciphering configuration method is written.
To realize purpose, the invention adopts the following technical scheme:
One kind of the invention is based on python dynamic and reads, enciphering configuration method is written, and the described method comprises the following steps:
Configuration information is obtained, during configuring JSON sequence chemical conversion binary file, AES encryption is carried out, generates configuration file;Match
It sets in file write-in IOS application installation package.
Preferably, further including following steps: application operation when read encryption configuration file, by AES decryption and
The mode of JSON unserializing reads configuration information.
Preferably, the step of carrying out AES encryption includes: to simplify the encryption of version Encryption Algorithm by SAES Advanced Encryption Standard
AES Advanced Encryption Standard initial key is generated, and obtains AES encryption key after carrying out cipher key spreading to the AES initial key;
Information to be encrypted is encrypted by AES encryption algorithm using the AES encryption key, generates encryption data.
Preferably, it is described by SAES Encryption Algorithm encrypt generate AES initial key include: configuration SAES initial key
In plain text with SAES;SAES key handling is carried out to the SAES initial key, and cipher key spreading is carried out to processing result, is obtained
SAES encryption key;The SAES is encrypted by SAES Encryption Algorithm in plain text using the SAES encryption key, is generated
AES initial key.
Preferably, described the step of carrying out SAES key handling to SAES initial key includes: initial to the SAES
Data in key carry out cyclic shift processing;Key selection processing is carried out to cyclic shift treated data.
Present invention simultaneously provides a kind of based on the reading of python dynamic, write-in encryption configuration device, and described device includes: to add
Close module during configuring JSON sequence chemical conversion binary file, carries out AES encryption, generates for obtaining configuration information
Configuration file;Writing module, for configuration file to be written in IOS application installation package.
Preferably, described device further include:
Read module is decrypted, for reading encryption configuration file when application operation, passes through AES decryption and JSON inverted sequence
The mode of columnization reads configuration information.
Preferably, encrypting module includes AES encryption unit, the unit requires base described in 3-5 for perform claim
It is read in python dynamic, the step of enciphering configuration method is written.
The python dynamic that this programme is intended to for AES Advanced Encryption Standard being applied to IOS system reads, encryption configuration is written
In.Data in the prior art are solved easily to be read and check;Data are easily tampered, and lack the safety issue of verification scheme.
It is encrypted by SAES Encryption Algorithm and generates AES initial key, AES initial key is extended to AES encryption key, benefit
Encryption, which is carried out, with the AES encryption key pair of encryption information to be encrypted generates encryption data.To by introducing SAES algorithm pair
AES encryption key is encrypted, and the difficulty that cracks of AES encryption key is improved, and attacker needs first to crack AES encryption key,
It could go to crack AES again, improve AES encryption data on the whole cracks difficulty.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
The flow chart for the step of Fig. 2 is AES encryption of the invention
Fig. 3 is a kind of structural principle block diagram for being read based on python dynamic, encryption configuration device being written of the invention.
Specific embodiment
The present invention is described further with reference to the accompanying drawings and detailed description.
One kind of the invention is based on python dynamic and reads, enciphering configuration method is written, and the described method comprises the following steps:
Configuration information is obtained, during configuring JSON sequence chemical conversion binary file, AES encryption is carried out, generates configuration file;Match
It sets in file write-in IOS application installation package.
Preferably, further including following steps: application operation when read encryption configuration file, by AES decryption and
The mode of JSON unserializing reads configuration information.
Preferably, the step of carrying out AES encryption includes: to simplify the encryption of version Encryption Algorithm by SAES Advanced Encryption Standard
AES Advanced Encryption Standard initial key is generated, and obtains AES encryption key after carrying out cipher key spreading to the AES initial key;
Information to be encrypted is encrypted by AES encryption algorithm using the AES encryption key, generates encryption data.
Preferably, it is described by SAES Encryption Algorithm encrypt generate AES initial key include: configuration SAES initial key
In plain text with SAES;SAES key handling is carried out to the SAES initial key, and cipher key spreading is carried out to processing result, is obtained
SAES encryption key;The SAES is encrypted by SAES Encryption Algorithm in plain text using the SAES encryption key, is generated
AES initial key.
Preferably, described the step of carrying out SAES key handling to SAES initial key includes: initial to the SAES
Data in key carry out cyclic shift processing;Key selection processing is carried out to cyclic shift treated data.
Present invention simultaneously provides a kind of based on the reading of python dynamic, write-in encryption configuration device, and described device includes: to add
Close module during configuring JSON sequence chemical conversion binary file, carries out AES encryption, generates for obtaining configuration information
Configuration file;Writing module, for configuration file to be written in IOS application installation package.
Preferably, described device further include:
Read module is decrypted, for reading encryption configuration file when application operation, passes through AES decryption and JSON inverted sequence
The mode of columnization reads configuration information.
Preferably, encrypting module includes AES encryption unit, the unit requires base described in 3-5 for perform claim
It is read in python dynamic, the step of enciphering configuration method is written.
The python dynamic that this programme is intended to for AES Advanced Encryption Standard being applied to IOS system reads, encryption configuration is written
In.Data in the prior art are solved easily to be read and check;Data are easily tampered, and lack the safety issue of verification scheme.
It is encrypted by SAES Encryption Algorithm and generates AES initial key, AES initial key is extended to AES encryption key, benefit
Encryption, which is carried out, with the AES encryption key pair of encryption information to be encrypted generates encryption data.To by introducing SAES algorithm pair
AES encryption key is encrypted, and the difficulty that cracks of AES encryption key is improved, and attacker needs first to crack AES encryption key,
It could go to crack AES again, improve AES encryption data on the whole cracks difficulty.
