CN118075037A - Data encryption method, device, equipment and storage medium - Google Patents

Data encryption method, device, equipment and storage medium Download PDF

Info

Publication number
CN118075037A
CN118075037A CN202410504447.6A CN202410504447A CN118075037A CN 118075037 A CN118075037 A CN 118075037A CN 202410504447 A CN202410504447 A CN 202410504447A CN 118075037 A CN118075037 A CN 118075037A
Authority
CN
China
Prior art keywords
data
file
encrypted
encryption
extracted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410504447.6A
Other languages
Chinese (zh)
Other versions
CN118075037B (en
Inventor
姚磊磊
陈勇
刘加瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Huayun'an Technology Co ltd
Original Assignee
Anhui Huayun'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Huayun'an Technology Co ltd filed Critical Anhui Huayun'an Technology Co ltd
Priority to CN202410504447.6A priority Critical patent/CN118075037B/en
Publication of CN118075037A publication Critical patent/CN118075037A/en
Application granted granted Critical
Publication of CN118075037B publication Critical patent/CN118075037B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure provides a data encryption method, a device, equipment and a storage medium, which are applied to the technical field of network security. The method comprises the steps of obtaining a file to be encrypted, a preset encryption length and an encryption password; based on a preset hash algorithm, the encryption password is converted into a hash value with a preset encryption length; extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length; if the file to be encrypted is completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule; if the file to be encrypted is not completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule, and encrypting the data in the unextracted file to be encrypted according to a preset encryption algorithm. In this way, the encryption logic can be made simpler, thereby facilitating user use.

Description

Data encryption method, device, equipment and storage medium
Technical Field
The disclosure relates to the technical field of computers, in particular to the technical field of network security, and specifically relates to a data encryption method, a device, equipment and a storage medium.
Background
Data encryption refers to converting plaintext into ciphertext through an encryption algorithm and an encryption key, and decryption refers to recovering ciphertext into plaintext through a decryption algorithm and a decryption key. The data encryption is the most reliable method for protecting information by a computer system, and the information is encrypted by utilizing a password technology to realize information concealment, so that the effect of protecting the safety of the information is achieved. However, the encryption logic of the current data encryption mode is complex, which is not beneficial to users.
Disclosure of Invention
The present disclosure provides a data encryption method, apparatus, device, and storage medium.
According to a first aspect of the present disclosure, a data encryption method is provided. The method comprises the following steps:
acquiring a file to be encrypted, a preset encryption length and an encryption password;
Converting the encryption password into a hash value of the preset encryption length based on a preset hash algorithm;
extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length;
if the file to be encrypted is completely extracted, encrypting the extracted data in the file to be encrypted according to a preset encryption rule;
if the file to be encrypted is not completely extracted, encrypting the extracted data in the file to be encrypted according to the preset encryption rule, and encrypting the unextracted data in the file to be encrypted according to a preset encryption algorithm.
In the foregoing aspect and any possible implementation manner, there is further provided an implementation manner, where encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive or operation on the hash value, the first data and the second data, replacing the first data with an obtained operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data are data which are extracted from the file header of the file to be encrypted and do not participate in operation, and the second data are data which are extracted from the file tail of the file to be encrypted and do not participate in operation.
In the foregoing aspect and any possible implementation manner, there is further provided an implementation manner, where encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive or operation on the hash value, the first data and the second data, replacing the second data with an obtained operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data are data which are extracted from the file header of the file to be encrypted and do not participate in operation, and the second data are data which are extracted from the file tail of the file to be encrypted and do not participate in operation.
In the foregoing aspect and any possible implementation manner, there is further provided an implementation manner, where encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive OR operation on the hash value, the first data and the second data, replacing the first data with an obtained operation result, and sequentially processing the data which are not replaced in the file to be encrypted until the data which are not replaced or can participate in operation in the file to be encrypted are not available, so that encryption of the data in the file to be encrypted is completed;
The first data is the data which is extracted from the file head of the file to be encrypted and is not replaced, and the second data is the data which is extracted from the file tail of the file to be encrypted and is not replaced.
In the foregoing aspect and any possible implementation manner, there is further provided an implementation manner, where encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
performing first exclusive-or operation on the hash value, the first data and the second data each time, replacing the first data with an obtained operation result, sequentially processing the data which do not participate in the first exclusive-or operation in the file to be encrypted until the data which do not participate in the first exclusive-or operation in the file to be encrypted are not available, performing second exclusive-or operation on the hash value, the first data and the second data each time, replacing the second data with an obtained operation result, sequentially processing the data which do not participate in the second exclusive-or operation in the file to be encrypted until the data which do not participate in the second exclusive-or operation in the file to be encrypted are not available, and performing fusion processing on the data which do not participate in the second exclusive-or operation in the file to be encrypted, thereby completing encryption of the data in the file to be encrypted;
the first data is data which is extracted from the file header of the file to be encrypted and does not participate in the first or second exclusive-or operation, and the second data is data which is extracted from the file tail of the file to be encrypted and does not participate in the first or second exclusive-or operation.
According to a second aspect of the present disclosure, a data decryption method is provided. The method comprises the following steps:
And when the file to be encrypted is completely extracted, decrypting the data in the encrypted file from the file tail and the file head of the encrypted file according to the preset encryption length and the preset encryption password.
