CN108549818A - A kind of method and system of mobile phone games data ciphering and deciphering - Google Patents
A kind of method and system of mobile phone games data ciphering and deciphering Download PDFInfo
- Publication number
- CN108549818A CN108549818A CN201810182245.9A CN201810182245A CN108549818A CN 108549818 A CN108549818 A CN 108549818A CN 201810182245 A CN201810182245 A CN 201810182245A CN 108549818 A CN108549818 A CN 108549818A
- Authority
- CN
- China
- Prior art keywords
- encryption information
- encryption
- length
- original key
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method and system of mobile phone games data ciphering and deciphering, original KEY is encrypted to form the first encryption information by Hash codes, original KEY treats encrypted mobile phone games data encryption and forms the second encryption information, first encryption file is combined to form encryption file with the second encryption file, terminal, to encrypting file decryption, finally obtains mobile phone games data to be encrypted by Hash codes, coordinated without additional server-side, it is at low cost, it is safer using two level Encryption Algorithm.
Description
Technical field
The present invention relates to data security arts more particularly to a kind of method and system of mobile phone games data ciphering and deciphering.
Background technology
Currently, popularizing with smart mobile phone, mobile phone games industry is also fast-developing, there is a large amount of new game productions every year
It is raw, but the game that can be succeeded on the market is in fact and few.Therefore, there is one kind not in mobile phone games exploitation industry
Good phenomenon is exactly those successfully game of mountain vallage.They by being unziped it to installation file (for example, apk files), from
And resource file therein is obtained easily, quickly analysis cracks the resource of those game, configuration, and then quick mountain vallage goes out one
Similar game.It is also configuration data by cracking game more also to play plug-in, some to be played are crucial
Data.
Common method includes the following steps in terms of game data encryption at present:
1. compress mode is randomly selected in ciphering process, cipher mode compresses game client valuable source,
Encryption, and accordingly generate index information and be uploaded to game server;
2. obtaining above-mentioned index information from game server in decrypting process, and correct decryption side is chosen according to it
Formula, decompression mode are decrypted the called valuable source of encryption, decompress;And then complete the calling of above-mentioned valuable source with
Ensure the normal operation of game client.
The encryption method improves the difficulty maliciously cracked to a certain extent, is effectively protected game client and its again
Resource is wanted, but is the encrypting and decrypting of game resource the shortcomings that the above method to need special server-side and coordinated, this
Inconvenience can be brought to resource decryption, increase the additional many workloads of game resource processing.
Invention content
The technical problem to be solved by the present invention is to:It provides a kind of inexpensive, safety to mobile phone games data encryption solution
Close method and system.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:
A method of to mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information
KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
In order to solve the above-mentioned technical problem, the another technical solution that the present invention uses for:
A kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation end include first
Memory, first processor and storage on the first memory and the first computer program that can be run on first processor,
The terminal includes second memory, second processor and is stored on second memory and can be run in second processor
Second computer program,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
The beneficial effects of the present invention are:Original KEY is encrypted to form the first encryption information by Hash codes, original KEY
It treats encrypted mobile phone games data encryption and forms the second encryption information, the first encryption file is combined into shape with the second encryption file
At encryption file, terminal, to encrypting file decryption, finally obtains mobile phone games data to be encrypted, without additional by Hash codes
Server-side coordinated, it is at low cost, it is safer using two level Encryption Algorithm.
Description of the drawings
Fig. 1 is a kind of flow chart of the method for mobile phone games encrypting and decrypting of the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the system of mobile phone games encrypting and decrypting of the embodiment of the present invention;
Label declaration:
1, end is developed;2, first memory;3, first processor;4, terminal 5, second memory;6, second processor;7、
Mobile phone games data ciphering and deciphering system.
Specific implementation mode
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and coordinate attached
Figure is explained.
The design of most critical of the present invention is:Use Hash codes and corresponding original with mobile phone games data to be encrypted
Decryption is encrypted to mobile phone games data by encrypting and decrypting rule in KEY, is coordinated without additional server-side, cost
It is low, it is safer using two level Encryption Algorithm.
Please refer to Fig. 1, a kind of method of mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information
KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
As can be seen from the above description, the beneficial effects of the present invention are:Original KEY is encrypted by Hash codes to be formed first plus
Confidential information, original KEY treat encrypted mobile phone games data encryption and form the second encryption information, and file and second is encrypted by first
Encryption file combines to form encryption file, and terminal, to encrypting file decryption, finally obtains mobile phone trip to be encrypted by Hash codes
Play data, are coordinated without additional server-side, at low cost, safer using two level Encryption Algorithm.
