Movatterモバイル変換


[0]ホーム

URL:


CN101226705A - Circle scattering migration code-transfer ciphering method - Google Patents

Circle scattering migration code-transfer ciphering method
Download PDF

Info

Publication number
CN101226705A
CN101226705ACNA2008100189696ACN200810018969ACN101226705ACN 101226705 ACN101226705 ACN 101226705ACN A2008100189696 ACNA2008100189696 ACN A2008100189696ACN 200810018969 ACN200810018969 ACN 200810018969ACN 101226705 ACN101226705 ACN 101226705A
Authority
CN
China
Prior art keywords
character
decimal
offset
password
transcoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100189696A
Other languages
Chinese (zh)
Other versions
CN100561546C (en
Inventor
李华伟
吴晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hejian Technology Suzhou Co Ltd
Original Assignee
Hejian Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hejian Technology Suzhou Co LtdfiledCriticalHejian Technology Suzhou Co Ltd
Priority to CNB2008100189696ApriorityCriticalpatent/CN100561546C/en
Publication of CN101226705ApublicationCriticalpatent/CN101226705A/en
Application grantedgrantedCritical
Publication of CN100561546CpublicationCriticalpatent/CN100561546C/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention relates to an enciphering method with recycling diffusion, offsetting and transcoding, which comprises the steps of (a) transcoding, namely transiting cipher characters of original plaintext password into ASCII codes one after another, transiting into decimal characters, (b) diffusion, namely multiplying the decimal characters transited from cipher character string, and a multiplier K is formed in linear relationship with positional constant of each original cipher character, (c) offsetting, namely carrying out mathematic processing with a offsetting constant M to the overall diffused decimal characters, (d) reoffsetting, namely carrying out mathematic processing with a offsetting constant N to individuals of the offset decimal characters, (e) character transiting, namely transiting offset decimal characters into corresponding ASCII codes to obtain enciphered password. The invention combines data recycling diffusion, offset and transcoding technique, employs two times of offsetting and transcoding, and produces dynamic extension enciphered password, thereby having good key attack resistant property and achieves the purpose of safeguarding information material.