Aspects and any one of the possible implementations as described above, further providing an implementation, the method further including:
and when the file to be encrypted is not completely extracted, decrypting the data in the encrypted file from the file tail and the file head of the encrypted file in sequence according to the preset encryption length, the encryption password and a decryption algorithm corresponding to the preset encryption algorithm.
According to a third aspect of the present disclosure, there is provided a data encryption apparatus. The device comprises:
The acquisition module is used for acquiring a file to be encrypted, a preset encryption length and an encryption password;
the conversion module is used for converting the encryption password into a hash value of the preset encryption length based on a preset hash algorithm;
The extraction module is used for extracting the data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length;
The encryption module is used for encrypting the extracted data in the file to be encrypted according to a preset encryption rule if the file to be encrypted is completely extracted; if the file to be encrypted is not completely extracted, encrypting the extracted data in the file to be encrypted according to the preset encryption rule, and encrypting the unextracted data in the file to be encrypted according to a preset encryption algorithm.
According to a fourth aspect of the present disclosure, an electronic device is provided. The electronic device includes: a memory and a processor, the memory having stored thereon a computer program, the processor implementing the method as described above when executing the program.
According to a fifth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method as described above.
The data encryption method, the device, the equipment and the storage medium provided by the embodiment of the application can be used for obtaining the file to be encrypted, the preset encryption length and the encryption password; based on a preset hash algorithm, the encryption password is converted into a hash value with a preset encryption length; extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length; if the file to be encrypted is completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule; if the file to be encrypted is not completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule, and encrypting the data in the unextracted file to be encrypted according to a preset encryption algorithm; based on the method, an encryption unit obtained by dividing the data in the file to be encrypted according to the preset encryption length is combined with the data in the file to be encrypted and the encryption password, so that the file to be encrypted is encrypted, the encryption logic is simpler, the user can use the file conveniently, the encryption strength is higher as the preset encryption length is higher, and the encrypted data is safer.
It should be understood that what is described in this summary is not intended to limit the critical or essential features of the embodiments of the disclosure nor to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. For a better understanding of the present disclosure, and without limiting the disclosure thereto, the same or similar reference numerals denote the same or similar elements, wherein:
FIG. 1 illustrates a flow chart of a data encryption method according to an embodiment of the present disclosure;
FIG. 2 illustrates a flow chart of a data decryption method according to an embodiment of the present disclosure;
FIG. 3 illustrates a block diagram of a data encryption device according to an embodiment of the present disclosure;
fig. 4 illustrates a block diagram of an exemplary electronic device capable of implementing embodiments of the present disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are some embodiments of the present disclosure, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments in this disclosure without inventive faculty, are intended to be within the scope of this disclosure.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In the method, the encryption unit obtained by dividing the data in the file to be encrypted according to the preset encryption length can be combined with the data in the file to be encrypted and the encryption password, so that the file to be encrypted is encrypted, the encryption logic is simpler, the user can use the file conveniently, the encryption strength is higher as the preset encryption length is higher, and the encrypted data is safer.
Fig. 1 shows a flow chart of a data encryption method 100 according to an embodiment of the present disclosure.
At block 110, a file to be encrypted, a preset encryption length, and an encryption password are obtained.
In some embodiments, the file to be encrypted may be a file to be encrypted obtained according to the actual encryption requirement of the user.
In some embodiments, the preset encryption length may be an encryption unit size W preset according to the actual requirement of the user, that is, the data in the file to be encrypted is encrypted with W bytes as the length unit of the encryption interval. W is a natural number greater than or equal to 1, such as 3.
In some embodiments, the encryption password may be an encryption password P preset according to the actual requirement of the user.
In some embodiments, the data of the file to be encrypted, the preset encryption length and the encryption password can be used for encrypting the data in the file to be encrypted.
At block 120, the encryption password is converted to a hash value of a predetermined encryption length based on a predetermined hash algorithm.
In some embodiments, a preset Hash algorithm, i.e., a Hash (Hash) method, may be preset according to the actual needs of the user. Such as direct addressing, digital analysis, square centering, and random number.
In some embodiments, an input of any length, i.e. an encrypted password, may be converted by a preset hash algorithm into an output of a fixed length, i.e. an output of a preset encrypted length, which is a hash value, i.e. a hash value ppp of a preset encrypted length.
In some embodiments, the encryption password is converted into a hash value with a preset encryption length, so that the data in the file to be encrypted can be conveniently encrypted by combining the data in the file to be encrypted and the preset encryption length.
At block 130, data in the file to be encrypted is extracted from the header and the trailer of the file to be encrypted according to the preset encryption length, respectively.
In some embodiments, in the process of extracting data in a file to be encrypted according to a preset encryption length, the data may be extracted from a header and a tail of the file to be encrypted at the same time, and may be extracted from the header of the file to be encrypted first and then extracted from the tail of the file to be encrypted.
For example, taking a file to be encrypted as "AAABBBCCCDDD" and a preset encryption length as 3 bytes as an example, extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length, wherein the extracted data in the file to be encrypted comprises "AAA" and "DDD" and "BBB" and "CCC", that is, the file to be encrypted is completely extracted, and the extracted head and tail data are not overlapped.