Further, the step S2 is specifically included:The length for obtaining the original KEY, the Hash codes are followed
Ring expand, the length of the Hash codes after expansion is consistent with the length of original KEY, by after the expansion Hash codes with it is described
Original KEY step-by-steps carry out xor operation, obtain first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into
Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion
Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
Seen from the above description, it carries out cyclic extension using Hash codes and original KEY and encrypts more convenient, nothing as key
Encryption key need to be separately provided, it is convenient and efficient.
Further, first encryption information is combined to form encryption with second encryption information described in step S4
File specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will
The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
First encryption information is read from the encryption file and second encryption information is specific described in step S5
Including:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information
Degree determines first encryption information, obtains the length of second encryption information, determines second encryption information.
It seen from the above description, can be more smart by the length of the length and the second encryption information that obtain the first encryption information
True the first encryption information of positioning and the second encryption information.
Further, the step S5 is specifically included:The length for obtaining first encryption information, by the Hash codes into
Row cyclic extension, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by the Kazakhstan after the expansion
Uncommon code carries out xor operation with the first encryption information step-by-step, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions,
The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described
Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
Seen from the above description, more convenient as secret key decryption using Hash codes and original KEY progress cyclic extension, nothing
Decruption key need to be separately provided, more quick, raising user experience is decrypted using xor operation.
Please refer to Fig. 2, a kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation
End include first memory, first processor and storage on the first memory and can be run on first processor first count
Calculation machine program, the terminal include second memory, second processor and are stored on second memory and can be in second processing
The second computer program run on device,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
As can be seen from the above description, the beneficial effects of the present invention are:Original KEY is encrypted by Hash codes to be formed first plus
Confidential information, original KEY treat encrypted mobile phone games data encryption and form the second encryption information, and file and second is encrypted by first
Encryption file combines to form encryption file, and terminal, to encrypting file decryption, finally obtains mobile phone trip to be encrypted by Hash codes
Play data, are coordinated without additional server-side, at low cost, safer using two level Encryption Algorithm.
Further, the step S2 is specifically included:The length for obtaining the original KEY, the Hash codes are followed
Ring expand, the length of the Hash codes after expansion is consistent with the length of original KEY, by after the expansion Hash codes with it is described
Original KEY step-by-steps carry out xor operation, obtain first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into
Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion
Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
Seen from the above description, it carries out cyclic extension using Hash codes and original KEY and encrypts more convenient, nothing as key
Encryption key need to be separately provided, it is convenient and efficient.
Further, first encryption information is combined to form encryption with second encryption information described in step S4
File specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will
The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
First encryption information is read from the encryption file and second encryption information is specific described in step S5
Including:
The encryption file is received, the head of the encryption file is read, obtains the length of first encryption information, really
Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
It seen from the above description, can be more smart by the length of the length and the second encryption information that obtain the first encryption information
True the first encryption information of positioning and the second encryption information.
Further, the step S5 is specifically included:The length for obtaining first encryption information, by the Hash codes into
Row cyclic extension, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by the Kazakhstan after the expansion
Uncommon code carries out xor operation with the first encryption information step-by-step, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions,
The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described
Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
Seen from the above description, more convenient as secret key decryption using Hash codes and original KEY progress cyclic extension, nothing
Decruption key need to be separately provided, more quick, raising user experience is decrypted using xor operation.
Fig. 1 is please referred to, the embodiment of the present invention one is:
A kind of method of mobile phone games data ciphering and deciphering, including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
The step S2 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining the original KEY
The length of Hash codes after filling is consistent with the length of original KEY, and the Hash codes after the expansion are pressed with the original KEY
Position carries out xor operation, obtains first encryption information, and the Hash codes are the setting of exploitation end, and maintain secrecy undocumented character
String;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into
Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion
Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
It is described first encryption information is combined with second encryption information to be formed encryption file specifically include:By institute
It states the length of the first encryption information and the head for encrypting file is written in first encryption information, described second is encrypted
The tail portion of the encryption file is written in the length of information and second encryption information.
