[go: up one dir, main page]

CN102497270B - Encryption method of standardized document - Google Patents

Encryption method of standardized document Download PDF

Info

Publication number
CN102497270B
CN102497270B CN201110438290.4A CN201110438290A CN102497270B CN 102497270 B CN102497270 B CN 102497270B CN 201110438290 A CN201110438290 A CN 201110438290A CN 102497270 B CN102497270 B CN 102497270B
Authority
CN
China
Prior art keywords
key
label
log
elements
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110438290.4A
Other languages
Chinese (zh)
Other versions
CN102497270A (en
Inventor
王勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin Qinghong Technology Co ltd
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN201110438290.4A priority Critical patent/CN102497270B/en
Publication of CN102497270A publication Critical patent/CN102497270A/en
Application granted granted Critical
Publication of CN102497270B publication Critical patent/CN102497270B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

现实中存在的大量的文档都是基于各种语言,存在许多的缺陷,比如对自然语言理解和处理比较困难,很难被计算机识别、统计和汇总,同时也极不规则,并且存在大量的冗余。采用传统的方法加密后得到的密文,很难找到伪密钥,惟一解距离很短。面对计算机处理和加密安全性的双重需求,提出一种规范化的文档。规范化的文档是由标签及其元素组成的,对于所有的标签,都有固定的元素,假定元素的数量是有限的,这种文档在许多情况下,可以完全取代一般的文本内容的文档,在某些情况下,则可以与其他的文档相结合来有效表达信息。本发明设计了一种针对这类规范化文档的加密方法,加密方法简洁,并且很容易找到伪密钥,也能保证传统的安全性要求。A large number of documents in reality are based on various languages, and there are many defects. For example, it is difficult to understand and process natural language, it is difficult to be recognized, counted and summarized by computers, and it is also extremely irregular, and there are a lot of redundant documents. Remain. It is difficult to find the pseudo-key for the ciphertext obtained after encryption by the traditional method, and the unique solution distance is very short. Facing the dual requirements of computer processing and encryption security, a standardized document is proposed. A normalized document is composed of tags and their elements. For all tags, there are fixed elements. Assuming that the number of elements is limited, this kind of document can completely replace the general text content document in many cases. In some cases, it can be combined with other documents to effectively express information. The present invention designs an encryption method for this kind of standardized document, the encryption method is simple, and it is easy to find a false key, which can also guarantee the traditional security requirements.

Description

一类规范化文档的加密方法An Encryption Method for a Class of Normalized Documents

技术领域 technical field

本发明属信息安全领域,涉及一类规范化文档的加密方法,特别是针对这类规范化文档的容易寻找伪密钥,具有误导功能的加密方法。 The invention belongs to the field of information security, and relates to an encryption method for a class of standardized documents, in particular to an encryption method which is easy to find false keys and has a misleading function for such standardized documents.

