CN114978711B - Dynamic key symmetric encryption data transmission method and system - Google Patents

Dynamic key symmetric encryption data transmission method and system Download PDF

Info

Publication number
CN114978711B
CN114978711B CN202210575469.2A CN202210575469A CN114978711B CN 114978711 B CN114978711 B CN 114978711B CN 202210575469 A CN202210575469 A CN 202210575469A CN 114978711 B CN114978711 B CN 114978711B
Authority
CN
China
Prior art keywords
character string
encrypted
data
decryption
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210575469.2A
Other languages
Chinese (zh)
Other versions
CN114978711A (en
Inventor
赵振江
张昊
王松阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Guozi Software Co ltd
Original Assignee
Shandong Guozi Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Guozi Software Co ltd filed Critical Shandong Guozi Software Co ltd
Priority to CN202210575469.2A priority Critical patent/CN114978711B/en
Publication of CN114978711A publication Critical patent/CN114978711A/en
Application granted granted Critical
Publication of CN114978711B publication Critical patent/CN114978711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure belongs to the technical field of data transmission security, and in particular relates to a data transmission method and system for symmetric encryption of dynamic keys, wherein the method comprises the following steps: acquiring original data to be transmitted; encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data; analyzing the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.

Description

Dynamic key symmetric encryption data transmission method and system
Technical Field
The disclosure belongs to the technical field of data transmission security, and particularly relates to a data transmission method and system for dynamic key symmetric encryption.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Data security transmission is increasingly important, and in order to ensure data security transmission, the following three forms are generally adopted:
Firstly, base64 coding data transmission, namely, transmitting original data after Base64 coding, wherein the transmission can be understood as a simple coding encryption mode; after the data transmission is intercepted, the data decoding can be easily carried out, so that the original data can be obtained; the key word combination of the base64 in the encoding process can be intercepted by safety protection equipment, so that the normal transmission of data is directly affected;
secondly, the fixed key encrypts data for safe transmission, the fixed key encrypts the data, and the original data is obtained based on the fixed decryption key after the data is intercepted; however, due to the fixed secret key, the secret key can be obtained by performing reverse calculation on the intercepted multi-section data, so that the original data is obtained, and the safety of data transmission is affected.
Thirdly, based on TLS data security transmission, a technology for performing security transmission on original data in a network transmission layer, and performing security transmission on the data by using https protocol; however, the data transmitted by using the TLS technology is directly decrypted by other modes to obtain the original data, so that the security of data transmission is affected.
The conventional data security transmission technology can easily acquire the original data, so that the original data can be easily utilized by an attacker to launch an attack to steal the key data.
Disclosure of Invention
In order to solve the above problems, the present disclosure provides a data transmission method and system with symmetric dynamic key encryption, which effectively avoids the situation that data cannot be normally transmitted due to data interception and data tampering in the data transmission process, and improves the security of data transmission.
According to some embodiments, a first aspect of the present disclosure provides a data transmission method for dynamic key symmetric encryption, which adopts the following technical scheme:
a data transmission method of dynamic key symmetric encryption includes:
Acquiring original data to be transmitted;
Encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
As a further technical limitation, after the original data to be transmitted is acquired, the acquired original data is formatted according to a specific format, and the formatted original data is added with a GUID of 32 bits to obtain a first encrypted string.
Further, base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; and performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string.
Further, in the process of the sensitive hash operation, based on the key of the algorithm, the sensitive hash operation is performed by using the algorithm, the sensitive hash value obtained by each data transmission is different, and the sensitive hash value is used as the key of symmetric encryption to perform symmetric encryption on the original data.
Further, acquiring characters at fixed positions based on the obtained third encrypted character string to obtain a symmetric encryption key, namely a fifth encrypted character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a secret key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; and carrying out data transmission on the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data.
Further, analyzing the received encrypted data to obtain a seventh decryption string, a fourth decryption string and a third decryption string; collecting characters at fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained; decrypting the obtained first decrypted binary number set based on the fifth decrypted string to obtain a second decrypted string; and performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string.
Further, performing sensitive hash operation on the obtained second decryption string, comparing the decryption string obtained after the sensitive hash operation with a third decryption string, and if the values of the two decryption strings are equal, not falsifying the data; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a fourth decryption character string, and if the values of the two decryption character strings are equal, not falsifying the data.
According to some embodiments, a second aspect of the present disclosure provides a data transmission system with dynamic key symmetric encryption, which adopts the following technical scheme:
a dynamic key symmetric encryption data transmission system, comprising:
an acquisition module configured to acquire raw data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
According to some embodiments, a third aspect of the present disclosure provides a computer-readable storage medium, which adopts the following technical solutions:
A computer readable storage medium having stored thereon a program which when executed by a processor performs steps in a method of dynamic key symmetric encryption data transfer according to the first aspect of the present disclosure.
According to some embodiments, a fourth aspect of the present disclosure provides an electronic device, which adopts the following technical solutions:
An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, the processor implementing steps in a method of dynamic key symmetric encryption data transfer according to the first aspect of the present disclosure when the program is executed.
Compared with the prior art, the beneficial effects of the present disclosure are:
The base16 coding mode is adopted for data transmission, so that safety protection equipment can be penetrated easily, and the situation that data cannot be normally transmitted due to interception by the safety protection equipment when the base64 coding mode is adopted for data transmission is effectively avoided; compared with the traditional fixed key encryption mode, the dynamic key encryption based on the algorithm has no decryption rule, so that the data security is enhanced, and the cracking difficulty is increased; special equipment and safety certificates are not required to be purchased, so that the cost and expenditure are greatly saved, and the problem that the certificates cannot be accessed due to expiration and the like is avoided; the encryption and decryption keys are hidden in the parameters, and the fixed positions of the keys are mutually agreed by the client and the server, so that the keys can be changed at any time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate and explain the exemplary embodiments of the disclosure and together with the description serve to explain the disclosure, and do not constitute an undue limitation on the disclosure.
