CN102236767B - In conjunction with the file encrypting method of cryptographic hash - Google Patents
In conjunction with the file encrypting method of cryptographic hash Download PDFInfo
- Publication number
- CN102236767B CN102236767B CN201110155338.0A CN201110155338A CN102236767B CN 102236767 B CN102236767 B CN 102236767B CN 201110155338 A CN201110155338 A CN 201110155338A CN 102236767 B CN102236767 B CN 102236767B
- Authority
- CN
- China
- Prior art keywords
- file
- cryptographic hash
- hash
- key
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention provides the file encrypting method in conjunction with cryptographic hash, it is characterized in that, comprise the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.The present invention is by checking first cryptographic hash corresponding with User Defined data and verify whether encrypt file is modified with the second cryptographic hash that double secret key is answered, and what improve existing symmetric cryptosystem cracks difficulty.And the present invention can realize the batch processing to file encryption/decryption by asterisk wildcard.
Description
Technical field
The present invention relates to file encryption, particularly, relate to the file encrypting method in conjunction with cryptographic hash.
Background technology
Along with the development that modern science and technology are day by day at full speed, people are more and more stronger to the dependence of network, and the powerful network system also brings the danger in leakage of personal information while providing data sharing.Society has also promoted the generation of various forms of cryptographic algorithm to the active demand of information privacy, and DES (DataEncodeStandard) is wherein cryptographic algorithm the most ripe at present.DES is invented by IBM, is approved as the government standard of non-confidential data in 1977 by the Bureau of Standards of US Department of Commerce belonging country (NationalBureauofStandard, NBS), and very fast finance and government-works in used in a large number.
Although DES is considered to foolproof, along with the geometry level of the operational speed of a computer increases, Brute-Force (brute force attack) can crack this algorithm easily.In January, 1999, the RSA data security session, EEF only with within 22 hours 15 minutes, just to complete initiated by RSA company challenge is cracked to DES.It is found that the DES of 64 has not reached the requirement of encryption now far away, so scientists just uses the 3DES encryption technology of 128, the author introduces the another kind of algorithm combined with the DES of 64 and time parameter here, also successfully can resist the attack of Brute-Force
Summary of the invention
For defect of the prior art, the object of this invention is to provide a kind of file encrypting method in conjunction with cryptographic hash.
According to an aspect of the present invention, the file encrypting method in conjunction with cryptographic hash is provided, it is characterized in that, comprise the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
Preferably, also step G is comprised the steps:: receive the second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash; Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination; Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash; Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
Preferably, also comprise the steps: step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information; Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.
Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
Preferably, described first file identification information comprises the first asterisk wildcard, described step B comprises the steps: step B1: the file that filename mates with described first asterisk wildcard is defined as described text file, and described second file identification information comprises the second asterisk wildcard.Described step H comprises the steps: step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
Preferably, in step F, symmetric encipherment algorithm is adopted to be encrypted.
Preferably, in step F, DES algorithm is adopted to be encrypted.
The present invention is by checking first cryptographic hash corresponding with User Defined data and verify whether encrypt file is modified with the second cryptographic hash that double secret key is answered, and what improve existing symmetric cryptosystem cracks difficulty.And the present invention can realize the batch processing to file encryption/decryption by asterisk wildcard.
Embodiment
File encrypting method in conjunction with cryptographic hash provided by the invention, comprises the steps: steps A: receive the first file identification information; Step B: determine some text files according to described first file identification information; Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data; Step D: the second cryptographic hash generating described first key; Step e: at the described second cryptographic hash generating object file of described text file end write; Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
Described steps A to step F achieves the encryption to file, next realizes the deciphering to file by step G to step L.