背景技术 Background technique

现实中存在的大量的文档都是基于各种语言,存在许多的缺陷,比如对自然语言理解和处理比较困难,很难被计算机识别、统计和汇总,同时也极不规则,并且存在大量的冗余。由于语言不规则,存在冗余,所以采用传统的方法加密后得到的密文,很难找到伪密钥,惟一解距离很短。这样,遭遇软磨硬泡攻击的时候,密钥持有人往往不得不交出真正的密钥来。同时,对于无限计算能力下的惟密文分析也很脆弱。发明人设计了一些具有误导功能的加密方法,但是,也有它们自己的局限性,由于语言的不规则和规范,使得加密的运算量大,而且,有时候也会出现对关键词的误判,导致一些伪密钥失效。因此,面对计算机处理和误导加密的双重需求,提出一种规范化的文档。规范化的文档是完全由标签及其元素组成的,对于所有的标签,都有固定的元素,假定元素的数量是有限的,这种文档在许多情况下,可以完全取代一般的文本内容的文档,在某些情况下,则可以与其他的文档相结合来有效表达信息。举一个简单的例子,时间、地点、天气、人物、活动,都可以作为一个标签,将所有可能的时间集中起来,就是时间标签的元素,其他的标签也是如此。现实中的一些xml、表、excel文档加以约束后,可以变成这类的规范化文档。这样的文档更容易压缩,冗余可以很好地消除,采用特别的加密可以增加伪密钥的数量,这种规范化也更适用于计算机处理信息。为了表达复杂的语义,还可以对标签之间的内容做更多规范。 A large number of documents in reality are based on various languages, and there are many defects. For example, it is difficult to understand and process natural language, it is difficult to be recognized, counted and summarized by computers, and it is also extremely irregular, and there are a lot of redundant documents. Remain. Because the language is irregular and there is redundancy, it is difficult to find the pseudo-key for the ciphertext encrypted by the traditional method, and the unique solution distance is very short. In this way, when encountering soft and hard foam attacks, the key holder often has to hand over the real key. At the same time, it is also vulnerable to ciphertext-only analysis under unlimited computing power. The inventor has designed some encryption methods with misleading functions, but they also have their own limitations. Due to the irregularity and standardization of the language, the calculation amount of encryption is large, and sometimes misjudgment of keywords also occurs. causing some pseudo-keys to become invalid. Therefore, facing the dual requirements of computer processing and misleading encryption, a normalized document is proposed. A normalized document is completely composed of tags and their elements. For all tags, there are fixed elements. Assuming that the number of elements is limited, this kind of document can completely replace the general text content document in many cases. In some cases, it can be combined with other documents to effectively express information. To give a simple example, time, location, weather, people, and activities can all be used as a tag to gather all possible times, which is the element of the time tag, and the same is true for other tags. Some xml, tables, and excel documents in reality can become such standardized documents after being constrained. Such documents are easier to compress, redundancy can be well eliminated, special encryption can increase the number of pseudo-keys, and this normalization is more suitable for computers to process information. In order to express complex semantics, more specifications can be made on the content between tags.

发明内容 Contents of the invention

本发明旨在克服现有加密方法无法误导的局限性,已经现有的具有误导功能加密方法的复杂等缺陷,而在对文档进行规范化后,提供一种简单、实用的具有误导功能的规范化文档的加密算法。为了各种安全性的考虑,本发明包含了外层和内层两层加密,内层加密使得可以具有误导功能,而外层的加密则讲一些可能需要保密的标签等信息也进一步加密,外层加密是可选的。 The present invention aims to overcome the limitation that the existing encryption method cannot be misleading, and the existing encryption method with misleading function is complicated and other defects, and after standardizing the document, it provides a simple and practical normalized document with misleading function encryption algorithm. For various safety considerations, the present invention includes two layers of encryption, the outer layer and the inner layer. The inner layer encryption can have a misleading function, while the outer layer encryption is to further encrypt some information such as labels that may need to be kept secret. Layer encryption is optional.

基于我们对这类规范化文档的定义,每一个标签都有有限的固定元素,可以建立一个标签元素的数据库,这个数据库存放着每一个标签中的所有元素,以及这些元素是什么编码,在数据库中将所有的元素进行编号,在最为关键的内层加密中,将待加密的明文中每一个标签中的元素都映射为数据库中对应的编号,对编号进行加密得到密文c,加解密所采用的运算是封闭的,也就是说,针对于每一个标签的编号的加密密文c,再用不同密钥解密c可以遍历所有的编号,然后将密文编号c写入标签对应的元素位置。 Based on our definition of this type of standardized document, each label has limited fixed elements, and a database of label elements can be established. This database stores all the elements in each label, and the encoding of these elements. In the database Number all the elements. In the most critical inner layer encryption, map the elements in each label in the plaintext to be encrypted to the corresponding number in the database, and encrypt the number to obtain the ciphertext c, which is used for encryption and decryption. The operation of is closed, that is to say, for the encrypted ciphertext c of each label number, and then decrypting c with different keys can traverse all the numbers, and then write the ciphertext number c into the corresponding element position of the label.

