CN102236767B - In conjunction with the file encrypting method of cryptographic hash - Google Patents

In conjunction with the file encrypting method of cryptographic hash Download PDF

Info

Publication number
CN102236767B
CN102236767B CN201110155338.0A CN201110155338A CN102236767B CN 102236767 B CN102236767 B CN 102236767B CN 201110155338 A CN201110155338 A CN 201110155338A CN 102236767 B CN102236767 B CN 102236767B
Authority
CN
China
Prior art keywords
file
cryptographic hash
hash
key
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110155338.0A
Other languages
Chinese (zh)
Other versions
CN102236767A (en
Inventor
陆广琴
杨章唯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Original Assignee
SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER filed Critical SHANGHAI JINSHAN DISTRICT YOUTH ACTIVITY CENTER
Priority to CN201110155338.0A priority Critical patent/CN102236767B/en
Publication of CN102236767A publication Critical patent/CN102236767A/en
Application granted granted Critical
Publication of CN102236767B publication Critical patent/CN102236767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides the file encrypting method in conjunction with cryptographic hash, it is characterized in that, comprise the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.The present invention is by checking first cryptographic hash corresponding with User Defined data and verify whether encrypt file is modified with the second cryptographic hash that double secret key is answered, and what improve existing symmetric cryptosystem cracks difficulty.And the present invention can realize the batch processing to file encryption/decryption by asterisk wildcard.

Description

In conjunction with the file encrypting method of cryptographic hash
Technical field
The present invention relates to file encryption, particularly, relate to the file encrypting method in conjunction with cryptographic hash.
Background technology
Along with the development that modern science and technology are day by day at full speed, people are more and more stronger to the dependence of network, and the powerful network system also brings the danger in leakage of personal information while providing data sharing.Society has also promoted the generation of various forms of cryptographic algorithm to the active demand of information privacy, and DES (DataEncodeStandard) is wherein cryptographic algorithm the most ripe at present.DES is invented by IBM, is approved as the government standard of non-confidential data in 1977 by the Bureau of Standards of US Department of Commerce belonging country (NationalBureauofStandard, NBS), and very fast finance and government-works in used in a large number.
Although DES is considered to foolproof, along with the geometry level of the operational speed of a computer increases, Brute-Force (brute force attack) can crack this algorithm easily.In January, 1999, the RSA data security session, EEF only with within 22 hours 15 minutes, just to complete initiated by RSA company challenge is cracked to DES.It is found that the DES of 64 has not reached the requirement of encryption now far away, so scientists just uses the 3DES encryption technology of 128, the author introduces the another kind of algorithm combined with the DES of 64 and time parameter here, also successfully can resist the attack of Brute-Force
Summary of the invention
For defect of the prior art, the object of this invention is to provide a kind of file encrypting method in conjunction with cryptographic hash.
According to an aspect of the present invention, the file encrypting method in conjunction with cryptographic hash is provided, it is characterized in that, comprise the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
Preferably, also step G is comprised the steps:: receive the second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash; Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination; Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash; Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
Preferably, also comprise the steps: step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information; Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.
Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
Preferably, described first file identification information comprises the first asterisk wildcard, described step B comprises the steps: step B1: the file that filename mates with described first asterisk wildcard is defined as described text file, and described second file identification information comprises the second asterisk wildcard.Described step H comprises the steps: step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
Preferably, in step F, symmetric encipherment algorithm is adopted to be encrypted.
Preferably, in step F, DES algorithm is adopted to be encrypted.
The present invention is by checking first cryptographic hash corresponding with User Defined data and verify whether encrypt file is modified with the second cryptographic hash that double secret key is answered, and what improve existing symmetric cryptosystem cracks difficulty.And the present invention can realize the batch processing to file encryption/decryption by asterisk wildcard.
Embodiment
File encrypting method in conjunction with cryptographic hash provided by the invention, comprises the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
Described steps A to step F achieves the encryption to file, next realizes the deciphering to file by step G to step L.
More specifically, the described file encrypting method in conjunction with cryptographic hash also comprises the steps: step G: receive the second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash; Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination; Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash; Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
Preferably, the described file encrypting method in conjunction with cryptographic hash also comprises the steps: step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information; Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
Preferably, described first file identification information comprises the first asterisk wildcard, described step B comprises the steps: step B1: the file that filename mates with described first asterisk wildcard is defined as described text file, and described second file identification information comprises the second asterisk wildcard.Described step H comprises the steps: step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
Preferably, in step F, symmetric encipherment algorithm is adopted to be encrypted.Preferably, in step F, DES algorithm is adopted to be encrypted.
Above specific embodiments of the invention are described.It is to be appreciated that the present invention is not limited to above-mentioned particular implementation, those skilled in the art can make various distortion or amendment within the scope of the claims, and this does not affect flesh and blood of the present invention.

Claims (10)

1. in conjunction with a file encrypting method for cryptographic hash, it is characterized in that, comprise the steps:
Steps A: receive the first file identification information;
Step B: determine some text files according to described first file identification information;
Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data;
Step D: the second cryptographic hash generating key;
Step e: at the described second cryptographic hash generating object file of described text file end write;
Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
2. file encrypting method according to claim 1, is characterized in that, also comprises the steps:
Step G: receive the second file identification information;
Step H: determine some described cryptograph files according to described second file identification information;
Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash;
Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination;
Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash;
Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
3. file encrypting method according to claim 2, is characterized in that, also comprises the steps:
Step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information;
Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
4. file encrypting method according to claim 2, is characterized in that, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.
5. file encrypting method according to claim 2, is characterized in that, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
6. file encrypting method according to claim 4, is characterized in that, described first file identification information comprises the first asterisk wildcard, and described step B comprises the steps:
Step B1: the file that filename mates with described first asterisk wildcard is defined as described text file,
Described second file identification information comprises the second asterisk wildcard, and described step H comprises the steps:
Step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
7. file encrypting method according to claim 5, is characterized in that, described first file identification information comprises the first asterisk wildcard, and described step B comprises the steps:
Step B1: the file that filename mates with described first asterisk wildcard is defined as described text file,
Described second file identification information comprises the second asterisk wildcard, and described step H comprises the steps:
Step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
8. the file encrypting method according to any one of claims 1 to 3,6 to 7, is characterized in that, adopts symmetric encipherment algorithm to be encrypted in step F.
9. file encrypting method according to claim 8, is characterized in that, adopts DES algorithm to be encrypted in step F.
10. file encrypting method according to claim 5, is characterized in that, adopts DES algorithm to be encrypted in step F.
CN201110155338.0A 2011-06-10 2011-06-10 In conjunction with the file encrypting method of cryptographic hash Active CN102236767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110155338.0A CN102236767B (en) 2011-06-10 2011-06-10 In conjunction with the file encrypting method of cryptographic hash

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110155338.0A CN102236767B (en) 2011-06-10 2011-06-10 In conjunction with the file encrypting method of cryptographic hash

Publications (2)

Publication Number Publication Date
CN102236767A CN102236767A (en) 2011-11-09
CN102236767B true CN102236767B (en) 2015-12-16

Family

ID=44887409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110155338.0A Active CN102236767B (en) 2011-06-10 2011-06-10 In conjunction with the file encrypting method of cryptographic hash

Country Status (1)

Country Link
CN (1) CN102236767B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650095A (en) * 2018-04-17 2018-10-12 四川长虹电器股份有限公司 A kind of file encryption-decryption method based on redis
CN109922049B (en) * 2019-02-02 2021-09-28 立旃(上海)科技有限公司 Verification device and method based on block chain
CN110176986A (en) * 2019-05-30 2019-08-27 杭州奇治信息技术股份有限公司 A kind of data ciphering method of multi-enciphering, device and mobile terminal
CN111967875A (en) * 2020-08-19 2020-11-20 上海网班教育科技股份有限公司 Block chain-based file uplink evidence storing method and device
CN114978711A (en) * 2022-05-25 2022-08-30 山东国子软件股份有限公司 Data transmission method and system for symmetric encryption of dynamic secret key
CN115022099A (en) * 2022-08-09 2022-09-06 北京华云安软件有限公司 Identity authentication method and system based on UDP transmission protocol

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710380A (en) * 2009-12-22 2010-05-19 中国软件与技术服务股份有限公司 Electronic document safety protection method
US7792300B1 (en) * 2003-09-30 2010-09-07 Oracle America, Inc. Method and apparatus for re-encrypting data in a transaction-based secure storage system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7792300B1 (en) * 2003-09-30 2010-09-07 Oracle America, Inc. Method and apparatus for re-encrypting data in a transaction-based secure storage system
CN101710380A (en) * 2009-12-22 2010-05-19 中国软件与技术服务股份有限公司 Electronic document safety protection method

Also Published As

Publication number Publication date
CN102236767A (en) 2011-11-09

Similar Documents

Publication Publication Date Title
CN102236767B (en) In conjunction with the file encrypting method of cryptographic hash
EP2658165A3 (en) Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
CA2553024A1 (en) System and method for associating message addresses with certificates
CN106778292B (en) A kind of quick restoring method of Word encrypted document
CN102024123A (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN103559453A (en) Hardware encryption protection method and system for cellphone data
DK2150915T3 (en) Security Log protocol
CN103942500B (en) Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN104038336A (en) Data encryption method based on 3DES
CN103338106A (en) Methods and devices for ciphering and deciphering file
Kaur A Review on Symmetric Key Cryptography Algorithms.
CN101383701A (en) Digital content protection method ciphered by biological characteristic
CN110233729A (en) A kind of encryption solid-state disk key management method based on PUF
CN102761559B (en) Network security based on private data shares method and communication terminal
CN100518060C (en) Method for protection of encipherment of digital document as well as client terminal equipment
CN102843356B (en) Controllable exchange method for symmetric key-encrypted file
TWI280025B (en) File encryption system having key recovery function and its method thereof
CN107404476B (en) Method and device for protecting data security in big data cloud environment
CN102025743A (en) Method and device for exporting mirror image of virtual machine in cloud computing
CN109033811A (en) Electric bidding document multilayer encrypting and deciphering system for e-bidding
CN103763097A (en) Security encryption method for password or secret key
CN104463003A (en) File encryption protecting method
CN103491384A (en) Encrypting method and device of video and decrypting method and device of video
CN103634113B (en) Encryption and decryption method and device with user/equipment identity authentication
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant