Encryption and decryption method for safe transmission of non-compressed files
A technology of secure transmission and encryption method, applied in the field of encryption and decryption of uncompressed files in secure transmission, can solve the problems of low security and low efficiency of encrypted files, and achieve the effect of high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] Example 1: Encryption (such as figure 1 )
[0077] 101-You can add files in batches by dragging and dropping, or you can add folders or files individually, and tick to confirm the final encrypted files.
[0078] 102-Enter the password of this encrypted file, it needs to be confirmed twice.
[0079] 103-Perform the encryption process and generate the encrypted file header structure, which will save the password signature (by fixing the K random number in the DSA algorithm, a non-random signature can be generated to verify the correctness of the password during decryption), and then Thread multi-task mode reads the content of the file to be encrypted, and writes the result file after encryption. Since the length of each file is determined after encryption, multi-thread and multi-task segmented encryption can be performed.
Embodiment 2
[0080] Embodiment 2: Decryption (such as figure 2 )
[0081] 201-You can add files in batches by dragging and dropping, or you can add folders or files individually, and check the files that need to be decrypted.
[0082] 202-Select the output path after decryption
[0083] 203-Operate the files that need to be decrypted one by one. For the first time, you are required to enter the decryption password of the file, and the file name to be decrypted is prompted through a pop-up box, and the password of the file is requested.
[0084] 204-Verify the decryption password (execute the DSA signature on the input password, use the same K as the encryption process, and compare and verify the password signature in the header structure of the file to be decrypted), and allow the password to be re-entered when an error occurs, or the decryption process is abandoned.
[0085] 205-Read the header structure of the file to be decrypted, analyze and obtain the directory structure information, and then ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