FIG. 1 is a flow chart of a method of data transmission for dynamic key symmetric encryption in a first embodiment of the present disclosure;
fig. 2 is a block diagram of a dynamic key symmetric encryption data transmission system according to a second embodiment of the present disclosure.
Detailed Description
The disclosure is further described below with reference to the drawings and examples.
It should be noted that the following detailed description is illustrative and is intended to provide further explanation of the present disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments in accordance with the present disclosure. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
Term interpretation:
Raw data: the original data is also called plaintext data, which refers to data that can be easily read by a person without any coding.
Secret key: the key refers to a digital key used when encrypting and decrypting data.
Symmetric encryption: the symmetric encryption is to encrypt the original data and then decrypt the original data by a key.
Sensitive hash: the sensitive hash means that when the original data is calculated, even if the original data has one byte, the calculated hash value can be greatly changed, the MD5 belongs to the sensitive hash, and the sensitive hash belongs to asymmetric encryption.
GUID: the globally unique identifier is a binary length digital identifier generated by an algorithm and is globally unique.
Example 1
The first embodiment of the disclosure introduces a data transmission method for dynamic key symmetric encryption.
A data transmission method for dynamic key symmetric encryption as shown in fig. 1, comprising:
Acquiring original data to be transmitted;
Encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
As one or more embodiments, the first step of the data transmission method of dynamic key symmetric encryption is encrypted transmission of data, specifically:
(1) Formatting the original data according to a specific format, and adding a 32-bit GUID to the formatted data to form a formatted character string with global uniqueness, namely a first encrypted character string;
(2) The formed first encrypted character string is subjected to base64 coding to obtain a coded second encrypted character string, and the aim of the operation is mainly to code some special data or characters in original data in a standardized way, so that the problem of inaccurate data operation caused by confusion of part of special characters in the whole calculation process is avoided;
(3) Performing sensitive hash operation on the obtained second encrypted character string to obtain hexadecimal signature data with uniqueness, namely a third encrypted character string;
(4) Performing sensitive hash operation on the obtained first encrypted character string to obtain hexadecimal signature data with uniqueness of the original data, namely a fourth encrypted character string;
(5) Collecting 8 characters at fixed positions from the obtained third encrypted character string as a symmetric encryption key to obtain a fifth encrypted character string; for example: collecting the following 8 index position characters of 0, 3, 18, 24, 19, 30, 12 and 15 from the third encryption character string, thus obtaining an 8-bit hexadecimal encryption key;
(6) Symmetrically encrypting the obtained second encrypted character string by using the fifth encrypted character string as a secret key to obtain a first encrypted binary number group;
(7) Performing base16 encryption processing on the obtained first encrypted binary number group to obtain a seventh encrypted character string;
(8) And carrying out data transmission on the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a specific format to obtain encrypted data.
It can be understood that the transmitted data contains a signature with data uniqueness, and the validity of the data can be verified through the signature with data uniqueness when the data is decrypted, and in addition, the encryption key is hidden in the third encryption character string and is fixedly acquired according to the signature; therefore, the secret key has strong randomness, and the cracking difficulty is enhanced.
As one or more embodiments, the second step of the data transmission method of dynamic key symmetric encryption is the reception and decryption of data, specifically:
(1) Analyzing the received encrypted data according to the transmitted data format to respectively obtain a seventh decryption character string, a fourth decryption character string and a third decryption character string;
(2) Acquiring 8 characters at fixed positions based on the obtained third decryption character string to serve as a decryption key, so as to obtain a fifth decryption character string;
(3) Base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained;
(4) Based on the obtained first decryption binary number group, decrypting by using the fifth decryption character string to obtain a second decryption character string;
(5) Base64 decoding is carried out on the obtained second decryption character string, and a first decryption character string is obtained;
(6) Performing sensitive hash operation on the obtained second decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained third decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(7) Performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained fourth decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(8) And (3) repeating the step (6) and the step (7), wherein if all the data pass verification, the first encrypted character string representing the decrypted original data is available, namely the secure transmission of the data is realized.
In the embodiment, the data encryption transmission encrypts the original data in the network data security transmission process; based on the secret key of the algorithm, carrying out sensitive hash operation on the original data by using the algorithm, wherein the sensitive hash value obtained by each original data transmission is different because of the sensitive hash, and then carrying out symmetric encryption on the original data by using the sensitive hash value as the secret key of symmetric encryption and then transmitting; the dynamic change of the original data is that the sensitive hash operation is carried out on the original data, and the sensitive hash values of different original data are definitely different, but if the original data are not changed, the transmitted symmetric encrypted ciphertext is still the same, so that a certain rule is generated, and the risk of being cracked is increased. Therefore, the original data needs to be dynamically changed; the base16 coding mode is adopted, so that safety protection equipment can be effectively penetrated, and normal transmission of data is not affected; the encryption key is hidden, and the encryption key is hidden in the transmitted parameters in the transmission process, so that the acquisition difficulty is increased.
Example two
The second embodiment of the disclosure introduces a data transmission system with dynamic key symmetric encryption.
A dynamic key symmetric encryption data transmission system as shown in fig. 2, comprising:
an acquisition module configured to acquire raw data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
Example III
A third embodiment of the present disclosure provides a computer-readable storage medium.
A computer readable storage medium having stored thereon a program which when executed by a processor performs the steps in a method for dynamic key symmetric encryption data transfer according to one embodiment of the present disclosure.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
Example IV
The fourth embodiment of the disclosure provides an electronic device.
An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor performs the steps in the data transmission method of dynamic key symmetric encryption according to the first embodiment of the disclosure when executing the program.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
The foregoing description of the preferred embodiments of the present disclosure is provided only and not intended to limit the disclosure so that various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (6)