More specifically, the described file encrypting method in conjunction with cryptographic hash also comprises the steps: step G: receive the second file identification information; Step H: determine some described cryptograph files according to described second file identification information; Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash; Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination; Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash; Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
Preferably, the described file encrypting method in conjunction with cryptographic hash also comprises the steps: step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information; Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
Preferably, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.Preferably, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
Preferably, described first file identification information comprises the first asterisk wildcard, described step B comprises the steps: step B1: the file that filename mates with described first asterisk wildcard is defined as described text file, and described second file identification information comprises the second asterisk wildcard.Described step H comprises the steps: step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
Preferably, in step F, symmetric encipherment algorithm is adopted to be encrypted.Preferably, in step F, DES algorithm is adopted to be encrypted.
Above specific embodiments of the invention are described.It is to be appreciated that the present invention is not limited to above-mentioned particular implementation, those skilled in the art can make various distortion or amendment within the scope of the claims, and this does not affect flesh and blood of the present invention.
Claims (10)
1. in conjunction with a file encrypting method for cryptographic hash, it is characterized in that, comprise the steps:
Steps A: receive the first file identification information;
Step B: determine some text files according to described first file identification information;
Step C: generate key, wherein, described key comprises User Defined data, check bit and hash, and wherein, described hash is for recording the first cryptographic hash of described User Defined data;
Step D: the second cryptographic hash generating key;
Step e: at the described second cryptographic hash generating object file of described text file end write;
Step F: use file destination described in described double secret key to be encrypted acquisition cryptograph files.
2. file encrypting method according to claim 1, is characterized in that, also comprises the steps:
Step G: receive the second file identification information;
Step H: determine some described cryptograph files according to described second file identification information;
Step I: judge that whether the cryptographic hash described in hash of described key is identical with described first cryptographic hash;
Step J: if the cryptographic hash described in the hash of described key is identical with described first cryptographic hash, then use cryptograph files described in described double secret key to be decrypted and obtain described file destination;
Step K: judge that whether the cryptographic hash of original text end of file in described file destination is identical with described second cryptographic hash;
Step L: if the cryptographic hash of original text end of file is identical with described second cryptographic hash in described file destination, then export described text file.
3. file encrypting method according to claim 2, is characterized in that, also comprises the steps:
Step J ': if the cryptographic hash described in the hash of described key is not identical with described first cryptographic hash, then output error information;
Step L ': if the cryptographic hash of original text end of file is not identical with described second cryptographic hash in described file destination, then output error information.
4. file encrypting method according to claim 2, is characterized in that, described key is 64, and wherein, described User Defined data account for 36, and check bit accounts for 8, and hash accounts for 20.
5. file encrypting method according to claim 2, is characterized in that, described key is 64, and wherein, described User Defined data account for 24, and check bit accounts for 8, and hash accounts for 32.
6. file encrypting method according to claim 4, is characterized in that, described first file identification information comprises the first asterisk wildcard, and described step B comprises the steps:
Step B1: the file that filename mates with described first asterisk wildcard is defined as described text file,
Described second file identification information comprises the second asterisk wildcard, and described step H comprises the steps:
Step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
7. file encrypting method according to claim 5, is characterized in that, described first file identification information comprises the first asterisk wildcard, and described step B comprises the steps:
Step B1: the file that filename mates with described first asterisk wildcard is defined as described text file,
Described second file identification information comprises the second asterisk wildcard, and described step H comprises the steps:
Step H1: the file that filename mates with described second asterisk wildcard is defined as described cryptograph files.
8. the file encrypting method according to any one of claims 1 to 3,6 to 7, is characterized in that, adopts symmetric encipherment algorithm to be encrypted in step F.
9. file encrypting method according to claim 8, is characterized in that, adopts DES algorithm to be encrypted in step F.
10. file encrypting method according to claim 5, is characterized in that, adopts DES algorithm to be encrypted in step F.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110155338.0A CN102236767B (en) | 2011-06-10 | 2011-06-10 | In conjunction with the file encrypting method of cryptographic hash |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110155338.0A CN102236767B (en) | 2011-06-10 | 2011-06-10 | In conjunction with the file encrypting method of cryptographic hash |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102236767A CN102236767A (en) | 2011-11-09 |
CN102236767B true CN102236767B (en) | 2015-12-16 |
Family
ID=44887409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110155338.0A Active CN102236767B (en) | 2011-06-10 | 2011-06-10 | In conjunction with the file encrypting method of cryptographic hash |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102236767B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650095A (en) * | 2018-04-17 | 2018-10-12 | 四川长虹电器股份有限公司 | A kind of file encryption-decryption method based on redis |
CN109922049B (en) * | 2019-02-02 | 2021-09-28 | 立旃(上海)科技有限公司 | Verification device and method based on block chain |
CN110176986A (en) * | 2019-05-30 | 2019-08-27 | 杭州奇治信息技术股份有限公司 | A kind of data ciphering method of multi-enciphering, device and mobile terminal |
CN111967875A (en) * | 2020-08-19 | 2020-11-20 | 上海网班教育科技股份有限公司 | Block chain-based file uplink evidence storing method and device |
CN114978711A (en) * | 2022-05-25 | 2022-08-30 | 山东国子软件股份有限公司 | Data transmission method and system for symmetric encryption of dynamic secret key |
CN115022099A (en) * | 2022-08-09 | 2022-09-06 | 北京华云安软件有限公司 | Identity authentication method and system based on UDP transmission protocol |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101710380A (en) * | 2009-12-22 | 2010-05-19 | 中国软件与技术服务股份有限公司 | Electronic document safety protection method |
US7792300B1 (en) * | 2003-09-30 | 2010-09-07 | Oracle America, Inc. | Method and apparatus for re-encrypting data in a transaction-based secure storage system |
-
2011
- 2011-06-10 CN CN201110155338.0A patent/CN102236767B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7792300B1 (en) * | 2003-09-30 | 2010-09-07 | Oracle America, Inc. | Method and apparatus for re-encrypting data in a transaction-based secure storage system |
CN101710380A (en) * | 2009-12-22 | 2010-05-19 | 中国软件与技术服务股份有限公司 | Electronic document safety protection method |
Also Published As
Publication number | Publication date |
---|---|
CN102236767A (en) | 2011-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102236767B (en) | In conjunction with the file encrypting method of cryptographic hash | |
EP2658165A3 (en) | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |
CA2553024A1 (en) | System and method for associating message addresses with certificates | |
CN106778292B (en) | A kind of quick restoring method of Word encrypted document | |
CN102024123A (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
CN103559453A (en) | Hardware encryption protection method and system for cellphone data | |
DK2150915T3 (en) | Security Log protocol | |
CN103942500B (en) | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption | |
CN104038336A (en) | Data encryption method based on 3DES | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
Kaur | A Review on Symmetric Key Cryptography Algorithms. | |
CN101383701A (en) | Digital content protection method ciphered by biological characteristic | |
CN110233729A (en) | A kind of encryption solid-state disk key management method based on PUF | |
CN102761559B (en) | Network security based on private data shares method and communication terminal | |
CN100518060C (en) | Method for protection of encipherment of digital document as well as client terminal equipment | |
CN102843356B (en) | Controllable exchange method for symmetric key-encrypted file | |
TWI280025B (en) | File encryption system having key recovery function and its method thereof | |
CN107404476B (en) | Method and device for protecting data security in big data cloud environment | |
CN102025743A (en) | Method and device for exporting mirror image of virtual machine in cloud computing | |
CN109033811A (en) | Electric bidding document multilayer encrypting and deciphering system for e-bidding | |
CN103763097A (en) | Security encryption method for password or secret key | |
CN104463003A (en) | File encryption protecting method | |
CN103491384A (en) | Encrypting method and device of video and decrypting method and device of video | |
CN103634113B (en) | Encryption and decryption method and device with user/equipment identity authentication | |
CN102647428A (en) | Encrypting and decrypting system and method adopting trusteeship control based on communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |