CN104780041A - A method for generating intelligent password protection - Google Patents
A method for generating intelligent password protection Download PDFInfo
- Publication number
- CN104780041A CN104780041A CN201410020056.3A CN201410020056A CN104780041A CN 104780041 A CN104780041 A CN 104780041A CN 201410020056 A CN201410020056 A CN 201410020056A CN 104780041 A CN104780041 A CN 104780041A
- Authority
- CN
- China
- Prior art keywords
- transition matrix
- matrix
- expressly
- character field
- generation method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 239000011159 matrix material Substances 0.000 claims abstract description 71
- 230000007704 transition Effects 0.000 claims description 44
- 230000000295 complement effect Effects 0.000 claims description 18
- 230000015572 biosynthetic process Effects 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 4
- 238000005336 cracking Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Abstract
The invention discloses a method for generating intelligent password protection, comprising the steps as follows: A, receiving a plaintext with a transmitting end, converting the plaintext to a first ciphertext via a transfer function, then decomposing the first ciphertext into a plurality of character fields; B, generating a random number via a random function, choosing one character field by using the random number, transmitting the character field to a receiving end, generating a transfer matrix at the receiving end via using the character field and transmitting the transfer matrix to the transmitting end; C, performing secondary encryption to the plaintext with the transmitting end by using the transfer matrix to form a second ciphertext and transmitting the second ciphertext to the receiving end; and D, deciphering the second ciphertext with the receiving end by using the transfer matrix. The method of the invention can overcome the shortcoming of the prior art and can be used for forming a comprehensive encryption means by combining the plaintext itself and an encryption method through using the manner that plaintext itself is encrypted, which greatly improves the safety of password protection.
Description
Technical field
The present invention relates to field of information security technology, especially a kind of intelligent cipher protection generation method.
Background technology
Along with people are to the attention of information security, the method for cryptoguard gets more and more.But the existing method to cryptoguard is mostly confined to adopt certain encryption method to being expressly encrypted, and its difference is only that concrete encryption method is different.This mode only relies on encryption method itself to the protection of password, and degree of safety cannot ensure.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of intelligent cipher protection generation method; the deficiencies in the prior art can be solved; by using the mode of expressly self-encryption; carry out combining a kind of comprehensive cryptographic means of formation with encryption method by expressly own, substantially increase the degree of safety of cryptoguard.
For solving the problems of the technologies described above, the technical solution used in the present invention is as follows.
A kind of intelligent cipher protection generation method, comprises the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
As preferably, in steps A, transfer function is hash function.
As preferably, in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
As preferably, the combination of random clock signal and character field adopts multiplying.
As preferably, in step C, the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
As preferably, when the algebraic complement of the element of transition matrix is encoded relatively prime with ASCII expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
The beneficial effect adopting technique scheme to bring is:
1, utilizing the transition matrix expressly formed to being expressly encrypted, can realize that each to send cipher mode expressly all different, can effectively prevent geostationary cipher mode to be cracked the information leakage caused.
2, form the first dark text by hash function, and use ASCII to encode and random clock signal formation transition matrix, that greatly can improve transition matrix cracks difficulty.Experimentally, inventor surprisingly finds, the operation times that cracks of the transition matrix using above step to be formed is used alone hash function to form the exponential depth multiple cracking operation times of conversion office, concrete exponential depth multiple be used alone ASCII coding and random clock signal formation conversion office crack operation times.This makes the difficulty that cracks of the transition matrix formed by the present invention significantly promote, and needing to crack transition matrix, is not only cracking separately each encryption method, but cracks a kind of encryption calculation method Jining comprehensively.
3, use the algebraic complement of transition matrix to expressly carrying out superencipher, because the algebraic complement quantity of a matrix is many, algorithm is complicated, so ensure that each character expressly uses different algebraic complement encryptions.Encrypts confidential is strong.
4, employing two large prime numbers are multiplied or greatest common divisor formation intermediary matrix, and that can improve intermediary matrix cracks difficulty.Theoretically, after the length of middle matrix element is more than 512, the possibility (speed that namely cracks is far below encryption method renewal speed) almost do not cracked.
Embodiment
A kind of intelligent cipher protection generation method, comprises the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
It should be noted that in steps A, transfer function is hash function.
It should be noted that in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
It should be noted that the combination of random clock signal and character field adopts multiplying.
It should be noted that in step C, the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
It should be noted that when the algebraic complement of the element of transition matrix is encoded relatively prime with ASCII expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
The present invention uses the mode of expressly self-encryption, plaintext itself and encryption method is carried out combining forming a kind of comprehensive cryptographic means, substantially increases the degree of safety of cryptoguard.Specifically have following some:
1, utilizing the transition matrix expressly formed to being expressly encrypted, can realize that each to send cipher mode expressly all different, can effectively prevent geostationary cipher mode to be cracked the information leakage caused.
2, form the first dark text by hash function, and use ASCII to encode and random clock signal formation transition matrix, that greatly can improve transition matrix cracks difficulty.Experimentally, inventor surprisingly finds, the operation times that cracks of the transition matrix using above step to be formed is used alone hash function to form the exponential depth multiple cracking operation times of conversion office, concrete exponential depth multiple be used alone ASCII coding and random clock signal formation conversion office crack operation times.This makes the difficulty that cracks of the transition matrix formed by the present invention significantly promote, and needing to crack transition matrix, is not only cracking separately each encryption method, but cracks a kind of encryption calculation method Jining comprehensively.
3, use the algebraic complement of transition matrix to expressly carrying out superencipher, because the algebraic complement quantity of a matrix is many, algorithm is complicated, so ensure that each character expressly uses different algebraic complement encryptions.Encrypts confidential is strong.
4, employing two large prime numbers are multiplied or greatest common divisor formation intermediary matrix, and that can improve intermediary matrix cracks difficulty.Theoretically, after the length of middle matrix element is more than 512, the possibility (speed that namely cracks is far below encryption method renewal speed) almost do not cracked.
More than show and describe general principle of the present invention and principal character and advantage of the present invention.The technical staff of the industry should understand; the present invention is not restricted to the described embodiments; what describe in above-described embodiment and specification just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.Application claims protection range is defined by appending claims and equivalent thereof.
Claims (6)
1. an intelligent cipher protection generation method, is characterized in that comprising the following steps:
A, transmitting terminal receive expressly, by transfer function by being expressly converted to the first dark text, then the first dark text are decomposed into several character fields;
B, generate a random number by random function, use random number to select a character field, character field is sent to receiving terminal, use character field to generate a transition matrix at receiving terminal, and transition matrix is sent it back transmitting terminal;
C, transmitting terminal use transition matrix to expressly carrying out superencipher, form the second dark text, the second dark text is sent to receiving terminal;
D, receiving terminal use transition matrix to be decrypted the second dark text.
2. intelligent cipher protection generation method according to claim 1, it is characterized in that: in steps A, transfer function is hash function.
3. intelligent cipher protection generation method according to claim 1, it is characterized in that: in step B, the step of T.G Grammar matrix is,
The ASCII coding of B1, use character field determines the order of transition matrix;
B2, use random clock signal and character field be combined to form entry of a matrix element.
4. intelligent cipher protection generation method according to claim 3, is characterized in that: the combination of random clock signal and character field adopts multiplying.
5. intelligent cipher protection generation method according to claim 1; it is characterized in that: in step C; the step of carrying out superencipher comprises, and use the algebraic complement of each element of transition matrix expressly will to be combined as intermediary matrix, being multiplied with transition matrix by intermediary matrix obtains the second dark text.
6. intelligent cipher protection generation method according to claim 4, it is characterized in that: when the algebraic complement of the element of transition matrix is encoded relatively prime with ASC II expressly, the element of intermediary matrix is the product that the algebraic complement of transition matrix element and the ASCII of plaintext encode; Otherwise, the greatest common divisor that the algebraic complement for transition matrix element is encoded with ASCII expressly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410020056.3A CN104780041B (en) | 2014-01-15 | 2014-01-15 | A kind of intelligent cipher protects generation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410020056.3A CN104780041B (en) | 2014-01-15 | 2014-01-15 | A kind of intelligent cipher protects generation method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104780041A true CN104780041A (en) | 2015-07-15 |
CN104780041B CN104780041B (en) | 2017-04-05 |
Family
ID=53621300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410020056.3A Expired - Fee Related CN104780041B (en) | 2014-01-15 | 2014-01-15 | A kind of intelligent cipher protects generation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104780041B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227297A (en) * | 2014-06-10 | 2016-01-06 | 江苏博智软件科技有限公司 | A kind of intelligent cipher protection generation method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020152373A1 (en) * | 2000-09-13 | 2002-10-17 | Chih-Tang Sun | Tunnel interface for securing traffic over a network |
US20050207580A1 (en) * | 2004-03-19 | 2005-09-22 | Milliken Walter C | Packet-based and pseudo-packet-based cryptographic synchronization systems and methods |
CN1828590A (en) * | 2005-03-03 | 2006-09-06 | 微软公司 | Method and system for encoding metadata |
CN101056171A (en) * | 2006-06-20 | 2007-10-17 | 华为技术有限公司 | An encryption communication method and device |
-
2014
- 2014-01-15 CN CN201410020056.3A patent/CN104780041B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020152373A1 (en) * | 2000-09-13 | 2002-10-17 | Chih-Tang Sun | Tunnel interface for securing traffic over a network |
US20050207580A1 (en) * | 2004-03-19 | 2005-09-22 | Milliken Walter C | Packet-based and pseudo-packet-based cryptographic synchronization systems and methods |
CN1828590A (en) * | 2005-03-03 | 2006-09-06 | 微软公司 | Method and system for encoding metadata |
CN101056171A (en) * | 2006-06-20 | 2007-10-17 | 华为技术有限公司 | An encryption communication method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227297A (en) * | 2014-06-10 | 2016-01-06 | 江苏博智软件科技有限公司 | A kind of intelligent cipher protection generation method |
Also Published As
Publication number | Publication date |
---|---|
CN104780041B (en) | 2017-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12019500938A1 (en) | Data transmission method, apparatus and system | |
CN102594548B (en) | Method capable of achieving data sectional encryption and decryption | |
CN103905187B (en) | A kind of network service encryption method based on content | |
CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
CN104038339A (en) | Method for encrypting file or communication message by use of multiple password algorithms and multiple keys | |
CN101344960A (en) | Chaos digital image encryption method | |
CN105099699A (en) | Safe and high-efficiency communication method based on equipment of Internet of things and system | |
Majumder et al. | Secure data communication and cryptography based on DNA based message encoding | |
CN105282090A (en) | Public URL encryption coding method for preventing illegal access on internet | |
CN102271043B (en) | Data transmission protection method | |
CN103745427A (en) | Image encryption method based on iterative amplitude-phase retrieval algorithm | |
CN107659405B (en) | The encrypting and decrypting method of data communication between a kind of substation boss station | |
CN109344627A (en) | A kind of novel Shannon perfection time slot scrambling | |
CN104301094A (en) | Safe data storage method for distributed type database | |
Tang et al. | A one-time pad encryption algorithm based on one-way hash and conventional block cipher | |
CN104780041A (en) | A method for generating intelligent password protection | |
CN105227297A (en) | A kind of intelligent cipher protection generation method | |
Srikantaswamy et al. | Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm | |
CN102546152B (en) | Method for achieving multi-stage encryption and decryption of data | |
CN105071930A (en) | Low-cost security key distribution device | |
CN105429749A (en) | Separated feature data encryption and decryption method and system | |
CN102968598B (en) | The decryption method of digital document | |
CN102377562B (en) | Encrypting method and device | |
CN105491051A (en) | Method for preventing video stream data from being illegally accessed | |
KR20170019679A (en) | Efficient white-box based encryption-decryption method and tag generation and verification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170405 |