1. A data transmission method for dynamic key symmetric encryption, comprising:
Acquiring original data to be transmitted; encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data, wherein the method specifically comprises the steps of formatting the acquired original data according to a specific format after acquiring the original data to be transmitted, and adding a 32-bit GUID (global unique identifier) to the formatted original data to obtain a first encrypted character string; base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string;
Acquiring characters at fixed positions based on the obtained third encryption character string to obtain a symmetric encryption key, namely a fifth encryption character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; transmitting the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
2. The method for data transmission by dynamic key symmetric encryption as claimed in claim 1, wherein the received encrypted data is parsed to obtain a seventh decryption string, a fourth decryption string, and a third decryption string; collecting characters at fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained; decrypting the obtained first decrypted binary number set based on the fifth decrypted string to obtain a second decrypted string; and performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string.
3. The method for transmitting data by symmetric encryption of dynamic key as claimed in claim 2, wherein the second decryption string is subjected to sensitive hash operation, the decryption string obtained after the sensitive hash operation is compared with the third decryption string, and if the values of the two decryption strings are equal, the data is not tampered; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a fourth decryption character string, and if the values of the two decryption character strings are equal, not falsifying the data.
4. A dynamic key symmetric encrypted data transmission system, comprising:
an acquisition module configured to acquire raw data to be transmitted;
The encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data; the method comprises the steps of after obtaining original data to be transmitted, formatting the obtained original data according to a specific format, and adding a 32-bit GUID to the formatted original data to obtain a first encrypted character string; base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string;
Acquiring characters at fixed positions based on the obtained third encryption character string to obtain a symmetric encryption key, namely a fifth encryption character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; transmitting the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
5. A computer-readable storage medium, on which a program is stored, characterized in that the program, when being executed by a processor, implements the steps in the dynamic key symmetric encryption data transmission method as claimed in any one of claims 1 to 3.
6. An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor performs the steps in the dynamic key symmetric encryption data transfer method of any one of claims 1-3 when the program is executed.
CN202210575469.2A 2022-05-25 2022-05-25 Dynamic key symmetric encryption data transmission method and system Active CN114978711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210575469.2A CN114978711B (en) 2022-05-25 2022-05-25 Dynamic key symmetric encryption data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210575469.2A CN114978711B (en) 2022-05-25 2022-05-25 Dynamic key symmetric encryption data transmission method and system