For example, taking a file to be encrypted as "AAABBBcccdCCCDDD" and a preset encryption length as 3 bytes as an example, extracting data in the file to be encrypted from the file header and the file trailer of the file to be encrypted according to the preset encryption length, where the extracted data in the file to be encrypted includes "AAA" and "DDD", "BBB" and "CCC" and "ccd", that is, the file to be encrypted is completely extracted, and the extracted header and trailer data overlap.
For example, taking the file to be encrypted as "AAABBBdCCCDDD" and the preset encryption length as 3 bytes as an example, extracting data in the file to be encrypted from the file header and the file trailer of the file to be encrypted according to the preset encryption length, where the extracted data in the file to be encrypted includes "AAA" and "DDD", "BBB" and "CCC", that is, the file to be encrypted is not completely extracted, and the data in the remaining files to be encrypted that are not extracted are "d".
At block 140, if the file to be encrypted is completely extracted, the data in the extracted file to be encrypted is encrypted according to a preset encryption rule.
In some embodiments, if the file to be encrypted is completely extracted, as in the above first or second example, the data in the extracted file to be encrypted, that is, "AAA" and "DDD" and "BBB" and "CCC", or "AAA" and "DDD", "BBB" and "CCC" may be encrypted according to a preset encryption rule.
At block 150, if the file to be encrypted is not completely extracted, the data in the extracted file to be encrypted is encrypted according to a preset encryption rule, and the data in the unextracted file to be encrypted is encrypted according to a preset encryption algorithm.
In some embodiments, if the file to be encrypted is not completely extracted, as in the third embodiment, the data in the extracted file to be encrypted, that is, "AAA" and "DDD", "BBB" and "CCC", may be encrypted according to a preset encryption rule; the data in the file to be encrypted, namely "d", which is not extracted, can also be encrypted according to a preset encryption algorithm.
In some embodiments, the preset encryption algorithm may be set according to the actual requirements of the user. For example, the preset encryption algorithm may be an MD5 algorithm, an SHA-1 algorithm, or a DSA algorithm.
According to the embodiment of the disclosure, the following technical effects are achieved:
Acquiring a file to be encrypted, a preset encryption length and an encryption password; based on a preset hash algorithm, the encryption password is converted into a hash value with a preset encryption length; extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length; if the file to be encrypted is completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule; if the file to be encrypted is not completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule, and encrypting the data in the unextracted file to be encrypted according to a preset encryption algorithm; based on the method, an encryption unit obtained by dividing the data in the file to be encrypted according to the preset encryption length is combined with the data in the file to be encrypted and the encryption password, so that the file to be encrypted is encrypted, the encryption logic is simpler, the user can use the file conveniently, the encryption strength is higher as the preset encryption length is higher, and the encrypted data is safer.
In some embodiments, encrypting the data in the extracted file to be encrypted according to the preset encryption rule includes:
Each time, carrying out exclusive OR operation on the hash value, the first data and the second data, replacing the first data with an operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data is data which is extracted from the file head of the file to be encrypted and is not involved in operation, and the second data is data which is extracted from the file tail of the file to be encrypted and is not involved in operation.
In some embodiments, taking an example as an example, when data which does not participate in operation in a file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp AAA ddD, and the first data "AAA" is replaced by the obtained operation result "XXX", namely the file to be encrypted is changed into "XXXBBBCCCDDD"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are 'BBB', the second data are 'CCC', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB CCC, and the first data 'BBB' is replaced by an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYCCCDDD'; after the two processes, no data which does not participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is XXXYYYCCCDDD.
In some embodiments, taking example two as an example, when data which does not participate in operation in a file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp AAA ddD, and the first data "AAA" is replaced by the obtained operation result "XXX", namely the file to be encrypted is changed into "XXXBBBcccdCCCDDD"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are 'BBB', the second data are 'CCC', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB CCC, and the first data 'BBB' is replaced by an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYcccdCCCDDD'; when data which do not participate in operation in the file to be encrypted are processed for the third time, the first data are ccc, the second data are ccd, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp ccc ccd, and the first data ccc is replaced by an obtained operation result ZZZ, namely the file to be encrypted is changed into XXXYYYZZZdCCCDDD; after the three times of processing, no data which does not participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is XXXYYYZZZdCCCDDD.
According to the embodiment of the disclosure, by providing a specific way of encrypting the data in the extracted file to be encrypted according to the preset encryption rule through the above process, only the first half of the file to be encrypted can be encrypted, and the data in the second half of the file to be encrypted and the independent secret key are used for participating in the operation in the encryption process, so that the encryption of the data in the extracted file to be encrypted is completed, and further the encryption logic is simpler, thereby being convenient for users to use.
In some embodiments, encrypting the data in the extracted file to be encrypted according to the preset encryption rule includes:
each time, carrying out exclusive OR operation on the hash value, the first data and the second data, replacing the second data with an operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data is data which is extracted from the file head of the file to be encrypted and is not involved in operation, and the second data is data which is extracted from the file tail of the file to be encrypted and is not involved in operation.
