CN114978711B - Dynamic key symmetric encryption data transmission method and system - Google Patents
Dynamic key symmetric encryption data transmission method and system Download PDFInfo
- Publication number
- CN114978711B CN114978711B CN202210575469.2A CN202210575469A CN114978711B CN 114978711 B CN114978711 B CN 114978711B CN 202210575469 A CN202210575469 A CN 202210575469A CN 114978711 B CN114978711 B CN 114978711B
- Authority
- CN
- China
- Prior art keywords
- character string
- encrypted
- data
- decryption
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 65
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000012545 processing Methods 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure belongs to the technical field of data transmission security, and in particular relates to a data transmission method and system for symmetric encryption of dynamic keys, wherein the method comprises the following steps: acquiring original data to be transmitted; encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data; analyzing the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
Description
Technical Field
The disclosure belongs to the technical field of data transmission security, and particularly relates to a data transmission method and system for dynamic key symmetric encryption.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Data security transmission is increasingly important, and in order to ensure data security transmission, the following three forms are generally adopted:
Firstly, base64 coding data transmission, namely, transmitting original data after Base64 coding, wherein the transmission can be understood as a simple coding encryption mode; after the data transmission is intercepted, the data decoding can be easily carried out, so that the original data can be obtained; the key word combination of the base64 in the encoding process can be intercepted by safety protection equipment, so that the normal transmission of data is directly affected;
secondly, the fixed key encrypts data for safe transmission, the fixed key encrypts the data, and the original data is obtained based on the fixed decryption key after the data is intercepted; however, due to the fixed secret key, the secret key can be obtained by performing reverse calculation on the intercepted multi-section data, so that the original data is obtained, and the safety of data transmission is affected.
Thirdly, based on TLS data security transmission, a technology for performing security transmission on original data in a network transmission layer, and performing security transmission on the data by using https protocol; however, the data transmitted by using the TLS technology is directly decrypted by other modes to obtain the original data, so that the security of data transmission is affected.
The conventional data security transmission technology can easily acquire the original data, so that the original data can be easily utilized by an attacker to launch an attack to steal the key data.
Disclosure of Invention
In order to solve the above problems, the present disclosure provides a data transmission method and system with symmetric dynamic key encryption, which effectively avoids the situation that data cannot be normally transmitted due to data interception and data tampering in the data transmission process, and improves the security of data transmission.
According to some embodiments, a first aspect of the present disclosure provides a data transmission method for dynamic key symmetric encryption, which adopts the following technical scheme:
a data transmission method of dynamic key symmetric encryption includes:
Acquiring original data to be transmitted;
Encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
As a further technical limitation, after the original data to be transmitted is acquired, the acquired original data is formatted according to a specific format, and the formatted original data is added with a GUID of 32 bits to obtain a first encrypted string.
Further, base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; and performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string.
Further, in the process of the sensitive hash operation, based on the key of the algorithm, the sensitive hash operation is performed by using the algorithm, the sensitive hash value obtained by each data transmission is different, and the sensitive hash value is used as the key of symmetric encryption to perform symmetric encryption on the original data.
Further, acquiring characters at fixed positions based on the obtained third encrypted character string to obtain a symmetric encryption key, namely a fifth encrypted character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a secret key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; and carrying out data transmission on the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data.
Further, analyzing the received encrypted data to obtain a seventh decryption string, a fourth decryption string and a third decryption string; collecting characters at fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained; decrypting the obtained first decrypted binary number set based on the fifth decrypted string to obtain a second decrypted string; and performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string.
Further, performing sensitive hash operation on the obtained second decryption string, comparing the decryption string obtained after the sensitive hash operation with a third decryption string, and if the values of the two decryption strings are equal, not falsifying the data; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a fourth decryption character string, and if the values of the two decryption character strings are equal, not falsifying the data.
According to some embodiments, a second aspect of the present disclosure provides a data transmission system with dynamic key symmetric encryption, which adopts the following technical scheme:
a dynamic key symmetric encryption data transmission system, comprising:
an acquisition module configured to acquire raw data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
According to some embodiments, a third aspect of the present disclosure provides a computer-readable storage medium, which adopts the following technical solutions:
A computer readable storage medium having stored thereon a program which when executed by a processor performs steps in a method of dynamic key symmetric encryption data transfer according to the first aspect of the present disclosure.
According to some embodiments, a fourth aspect of the present disclosure provides an electronic device, which adopts the following technical solutions:
An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, the processor implementing steps in a method of dynamic key symmetric encryption data transfer according to the first aspect of the present disclosure when the program is executed.
Compared with the prior art, the beneficial effects of the present disclosure are:
The base16 coding mode is adopted for data transmission, so that safety protection equipment can be penetrated easily, and the situation that data cannot be normally transmitted due to interception by the safety protection equipment when the base64 coding mode is adopted for data transmission is effectively avoided; compared with the traditional fixed key encryption mode, the dynamic key encryption based on the algorithm has no decryption rule, so that the data security is enhanced, and the cracking difficulty is increased; special equipment and safety certificates are not required to be purchased, so that the cost and expenditure are greatly saved, and the problem that the certificates cannot be accessed due to expiration and the like is avoided; the encryption and decryption keys are hidden in the parameters, and the fixed positions of the keys are mutually agreed by the client and the server, so that the keys can be changed at any time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure, illustrate and explain the exemplary embodiments of the disclosure and together with the description serve to explain the disclosure, and do not constitute an undue limitation on the disclosure.
FIG. 1 is a flow chart of a method of data transmission for dynamic key symmetric encryption in a first embodiment of the present disclosure;
fig. 2 is a block diagram of a dynamic key symmetric encryption data transmission system according to a second embodiment of the present disclosure.
Detailed Description
The disclosure is further described below with reference to the drawings and examples.
It should be noted that the following detailed description is illustrative and is intended to provide further explanation of the present disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments in accordance with the present disclosure. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
Term interpretation:
Raw data: the original data is also called plaintext data, which refers to data that can be easily read by a person without any coding.
Secret key: the key refers to a digital key used when encrypting and decrypting data.
Symmetric encryption: the symmetric encryption is to encrypt the original data and then decrypt the original data by a key.
Sensitive hash: the sensitive hash means that when the original data is calculated, even if the original data has one byte, the calculated hash value can be greatly changed, the MD5 belongs to the sensitive hash, and the sensitive hash belongs to asymmetric encryption.
GUID: the globally unique identifier is a binary length digital identifier generated by an algorithm and is globally unique.
Example 1
The first embodiment of the disclosure introduces a data transmission method for dynamic key symmetric encryption.
A data transmission method for dynamic key symmetric encryption as shown in fig. 1, comprising:
Acquiring original data to be transmitted;
Encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
As one or more embodiments, the first step of the data transmission method of dynamic key symmetric encryption is encrypted transmission of data, specifically:
(1) Formatting the original data according to a specific format, and adding a 32-bit GUID to the formatted data to form a formatted character string with global uniqueness, namely a first encrypted character string;
(2) The formed first encrypted character string is subjected to base64 coding to obtain a coded second encrypted character string, and the aim of the operation is mainly to code some special data or characters in original data in a standardized way, so that the problem of inaccurate data operation caused by confusion of part of special characters in the whole calculation process is avoided;
(3) Performing sensitive hash operation on the obtained second encrypted character string to obtain hexadecimal signature data with uniqueness, namely a third encrypted character string;
(4) Performing sensitive hash operation on the obtained first encrypted character string to obtain hexadecimal signature data with uniqueness of the original data, namely a fourth encrypted character string;
(5) Collecting 8 characters at fixed positions from the obtained third encrypted character string as a symmetric encryption key to obtain a fifth encrypted character string; for example: collecting the following 8 index position characters of 0, 3, 18, 24, 19, 30, 12 and 15 from the third encryption character string, thus obtaining an 8-bit hexadecimal encryption key;
(6) Symmetrically encrypting the obtained second encrypted character string by using the fifth encrypted character string as a secret key to obtain a first encrypted binary number group;
(7) Performing base16 encryption processing on the obtained first encrypted binary number group to obtain a seventh encrypted character string;
(8) And carrying out data transmission on the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a specific format to obtain encrypted data.
It can be understood that the transmitted data contains a signature with data uniqueness, and the validity of the data can be verified through the signature with data uniqueness when the data is decrypted, and in addition, the encryption key is hidden in the third encryption character string and is fixedly acquired according to the signature; therefore, the secret key has strong randomness, and the cracking difficulty is enhanced.
As one or more embodiments, the second step of the data transmission method of dynamic key symmetric encryption is the reception and decryption of data, specifically:
(1) Analyzing the received encrypted data according to the transmitted data format to respectively obtain a seventh decryption character string, a fourth decryption character string and a third decryption character string;
(2) Acquiring 8 characters at fixed positions based on the obtained third decryption character string to serve as a decryption key, so as to obtain a fifth decryption character string;
(3) Base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained;
(4) Based on the obtained first decryption binary number group, decrypting by using the fifth decryption character string to obtain a second decryption character string;
(5) Base64 decoding is carried out on the obtained second decryption character string, and a first decryption character string is obtained;
(6) Performing sensitive hash operation on the obtained second decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained third decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(7) Performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with the obtained fourth decryption character string, and if the values of the two character strings are completely equal, indicating that the data is not tampered;
(8) And (3) repeating the step (6) and the step (7), wherein if all the data pass verification, the first encrypted character string representing the decrypted original data is available, namely the secure transmission of the data is realized.
In the embodiment, the data encryption transmission encrypts the original data in the network data security transmission process; based on the secret key of the algorithm, carrying out sensitive hash operation on the original data by using the algorithm, wherein the sensitive hash value obtained by each original data transmission is different because of the sensitive hash, and then carrying out symmetric encryption on the original data by using the sensitive hash value as the secret key of symmetric encryption and then transmitting; the dynamic change of the original data is that the sensitive hash operation is carried out on the original data, and the sensitive hash values of different original data are definitely different, but if the original data are not changed, the transmitted symmetric encrypted ciphertext is still the same, so that a certain rule is generated, and the risk of being cracked is increased. Therefore, the original data needs to be dynamically changed; the base16 coding mode is adopted, so that safety protection equipment can be effectively penetrated, and normal transmission of data is not affected; the encryption key is hidden, and the encryption key is hidden in the transmitted parameters in the transmission process, so that the acquisition difficulty is increased.
Example two
The second embodiment of the disclosure introduces a data transmission system with dynamic key symmetric encryption.
A dynamic key symmetric encryption data transmission system as shown in fig. 2, comprising:
an acquisition module configured to acquire raw data to be transmitted;
the encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
Example III
A third embodiment of the present disclosure provides a computer-readable storage medium.
A computer readable storage medium having stored thereon a program which when executed by a processor performs the steps in a method for dynamic key symmetric encryption data transfer according to one embodiment of the present disclosure.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
Example IV
The fourth embodiment of the disclosure provides an electronic device.
An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor performs the steps in the data transmission method of dynamic key symmetric encryption according to the first embodiment of the disclosure when executing the program.
The detailed steps are the same as those of the data transmission method for dynamic key symmetric encryption provided in the first embodiment, and will not be described herein.
The foregoing description of the preferred embodiments of the present disclosure is provided only and not intended to limit the disclosure so that various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.
Claims (6)
1. A data transmission method for dynamic key symmetric encryption, comprising:
Acquiring original data to be transmitted; encrypting the acquired original data based on a dynamic key of an algorithm to obtain encrypted data, wherein the method specifically comprises the steps of formatting the acquired original data according to a specific format after acquiring the original data to be transmitted, and adding a 32-bit GUID (global unique identifier) to the formatted original data to obtain a first encrypted character string; base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string;
Acquiring characters at fixed positions based on the obtained third encryption character string to obtain a symmetric encryption key, namely a fifth encryption character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; transmitting the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data;
analyzing the character string of the encrypted data to obtain a decryption key;
and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
2. The method for data transmission by dynamic key symmetric encryption as claimed in claim 1, wherein the received encrypted data is parsed to obtain a seventh decryption string, a fourth decryption string, and a third decryption string; collecting characters at fixed positions in the obtained third decryption character string to obtain a decryption key, namely a fifth decryption character string; base16 decoding is carried out on the obtained seventh decryption character string, and a first decryption binary number group is obtained; decrypting the obtained first decrypted binary number set based on the fifth decrypted string to obtain a second decrypted string; and performing base64 decoding on the obtained second decryption character string to obtain a first decryption character string.
3. The method for transmitting data by symmetric encryption of dynamic key as claimed in claim 2, wherein the second decryption string is subjected to sensitive hash operation, the decryption string obtained after the sensitive hash operation is compared with the third decryption string, and if the values of the two decryption strings are equal, the data is not tampered; and performing sensitive hash operation on the obtained first decryption character string, comparing the decryption character string obtained after the sensitive hash operation with a fourth decryption character string, and if the values of the two decryption character strings are equal, not falsifying the data.
4. A dynamic key symmetric encrypted data transmission system, comprising:
an acquisition module configured to acquire raw data to be transmitted;
The encryption module is configured to encrypt the acquired original data based on the dynamic key of the algorithm to obtain encrypted data; the method comprises the steps of after obtaining original data to be transmitted, formatting the obtained original data according to a specific format, and adding a 32-bit GUID to the formatted original data to obtain a first encrypted character string; base64 encoding is carried out on the obtained first encrypted character string, and an encoded second encrypted character string is obtained; performing sensitive hash operation on the obtained second encrypted character string to obtain a third encrypted character string with a unique hexadecimal signature; performing sensitive hash operation on the obtained first encrypted character string to obtain original data with unique hexadecimal signature, namely a fourth encrypted character string;
Acquiring characters at fixed positions based on the obtained third encryption character string to obtain a symmetric encryption key, namely a fifth encryption character string; symmetrically encrypting the obtained second encrypted character string by taking the fifth encrypted character string as a key to obtain a first encrypted binary number group; base16 processing is carried out on the obtained first encrypted binary number group, and a seventh encrypted character string is obtained; transmitting the obtained seventh encrypted character string, fourth encrypted character string and third encrypted character string according to a preset format, namely completing the transmission of encrypted data;
A decryption module configured to parse the character string of the encrypted data to obtain a decryption key; and decrypting the received encrypted data through the obtained decryption key to complete data transmission.
5. A computer-readable storage medium, on which a program is stored, characterized in that the program, when being executed by a processor, implements the steps in the dynamic key symmetric encryption data transmission method as claimed in any one of claims 1 to 3.
6. An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor performs the steps in the dynamic key symmetric encryption data transfer method of any one of claims 1-3 when the program is executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210575469.2A CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210575469.2A CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978711A CN114978711A (en) | 2022-08-30 |
CN114978711B true CN114978711B (en) | 2024-06-25 |
Family
ID=82955115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210575469.2A Active CN114978711B (en) | 2022-05-25 | 2022-05-25 | Dynamic key symmetric encryption data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978711B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579392B (en) * | 2024-01-16 | 2024-04-16 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236767A (en) * | 2011-06-10 | 2011-11-09 | 上海市金山区青少年活动中心 | File encryption method in combination with hash value |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150499B (en) * | 2018-08-29 | 2021-06-08 | 深圳市迷你玩科技有限公司 | Method and device for dynamically encrypting data, computer equipment and storage medium |
KR101942033B1 (en) * | 2018-11-19 | 2019-01-24 | 동국대학교 산학협력단 | Electronic device capable of decrypting code-based encrypted data in which t+a error codes are inserted and operating method thereof |
CN112822228B (en) * | 2019-11-15 | 2023-05-02 | 北京中电普华信息技术有限公司 | Browser file encryption uploading method and system based on cryptographic algorithm |
CN112887311A (en) * | 2021-01-26 | 2021-06-01 | 北京高因科技有限公司 | Safety encryption method and device based on data transmission process |
CN113259132B (en) * | 2021-06-30 | 2021-09-28 | 平安普惠企业管理有限公司 | Data transmission encryption and decryption method and device, computer equipment and storage medium |
-
2022
- 2022-05-25 CN CN202210575469.2A patent/CN114978711B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236767A (en) * | 2011-06-10 | 2011-11-09 | 上海市金山区青少年活动中心 | File encryption method in combination with hash value |
Non-Patent Citations (1)
Title |
---|
"巧用Base64编码和GUID实现数据加密";余应刚;《电脑编程技巧与维护》;20090618;第1-5节 * |
Also Published As
Publication number | Publication date |
---|---|
CN114978711A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5568554A (en) | Method for improving the processing and storage performance of digital signature schemes | |
US8746363B2 (en) | System for conducting remote biometric operations | |
EP2290872B1 (en) | Device for generating a message authentication code for authenticating a message | |
CN109840425B (en) | File encryption method and device | |
CN110598422A (en) | Trusted identity authentication system and method based on mobile digital certificate | |
US20080137837A1 (en) | Encryption method for message authentication | |
KR101078546B1 (en) | Apparatus for coding and decoding of security data file based on data storage unit idedtification, system for electronic signature using the same | |
CN110611670A (en) | API request encryption method and device | |
JP6346942B2 (en) | Blocking password attacks | |
CN117640256B (en) | Data encryption method, recommendation device and storage medium of wireless network card | |
CN112738051B (en) | Data information encryption method, system and computer readable storage medium | |
US9515989B1 (en) | Methods and apparatus for silent alarm channels using one-time passcode authentication tokens | |
CN117278324B (en) | Message encryption transmission method and system | |
US8024574B2 (en) | Unidirectional message masking and validation system and method | |
CN114978711B (en) | Dynamic key symmetric encryption data transmission method and system | |
WO2018038445A1 (en) | Method for mobile device for managing encoded file and encoded file management system comprising same | |
Quilala et al. | Modified Blowfish algorithm analysis using derivation cases | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
Muzaffar et al. | Lightweight, single-clock-cycle, multilayer cipher for single-channel IoT communication: Design and implementation | |
CN110247878A (en) | A kind of data transfer encryption method | |
CN115001758A (en) | Short byte message security encryption method based on quantum encryption | |
CN116781265A (en) | Data encryption method and device | |
CN114584407A (en) | System for embedding and extracting multilingual hidden data in online message | |
CN114390518A (en) | Encryption method, device, equipment and storage medium | |
KR20220137024A (en) | Symmetric Asynchronous Generation Encryption Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |