Encryption and decryption methods for file transfers

A file transfer and file technology, applied in the field of file transfer encryption and decryption, can solve the hidden dangers of file security, not applicable to ordinary enterprises, cracking encrypted files, etc., to increase encryption security, strengthen unbreakability, and increase decryption. effect of difficulty

Active Publication Date: 2016-11-30
武汉千里路智能交通科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Channel encryption has high security and is generally used in politics and military affairs, but it is expensive and not suitable for ordinary enterprises
Local file encryption technology needs to be carried out on the local computer. If hackers enter, they may steal information such as ciphertext, keys, and software, which may crack encrypted files, bringing hidden dangers to file security and threatening the normal operation of enterprises.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption methods for file transfers
  • Encryption and decryption methods for file transfers
  • Encryption and decryption methods for file transfers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The method of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] Such as figure 1 As shown, the encryption and decryption method for file transfer includes the following steps:

[0031] Step S100, encrypt the original file D to obtain ciphertext.

[0032] The encryption method of this embodiment is as follows: figure 2 As shown, it specifically includes the following steps:

[0033] S101. Use a random function to generate a sequence as the version number A of the original file D, and establish a corresponding relationship between the version number A and the original file D and store it in a local encryption computer.

[0034] S102. Encrypt the version number A with MD5 to obtain the version number ciphertext B. In this embodiment, the hash function is used to perform MD5 encryption for illustration.

[0035] S103. Iterate the version number ciphertext B by using the diver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method for file transmission. The method comprises the following steps: generating a file version number; encrypting the file version number with a hash function to generate a version number ciphertext; using an iterative function to iteratively generate the version number ciphertext The initial key for file encryption; put the version number into the file, and encrypt the file with Advanced Encryption Standard; send the file ciphertext and version number ciphertext to the receiver; the receiver decrypts by inputting the version number ciphertext. And implant the program corresponding to encryption and decryption in the encryption and decryption program into the mobile storage device, so that even if the decryption software is stolen and the ciphertext is stolen, the decryption operation cannot be performed. The invention is applied to the protection of file transmission and copying in the local area network , can put an end to the illegal operation of the file.

Description

technical field [0001] The invention relates to encryption and decryption of file transmission, in particular to an encryption and decryption method of file transmission. Background technique [0002] With the increasing development of hacker technology and Trojan horse technology, the internal file transmission of the enterprise is very easy to be stolen, which will bring immeasurable losses to the enterprise. Therefore, it is necessary to encrypt and protect the file transmission in the LAN. [0003] Existing encryption technologies for file transmission in a local area network include channel encryption and encryption on a local computer. Channel encryption has high security and is generally used in politics and military affairs, but it is expensive and not suitable for ordinary enterprises. Local file encryption technology needs to be performed on the local computer. If a hacker enters, information such as ciphertext, keys, and software may be stolen, and encrypted file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/18H04L9/28
Inventor 田雨
Owner 武汉千里路智能交通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products