Claims (8)
1. one kind is read based on python dynamic, write-in enciphering configuration method, characterized in that the described method comprises the following steps:
Configuration information is obtained, during configuring JSON sequence chemical conversion binary file, AES encryption is carried out, generates configuration text
Part;
Configuration file is written in IOS application installation package.
2. according to the method described in claim 1, it is characterized in that, further include following steps:
Encryption configuration file is read when using operation, by way of AES decryption and JSON unserializing, reads and matches confidence
Breath.
3. according to the method described in claim 1, it is characterized in that, carry out AES encryption the step of include:
Simplify the encryption of version Encryption Algorithm by SAES Advanced Encryption Standard and generate AES Advanced Encryption Standard initial key, and to institute
It states after AES initial key carries out cipher key spreading and obtains AES encryption key;
Information to be encrypted is encrypted by AES encryption algorithm using the AES encryption key, generates encryption data.
4. according to the method described in claim 3, it is characterized in that, it is described by SAES Encryption Algorithm encrypt generate AES it is initially close
Key includes:
Configure SAES initial key and SAES in plain text;
SAES key handling is carried out to the SAES initial key, and cipher key spreading is carried out to processing result, obtains SAES encryption
Key;
The SAES is encrypted by SAES Encryption Algorithm in plain text using the SAES encryption key, it is initially close to generate AES
Key.
5. according to the method described in claim 4, it is characterized in that, it is described to SAES initial key carry out SAES key handling step
Suddenly include:
Cyclic shift processing is carried out to the data in the SAES initial key;
Key selection processing is carried out to cyclic shift treated data.
6. one kind is read based on python dynamic, write-in encryption configuration device, characterized in that described device includes:
Encrypting module during configuring JSON sequence chemical conversion binary file, carries out AES and adds for obtaining configuration information
It is close, generate configuration file;
Writing module, for configuration file to be written in IOS application installation package.
7. device according to claim 6, characterized in that described device further include:
Read module is decrypted, for reading encryption configuration file when application operation, passes through AES decryption and JSON unserializing
Mode, read configuration information.
8. device according to claim 6, characterized in that encrypting module includes AES encryption unit, and the unit is for holding
It is read described in row claim 3-5 based on python dynamic, the step of enciphering configuration method is written.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810441384.9A CN110474758A (en) | 2018-05-10 | 2018-05-10 | One kind is read based on python dynamic, enciphering configuration method is written |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810441384.9A CN110474758A (en) | 2018-05-10 | 2018-05-10 | One kind is read based on python dynamic, enciphering configuration method is written |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110474758A true CN110474758A (en) | 2019-11-19 |
Family
ID=68503851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810441384.9A Pending CN110474758A (en) | 2018-05-10 | 2018-05-10 | One kind is read based on python dynamic, enciphering configuration method is written |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110474758A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744673A (en) * | 2014-01-06 | 2014-04-23 | 北京乐动卓越科技有限公司 | Resource allocation method based on iOS (Internet 0perating System) platform |
CN104253684A (en) * | 2014-09-23 | 2014-12-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN104598263A (en) * | 2014-12-04 | 2015-05-06 | 广州酷狗计算机科技有限公司 | Application program operation method and configuration file generating method and device |
-
2018
- 2018-05-10 CN CN201810441384.9A patent/CN110474758A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744673A (en) * | 2014-01-06 | 2014-04-23 | 北京乐动卓越科技有限公司 | Resource allocation method based on iOS (Internet 0perating System) platform |
CN104253684A (en) * | 2014-09-23 | 2014-12-31 | 深圳市汇顶科技股份有限公司 | Encryption method and encryption device |
CN104598263A (en) * | 2014-12-04 | 2015-05-06 | 广州酷狗计算机科技有限公司 | Application program operation method and configuration file generating method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103546576B (en) | A kind of embedded device remote automatic upgrading method and system | |
US9413754B2 (en) | Authenticator device facilitating file security | |
CN108762791B (en) | Firmware upgrading method and device | |
US20180124023A1 (en) | Method, system and apparatus for storing website private key plaintext | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
CN109040090A (en) | A kind of data ciphering method and device | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
CN103473592B (en) | A kind of label off-line authenticating method and device based on CPK system | |
CN106411902B (en) | Data secure transmission method and system | |
CN103684786A (en) | Method and system for storing digital certificate and binding digital certificate to hardware carrier | |
CN101325774A (en) | Encryption/decryption method and mobile terminal thereof | |
US20170093816A1 (en) | Remote encryption method and cryptographic center | |
CN111884814B (en) | Method and system for preventing intelligent terminal from being counterfeited | |
CN109687966A (en) | Encryption method and its system | |
Al-gohany et al. | Comparative study of database security in cloud computing using AES and DES encryption algorithms | |
CN105825142A (en) | Method and device for encrypting and decrypting documents in mobile terminal | |
CN111224958A (en) | Data transmission method and system | |
CN105357665A (en) | Encryption method for sensitive data of mobile phone and off-line decryption method based on same | |
US20220284112A1 (en) | System and method for securely transferring data | |
JP2012226711A (en) | Information processing apparatus and information processing method | |
CN116455572B (en) | Data encryption method, device and equipment | |
CN104038337A (en) | Data encryption method based on AES128 | |
CN112528309A (en) | Data storage encryption and decryption method and device | |
CN105847261B (en) | A kind of electronic signature method based on the wireless encryption and decryption of bluetooth | |
CN102332978B (en) | Lottery ticket off-line verification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191119 |
|
RJ01 | Rejection of invention patent application after publication |