Publications (2)

Publication Number Publication Date
CN114978711A CN114978711A (en) 2022-08-30
CN114978711B true CN114978711B (en) 2024-06-25

Family

ID=82955115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210575469.2A Active CN114978711B (en) 2022-05-25 2022-05-25 Dynamic key symmetric encryption data transmission method and system

Country Status (1)

Country Link
CN (1) CN114978711B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117579392B (en) * 2024-01-16 2024-04-16 北京富通亚讯网络信息技术有限公司 Reliable data transmission method, device, equipment and medium based on encryption processing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236767A (en) * 2011-06-10 2011-11-09 上海市金山区青少年活动中心 File encryption method in combination with hash value

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150499B (en) * 2018-08-29 2021-06-08 深圳市迷你玩科技有限公司 Method and device for dynamically encrypting data, computer equipment and storage medium
KR101942033B1 (en) * 2018-11-19 2019-01-24 동국대학교 산학협력단 Electronic device capable of decrypting code-based encrypted data in which t+a error codes are inserted and operating method thereof
CN112822228B (en) * 2019-11-15 2023-05-02 北京中电普华信息技术有限公司 Browser file encryption uploading method and system based on cryptographic algorithm
CN112887311A (en) * 2021-01-26 2021-06-01 北京高因科技有限公司 Safety encryption method and device based on data transmission process
CN113259132B (en) * 2021-06-30 2021-09-28 平安普惠企业管理有限公司 Data transmission encryption and decryption method and device, computer equipment and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236767A (en) * 2011-06-10 2011-11-09 上海市金山区青少年活动中心 File encryption method in combination with hash value

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"巧用Base64编码和GUID实现数据加密";余应刚;《电脑编程技巧与维护》;20090618;第1-5节 *

Also Published As

Publication number Publication date
CN114978711A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
US5568554A (en) Method for improving the processing and storage performance of digital signature schemes
US8746363B2 (en) System for conducting remote biometric operations
EP2290872B1 (en) Device for generating a message authentication code for authenticating a message
CN109840425B (en) File encryption method and device
CN110598422A (en) Trusted identity authentication system and method based on mobile digital certificate
US20080137837A1 (en) Encryption method for message authentication
KR101078546B1 (en) Apparatus for coding and decoding of security data file based on data storage unit idedtification, system for electronic signature using the same
CN110611670A (en) API request encryption method and device
JP6346942B2 (en) Blocking password attacks
CN117640256B (en) Data encryption method, recommendation device and storage medium of wireless network card
CN112738051B (en) Data information encryption method, system and computer readable storage medium
US9515989B1 (en) Methods and apparatus for silent alarm channels using one-time passcode authentication tokens
CN117278324B (en) Message encryption transmission method and system
US8024574B2 (en) Unidirectional message masking and validation system and method
CN114978711B (en) Dynamic key symmetric encryption data transmission method and system
WO2018038445A1 (en) Method for mobile device for managing encoded file and encoded file management system comprising same
Quilala et al. Modified Blowfish algorithm analysis using derivation cases
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
Muzaffar et al. Lightweight, single-clock-cycle, multilayer cipher for single-channel IoT communication: Design and implementation
CN110247878A (en) A kind of data transfer encryption method
CN115001758A (en) Short byte message security encryption method based on quantum encryption
CN116781265A (en) Data encryption method and device
CN114584407A (en) System for embedding and extracting multilingual hidden data in online message
CN114390518A (en) Encryption method, device, equipment and storage medium
KR20220137024A (en) Symmetric Asynchronous Generation Encryption Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant