The safe encryption method of password or keyTechnical field
The invention belongs to maintaining secrecy or safe transmission technical field of digital information, relate to the safe encryption method of a kind of password or key.
Background technology
The encryption technology of digital information is the main secrecy provision that ecommerce is taked, the most frequently used safe and secret means, utilize technological means that important data encryption is transmitted, arrive object and by certain mode, decipher again, in order to reach the secret effect of digital information.Existing encryption technology generally comprises password encryption and secret key encryption, although password encryption and secret key encryption have guaranteed the fail safe that digital information is certain, once but password and key loss just can be decoded digital information completely, in addition, modernization along with hacking technique, the fail safe of password encryption and secret key encryption is more and more challenged, and how to ensure that the uniqueness of password encryption and secret key encryption and difficult cracking have become one of modern society's problem demanding prompt solution.
Summary of the invention
Technical problem to be solved by this invention is for the problem that existing password is encrypted and secret key encryption exists that encryption safe performance is low, password and key are easily stolen, provide a kind of encryption safe performance high, there is the password of uniqueness or the safe encryption method of key after being difficult for cracking, encrypting.
For addressing the above problem, technical scheme of the present invention is:
A safe encryption method for password or key, comprises the steps:
Step a: obtain the content of password or the key that need to be encrypted computing, the content of password and key is write in the first buffer;
Step b: obtain the MAC Address of Network Card of computer, write in the second buffer the content in computer network interface card MAC Address is all or part of;
Step c: read respectively the content in the first buffer and the second buffer, the content reading is encrypted to computing and produces new password or key, described new password or key need the checking of user's MAC Address of Network Card after deciphering.
Preferably, in described step b, also comprise the CPU information of obtaining computer, and generate computer CPU information can execution character string, can write in the second buffer by all or part of of execution character string; Corresponding, password or key new in step c also need the checking of computer CPU information after deciphering.The CPU information of computer has uniqueness as hardware sequence number etc., can be used as multiple digital verification, further ensure the security performance of new password or key, even password or key from stealing or leakage, stolen party can only just can complete decryption work on user's computer, has increased the difficulty of divulging a secret.
Preferably, in described step b, also comprise and obtain computer application software information, and generate the identification strings of application software information, all or part of of identification strings write in the second buffer; Password or key new in corresponding step c also need the checking of application software information after deciphering.In the encryption or decrypting process of computer application software and digital information, the software information that can utilize computer application software to produce, the identification strings of generation is as multiple digital verification, the password that multi-faceted raising is new or the security performance of key.
Preferably, described computer is a kind of of data receiver, data receiver, data receiver and data receiver.When computer is data receiver or data receiver or data receiver and data receiver, can obtain respectively MAC Address in data receiver and data receiver or computer CPU information or computer application software information writes in the second buffer, be conducive to like this improve the password of the inner important numbers information of computer the machine or the security performance of key, also improved digital information transmission both sides' password or the security performance of key.
Be compared to prior art, the safe encryption method of password of the present invention or key is combined password or key with computer network interface card MAC Address, content all or part of in computer network interface card MAC Address and password or key are encrypted to computing and form new password or key, the password that this is new or key need the checking of content all or part of in original computer network interface card MAC Address after deciphering, could ensure the validity of password or key, guarantee that password or the key after encrypting has uniqueness; The present invention has the advantages that encryption safe performance is high, be difficult for cracking, and can be widely used in the password of various data, application software etc. or the safety encipher of key.
Accompanying drawing explanation
Fig. 1 is the inventive method flow chart.
Embodiment
Below in conjunction with drawings and Examples, further describe the present invention, but protection scope of the present invention is not limited to this.
With reference to Fig. 1, the safe encryption method of password of the present invention or key reconfigures one group of new password or key of rear production by password or key and one or more computer network interface card MAC Address, computer CPU information and computer application software information, in order to improve the security performance of password or key, ensure the uniqueness of password or key.
The safe encryption method of password of the present invention or key comprises the steps:
Step a: obtain the content of password or the key that need to be encrypted computing, the content of password and key is write in the first buffer.
Step b: when the content of password and key successfully writes the first buffer, obtain the MAC Address of Network Card of one or more computer, in computer network interface card MAC Address, 48bit is that each network site is exclusive, there is uniqueness, now write in the second buffer the content in computer network interface card MAC Address is all or part of.The number that 48bit writes figure place can, according to the needs of password and key complexity or importance, can arrange with user voluntarily.
Successfully writing after MAC Address, obtain the CPU information of one or more computer, and generate computer CPU information can execution character string, can write in the second buffer by all or part of of execution character string, wherein computer CPU information comprises computer hardware sequence or other.After can execution character conspiring to create merit and writing, obtain computer application software information, and generate the identification strings of application software information, all or part of of identification strings write in the second buffer.After above-mentioned steps completes, enter step c.
Step c: read respectively the content in the first buffer and the second buffer, the content reading is encrypted to computing and generates new password or key.Wherein cryptographic calculation can be MD5 algorithm, the symmetry algorithm based on DES or various simple logics high in the clouds, as " displacement ", " position negate computing " and " position XOR " etc., object is to make computer network interface card MAC Address, computer CPU information or computer application software information combination in new password or key, increases its complexity.The above-mentioned MD5 algorithm of mentioning, the symmetry algorithm based on DES and various simple logical operation, as " displacement ", " position negate computing " and " position XOR " etc. belong to prior art, have this to repeat no more.
Wherein, described password or key can be password or the keys of computer-internal digital information, can be also password or the keys that needs transfer files, have the place that relates to password or key can adopt method of the present invention to be encrypted in computer.Described computer can be a kind of in data receiver, data receiver, data receiver and data receiver.When computer is data receiver or data receiver or data receiver and data receiver, can obtain respectively MAC Address in data receiver and data receiver or computer CPU information or computer application software information writes in the second buffer and stores, make new password or cipher key application in one or more computer, be conducive to improve the password of the inner important numbers information of computer the machine or the security performance of key, also improved digital information transmission both sides' password or the security performance of key.
After new password or key generate, in use, user need to be decrypted with multiple check after can enable.After the inverse operation deciphering by respective encrypted algorithm of new password or key, need the checking of the corresponding MAC Address of Network Card of user, computer CPU information or computer application software information, only have new password or key to be proved to be successful in subscriber computer, while determining new password or key safety, password or key just can play corresponding effect, could ensure the validity of password or key, otherwise, new password or key verification failure, cannot read digital information.
It should be noted that; embodiment of the present invention is illustrative; rather than determinate; therefore the invention is not restricted to the embodiment described in embodiment; every other execution modes that drawn by those skilled in the art's technical scheme according to the present invention, belong to protection scope of the present invention equally.