In some embodiments, taking an example as an example, when data which does not participate in operation in a file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp type AAA type DDD, and the second data "DDD" is replaced by the obtained operation result "XXX", namely the file to be encrypted is changed into "AAABBBCCCXXX"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are BBB, the second data are CCC, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp BBB CCC, and the second data are replaced by an obtained operation result YYY, namely the file to be encrypted is changed into AAABBBYYYXXX; after the two processes, no data which does not participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is AAABBBYYYXXX.
In some embodiments, taking example two as an example, when data which does not participate in operation in a file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp type AAA type DDD, and the second data "DDD" is replaced by the obtained operation result "XXX", namely the file to be encrypted is changed into "AAABBBcccdCCCXXX"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are BBB, the second data are CCC, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp BBB CCC, and the second data are replaced by an obtained operation result YYY, namely the file to be encrypted is changed into AAABBBcccdYYYXXX; when data which do not participate in operation in the file to be encrypted are processed for the third time, the first data are ccc, the second data are ccd, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp ccc ccd, and the second data are replaced by an obtained operation result ZZZ, namely the file to be encrypted is changed into AAABBBcZZZYYYXXX; after the three times of processing, no data which does not participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is AAABBBcZZZYYYXXX.
According to the embodiment of the disclosure, by providing a specific way of encrypting the data in the extracted file to be encrypted according to the preset encryption rule through the above process, only the second half of the file to be encrypted can be encrypted, and the data in the first half of the file to be encrypted and the independent secret key are used for participating in the operation in the encryption process, so that the encryption of the data in the extracted file to be encrypted is completed, and further the encryption logic is simpler, thereby being convenient for users to use.
In some embodiments, encrypting the data in the extracted file to be encrypted according to the preset encryption rule includes:
each time, carrying out exclusive OR operation on the hash value, the first data and the second data, replacing the first data with an obtained operation result, and sequentially processing the data which are not replaced in the file to be encrypted until the data which are not replaced or can participate in operation in the file to be encrypted are not available, so that the encryption of the data in the file to be encrypted is completed;
The first data is the non-replaced data extracted from the file head of the file to be encrypted, and the second data is the non-replaced data extracted from the file tail of the file to be encrypted.
In some embodiments, taking an example as an example, when the first processing is performed on the data that is not replaced in the file to be encrypted, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive or operation, that is, ppp AAA DDD, and the first data "AAA" is replaced with the obtained operation result "XXX", that is, the file to be encrypted becomes "XXXBBBCCCDDD"; when the data which is not replaced in the file to be encrypted is processed for the second time, the first data is 'BBB', the second data is 'DDD', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB DDD, and the first data 'BBB' is replaced with an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYCCCDDD'; when the data which is not replaced in the file to be encrypted is processed for the third time, the first data is CCC, the second data is DDD, the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp CCC DDD, and the first data CCC is replaced by an obtained operation result QQQ, namely the file to be encrypted is changed into XXXYYYQQQDDD; when the data which is not replaced in the file to be encrypted is processed for the fourth time, the first data is 'DDD', the second data is 'DDD', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp DDD, and the first data 'DDD' is replaced with an obtained operation result 'JJJ', namely the file to be encrypted is changed into 'XXXYYYQQQJJJ'; after the four times of processing, the file to be encrypted has no data which is not replaced, and the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is XXXYYYQQQJJJ'.
In some embodiments, taking example two as an example, when the first processing is performed on the data which is not replaced in the file to be encrypted, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive or operation, that is, ppp AAA DDD, and the first data "AAA" is replaced with the obtained operation result "XXX", that is, the file to be encrypted becomes "XXXBBBcccdCCCDDD"; when the data which is not replaced in the file to be encrypted is processed for the second time, the first data is 'BBB', the second data is 'DDD', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB DDD, and the first data 'BBB' is replaced with an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYcccdCCCDDD'; when the data which is not replaced in the file to be encrypted is processed for the third time, the first data is ccc, the second data is DDD, the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp ccc DDD, and the first data ccc is replaced by an obtained operation result QQQ, namely the file to be encrypted is changed into XXXYYYQQQdCCCDDD; when the data which is not replaced in the file to be encrypted is processed for the fourth time, the first data is dCC, the second data is DDD, the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp dCC DDD, and the first data is dCC replaced by an obtained operation result JJJ, namely the file to be encrypted is XXXYYYQQQJJJCDDD; when the data which is not replaced in the file to be encrypted is processed for the fifth time, the first data is 'CDD', the second data is 'DDD', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp CDD DDD, and the first data 'CDD' is replaced with an obtained operation result 'FFF', namely the file to be encrypted is changed into 'XXXYYYQQQJJJFFFD'; after the five times of processing, no data which can participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is XXXYYYQQQJJJFFFD'.
According to the embodiment of the disclosure, a specific manner of encrypting the extracted data in the file to be encrypted according to the preset encryption rule is provided through the above process, all or most of the file to be encrypted can be encrypted, all the data of the file to be encrypted and the independent secret key are used for participating in operation in the encryption process, and the encryption of the extracted data in the file to be encrypted is completed, so that encryption logic is simpler, and the use of users is facilitated.
