CN104780041A - A method for generating intelligent password protection - Google Patents

A method for generating intelligent password protection Download PDF

Info

Publication number
CN104780041A
CN104780041A CN201410020056.3A CN201410020056A CN104780041A CN 104780041 A CN104780041 A CN 104780041A CN 201410020056 A CN201410020056 A CN 201410020056A CN 104780041 A CN104780041 A CN 104780041A
Authority
CN
China
Prior art keywords
transition matrix
matrix
expressly
character field
generation method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410020056.3A
Other languages
Chinese (zh)
Other versions
CN104780041B (en
Inventor
傅涛
蔡圣闻
石进
潘健翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU NANDASOFT TECHNOLOGY Co Ltd
Original Assignee
JIANGSU NANDASOFT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU NANDASOFT TECHNOLOGY Co Ltd filed Critical JIANGSU NANDASOFT TECHNOLOGY Co Ltd
Priority to CN201410020056.3A priority Critical patent/CN104780041B/en
Publication of CN104780041A publication Critical patent/CN104780041A/en
Application granted granted Critical
Publication of CN104780041B publication Critical patent/CN104780041B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method for generating intelligent password protection, comprising the steps as follows: A, receiving a plaintext with a transmitting end, converting the plaintext to a first ciphertext via a transfer function, then decomposing the first ciphertext into a plurality of character fields; B, generating a random number via a random function, choosing one character field by using the random number, transmitting the character field to a receiving end, generating a transfer matrix at the receiving end via using the character field and transmitting the transfer matrix to the transmitting end; C, performing secondary encryption to the plaintext with the transmitting end by using the transfer matrix to form a second ciphertext and transmitting the second ciphertext to the receiving end; and D, deciphering the second ciphertext with the receiving end by using the transfer matrix. The method of the invention can overcome the shortcoming of the prior art and can be used for forming a comprehensive encryption means by combining the plaintext itself and an encryption method through using the manner that plaintext itself is encrypted, which greatly improves the safety of password protection.

Description

A kind of intelligent cipher protection generation method
Technical field
The present invention relates to field of information security technology, especially a kind of intelligent cipher protection generation method.
Background technology
Along with people are to the attention of information security, the method for cryptoguard gets more and more.But the existing method to cryptoguard is mostly confined to adopt certain encryption method to being expressly encrypted, and its difference is only that concrete encryption method is different.This mode only relies on encryption method itself to the protection of password, and degree of safety cannot ensure.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of intelligent cipher protection generation method; the deficiencies in the prior art can be solved; by using the mode of expressly self-encryption; carry out combining a kind of comprehensive cryptographic means of formation with encryption method by expressly own, substantially increase the degree of safety of cryptoguard.
For solving the problems of the technologies described above, the technical solution used in the present invention is as follows.
A kind of intelligent cipher protection generation method, comprises the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
As preferably, in steps A, transfer function is hash function.
As preferably, in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
As preferably, the combination of random clock signal and character field adopts multiplying.
As preferably, in step C, the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
As preferably, when the algebraic complement of the element of transition matrix is encoded relatively prime with ASCII expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
The beneficial effect adopting technique scheme to bring is:
1, utilizing the transition matrix expressly formed to being expressly encrypted, can realize that each to send cipher mode expressly all different, can effectively prevent geostationary cipher mode to be cracked the information leakage caused.
2, form the first dark text by hash function, and use ASCII to encode and random clock signal formation transition matrix, that greatly can improve transition matrix cracks difficulty.Experimentally, inventor surprisingly finds, the operation times that cracks of the transition matrix using above step to be formed is used alone hash function to form the exponential depth multiple cracking operation times of conversion office, concrete exponential depth multiple be used alone ASCII coding and random clock signal formation conversion office crack operation times.This makes the difficulty that cracks of the transition matrix formed by the present invention significantly promote, and needing to crack transition matrix, is not only cracking separately each encryption method, but cracks a kind of encryption calculation method Jining comprehensively.
3, use the algebraic complement of transition matrix to expressly carrying out superencipher, because the algebraic complement quantity of a matrix is many, algorithm is complicated, so ensure that each character expressly uses different algebraic complement encryptions.Encrypts confidential is strong.
4, employing two large prime numbers are multiplied or greatest common divisor formation intermediary matrix, and that can improve intermediary matrix cracks difficulty.Theoretically, after the length of middle matrix element is more than 512, the possibility (speed that namely cracks is far below encryption method renewal speed) almost do not cracked.
Embodiment
A kind of intelligent cipher protection generation method, comprises the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
It should be noted that in steps A, transfer function is hash function.
It should be noted that in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
It should be noted that the combination of random clock signal and character field adopts multiplying.
It should be noted that in step C, the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
It should be noted that when the algebraic complement of the element of transition matrix is encoded relatively prime with ASCII expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
The present invention uses the mode of expressly self-encryption, plaintext itself and encryption method is carried out combining forming a kind of comprehensive cryptographic means, substantially increases the degree of safety of cryptoguard.Specifically have following some:
1, utilizing the transition matrix expressly formed to being expressly encrypted, can realize that each to send cipher mode expressly all different, can effectively prevent geostationary cipher mode to be cracked the information leakage caused.
2, form the first dark text by hash function, and use ASCII to encode and random clock signal formation transition matrix, that greatly can improve transition matrix cracks difficulty.Experimentally, inventor surprisingly finds, the operation times that cracks of the transition matrix using above step to be formed is used alone hash function to form the exponential depth multiple cracking operation times of conversion office, concrete exponential depth multiple be used alone ASCII coding and random clock signal formation conversion office crack operation times.This makes the difficulty that cracks of the transition matrix formed by the present invention significantly promote, and needing to crack transition matrix, is not only cracking separately each encryption method, but cracks a kind of encryption calculation method Jining comprehensively.
3, use the algebraic complement of transition matrix to expressly carrying out superencipher, because the algebraic complement quantity of a matrix is many, algorithm is complicated, so ensure that each character expressly uses different algebraic complement encryptions.Encrypts confidential is strong.
4, employing two large prime numbers are multiplied or greatest common divisor formation intermediary matrix, and that can improve intermediary matrix cracks difficulty.Theoretically, after the length of middle matrix element is more than 512, the possibility (speed that namely cracks is far below encryption method renewal speed) almost do not cracked.
More than show and describe general principle of the present invention and principal character and advantage of the present invention.The technical staff of the industry should understand; the present invention is not restricted to the described embodiments; what describe in above-described embodiment and specification just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.Application claims protection range is defined by appending claims and equivalent thereof.