S5, terminal receive the encryption file, and first encryption information and described second are read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains described original for encryption information
KEY;
The step S5 is specifically included:The Hash codes are carried out cycle expansion by the length for obtaining first encryption information
Fill, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by after the expansion Hash codes and institute
It states the first encryption information step-by-step and carries out xor operation, obtain the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions,
The length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with it is described
Second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
The embodiment of the present invention two is:
Method described in embodiment one is applied to specific scene, for example Hash codes are:HASHC, with hand to be encrypted
The corresponding original KEY of machine game data is:TESTKEYCODE123, mobile phone games data to be encrypted are:
IPHONEGAME12345678, the process that exploitation end is encrypted are specially:The length of the Hash codes is 5 characters, described
The length of original KEY is 14 characters, and Hash codes described in cyclic extension obtain HASHCHASHCHASH, the Hash of cyclic extension
Code is consistent with the length of original KEY, by each character ASCII character of HASHCHASHCHASH and TESTKEYCODE123
Each character ASCII character step-by-step carries out xor operation, as follows:
The first encryption information is obtained, it is as follows:
| 28 | 4 | 0 | 28 | 8 | 13 | 24 | 16 | 7 | 7 | 13 | 112 | 97 | 123 |
The length of the mobile phone games data to be encrypted is 18 characters, and the length of the original KEY is 14 characters,
Original KEY described in cyclic extension obtains TESTKEYCODE123TEST, the original KEY of cyclic extension and the hand to be encrypted
The length of machine game data is consistent, by each character ASCII character of TESTKEYCODE123TEST and
Each character ASCII character step-by-step of IPHONEGAME12345678 carries out xor operation, as follows:
The second encryption information is obtained, it is as follows:
| 31 | 21 | 27 | 27 | 5 | 0 | 30 | 14 | 14 | 1 | 116 | 3 | 1 | 7 | 97 | 115 | 100 | 108 |
It is described to combine to form encryption file with second encryption information by first encryption information, described first is added
The head of the encryption file is written in the length 14 of confidential information and first encryption information, by second encryption information
The tail portion of the encryption file is written in length 18 and second encryption information, the encryption file is sent to terminal, eventually
Termination receives encryption file, the first encryption information and the second encryption information is read, according to the rule of xor operation:Same variable with
Another variable and its exclusive or value exclusive or are equal to another number, such as (a^b) ^a=b;The length for reading the first encryption information is 14, will
The Hash codes HASHC carries out cyclic extension, obtains HASHCHASHCHASH, and the Hash codes after the expansion are believed with the first encryption
The length of breath is consistent, by each character ASCII character of each character ASCII character of HASHCHASHCHASH and the first encryption information
Step-by-step carries out xor operation, as follows:
It is TESTKEYCODE123 to obtain the original KEY, according to the rule of xor operation:Same variable and another variable
It is equal to another number, such as (a^b) ^a=b with its exclusive or value exclusive or;The length for reading the second encryption information is 18, will be described original
KEY cyclic extensions obtain TESTKEYCODE123TEST, the length of the original KEY of cyclic extension and second encryption information
Unanimously, by each character ASCII character step-by-step of each character ASCII character of TESTKEYCODE123TEST and the second encryption information
Xor operation is carried out, it is as follows:
It is IPHONEGAME12345678 to obtain mobile phone games data.
Fig. 2 is please referred to, the embodiment of the present invention three is:
A kind of system 7 to mobile phone games data ciphering and deciphering, including exploitation end 1 and terminal 4, the exploitation end 1 include
First memory 2, first processor 3 and storage are on the first memory and the first computer that can be run on first processor
Program, the terminal 4 include second memory 5, second processor 6 and are stored on second memory and can be in second processor
The second computer program of upper operation, which is characterized in that
The first processor 3 realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
The step S2 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining the original KEY
The length of Hash codes after filling is consistent with the length of original KEY, and the Hash codes after the expansion are pressed with the original KEY
Position carries out xor operation, obtains first encryption information, and the Hash codes are the setting of exploitation end, and maintain secrecy undocumented character
String;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, are formed
Second encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, by the original KEY into
Row cyclic extension, the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, by the expansion
Original KEY after filling carries out xor operation with the mobile phone games data step-by-step to be encrypted, obtains second encryption information.
S4, first encryption information is combined to form encryption file with second encryption information, by encryption text
Part is sent to terminal;
It is described first encryption information is combined with second encryption information to be formed encryption file specifically include:By institute
It states the length of the first encryption information and the head for encrypting file is written in first encryption information, described second is encrypted
The tail portion of the encryption file is written in the length of information and second encryption information.
The second processor 6 realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption is read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
The step S5 is specifically included:The Hash codes are carried out cycle expansion by the length for obtaining first encryption information
Fill, the length of the Hash codes after expansion is consistent with the length of the first encryption information, by after the expansion Hash codes and institute
It states the first encryption information step-by-step and carries out xor operation, obtain the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone
Game data.
The step S6 is specifically included:The length for obtaining second encryption information, by the original KEY cyclic extensions,
The character length of original KEY after expansion is consistent with the length of the second encryption information, by after the expansion original KEY with
The second encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
In conclusion a kind of method and system of mobile phone games data ciphering and deciphering provided by the invention, pass through Hash codes
Original KEY is encrypted to form the first encryption information, original KEY treats encrypted mobile phone games data encryption and forms the second encryption letter
Breath, by first encryption file with second encryption file combine to form encryption file, terminal by Hash codes to encryption file decryption,
Mobile phone games data to be encrypted are finally obtained, are coordinated without additional server-side, it is at low cost, it is encrypted and is calculated using two level
Method, it is safer.
Example the above is only the implementation of the present invention is not intended to limit the scope of the invention, every to utilize this hair
Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in relevant technical field, include similarly
In the scope of patent protection of the present invention.
Claims (10)
1. a kind of method of mobile phone games data ciphering and deciphering, which is characterized in that including step:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, form second
Encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, the encryption file is sent out
It send to terminal;
S5, terminal receive the encryption file, and first encryption information and second encryption are read from the encryption file
First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY for information;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone games
Data.
2. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
The step S2 is specifically included:The Hash codes are carried out cyclic extension, after expansion by the length for obtaining the original KEY
Hash codes length it is consistent with the length of original KEY, by Hash codes and the original KEY step-by-steps after the expansion into
Row xor operation obtains first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, the original KEY is followed
Ring expands, and the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, after the expansion
Original KEY carry out xor operation with the mobile phone games data step-by-step to be encrypted, obtain second encryption information.
3. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
First encryption information combined with second encryption information described in step S4 and to form encryption file and specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will be described
The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
4. a kind of method of mobile phone games data ciphering and deciphering according to claim 3, which is characterized in that
First encryption information is read from the encryption file and second encryption information specifically includes described in step S5:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information, really
Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
5. a kind of method of mobile phone games data ciphering and deciphering according to claim 1, which is characterized in that
The step S5 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining first encryption information
The length of Hash codes after filling is consistent with the length of the first encryption information, by the Hash codes and described first after the expansion
Encryption information step-by-step carries out xor operation, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information expands the original KEY cyclic extensions
The length of original KEY afterwards is consistent with the length of the second encryption information, by the original KEY and described second after the expansion
Encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
6. a kind of system to mobile phone games data ciphering and deciphering, including exploitation end and terminal, the exploitation end are deposited including first
Reservoir, first processor and storage on the first memory and the first computer program that can be run on first processor, institute
State terminal include second memory, second processor and be stored on second memory and can be run in second processor
Two computer programs,
The first processor realizes following steps when executing first computer program:
One S1, setting original KEY corresponding with mobile phone games data to be encrypted;
S2, the original KEY is encrypted using Hash codes according to encryption rule, forms the first encryption information;
S3, the mobile phone games data to be encrypted are encrypted using the original KEY according to encryption rule, form second
Encryption information;
S4, first encryption information is combined to form encryption file with second encryption information, the encryption file is sent out
It send to terminal;
The second processor realizes following steps when executing the second computer program:
S5, the encryption file is received, first encryption information and second encryption information is read from the encryption file,
First encryption information is decrypted according to decryption rule using the Hash codes, obtains the original KEY;
S6, second encryption information is decrypted using the original KEY according to decryption rule, obtains the mobile phone games
Data.
7. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
The step S2 is specifically included:The Hash codes are carried out cyclic extension, after expansion by the length for obtaining the original KEY
Hash codes length it is consistent with the length of original KEY, by Hash codes and the original KEY step-by-steps after the expansion into
Row xor operation obtains first encryption information;
The step S3 is specifically included:The length for obtaining the mobile phone games data to be encrypted, the original KEY is followed
Ring expands, and the length of the original KEY after expansion is consistent with the length of mobile phone games data to be encrypted, after the expansion
Original KEY carry out xor operation with the mobile phone games data step-by-step to be encrypted, obtain second encryption information.
8. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
First encryption information combined with second encryption information described in step S4 and to form encryption file and specifically includes:
The head that the length of first encryption information and first encryption information are written to the encryption file, will be described
The tail portion of the encryption file is written in the length of second encryption information and second encryption information.
9. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
First encryption information is read from the encryption file and second encryption information specifically includes described in step S5:
Terminal receives the encryption file, reads the head of the encryption file, obtains the length of first encryption information, really
Fixed first encryption information, obtains the length of second encryption information, determines second encryption information.
10. a kind of system of mobile phone games data ciphering and deciphering according to claim 6, which is characterized in that
The step S5 is specifically included:The Hash codes are carried out cyclic extension, expanded by the length for obtaining first encryption information
The length of Hash codes after filling is consistent with the length of the first encryption information, by the Hash codes and described first after the expansion
Encryption information step-by-step carries out xor operation, obtains the original KEY;
The step S6 is specifically included:The length for obtaining second encryption information expands the original KEY cyclic extensions
The length of original KEY afterwards is consistent with the length of the second encryption information, by the original KEY and described second after the expansion
Encryption information step-by-step carries out xor operation, obtains the mobile phone games data.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810182245.9A CN108549818A (en) | 2018-03-06 | 2018-03-06 | A kind of method and system of mobile phone games data ciphering and deciphering |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810182245.9A CN108549818A (en) | 2018-03-06 | 2018-03-06 | A kind of method and system of mobile phone games data ciphering and deciphering |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN108549818A true CN108549818A (en) | 2018-09-18 |
Family
ID=63516581
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810182245.9A Pending CN108549818A (en) | 2018-03-06 | 2018-03-06 | A kind of method and system of mobile phone games data ciphering and deciphering |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108549818A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116723036A (en) * | 2023-07-04 | 2023-09-08 | 上海企创信息科技有限公司 | Network data transmission encryption and decryption methods, systems, terminals and media |
| CN120200857A (en) * | 2025-05-26 | 2025-06-24 | 赛力斯汽车有限公司 | Vehicle communication data encryption method, decryption method, device and system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103516516A (en) * | 2012-06-28 | 2014-01-15 | 中国电信股份有限公司 | File safe sharing method, system and terminal |
| CN105376261A (en) * | 2015-12-21 | 2016-03-02 | Tcl集团股份有限公司 | Encryption method and system for instant communication message |
| CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
| CN107038383A (en) * | 2016-02-03 | 2017-08-11 | 华为技术有限公司 | A kind of method and apparatus of data processing |
-
2018
- 2018-03-06 CN CN201810182245.9A patent/CN108549818A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103516516A (en) * | 2012-06-28 | 2014-01-15 | 中国电信股份有限公司 | File safe sharing method, system and terminal |
| CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
| CN105376261A (en) * | 2015-12-21 | 2016-03-02 | Tcl集团股份有限公司 | Encryption method and system for instant communication message |
| CN107038383A (en) * | 2016-02-03 | 2017-08-11 | 华为技术有限公司 | A kind of method and apparatus of data processing |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116723036A (en) * | 2023-07-04 | 2023-09-08 | 上海企创信息科技有限公司 | Network data transmission encryption and decryption methods, systems, terminals and media |
| CN120200857A (en) * | 2025-05-26 | 2025-06-24 | 赛力斯汽车有限公司 | Vehicle communication data encryption method, decryption method, device and system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110008745B (en) | Encryption method, computer equipment and computer storage medium | |
| CN112035827B (en) | Cipher data processing method, device, equipment and readable storage medium | |
| CN105760764A (en) | Encryption and decryption methods and devices for embedded storage device file and terminal | |
| KR101112157B1 (en) | Data Encrytion Method | |
| KR20180081470A (en) | System for hiding information using lightweight mutual authentication based on biometric in mobile environment, method thereof and computer recordable medium storing program to perform the method | |
| CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
| Alsaffar et al. | An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image | |
| CN105119924B (en) | A kind of information transferring method | |
| CN114205142A (en) | Data transmission method and device, electronic equipment and storage medium | |
| Sermeno et al. | Modified Vigenere cryptosystem: An integrated data encryption module for learning management system | |
| CN105721134B (en) | It is realized using the single whitepack with multiple external encodes | |
| CN108549818A (en) | A kind of method and system of mobile phone games data ciphering and deciphering | |
| US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
| CN107278357B (en) | Cryptographic system and method | |
| CN105162592B (en) | A kind of method and system of certification wearable device | |
| US11276138B2 (en) | Image data encryption and rendering system | |
| CN111314052B (en) | A data encryption and decryption method | |
| KR20110101317A (en) | Method and apparatus for automatic data encryption | |
| CN109214163B (en) | Identity authentication method and device | |
| CN110968878B (en) | Information transmission method, system, electronic equipment and readable medium | |
| CN109150494B (en) | Method, storage medium, device and system for constructing encryption and decryption algorithm in mobile terminal | |
| CN106650342B (en) | Jar package reinforcement method and system | |
| CN104363584B (en) | A kind of method, apparatus and terminal of short message Encrypt and Decrypt | |
| KR101224956B1 (en) | Method and device for cipher-deciphering data automatically | |
| CN106330961A (en) | Encryption method of important resources of mobile game client |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180918 |
|
| RJ01 | Rejection of invention patent application after publication |