Description

Circle scattering migration code-transfer ciphering method
Technical field
The present invention relates to software information industry data encryption and decryption technical field.
Background technology
21st century is the informationalized epoch; high speed development and widespread use along with computing machine and data communication technology; society is more and more higher to the degree of dependence of safe storage, safe transmission and the safe handling of information material, and the safeguard protection problem of information just seems more important.Information networking day by day at present, ecommerce, e-finance, technology such as office is with no paper, robotization flourish, the security of thing followed information and confidentiality are paid close attention to day by day, come into one's own more.Along with fast development of computer technology, the ability of decoding is shockingly development also, make confidential technique be faced with stern challenge, traditional encryption method is encrypted (transiposition) method owing to its regularity as replacing encryption (subsititution) or transposition, be easy to be cracked, therefore, need a kind of more reliable encryption method to make some responsive confidential information not have storage or transmission safely on the medium of safeguard procedures urgently.
Summary of the invention
The object of the invention is exactly to provide a kind of to the code characters indefinite length after feasible encryption the in clear-text passwords encryption back for solving the deficiencies in the prior art, thereby is difficult for decoded encryption method.
For solving the problems of the technologies described above technical scheme of the present invention be: a kind of circle scattering migration code-transfer ciphering method is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
Further, between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
Described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
A plurality of original plaintext code characters are carried out cyclic transformation by step (a) to step (d) respectively and are handled.
Owing to adopted above-mentioned technical scheme; advantage of the present invention is: binding data circle scattering migration of the present invention and transcoding technology, adopt twice skew and transcoding, and produce the dynamic expansion Crypted password; thereby the performance with good opposing cipher key attacks reaches protection data information purpose of safety.
Embodiment
Below graphic extension is carried out in circle scattering migration code-transfer ciphering method combination of the present invention, will be provided an embodiment at last and be described in further detail:
If the original plaintext password that needs to encrypt is:
Now above-mentioned original plaintext password is encrypted, step is as follows:
(a), transcoding step: first original plaintext code characters is carried out ASCII character transform, convert character to decimal to and be:
Figure S2008100189696D00021
(b), diffusing step: the character to decimal after first original plaintext password conversion is carried out multiplying, multiplier is K, K is the diffusion variable, and it is linear to be somebody's turn to do diffusion variable K and original plaintext code characters residing position constant in the original plaintext password string, and the character after the diffusion becomes:
(c), bias step: at above-mentioned first expressly the character to decimal integral body after character diffusion add (+M), subtract (M) or the processing of delivery (%M), this addend M, subtrahend M or modulus M are called constant offset M at this, and the character after the skew becomes:
Figure S2008100189696D00023
(d), the grouping step: after the character to decimal integral body after first original plaintext code characters is carried out transcoding, diffusion, skew with any self-defined grouping character variable as " | ", “ ﹠amp; ", " $ " identify, and is used for grouping;
After first original plaintext password carried out above-mentioned steps conversion; again second original plaintext password changed; so circulation; until the conversion of finishing last original plaintext code characters; it is simpler that this kind cyclic transformation mode one by one can make encryption method implement; certainly the present technique personnel also can realize the mode that enters next step after all original plaintext code characters conversions is again realized that this all should be encompassed in the protection domain of the present invention in each step according to above-mentioned thought.
To after all original plaintext password conversions, the gained character string is as follows through above-mentioned:
Figure S2008100189696D00031
Carry out again bias step (e) then: to above-mentioned single character to decimal (individuality) add (+N), subtract (N) or delivery (%N) any processing wherein, this addend N, subtrahend N or modulus N are called constant offset N at this, are transformed to:
Figure S2008100189696D00032
At last each above-mentioned individual character to decimal is converted to corresponding ascii character, promptly obtain final Crypted password, Password Length after this encryption method is encrypted is unfixing, all relevant with original password length, side-play amount M, side-play amount N, if with 8 passwords, it is example that M, N are double figures, password total length after the encryption is between 24~32, therefore, be not easy to be cracked through the data after the encryption of this kind method, thereby guaranteed the safety of data information.
Provide a specific embodiment below, with clearer understanding encryption method implementation procedure of the present invention:
The setting original password is: x y z 789
(a), transcoding step: above-mentioned original plaintext password is carried out the ASCII character conversion, and the character to decimal after the conversion is:
120 121 122 55 56 57
(b), diffusing step: multiply each other with multiplier K to above-mentioned character to decimal is whole, and the position constant at multiplier K and original plaintext code characters place is linear, in the present embodiment, multiplying is as follows:
120×1 121×2 122×3 55×4 56×5 57×6,
So the decimal system after obtaining spreading is:
120 242 366 220 280 342
(c), bias step: the decimal system integral body after the above-mentioned diffusion added M, subtracts a kind of computing among M or the delivery M, in the present embodiment, adopt to add (+) computing, and M gets 20 arbitrarily, so the decimal system after being offset is:
140 262 382 240 300 362
(d), grouping step: promptly between every adjacent decimal number, divide into groups with self-defined symbol:
140|262|382|240|300|362
(e), bias step again: each individuality to above-mentioned character to decimal adds N, subtracts a kind of computing among N or the delivery N, in the present embodiment, adopt to add (+) computing, and N gets 72 arbitrarily, so tackle the skew that following data add N:
1 4 0 2 6 2 3 8 2 2 4 0 3 0 0 3 6 2
The decimal system after the skew is:
73 76 72 74 78 74 75 80 74 74 76 72 75 72 72
75 78 74
At last above-mentioned data are carried out the ASIIC transcoding again, promptly obtain final password and be:
I L H J N J K P J J L H K H H K N J
The foregoing description only is explanation technical conceive of the present invention and characteristics, and its purpose is to allow the personage who is familiar with this technology can understand content of the present invention and enforcement according to this, can not limit protection scope of the present invention with this.All equivalences that spirit is done according to the present invention change or modify, and all should be encompassed within protection scope of the present invention.

Claims (4)

1. circle scattering migration code-transfer ciphering method, it is characterized in that: it comprises the steps:
(a), transcoding step: each original plaintext code characters is carried out ASCII character respectively transform, convert corresponding character to decimal to;
(b), diffusing step: each corresponding character to decimal in code characters conversion back is multiplied each other with multiplier K respectively, and described multiplier K and each the residing position of original password character constant are linear, and wherein, K is a positive integer;
(c), bias step: each the character to decimal integral body after the diffusion is carried out the mathematics manipulation that constant offset is M, and described mathematics manipulation comprises and adding, subtracts, a kind of in the delivery, and wherein, M is a positive integer;
(d), bias step again: the individuality in each character to decimal after step (c) skew is carried out the mathematics manipulation that constant offset is N again, and described mathematics manipulation also comprises and adding, subtracts, a kind of in the delivery, and wherein, N is a positive integer;
(e), change the character step: the character to decimal after will being offset again converts the password after corresponding ASCII character promptly obtains encrypting to.
2. circle scattering migration code-transfer ciphering method according to claim 1, it is characterized in that: between described step (c) and step (d), also have a grouping step, divide into groups with self-defined grouping character variable between adjacent two character to decimals after described grouping step will be offset.
3. circle scattering migration code-transfer ciphering method according to claim 2 is characterized in that: described self-defined grouping character variable comprises " | ", “ ﹠amp; ", a kind of in " $ ".
4. circle scattering migration code-transfer ciphering method according to claim 1 and 2 is characterized in that: a plurality of original plaintext code characters are carried out cyclic transformation by step (a) to step (d) respectively and are handled.
CNB2008100189696A2008-01-282008-01-28Circle scattering migration code-transfer ciphering methodExpired - Fee RelatedCN100561546C (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CNB2008100189696ACN100561546C (en)2008-01-282008-01-28Circle scattering migration code-transfer ciphering method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CNB2008100189696ACN100561546C (en)2008-01-282008-01-28Circle scattering migration code-transfer ciphering method

Publications (2)

Publication NumberPublication Date
CN101226705Atrue CN101226705A (en)2008-07-23
CN100561546C CN100561546C (en)2009-11-18

Family

ID=39858676

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CNB2008100189696AExpired - Fee RelatedCN100561546C (en)2008-01-282008-01-28Circle scattering migration code-transfer ciphering method

Country Status (1)

CountryLink
CN (1)CN100561546C (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101697116B (en)*2009-10-272011-11-09飞天诚信科技股份有限公司Data conversion method and device
CN102571324A (en)*2011-12-312012-07-11深圳市永达电子股份有限公司Method for building dynamic nonstandard character library, built character library, and system applying method and character library above
CN101894244B (en)*2009-05-202012-11-21鸿富锦精密工业(深圳)有限公司System and method for enciphering electronic data
CN102904712A (en)*2011-07-252013-01-30深圳市金溢科技有限公司Information encrypting method
CN104113410A (en)*2014-07-042014-10-22北京思特奇信息技术股份有限公司Method and device for data encryption transmission based on multi-table encryption method
CN104615954A (en)*2014-06-302015-05-13腾讯科技(深圳)有限公司Password storage method and device
CN105049094A (en)*2015-07-162015-11-11陈飞Complex multi-group parameter transcoding and transmission method and system
CN105141631A (en)*2015-09-212015-12-09宇龙计算机通信科技(深圳)有限公司Terminal, server and account security login method, device and system
CN108234513A (en)*2018-01-232018-06-29马鞍山博望科创生产力促进中心有限公司A kind of numerically controlled lathe remote control signal Transmission system
CN110019075A (en)*2018-08-092019-07-16苏州科达科技股份有限公司Log encryption method and decryption method and device
CN113468558A (en)*2021-06-082021-10-01深圳市综合交通设计研究院有限公司Road traffic flow data acquisition project data encryption and decryption system and carrier device
CN113536287A (en)*2021-06-212021-10-22苏州工业园区服务外包职业学院 Information verification method, system, computer equipment and storage medium
CN113987586A (en)*2021-11-262022-01-28江苏太湖云计算信息技术股份有限公司Method for encrypting personal identity information of database
CN114130033A (en)*2021-11-192022-03-04苏州九宫数字科技有限公司Resource encryption and decryption method, system and medium for Cocos game package
CN115062279A (en)*2022-07-122022-09-16青岛中科曙光科技服务有限公司 Source code encryption and decryption method, device and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH10177472A (en)1996-12-181998-06-30Meteoola Syst KkMethod for generating random number string
CN100359494C (en)*2003-05-042008-01-02江南机器(集团)有限公司Electronic file characters internal code transformation encryption method
CN1777089B (en)*2005-11-242010-11-17上海森田科学技术研究所有限公司Complex phase shift encrypting and decrypting method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101894244B (en)*2009-05-202012-11-21鸿富锦精密工业(深圳)有限公司System and method for enciphering electronic data
CN101697116B (en)*2009-10-272011-11-09飞天诚信科技股份有限公司Data conversion method and device
CN102904712B (en)*2011-07-252016-01-06深圳市金溢科技股份有限公司Information ciphering method
CN102904712A (en)*2011-07-252013-01-30深圳市金溢科技有限公司Information encrypting method
CN102571324A (en)*2011-12-312012-07-11深圳市永达电子股份有限公司Method for building dynamic nonstandard character library, built character library, and system applying method and character library above
CN104615954B (en)*2014-06-302018-09-11腾讯科技(深圳)有限公司Password storage method and apparatus
CN104615954A (en)*2014-06-302015-05-13腾讯科技(深圳)有限公司Password storage method and device
CN104113410A (en)*2014-07-042014-10-22北京思特奇信息技术股份有限公司Method and device for data encryption transmission based on multi-table encryption method
CN105049094A (en)*2015-07-162015-11-11陈飞Complex multi-group parameter transcoding and transmission method and system
CN105141631A (en)*2015-09-212015-12-09宇龙计算机通信科技(深圳)有限公司Terminal, server and account security login method, device and system
CN108234513A (en)*2018-01-232018-06-29马鞍山博望科创生产力促进中心有限公司A kind of numerically controlled lathe remote control signal Transmission system
CN110019075B (en)*2018-08-092021-08-10苏州科达科技股份有限公司Log encryption method and device and log decryption method and device
CN110019075A (en)*2018-08-092019-07-16苏州科达科技股份有限公司Log encryption method and decryption method and device
CN113468558A (en)*2021-06-082021-10-01深圳市综合交通设计研究院有限公司Road traffic flow data acquisition project data encryption and decryption system and carrier device
CN113536287A (en)*2021-06-212021-10-22苏州工业园区服务外包职业学院 Information verification method, system, computer equipment and storage medium
CN113536287B (en)*2021-06-212024-06-21苏州工业园区服务外包职业学院Information verification method, system, computer equipment and storage medium
CN114130033A (en)*2021-11-192022-03-04苏州九宫数字科技有限公司Resource encryption and decryption method, system and medium for Cocos game package
CN114130033B (en)*2021-11-192025-05-02苏州九宫数字科技有限公司 A resource encryption and decryption method, system and medium for Cocos game package
CN113987586A (en)*2021-11-262022-01-28江苏太湖云计算信息技术股份有限公司Method for encrypting personal identity information of database
CN115062279A (en)*2022-07-122022-09-16青岛中科曙光科技服务有限公司 Source code encryption and decryption method, device and storage medium

Also Published As

Publication numberPublication date
CN100561546C (en)2009-11-18

Similar Documents

PublicationPublication DateTitle
CN100561546C (en)Circle scattering migration code-transfer ciphering method
Khan et al.A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI
Raza et al.Routine of encryption in cognitive radio network
Hendi et al.A novel simple and highly secure method for data encryption-decryption
US20140208102A1 (en)Method of protecting digital information
CN114826587B (en)Data encryption method, data decryption method, data encryption device, data decryption device and data decryption equipment
Aung et al.A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher)
CN117714613A (en)Image encryption method and device, electronic equipment and storage medium
Arroyo et al.Polybius square in cryptography: a brief review of literature
CN114826590A (en)Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment
Lu et al.Text visualization encryption based on coordinate substitution and chaotic system
Mehta et al.DieRoll: A unique key generation and encryption technique
Sawant et al.Modified symmetric image encryption approach based on mixed column and substitution box
Sihwail et al.A New Image Encryption Method Using an Optimized Smart Codebook
CN101009548A (en)Data encryption method based on encryption technology
Albu-Rghaif et al.A data structure encryption algorithm based on circular queue to enhance data security
CN103812658A (en)Stream cipher based secure communication protocol
Bhat et al.Information hiding through dynamic text steganography and cryptography: Computing and informatics
CN118018659A (en) Image encryption and decryption method and system based on SM2 and DNA
HiwarekarEncryption-decryption using laplace transforms
CN110086953A (en)The color image encrypting method with Gyrator transformation is decomposed based on QR
CN109327478B (en) A secure access method for chaotic physical layer
Amma NG et al.A novel scrambled data hiding approach towards securing sensitive data
Lavanya et al.An encryption algorithm functioning on ASCII values and random number generation
LuResearch on anti-counterfeiting technology based on encrypted two-dimensional code

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20091118

Termination date:20170128

CF01Termination of patent right due to non-payment of annual fee

[8]ページ先頭

©2009-2025 Movatter.jp