完整加密流程如下: The complete encryption process is as follows:

(一)逐一地读取文档中各个标签的内容,即标签中的元素,查询数据库,得出对应的标签中这一元素对应的编号,然后逐一地从内层密钥中截取对应位置的密钥用于这一个标签内容的加密,得到元素的密文c,加密解密算法保证封闭性。逐一将标签中元素的密文写入文档中相应标签对应的内容。 (1) Read the content of each label in the document one by one, that is, the elements in the label, query the database, get the number corresponding to this element in the corresponding label, and then intercept the corresponding key from the inner key one by one. The key is used to encrypt the content of this tag to obtain the ciphertext c of the element, and the encryption and decryption algorithm ensures the closure. Write the ciphertext of the elements in the tag to the content corresponding to the corresponding tag in the document one by one.

(二)保存内层加密后的文档,得到过渡密文。 (2) Save the encrypted document in the inner layer to obtain the transitional ciphertext.

(三)可选地,对这一文档进行一个外层的加密,得到最终密文。这个加密采用传统的加密方法进行,选择一种对称加密方法即可。 (3) Optionally, perform an outer encryption on this document to obtain the final ciphertext. This encryption is carried out using traditional encryption methods, and a symmetric encryption method can be selected.

解密过程中,首先将最终的密文用传统的对称密码算法进行相应的解密,得到过渡的密文文件,其次要将得到的过渡文件进行内层的解密。当进行这层解密的时候,对每一个标签中的密文进行读取,然后,获得这一个标签对应的密钥,经过解密,得到标签内容的明文所对应的编号,然后根据数据库,可以查得对应的内容。 In the decryption process, firstly, the final ciphertext is decrypted with the traditional symmetric encryption algorithm to obtain the transitional ciphertext file, and secondly, the inner decryption of the transitional file is carried out. When this level of decryption is performed, the ciphertext in each label is read, and then the key corresponding to this label is obtained. After decryption, the number corresponding to the plaintext of the label content is obtained, and then according to the database, you can check corresponding content.

本加密方法可以很容易找到伪密钥,即错误的密钥可以解密出有意义的明文可以伪密钥的获取方法:A)加密解密中有两个密钥,要获取伪密钥,可以将外层对称密码的密钥不变,然后任意选取一个内层密钥序列进行截取,依次分配给相应的标签,进行解密,这时阅读文本,是否有不如意(比如不合理、暴露破绽、认为误导效果不好)的关键词,如果不满意,可以用同样方法尝试其他的密钥,并且可以根据关键词所在的位置根据自己的需要进行修改,这样形成了最终的内层密钥的有效部分,用这个密钥配合正确的外层对称密码密钥就是一个伪密钥;B)还有一种更加自由的选择伪密钥的方式,可以根据自己所希望的误导的标签内容确定下来,以此确定内层加密的伪密钥序列,方法为外层密钥不变,根据文本的关键词,以数据库为依据,选择想要替换的误导元素,即可确定这一个元素的对应的伪子密钥,将每一个标签对应的伪子密钥依次连接起来,即为内层的伪密钥,采用不变的外层密钥,即可得总的伪密钥。 This encryption method can easily find the false key, that is, the wrong key can decrypt meaningful plaintext. The method of obtaining the false key: A) There are two keys in the encryption and decryption. To obtain the false key, you can use The key of the outer symmetric cipher remains unchanged, and then arbitrarily selects an inner key sequence to intercept, assigns it to the corresponding label in turn, and decrypts it. At this time, when reading the text, whether there is any dissatisfaction (such as unreasonable, exposed flaws, misleading, etc.) effect is not good), if you are not satisfied, you can try other keys in the same way, and you can modify it according to your own needs according to the position of the keyword, thus forming the effective part of the final inner key, Using this key with the correct outer symmetric encryption key is a pseudo-key; B) There is a more free way to choose a pseudo-key, which can be determined according to the content of the misleading label you want, so as to determine The pseudo-key sequence of the inner layer encryption, the method is to keep the outer key unchanged, according to the keywords of the text, based on the database, select the misleading element to be replaced, and then determine the corresponding pseudo-subkey of this element , connect the pseudo-subkeys corresponding to each label in turn, which is the pseudo-key of the inner layer, and use the constant outer key to obtain the total pseudo-key.

在受到密码分析者的密码分析的时候,密码分析者根据不同的内层密钥是可以得到不同的有意义明文的,加上这些不同密钥得到的明文的一样也可能与原来明文相近、相反的意义,所以很吻合通信背景,密码分析者也无法确定真正密钥。 When subjected to cryptanalysis by cryptanalysts, cryptanalysts can obtain different meaningful plaintexts based on different inner keys, and the plaintexts obtained by adding these different keys may also be similar to the original plaintexts, and vice versa. meaning, so it fits well with the communication background, and cryptanalysts cannot determine the real key.

具体实施方式 Detailed ways

下面是本发明的实施例,但是,本发明并不限于实施例。 The following are examples of the present invention, however, the present invention is not limited to the examples.

在具体实现的时候,双方约定总密钥的不同部分分别用于内层和外层加密,外层密钥为固定长度,根据外层加密采用的算法来决定,比如外层加密算法采用256位的AES加密。密钥的最前面256bit为外层密钥,其余为内层密钥。内层密钥进行等长度截取,截取长度根据数据库中所有标签中最大的可能元素的数目N来定,取值应该大于等于log2N。将内层密钥截取后依次分配给各个标签,作为加密用的子密钥。 In the actual implementation, the two parties agree that different parts of the total key are used for inner and outer encryption respectively, and the outer key is a fixed length, which is determined according to the algorithm used in the outer encryption. For example, the outer encryption algorithm uses 256 bits. AES encryption. The first 256 bits of the key are outer keys, and the rest are inner keys. The inner key is truncated to equal length. The truncated length is determined according to the maximum number N of possible elements in all tags in the database, and the value should be greater than or equal to log 2 N. The inner key is intercepted and distributed to each label in turn as a subkey for encryption.

文件加密流程如下: The file encryption process is as follows:

1)   通信双方共享密钥,密钥比较长,可以采用量子密钥分配来实现长随机密钥的分配。双方规定采用相同的加密算法,并且共享相同的数据库。 1) The communication parties share the key, and the key is relatively long. Quantum key distribution can be used to realize the distribution of long random keys. Both parties stipulate to use the same encryption algorithm and share the same database.

2)   加密过程中要根据文件的类型或者格式,用相应的软件打开文件读取其内容,比如,xml或者excel文件的加密,就先用相应的软件打开文件,读取各个标签中的内容,准备进行内层加密。 2) During the encryption process, according to the type or format of the file, use the corresponding software to open the file to read its content. For example, to encrypt an xml or excel file, first use the corresponding software to open the file and read the content in each label. Prepare for inner encryption.

3)    内层加密,我们这里选择的编号为将所有元素从0到n-1,进行编号,n为这一个标签的所有元素的数目。加密算法为模加运算,根据密钥的固定结构,将子密钥k从序列中截取出来,子密钥的截取方法有:A)采用截取等长度子密钥的方法从随机序列中截取,截取的长度为等于或者大于log2N的正整数,当log2N为正整数时,截取长度为log2N;log2N为非整数的时候,截取 log2N的整数部分加1,N为所有标签中元素个数的最大值,加密和解密时候均按照这样的规则进行截取,这样能够保证加解密截取的子密钥同步,这种方法密钥需求量大,但是运算速度快;B)根据每一个标签遍历所有元素所需要的最短长度截取,截取的长度为等于或者大于log2n的正整数,当log2n为正整数时,截取长度为log2n;log2n为非整数的时候,截取 log2n的整数部分加1,n为这一个标签所有元素的个数,加密和解密时候均按照这样的规则进行截取,这样能够保证加解密截取的子密钥同步,这种方法运算速度慢,但是可以最大限度节省密钥需求量。 3) Inner layer encryption, the number we choose here is to number all elements from 0 to n-1, and n is the number of all elements of this label. The encryption algorithm is a modular addition operation. According to the fixed structure of the key, the subkey k is intercepted from the sequence. The subkey interception methods are: A) Use the method of intercepting equal-length subkeys to intercept from the random sequence, The intercepted length is a positive integer equal to or greater than log 2 N. When log 2 N is a positive integer, the intercepted length is log 2 N; when log 2 N is a non-integer, add 1 to the integer part of log 2 N is the maximum number of elements in all tags, and the encryption and decryption are intercepted according to such rules, which can ensure the synchronization of the subkeys intercepted by encryption and decryption. This method requires a large number of keys, but the operation speed is fast; B ) is intercepted according to the shortest length required for traversing all elements of each label, the intercepted length is a positive integer equal to or greater than log 2 n, when log 2 n is a positive integer, the intercepted length is log 2 n; log 2 n is not When it is an integer, add 1 to the integer part of log 2 n, where n is the number of all elements of this label. When encrypting and decrypting, intercept according to this rule, which can ensure the synchronization of the subkeys intercepted by encryption and decryption. The operation speed of this method is slow, but it can save the key demand to the greatest extent.

计算密文编号的方法为c=m+k mod n,以下是一个非常简单的文本的相关信息: The method of calculating the ciphertext number is c=m+k mod n, the following is the relevant information of a very simple text:

表一  示例 Table 1 Example

标签Label 元素element 编号mnumber m nno 密钥值key value 密文编号Cipher text number 星期Week 星期一Monday 11 77 7676 00 事项matter 上班work 00 55 5656 11

4)   内层加密得到了新的文本,将文本保存到过渡的密文文件中。 4) The inner encryption gets the new text, and saves the text in the transitional ciphertext file.

5)   进行外层的加密得到最终密文。为加强安全性对过渡的密文文件进行外层的加密。这个加密采用传统的256位AES算法进行加密。 5) Encrypt the outer layer to get the final ciphertext. In order to strengthen the security, the outer encryption is performed on the transitional ciphertext file. This encryption is encrypted using the traditional 256-bit AES algorithm.

解密为一个相反的过程,文件解密流程如下:首先对于外层的对称密码加密进行相应的解密,得到过渡的密文文件,其次要将得到的过渡文件用相关软件打开,读取其内容,根据截取得到的对应的子密钥,进行解密,得到的m值,查询数据库,可以确定相应的数据库元素,比如,解密得到星期的编号为1,查询数据库中星期中编号为1的元素是星期一,即可得明文中对应标签内容为星期一。 Decryption is a reverse process, and the file decryption process is as follows: firstly, corresponding decryption is performed on the outer layer of symmetric password encryption to obtain the transitional ciphertext file, and secondly, the obtained transitional file is opened with relevant software to read its content, according to Intercept the corresponding subkey obtained, decrypt it, obtain the m value, query the database, and determine the corresponding database element, for example, decrypt the number of the week to get 1, and the element numbered 1 in the query database is Monday , the content of the corresponding label in the plain text is Monday.

这样我们也可以根据前面提到的两种方法中的一种获取伪密钥,得到有意义的明文,而且可以根据自己的意图得到满意的“伪明文”。 In this way, we can also obtain the pseudo-key according to one of the two methods mentioned above, obtain meaningful plaintext, and obtain satisfactory "pseudo-plaintext" according to our own intentions.

Claims (4)

1. the encryption method of a class standardization document, comprise that A. opens file, read each label substance, B. the content of all labels is carried out to interior infill layer with sub-key independently successively, C. preserve file, obtain transition ciphertext document, D. carries out the outer infill layer of traditional symmetry algorithm to transition document, E. calculate pseudo-key, it is characterized in that:
Be expressly normalized, document is made up of label and element thereof completely, for all labels, has fixing element, and the quantity of supposing element is limited;
Internal layer encryption key adopts random sequence to carry out, after successively internal layer key being intercepted, distribute to each label, interior infill layer is mainly mapped as the element in each label in plaintext to be encrypted numbering corresponding in database, numbering is encrypted and obtains ciphertext c, then ciphertext is numbered to c and write the element position that label is corresponding, enciphering and deciphering algorithm has closure, by the content of all possible sub-key enabling decryption of encrypted, finally can travel through all elements that same label comprises, encrypting and decrypting depends on a database, each label is limited fixed element in database, this database is being deposited all elements in each label, and these elements are any codings, and in database, all elements are numbered,
The division methods of the sub-key in internal layer key is, adopt the method that intercepts equal length sub-key that the sub-key k of interior infill layer is intercepted out from internal layer key sequence, or adopt the sub-key k that intercepts current label according to the needed shortest length of each label traversal all elements;
Outer infill layer is optional;
The method of calculating the pseudo-key of generation is: A) by constant the key of outer symmetric cryptography, then choosing arbitrarily an internal layer key sequence intercepts, distribute to successively corresponding label, be decrypted, form the live part of final internal layer key, coordinated correct outer symmetric cryptography key with this key; Or B) according to the label substance of desirable misleading, in determining, the pseudo-key sequence of infill layer, is connected in turn pseudo-sub-key corresponding each label, adopts constant outer key, the pseudo-key that gets final product always.
2. the method for claim 1, is characterized in that: the method that the method for the intercepting equal length sub-key below described employing intercepts the sub-key k of interior infill layer out from internal layer key sequence is: the length of intercepting is for being equal to, or greater than log 2the positive integer of N, works as log 2when N is positive integer, intercepted length is log 2n; log 2when N is non-integral, intercept log 2the integer part of N adds the maximum that 1, N is element number in all labels.
3. the method for claim 1, is characterized in that: the method that described employing intercepts the sub-key k of current label according to the needed shortest length of each label traversal all elements is: the length of intercepting is for being equal to, or greater than log 2the positive integer of n, works as log 2when n is positive integer, intercepted length is log 2n; log 2when n is non-integral, intercept log 2the integer part of n adds the number that 1, n is this label all elements.
4. the method for claim 1, it is characterized in that: at the method A that calculates the pseudo-key of generation) in, read text while being decrypted, judge whether keyword is satisfied with, if there is unsatisfied keyword, attempt other key with same method, and modify according to the needs of oneself according to the position at keyword place;
At the method B that calculates the pseudo-key of generation) in, according to the keyword of text, taking database as foundation, select to want the misleading element of replacement, determine the corresponding pseudo-sub-key of this element.
CN201110438290.4A 2011-12-24 2011-12-24 Encryption method of standardized document Expired - Fee Related CN102497270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110438290.4A CN102497270B (en) 2011-12-24 2011-12-24 Encryption method of standardized document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110438290.4A CN102497270B (en) 2011-12-24 2011-12-24 Encryption method of standardized document

Publications (2)

Publication Number Publication Date
CN102497270A CN102497270A (en) 2012-06-13
CN102497270B true CN102497270B (en) 2014-07-16

Family

ID=46189059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110438290.4A Expired - Fee Related CN102497270B (en) 2011-12-24 2011-12-24 Encryption method of standardized document

Country Status (1)

Country Link
CN (1) CN102497270B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
HK1210371A2 (en) 2015-11-20 2016-04-15 衍利行资产有限公司 A method and system for analyzing a piece of text
CN107820240A (en) * 2016-09-12 2018-03-20 山东量子科学技术研究院有限公司 Short message Encrypt and Decrypt method and Android operation system based on Android operation system
CN108694326A (en) * 2017-04-11 2018-10-23 北京京东尚科信息技术有限公司 Text encryption method, apparatus and server
CN110266488B (en) * 2019-07-15 2021-08-31 国网江苏省电力有限公司电力科学研究院 Location-based key generation method and encrypted data transmission method and system
CN110780884B (en) * 2019-09-05 2022-04-12 腾讯科技(深圳)有限公司 Information processing method, device and equipment
CN112836764B (en) * 2021-03-02 2023-07-28 中山大学 Universal target attack method and device for target classification system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001160803A (en) * 1999-12-03 2001-06-12 Ntt Data Corp Security scheme and method
JP2002229986A (en) * 2001-02-06 2002-08-16 Ricoh Co Ltd Structured document processing apparatus, structured document processing method, and program for causing computer to execute structured document processing
CN102170350A (en) * 2011-04-11 2011-08-31 桂林电子科技大学 Multiple uncertainty encryption system with misleading function
CN102185689A (en) * 2011-03-25 2011-09-14 桂林电子科技大学 Low redundant encryption system with misguiding function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001160803A (en) * 1999-12-03 2001-06-12 Ntt Data Corp Security scheme and method
JP2002229986A (en) * 2001-02-06 2002-08-16 Ricoh Co Ltd Structured document processing apparatus, structured document processing method, and program for causing computer to execute structured document processing
CN102185689A (en) * 2011-03-25 2011-09-14 桂林电子科技大学 Low redundant encryption system with misguiding function
CN102170350A (en) * 2011-04-11 2011-08-31 桂林电子科技大学 Multiple uncertainty encryption system with misleading function

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于迷惑与误导的加密及实现;王勇;《计算机安全》;20051031;全文 *
王勇.基于迷惑与误导的加密及实现.《计算机安全》.2005,13-16.

Also Published As

Publication number Publication date
CN102497270A (en) 2012-06-13

Similar Documents

Publication Publication Date Title
Hao et al. Fine-grained data access control with attribute-hiding policy for cloud-based IoT
CN107135062B (en) An Improved Encryption Method for Large Files
CN102497270B (en) Encryption method of standardized document
CN107078901B (en) Encoder, decoder and the method encrypted using partial data
CN106685980B (en) Encryption method for large file
US20140143553A1 (en) Method and Apparatus for Encapsulating and Encrypting Files in Computer Device
CN105959098A (en) Format-reserved encryption algorithm based on multi-segmented Feistel network
CN106888080A (en) Protection whitepack feistel network implementations are in case fault analysis
US20100054477A1 (en) Accelerated cryptography with an encryption attribute
CN106888081A (en) The coding wide of median in whitepack embodiment
CN106936820B (en) Data variable length modification method and application thereof in big data encryption
CN102412963B (en) Random sequence based encryption method with misleading function
CN106131049A (en) A kind of method of data transmission encryption and decryption
CN102447558B (en) Encryption method using random sequence on-demand and having misleading function
CN102456108B (en) Encryption method for ibus pinyin code table
CN107273724A (en) Input and output watermarking for whitepack embodiment
Kaushik et al. A review paper on data encryption and decryption
Kaur A Review on Symmetric Key Cryptography Algorithms.
Gupta et al. Ensuring data security in databases using format preserving encryption
Dayıoğlu Secure database in cloud computing-cryptdb revisited
Peng et al. On the security of fully homomorphic encryption for data privacy in Internet of Things
CN102360414B (en) A Misleading Encryption Method with Corrected Pseudo-Random Sequence
CN102185689A (en) Low redundant encryption system with misguiding function
Mousa et al. Query Processing Performance on Encrypted Databases by Using the REA Algorithm.
Mallaiah et al. Performance analysis of Format Preserving Encryption (FIPS PUBS 74-8) over block ciphers for numeric data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: GUILIN UNIVERSITY OF ELECTRONIC TECHNOLOGY

Free format text: FORMER OWNER: WANG YONG

Effective date: 20140529

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20140529

Address after: Guilin City, the Guangxi Zhuang Autonomous Region Jinji road 541004 No. 1

Applicant after: Guilin University of Electronic Technology

Address before: 541004 School of computer science and engineering,, Guilin, the Guangxi Zhuang Autonomous Region, China, Guilin University of Electronic Technology

Applicant before: Wang Yong

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211201

Address after: 541004 room 3201, Science Park, Guilin University of Electronic Science and technology, No. 123, Liuhe Road, Guilin, Guangxi Zhuang Autonomous Region

Patentee after: Guilin Qinghong Technology Co.,Ltd.

Address before: 541004 1 Jinji Road, Guilin, the Guangxi Zhuang Autonomous Region

Patentee before: GUILIN University OF ELECTRONIC TECHNOLOGY

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140716