Ciphertext generation method, ciphertext decryption method and encryption/ decryption device

A ciphertext and technology to be encrypted, which is applied in the field of communication security, can solve problems such as low security, and achieve the effect of solving low security

Active Publication Date: 2014-06-18
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides a ciphertext generation method, a ciphertext decryption method, and an encryption and decryption device, which are used to solve problems in the prior art when using the underlying encryption algorithm of the Java language to encrypt and transmit cross-system passwords or information. The problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext generation method, ciphertext decryption method and encryption/ decryption device
  • Ciphertext generation method, ciphertext decryption method and encryption/ decryption device
  • Ciphertext generation method, ciphertext decryption method and encryption/ decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Based on the above basic idea, the flow chart of a method for generating ciphertext provided by the embodiment of the present invention is as follows figure 1 As shown, it specifically includes the following steps:

[0031] Step 11. Obtain the encrypted serial number according to the preset key file and serial number generation method, and randomly generate a code table, which is a string composed of the above-mentioned code table characters arranged randomly.

[0032] Wherein, the preset key file may be a text file, and the content of the file may be a character string composed of numbers and / or letters of an indeterminate length, as long as the length is no less than 8 bits and no more than 65535 bits.

[0033] There are many ways to generate the serial number, for example, the number of characters contained in the key file can be used as the encrypted serial number; the number of digits contained in the key file can be used as the encrypted serial number; The number...

Embodiment 2

[0072] The method for generating ciphertext and the method for decrypting ciphertext provided by the embodiment of the present invention will be specifically described below in combination with examples.

[0073] First, for the code table, assume that the randomly generated code table is:

[0074] SboJU9#dL,O+a&sh:c / mpIj;*FE_V64]Dvz0uf7yCnM.~)t\rKxA

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a ciphertext generation method, a ciphertext decryption method and an encryption / decryption device, and is used for solving the problem of poor safety when a ground-up encryption algorithm of the Java language is used for carrying out encryption transmission on a cross-system password or information in the prior art. The ciphertext generation method comprises the following steps: according to a preset key file and an identification number generation method, obtaining an encrypted identification number, and randomly generating a code table comprising a plurality of characters; according to the obtained encrypted identification number and each plaintext character to be encrypted, looking up a code table character respectively corresponding to each plaintext character to be encrypted from the generated rate table along an appointed code table lookup direction; according to the found code table character, generating a ciphertext. Therefore, the safety of the ciphertext not only depends on the encryption algorithm but also depends on the preset key file and the randomly-generated code table, and the ciphertext can not be accurately decrypted even if a decryption algorithm is obtained only by using different key files and code tables to carry out encryption processing on the plaintext.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a ciphertext generation method, a ciphertext decryption method and an encryption and decryption device. Background technique [0002] In a communication network where multiple different systems coexist, in order to ensure communication security between systems, usually, communication passwords and communication information between systems need to be transmitted or saved in the form of ciphertext. At present, the underlying encryption algorithm that comes with the Java language is commonly used to encrypt cross-system passwords or information, but this method has some problems when used across systems. For example, since the security of the ciphertext obtained by using the underlying encryption algorithm to encrypt the plaintext depends entirely on the encryption algorithm, when the ciphertext encrypted with the encryption algorithm is sent to other systems, the decryption al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 王金贵杜怀中裴照华赵泽张耀华鄢兵安孙大伟苗浩龙李红杰曹瑞波
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products