Movatterモバイル変換


[0]ホーム

URL:


CN102236767A - File encryption method in combination with hash value - Google Patents

File encryption method in combination with hash value
Download PDF

Info

Publication number
CN102236767A
CN102236767ACN2011101553380ACN201110155338ACN102236767ACN 102236767 ACN102236767 ACN 102236767ACN 2011101553380 ACN2011101553380 ACN 2011101553380ACN 201110155338 ACN201110155338 ACN 201110155338ACN 102236767 ACN102236767 ACN 102236767A
Authority
CN
China
Prior art keywords
file
cryptographic hash
key
hash
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101553380A
Other languages
Chinese (zh)
Other versions
CN102236767B (en
Inventor
陆广琴
杨章唯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Original Assignee
SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTERfiledCriticalSHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Priority to CN201110155338.0ApriorityCriticalpatent/CN102236767B/en
Publication of CN102236767ApublicationCriticalpatent/CN102236767A/en
Application grantedgrantedCritical
Publication of CN102236767BpublicationCriticalpatent/CN102236767B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention provides a file encryption method in combination with a hash value. The method is characterized by comprising the following steps of: A, receiving first file identification information; B, determining a plurality of original text files according to the first file identification information; C, generating a key, wherein the key comprises user-defined data, a check digit and hash data, and the hash data is used for recording a first hash value of the user-defined data; D, generating a second hash value of the first key; E, writing the second hash value into the tail of the original text files to form a target file; and F, encrypting a target file by using the key to acquire a cipher text file. Whether an encrypted file is modified is verified by verifying the first hash value corresponding to the user-defined data and the second hash value corresponding to the key, so that the difficulty in cracking of the conventional symmetric encryption technology is improved. In addition, batch processing of file encryption/decryption can be realized through a wildcard.

Description

File encrypting method in conjunction with cryptographic hash
Technical field
The present invention relates to file encryption, particularly, relate to file encrypting method in conjunction with cryptographic hash.
Background technology
Along with modern science and technology development at full speed day by day, people are more and more stronger to the dependence of network, and the powerful network system has also been brought the danger of leakage of personal information aspect when data sharing is provided.Society has also promoted the generation of various forms of cryptographic algorithm to the active demand of information privacy, and DES wherein (Data Encode Standard) is the most ripe at present cryptographic algorithm.DES is by IBM invention, and (National Bureau of Standard, NBS) approval be the government standard of non-confidential data, and is used in a large number in financial and government-works very soon by the Bureau of Standards of US Department of Commerce belonging country in 1977.
Although it is foolproof that DES is considered to, along with how much level growths of the operational speed of a computer, Brute-Force (brute force attack) can crack this algorithm easily.In January, 1999, the RSA data security session, EEF is only with just finishing the challenge of being initiated by RSA company that cracks to DES in 22 hours 15 minutes.It is found that 64 DES has not reached the requirement of present encryption far away, so scientists is just used 128 3DES encryption technology, the author introduces another kind of DES and the algorithm that combines of time parameter with 64 here, also can successfully resist the attack of Brute-Force.
Summary of the invention
At defective of the prior art, the purpose of this invention is to provide a kind of file encrypting method in conjunction with cryptographic hash.
According to an aspect of the present invention, provide file encrypting method, it is characterized in that, comprise the steps: steps A: receive first file identification information in conjunction with cryptographic hash; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and Hash data, and wherein, described Hash data are used to put down in writing first cryptographic hash of described User Defined data; Step D: second cryptographic hash that generates described first key; Step e: write described second cryptographic hash at described text file end and generate file destination; Step F: use described key that described file destination is encrypted the acquisition cryptograph files.
Preferably, also comprise the steps: step G: receive second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge whether the cryptographic hash that the Hash data of described key are put down in writing is identical with described first cryptographic hash; Step J:, then use described key that described cryptograph files is decrypted and obtain described file destination if the cryptographic hash that the Hash data of described key are put down in writing is identical with described first cryptographic hash; Step K: whether the cryptographic hash of judging original text end of file in the described file destination is identical with described second cryptographic hash; Step L:, then export described text file if the cryptographic hash of original text end of file is identical with described second cryptographic hash in the described file destination.
Preferably, also comprise the steps: step J ': if cryptographic hash and described first cryptographic hash that the Hash data of described key are put down in writing are inequality, then output error information; Step L ': if the cryptographic hash and described second cryptographic hash of original text end of file are inequality in the described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and the Hash data account for 20.
Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and the Hash data account for 32.
Preferably, described first file identification information comprises first asterisk wildcard, described step B comprises the steps: step B1: the file of filename and described first asterisk wildcard coupling is defined as described text file, and described second file identification information comprises second asterisk wildcard.Described step H comprises the steps: step H1: the file of filename and described second asterisk wildcard coupling is defined as described cryptograph files.
Preferably, in step F, adopt symmetric encipherment algorithm to encrypt.
Preferably, in step F, adopt the DES algorithm to encrypt.
The present invention verifies by checking first cryptographic hash corresponding with the User Defined data and with corresponding second cryptographic hash of key whether encrypt file is modified, and has improved the difficulty that cracks of existing symmetric cryptosystem.And the present invention can realize batch processing to file encryption/decryption by asterisk wildcard.
Embodiment
File encrypting method in conjunction with cryptographic hash provided by the invention comprises the steps: steps A: receive first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and Hash data, and wherein, described Hash data are used to put down in writing first cryptographic hash of described User Defined data; Step D: second cryptographic hash that generates described first key; Step e: write described second cryptographic hash at described text file end and generate file destination; Step F: use described key that described file destination is encrypted the acquisition cryptograph files.
Described steps A to step F has realized the encryption to file, next passes through step G to the deciphering of step L realization to file.
More specifically, described file encrypting method in conjunction with cryptographic hash also comprises the steps: step G: receive second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge whether the cryptographic hash that the Hash data of described key are put down in writing is identical with described first cryptographic hash; Step J:, then use described key that described cryptograph files is decrypted and obtain described file destination if the cryptographic hash that the Hash data of described key are put down in writing is identical with described first cryptographic hash; Step K: whether the cryptographic hash of judging original text end of file in the described file destination is identical with described second cryptographic hash; Step L:, then export described text file if the cryptographic hash of original text end of file is identical with described second cryptographic hash in the described file destination.
Preferably, described file encrypting method in conjunction with cryptographic hash also comprises the steps: step J ': if cryptographic hash and described first cryptographic hash that the Hash data of described key are put down in writing are inequality, and then output error information; Step L ': if the cryptographic hash and described second cryptographic hash of original text end of file are inequality in the described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and the Hash data account for 20.Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and the Hash data account for 32.
Preferably, described first file identification information comprises first asterisk wildcard, described step B comprises the steps: step B1: the file of filename and described first asterisk wildcard coupling is defined as described text file, and described second file identification information comprises second asterisk wildcard.Described step H comprises the steps: step H1: the file of filename and described second asterisk wildcard coupling is defined as described cryptograph files.
Preferably, in step F, adopt symmetric encipherment algorithm to encrypt.Preferably, in step F, adopt the DES algorithm to encrypt.
More than specific embodiments of the invention are described.It will be appreciated that the present invention is not limited to above-mentioned specific implementations, those skilled in the art can make various distortion or modification within the scope of the claims, and this does not influence flesh and blood of the present invention.

Claims (10)

CN201110155338.0A2011-06-102011-06-10In conjunction with the file encrypting method of cryptographic hashExpired - Fee RelatedCN102236767B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201110155338.0ACN102236767B (en)2011-06-102011-06-10In conjunction with the file encrypting method of cryptographic hash

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201110155338.0ACN102236767B (en)2011-06-102011-06-10In conjunction with the file encrypting method of cryptographic hash

Publications (2)

Publication NumberPublication Date
CN102236767Atrue CN102236767A (en)2011-11-09
CN102236767B CN102236767B (en)2015-12-16

Family

ID=44887409

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201110155338.0AExpired - Fee RelatedCN102236767B (en)2011-06-102011-06-10In conjunction with the file encrypting method of cryptographic hash

Country Status (1)

CountryLink
CN (1)CN102236767B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108650095A (en)*2018-04-172018-10-12四川长虹电器股份有限公司A kind of file encryption-decryption method based on redis
CN109922049A (en)*2019-02-022019-06-21立旃(上海)科技有限公司Verifying device and method based on block chain
CN110176986A (en)*2019-05-302019-08-27杭州奇治信息技术股份有限公司A kind of data ciphering method of multi-enciphering, device and mobile terminal
CN111967875A (en)*2020-08-192020-11-20上海网班教育科技股份有限公司Block chain-based file uplink evidence storing method and device
CN112632574A (en)*2020-12-212021-04-09深圳壹账通智能科技有限公司Multi-mechanism data processing method and device based on alliance chain and related equipment
CN114978711A (en)*2022-05-252022-08-30山东国子软件股份有限公司Data transmission method and system for symmetric encryption of dynamic secret key
CN115022099A (en)*2022-08-092022-09-06北京华云安软件有限公司Identity authentication method and system based on UDP transmission protocol
CN116136844A (en)*2021-11-182023-05-19腾讯科技(深圳)有限公司Entity identification information generation method, device, medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101710380A (en)*2009-12-222010-05-19中国软件与技术服务股份有限公司Electronic document safety protection method
US7792300B1 (en)*2003-09-302010-09-07Oracle America, Inc.Method and apparatus for re-encrypting data in a transaction-based secure storage system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7792300B1 (en)*2003-09-302010-09-07Oracle America, Inc.Method and apparatus for re-encrypting data in a transaction-based secure storage system
CN101710380A (en)*2009-12-222010-05-19中国软件与技术服务股份有限公司Electronic document safety protection method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108650095A (en)*2018-04-172018-10-12四川长虹电器股份有限公司A kind of file encryption-decryption method based on redis
CN109922049A (en)*2019-02-022019-06-21立旃(上海)科技有限公司Verifying device and method based on block chain
CN110176986A (en)*2019-05-302019-08-27杭州奇治信息技术股份有限公司A kind of data ciphering method of multi-enciphering, device and mobile terminal
CN111967875A (en)*2020-08-192020-11-20上海网班教育科技股份有限公司Block chain-based file uplink evidence storing method and device
CN112632574A (en)*2020-12-212021-04-09深圳壹账通智能科技有限公司Multi-mechanism data processing method and device based on alliance chain and related equipment
CN116136844A (en)*2021-11-182023-05-19腾讯科技(深圳)有限公司Entity identification information generation method, device, medium and electronic equipment
CN114978711A (en)*2022-05-252022-08-30山东国子软件股份有限公司Data transmission method and system for symmetric encryption of dynamic secret key
CN114978711B (en)*2022-05-252024-06-25山东国子软件股份有限公司 A method and system for data transmission using dynamic key symmetric encryption
CN115022099A (en)*2022-08-092022-09-06北京华云安软件有限公司Identity authentication method and system based on UDP transmission protocol

Also Published As

Publication numberPublication date
CN102236767B (en)2015-12-16

Similar Documents

PublicationPublication DateTitle
CN102236767B (en)In conjunction with the file encrypting method of cryptographic hash
CN102024123B (en)Method and device for importing mirror image of virtual machine in cloud calculation
CN103716157A (en)Grouped multiple-key encryption method and grouped multiple-key encryption device
CN106529308A (en)Data encryption method and apparatus, and mobile terminal
CN104901810A (en)Data encryption storage method based on domestic cryptographic algorithm
CN110955918A (en) A contract text protection method based on RSA encryption sha-256 digital signature
CN102890757B (en)A kind of comparison method of electric energy meter software and Compare System thereof
CN102025744A (en)Import and export system of virtual machine image in cloud computing
CN103942500B (en)Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN105468940A (en)Software protection method and apparatus
CN103237010B (en)The server end of digital content is cryptographically provided
CN108632296A (en)A kind of dynamic encryption and decryption method of network communication
CN104574652B (en)The increase of IC-card blowdown data, the method reduced and IC-card
CN106101150A (en)The method and system of AES
US20110026712A1 (en)Concealing plain text in scrambled blocks
CN106778292B (en) A Quick Restoration Method of Word Encrypted Document
CN116707778A (en)Data hybrid encryption transmission method and device and electronic equipment
CN102135944A (en)Method for safe data storage in mobile communication equipment
KaurA Review on Symmetric Key Cryptography Algorithms.
CN112069472A (en)User login authentication method and system
CN103634113B (en)Encryption and decryption method and device with user/equipment identity authentication
CN104392153B (en)A kind of method for protecting software and system
Gong[Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN102761559B (en)Network security based on private data shares method and communication terminal
CN102223229A (en)Method for safe transmission of data in public network

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20151216


[8]ページ先頭

©2009-2025 Movatter.jp