Claims (6)

1. an intelligent cipher protection generation method, is characterized in that comprising the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
2. intelligent cipher protection generation method according to claim 1, it is characterized in that: in steps A, transfer function is hash function.
3. intelligent cipher protection generation method according to claim 1, it is characterized in that: in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
4. intelligent cipher protection generation method according to claim 3, is characterized in that: the combination of random clock signal and character field adopts multiplying.
5. intelligent cipher protection generation method according to claim 1; it is characterized in that: in step C; the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
6. intelligent cipher protection generation method according to claim 4, it is characterized in that: when the algebraic complement of the element of transition matrix is encoded relatively prime with ASC II expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
CN201410020056.3A 2014-01-15 2014-01-15 A kind of intelligent cipher protects generation method Expired - Fee Related CN104780041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410020056.3A CN104780041B (en) 2014-01-15 2014-01-15 A kind of intelligent cipher protects generation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410020056.3A CN104780041B (en) 2014-01-15 2014-01-15 A kind of intelligent cipher protects generation method

Publications (2)

Publication Number Publication Date
CN104780041A true CN104780041A (en) 2015-07-15
CN104780041B CN104780041B (en) 2017-04-05

Family

ID=53621300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410020056.3A Expired - Fee Related CN104780041B (en) 2014-01-15 2014-01-15 A kind of intelligent cipher protects generation method

Country Status (1)

Country Link
CN (1) CN104780041B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227297A (en) * 2014-06-10 2016-01-06 江苏博智软件科技有限公司 A kind of intelligent cipher protection generation method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020152373A1 (en) * 2000-09-13 2002-10-17 Chih-Tang Sun Tunnel interface for securing traffic over a network
US20050207580A1 (en) * 2004-03-19 2005-09-22 Milliken Walter C Packet-based and pseudo-packet-based cryptographic synchronization systems and methods
CN1828590A (en) * 2005-03-03 2006-09-06 微软公司 Method and system for encoding metadata
CN101056171A (en) * 2006-06-20 2007-10-17 华为技术有限公司 An encryption communication method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020152373A1 (en) * 2000-09-13 2002-10-17 Chih-Tang Sun Tunnel interface for securing traffic over a network
US20050207580A1 (en) * 2004-03-19 2005-09-22 Milliken Walter C Packet-based and pseudo-packet-based cryptographic synchronization systems and methods
CN1828590A (en) * 2005-03-03 2006-09-06 微软公司 Method and system for encoding metadata
CN101056171A (en) * 2006-06-20 2007-10-17 华为技术有限公司 An encryption communication method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227297A (en) * 2014-06-10 2016-01-06 江苏博智软件科技有限公司 A kind of intelligent cipher protection generation method

Also Published As

Publication number Publication date
CN104780041B (en) 2017-04-05

Similar Documents

Publication Publication Date Title
PH12019500938A1 (en) Data transmission method, apparatus and system
CN102594548B (en) Method capable of achieving data sectional encryption and decryption
CN103905187B (en) A kind of network service encryption method based on content
CN102664740B (en) Remote-authorization-based bidding document encryption and decryption method
CN104038339A (en) Method for encrypting file or communication message by use of multiple password algorithms and multiple keys
CN101344960A (en) Chaos digital image encryption method
CN105099699A (en) Safe and high-efficiency communication method based on equipment of Internet of things and system
Majumder et al. Secure data communication and cryptography based on DNA based message encoding
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN102271043B (en) Data transmission protection method
CN103745427A (en) Image encryption method based on iterative amplitude-phase retrieval algorithm
CN107659405B (en) The encrypting and decrypting method of data communication between a kind of substation boss station
CN109344627A (en) A kind of novel Shannon perfection time slot scrambling
CN104301094A (en) Safe data storage method for distributed type database
Tang et al. A one-time pad encryption algorithm based on one-way hash and conventional block cipher
CN104780041A (en) A method for generating intelligent password protection
CN105227297A (en) A kind of intelligent cipher protection generation method
Srikantaswamy et al. Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
CN102546152B (en) Method for achieving multi-stage encryption and decryption of data
CN105071930A (en) Low-cost security key distribution device
CN105429749A (en) Separated feature data encryption and decryption method and system
CN102968598B (en) The decryption method of digital document
CN102377562B (en) Encrypting method and device
CN105491051A (en) Method for preventing video stream data from being illegally accessed
KR20170019679A (en) Efficient white-box based encryption-decryption method and tag generation and verification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170405