In some embodiments, encrypting the data in the extracted file to be encrypted according to the preset encryption rule includes:
Firstly performing first exclusive-or operation on the hash value, the first data and the second data each time, replacing the first data with an obtained operation result, sequentially processing the data which do not participate in the first exclusive-or operation in the file to be encrypted until the data which do not participate in the first exclusive-or operation in the file to be encrypted does not exist, performing second exclusive-or operation on the hash value, the first data and the second data each time, replacing the second data with an obtained operation result, sequentially processing the data which do not participate in the second exclusive-or operation in the file to be encrypted until the data which do not participate in the second exclusive-or operation in the file to be encrypted does not exist, and performing fusion processing on the data which do not participate in the first exclusive-or operation and the second exclusive-or operation in the file to be encrypted, so as to complete encryption of the data in the file to be encrypted;
The first data is data which is extracted from the file head of the file to be encrypted and does not participate in the first or second exclusive-or operation, and the second data is data which is extracted from the file tail of the file to be encrypted and does not participate in the first or second exclusive-or operation.
In some embodiments, taking an example as an example, in the first exclusive-or operation, when data which does not participate in the operation in the file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive-or operation, that is, ppp AAA DDD, and the first data "AAA" is replaced with the obtained operation result "XXX", that is, the file to be encrypted becomes "XXXBBBCCCDDD"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are 'BBB', the second data are 'CCC', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB CCC, and the first data 'BBB' is replaced by an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYCCCDDD'; in the second exclusive-or operation, when data which do not participate in the operation in the file to be encrypted are processed for the first time, the first data are AAA, the second data are DDD, the exclusive-or operation is carried out on the hash value, the first data and the second data, namely ppp AAA DDD, and the second data are replaced by the obtained operation result XXX, namely the file to be encrypted is AAABBBCCCXXX; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are BBB, the second data are CCC, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp BBB CCC, and the second data are replaced by an obtained operation result YYY, namely the file to be encrypted is changed into AAABBBYYYXXX; and (3) carrying out fusion processing on the data subjected to the first exclusive OR operation and the second exclusive OR operation, namely eliminating the data which are not replaced in 'XXXYYYCCCDDD' and 'AAABBBYYYXXX', and fusing the replaced data to finish the encryption of the data in the file to be encrypted, wherein the encrypted file is 'XXXYYYYYYXXX'.
In some embodiments, taking example two as an example, in the first exclusive-or operation, when data which does not participate in the operation in the file to be encrypted is processed for the first time, the first data is "AAA", the second data is "DDD", the hash value, the first data and the second data are subjected to exclusive-or operation, that is, ppp AAA DDD, and the first data "AAA" is replaced with the obtained operation result "XXX", that is, the file to be encrypted becomes "XXXBBBcccdCCCDDD"; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are 'BBB', the second data are 'CCC', the hash value, the first data and the second data are subjected to exclusive OR operation, namely ppp BBB CCC, and the first data 'BBB' is replaced by an obtained operation result 'YYY', namely the file to be encrypted is changed into 'XXXYYYcccdCCCDDD'; when data which do not participate in operation in the file to be encrypted are processed for the third time, the first data are ccc, the second data are ccd, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp ccc ccd, and the first data ccc is replaced by an obtained operation result ZZZ, namely the file to be encrypted is changed into XXXYYYZZZdCCCDDD; in the second exclusive-or operation, when data which do not participate in the operation in the file to be encrypted are processed for the first time, the first data are AAA, the second data are DDD, the exclusive-or operation is carried out on the hash value, the first data and the second data, namely ppp AAA DDD, and the second data are replaced by the obtained operation result XXX, namely the file to be encrypted is AAABBBcccdCCCXXX; when data which do not participate in operation in the file to be encrypted are processed for the second time, the first data are BBB, the second data are CCC, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp BBB CCC, and the second data are replaced by an obtained operation result YYY, namely the file to be encrypted is changed into AAABBBcccdYYYXXX; when data which do not participate in operation in the file to be encrypted are processed for the third time, the first data are ccc, the second data are ccd, exclusive OR operation is carried out on the hash value, the first data and the second data, namely ppp ccc ccd, and the second data are replaced by an obtained operation result ZZZ, namely the file to be encrypted is changed into AAABBBcZZZYYYXXX; after the three times of processing, no data which does not participate in operation exists in the file to be encrypted, the encryption of the file to be encrypted is stopped, namely the encryption of the data in the file to be encrypted is completed, and the encrypted file is AAABBBcZZZYYYXXX; and (3) carrying out fusion processing on the data subjected to the first exclusive OR operation and the second exclusive OR operation, namely eliminating the data which are not replaced in 'XXXYYYZZZdCCCDDD' and 'AAABBBcZZZYYYXXX', and fusing the replaced data to finish the encryption of the data in the file to be encrypted, wherein the encrypted file is 'XXXYYYZZZZYYYXXX'.
According to the embodiment of the disclosure, by providing a specific way for encrypting the extracted data in the file to be encrypted according to the preset encryption rule through the above process, all the files to be encrypted can be encrypted, and all the data and independent keys of the files to be encrypted are used for participating in operation in the encryption process, so that the data in the extracted files to be encrypted are encrypted, and encryption logic is further simpler, so that the use of users is facilitated.
Fig. 2 shows a flow chart of a data decryption method 200 according to an embodiment of the disclosure.
When the file to be encrypted is completely extracted, the data in the encrypted file is decrypted sequentially from the end and the head of the encrypted file according to the preset encryption length and the encryption password, respectively, at block 210.
In some embodiments, when the file to be encrypted is completely extracted, the encryption password may be converted into a hash value with a preset encryption length based on a preset hash algorithm, and the ciphertext is obtained by performing an exclusive-or operation on the plaintext and the key based on a decryption rule corresponding to the preset encryption rule during encryption, where the ciphertext and the key are subjected to an exclusive-or operation again to restore the plaintext, that is, the hash value, the first data and the second data are subjected to an exclusive-or operation twice to obtain the self, so as to complete decryption of the data in the encrypted file.
When the file to be encrypted is not completely extracted, the data in the encrypted file is decrypted in sequence from the end and the head of the encrypted file according to the preset encryption length, the encryption password and the decryption algorithm corresponding to the preset encryption algorithm, respectively, in block 220.
In some embodiments, when the file to be encrypted is not completely extracted, the decryption of the data in the encrypted file may be completed based on a decryption rule corresponding to the preset encryption rule and a decryption algorithm corresponding to the preset encryption algorithm during encryption.
According to the embodiment of the disclosure, through the above process, two specific data decryption modes for the file to be encrypted and the file to be encrypted which is not completely extracted are provided, so that decryption logic is simpler, and the user can use the decryption logic conveniently.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present disclosure is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present disclosure. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all alternative embodiments, and that the acts and modules referred to are not necessarily required by the present disclosure.
The foregoing is a description of embodiments of the method, and the following further describes embodiments of the present disclosure through examples of apparatus.
Fig. 3 shows a block diagram of a data encryption device 300 according to an embodiment of the present disclosure. As shown in fig. 3, the apparatus 300 includes:
An obtaining module 310, configured to obtain a file to be encrypted, a preset encryption length, and an encryption password;
a conversion module 320, configured to convert the encrypted password into a hash value with a preset encryption length based on a preset hash algorithm;
the extracting module 330 is configured to extract data in the file to be encrypted from a header and a footer of the file to be encrypted according to a preset encryption length;
The encryption module 340 is configured to encrypt data in the extracted file to be encrypted according to a preset encryption rule if the file to be encrypted is completely extracted; if the file to be encrypted is not completely extracted, encrypting the data in the extracted file to be encrypted according to a preset encryption rule, and encrypting the data in the unextracted file to be encrypted according to a preset encryption algorithm.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the described modules may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the related user personal information all conform to the regulations of related laws and regulations, and the public sequence is not violated.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 4 illustrates a block diagram of an exemplary electronic device 400 capable of implementing embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
The electronic device 400 includes a computing unit 401 that can perform various suitable actions and processes according to a computer program stored in a ROM402 or a computer program loaded from a storage unit 408 into a RAM 403. In the RAM403, various programs and data required for the operation of the electronic device 400 may also be stored. The computing unit 401, ROM402, and RAM403 are connected to each other by a bus 404. An I/O interface 405 is also connected to bus 404.
Various components in electronic device 400 are connected to I/O interface 405, including: an input unit 406 such as a keyboard, a mouse, etc.; an output unit 407 such as various types of displays, speakers, and the like; a storage unit 408, such as a magnetic disk, optical disk, etc.; and a communication unit 409 such as a network card, modem, wireless communication transceiver, etc. The communication unit 409 allows the electronic device 400 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The computing unit 401 may be a variety of general purpose and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 401 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 401 performs the various methods and processes described above, such as method 100. For example, in some embodiments, the method 100 may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 408.
In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 400 via the ROM402 and/or the communication unit 409. One or more of the steps of the method 100 described above may be performed when a computer program is loaded into RAM403 and executed by the computing unit 401. Alternatively, in other embodiments, the computing unit 401 may be configured to perform the method 100 by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: display means for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server incorporating a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel, sequentially, or in a different order, provided that the desired results of the disclosed aspects are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (10)

1. A data encryption method, comprising:
acquiring a file to be encrypted, a preset encryption length and an encryption password;
Converting the encryption password into a hash value of the preset encryption length based on a preset hash algorithm;
extracting data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length;
if the file to be encrypted is completely extracted, encrypting the extracted data in the file to be encrypted according to a preset encryption rule;
if the file to be encrypted is not completely extracted, encrypting the extracted data in the file to be encrypted according to the preset encryption rule, and encrypting the unextracted data in the file to be encrypted according to a preset encryption algorithm.
2. The method according to claim 1, wherein encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive or operation on the hash value, the first data and the second data, replacing the first data with an obtained operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data are data which are extracted from the file header of the file to be encrypted and do not participate in operation, and the second data are data which are extracted from the file tail of the file to be encrypted and do not participate in operation.
3. The method according to claim 1, wherein encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive or operation on the hash value, the first data and the second data, replacing the second data with an obtained operation result, and sequentially processing the data which do not participate in the operation in the file to be encrypted until the data which do not participate in the operation in the file to be encrypted are not available, so as to complete encryption of the data in the file to be encrypted;
The first data are data which are extracted from the file header of the file to be encrypted and do not participate in operation, and the second data are data which are extracted from the file tail of the file to be encrypted and do not participate in operation.
4. The method according to claim 1, wherein encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
Each time, performing exclusive OR operation on the hash value, the first data and the second data, replacing the first data with an obtained operation result, and sequentially processing the data which are not replaced in the file to be encrypted until the data which are not replaced or can participate in operation in the file to be encrypted are not available, so that encryption of the data in the file to be encrypted is completed;
The first data is the data which is extracted from the file head of the file to be encrypted and is not replaced, and the second data is the data which is extracted from the file tail of the file to be encrypted and is not replaced.
5. The method according to claim 1, wherein encrypting the extracted data in the file to be encrypted according to a preset encryption rule includes:
performing first exclusive-or operation on the hash value, the first data and the second data each time, replacing the first data with an obtained operation result, sequentially processing the data which do not participate in the first exclusive-or operation in the file to be encrypted until the data which do not participate in the first exclusive-or operation in the file to be encrypted are not available, performing second exclusive-or operation on the hash value, the first data and the second data each time, replacing the second data with an obtained operation result, sequentially processing the data which do not participate in the second exclusive-or operation in the file to be encrypted until the data which do not participate in the second exclusive-or operation in the file to be encrypted are not available, and performing fusion processing on the data which do not participate in the second exclusive-or operation in the file to be encrypted, thereby completing encryption of the data in the file to be encrypted;
the first data is data which is extracted from the file header of the file to be encrypted and does not participate in the first or second exclusive-or operation, and the second data is data which is extracted from the file tail of the file to be encrypted and does not participate in the first or second exclusive-or operation.
6. A data decryption method, comprising:
And when the file to be encrypted is completely extracted, decrypting the data in the encrypted file from the file tail and the file head of the encrypted file according to the preset encryption length and the preset encryption password.
7. The method of claim 6, wherein the method further comprises:
and when the file to be encrypted is not completely extracted, decrypting the data in the encrypted file from the file tail and the file head of the encrypted file in sequence according to the preset encryption length, the encryption password and a decryption algorithm corresponding to the preset encryption algorithm.
8. A data encryption apparatus, comprising:
The acquisition module is used for acquiring a file to be encrypted, a preset encryption length and an encryption password;
the conversion module is used for converting the encryption password into a hash value of the preset encryption length based on a preset hash algorithm;
The extraction module is used for extracting the data in the file to be encrypted from the file head and the file tail of the file to be encrypted according to the preset encryption length;
The encryption module is used for encrypting the extracted data in the file to be encrypted according to a preset encryption rule if the file to be encrypted is completely extracted; if the file to be encrypted is not completely extracted, encrypting the extracted data in the file to be encrypted according to the preset encryption rule, and encrypting the unextracted data in the file to be encrypted according to a preset encryption algorithm.
9. An electronic device, comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor;
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
10. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-5.
CN202410504447.6A 2024-04-25 2024-04-25 Data encryption method, device, equipment and storage medium Active CN118075037B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410504447.6A CN118075037B (en) 2024-04-25 2024-04-25 Data encryption method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410504447.6A CN118075037B (en) 2024-04-25 2024-04-25 Data encryption method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN118075037A true CN118075037A (en) 2024-05-24
CN118075037B CN118075037B (en) 2024-07-12

Family

ID=91097603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410504447.6A Active CN118075037B (en) 2024-04-25 2024-04-25 Data encryption method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN118075037B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355421A (en) * 2008-09-25 2009-01-28 中国电信股份有限公司 Method for adapting ciphering/deciphering data length of packet
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103001766A (en) * 2012-11-26 2013-03-27 北京视博数字电视科技有限公司 Symmetrical encryption and decryption method for supporting non-aligned data and system thereof
CN103366132A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Device and method for encrypting data
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption
CN104077541A (en) * 2014-06-20 2014-10-01 纵横壹旅游科技(成都)有限公司 Selective encryption method and device based on multimedia data
US20160352517A1 (en) * 2015-05-29 2016-12-01 Microsoft Technology Licensing, Llc Sharing encrypted data with enhanced security
CN108377183A (en) * 2017-12-20 2018-08-07 ***通信集团福建有限公司 XDR data informations encryption method, device, equipment and medium
CN108463968A (en) * 2016-01-11 2018-08-28 维萨国际服务协会 The quick format of variable length data retains encryption
CN108667595A (en) * 2017-03-28 2018-10-16 吉林化工学院 A kind of compression encryption method of large data files
CN111565206A (en) * 2020-07-16 2020-08-21 飞天诚信科技股份有限公司 Method and terminal for safely transmitting secret key
CN111709010A (en) * 2020-06-19 2020-09-25 山东省计算中心(国家超级计算济南中心) Terminal authentication information extraction and verification method and system based on state cryptographic algorithm
CN113032345A (en) * 2021-03-26 2021-06-25 北京字节跳动网络技术有限公司 File processing method, device, terminal and non-transitory storage medium
CN113938270A (en) * 2021-12-17 2022-01-14 北京华云安信息技术有限公司 Data encryption method and device capable of flexibly reducing complexity
US20230057517A1 (en) * 2021-08-10 2023-02-23 Samsung Electronics Co., Ltd. Systems, methods, and apparatus for dividing and encrypting data
CN115730331A (en) * 2022-09-21 2023-03-03 中国电信股份有限公司 Encrypted data generation method and device, electronic equipment and storage medium
CN116015960A (en) * 2023-01-04 2023-04-25 安徽华云安科技有限公司 Multi-node traffic confusion method, device, equipment and storage medium
CN116842538A (en) * 2023-05-31 2023-10-03 武汉中海庭数据技术有限公司 Vector high-precision map encryption method, system and storage medium
CN116962758A (en) * 2023-07-13 2023-10-27 海宁奕斯伟集成电路设计有限公司 Encryption method and device for multimedia content, electronic equipment and storage medium
CN117098120A (en) * 2023-10-19 2023-11-21 国网山西省电力公司晋城供电公司 Beidou short message data encryption and decryption method, equipment and storage medium

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355421A (en) * 2008-09-25 2009-01-28 中国电信股份有限公司 Method for adapting ciphering/deciphering data length of packet
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN103366132A (en) * 2012-03-29 2013-10-23 国际商业机器公司 Device and method for encrypting data
CN103001766A (en) * 2012-11-26 2013-03-27 北京视博数字电视科技有限公司 Symmetrical encryption and decryption method for supporting non-aligned data and system thereof
CN103427979A (en) * 2013-06-09 2013-12-04 浙江工业大学 Internet picture transparent and safe transmission method based on chaotic encryption
CN104077541A (en) * 2014-06-20 2014-10-01 纵横壹旅游科技(成都)有限公司 Selective encryption method and device based on multimedia data
US20160352517A1 (en) * 2015-05-29 2016-12-01 Microsoft Technology Licensing, Llc Sharing encrypted data with enhanced security
CN108463968A (en) * 2016-01-11 2018-08-28 维萨国际服务协会 The quick format of variable length data retains encryption
CN108667595A (en) * 2017-03-28 2018-10-16 吉林化工学院 A kind of compression encryption method of large data files
CN108377183A (en) * 2017-12-20 2018-08-07 ***通信集团福建有限公司 XDR data informations encryption method, device, equipment and medium
CN111709010A (en) * 2020-06-19 2020-09-25 山东省计算中心(国家超级计算济南中心) Terminal authentication information extraction and verification method and system based on state cryptographic algorithm
CN111565206A (en) * 2020-07-16 2020-08-21 飞天诚信科技股份有限公司 Method and terminal for safely transmitting secret key
CN113032345A (en) * 2021-03-26 2021-06-25 北京字节跳动网络技术有限公司 File processing method, device, terminal and non-transitory storage medium
US20230057517A1 (en) * 2021-08-10 2023-02-23 Samsung Electronics Co., Ltd. Systems, methods, and apparatus for dividing and encrypting data
CN113938270A (en) * 2021-12-17 2022-01-14 北京华云安信息技术有限公司 Data encryption method and device capable of flexibly reducing complexity
CN115730331A (en) * 2022-09-21 2023-03-03 中国电信股份有限公司 Encrypted data generation method and device, electronic equipment and storage medium
CN116015960A (en) * 2023-01-04 2023-04-25 安徽华云安科技有限公司 Multi-node traffic confusion method, device, equipment and storage medium
CN116842538A (en) * 2023-05-31 2023-10-03 武汉中海庭数据技术有限公司 Vector high-precision map encryption method, system and storage medium
CN116962758A (en) * 2023-07-13 2023-10-27 海宁奕斯伟集成电路设计有限公司 Encryption method and device for multimedia content, electronic equipment and storage medium
CN117098120A (en) * 2023-10-19 2023-11-21 国网山西省电力公司晋城供电公司 Beidou short message data encryption and decryption method, equipment and storage medium

Also Published As

Publication number Publication date
CN118075037B (en) 2024-07-12

Similar Documents

Publication Publication Date Title
CN111783124B (en) Data processing method, device and server based on privacy protection
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN112560091A (en) Digital signature method, signature information verification method, related device and electronic equipment
CN112437060B (en) Data transmission method and device, computer equipment and storage medium
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
US20170279639A1 (en) Bridge port extender
CN113938270A (en) Data encryption method and device capable of flexibly reducing complexity
CN118075037B (en) Data encryption method, device, equipment and storage medium
CN109118187A (en) Restoration methods, device and the computer readable storage medium of block chain wallet
CN115442164B (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN110249299A (en) Generate method, chip and the electronic equipment of random number
CN116389090A (en) Data encryption and decryption methods and devices, electronic equipment and storage medium
CN115587382B (en) Fully-encrypted data processing method, device, equipment and medium
CN112559497B (en) Data processing method, information transmission method, device and electronic equipment
CN114239014A (en) File processing method and device based on offline device and electronic device
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN111309987B (en) Encryption algorithm identification method and device in actual attack scene
US8437472B2 (en) Strengthened key schedule for arcfour
CN115580489B (en) Data transmission method, device, equipment and storage medium
CN114024780B (en) Node information processing method and device based on Internet of things equipment
KR20240081407A (en) Electronic device for encrypting data by public key and methods thereof
CN213426202U (en) Protection system of server
KR102407204B1 (en) Apparatus and method for compressing using password for improving security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant