[go: up one dir, main page]

CN116015650B - File encryption and decryption method and device and storage medium - Google Patents

File encryption and decryption method and device and storage medium Download PDF

Info

Publication number
CN116015650B
CN116015650B CN202211731330.9A CN202211731330A CN116015650B CN 116015650 B CN116015650 B CN 116015650B CN 202211731330 A CN202211731330 A CN 202211731330A CN 116015650 B CN116015650 B CN 116015650B
Authority
CN
China
Prior art keywords
character string
random
index
file
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211731330.9A
Other languages
Chinese (zh)
Other versions
CN116015650A (en
Inventor
汪宗叶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jinzhigang Education Consulting Co ltd
Original Assignee
Guangzhou Jinzhigang Education Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jinzhigang Education Consulting Co ltd filed Critical Guangzhou Jinzhigang Education Consulting Co ltd
Priority to CN202211731330.9A priority Critical patent/CN116015650B/en
Publication of CN116015650A publication Critical patent/CN116015650A/en
Application granted granted Critical
Publication of CN116015650B publication Critical patent/CN116015650B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a device and a storage medium for encrypting and decrypting a file, wherein the encryption method comprises the following steps: generating a first random character string with the length being greater than a set bit number, a second random character string with the length being random and a file password; calculating a first index of a file password by using a random number algorithm, and a second index of a first random character string; dividing the file password according to the first index to obtain two sections of password strings, and splicing the password strings with the second random character strings to obtain plaintext character strings; the file password is spliced with the second random character string to play a role in confusing audio-visual, even if the plaintext character string is leaked, the file password cannot be leaked, the safety is higher, and the privacy of the file is further ensured; starting from the second index, intercepting characters with set bit numbers from the first random character string, and determining the characters as keys; the invention can be widely applied to the field of cryptography by initializing a block encryption algorithm by using a secret key and encrypting a plaintext character string to obtain a ciphertext character string.

Description

File encryption and decryption method and device and storage medium
Technical Field
The present invention relates to the field of cryptography, and in particular, to a method and apparatus for encrypting and decrypting a file, and a storage medium.
Background
Current file encryption technology: the server generates a password to encrypt the file, stores the file identifier and the corresponding password in a storage medium at the same time, and after the file receiver acquires the file, acquires decryption related information through a decryption interface by using the file identifier, the existing mode still has the following problems although the file is encrypted in the network transmission process: the problem of file password leakage is caused by the leakage of storage medium data, and the problem of password leakage is caused by the fact that a file decryption interface is wrapped or stolen, and due to the problem, if the file password is leaked, the privacy of a file can be influenced, so that an encryption scheme which is safer and has higher file privacy is very important.
Disclosure of Invention
In view of this, the embodiments of the present invention provide a method, an apparatus and a storage medium for encrypting and decrypting a file with higher security and higher file privacy.
An aspect of an embodiment of the present invention provides a method for encrypting a file, including:
Generating a first random character string with the length being greater than a set bit number, a second random character string with the length being random and a file password;
Calculating a first index of a subscript of the file password and a second index of a subscript of the first random string by using a random number algorithm;
Dividing the file password according to the first index to obtain two password strings, and respectively splicing the password strings at two ends of the second random character string to obtain a plaintext character string;
starting from the second index, intercepting the characters with the set digits from the first random character string, and determining the characters as keys;
and initializing a block encryption algorithm by using the secret key, and encrypting the plaintext character string to obtain a ciphertext character string.
Preferably, the generating process of the file password includes:
Generating a unique identification code by using a UUID algorithm;
And encrypting the unique identification code by using an MD5 algorithm to obtain a file password.
Preferably, the method further comprises:
And storing the first random character string, the second random character string, the first index, the second index and the ciphertext character string to a storage medium.
Another aspect of the embodiments of the present invention further provides a method for decrypting a file, where the method for decrypting a file to obtain a file password in the method for encrypting a file includes:
acquiring a first random character string, a second random character string, a first index of subscripts, a second index of subscripts and a ciphertext character string;
starting from the second index, intercepting characters with set bit numbers from the first random character string, and determining the characters as keys;
initializing a block encryption algorithm by using the secret key, and decrypting the ciphertext character string to obtain a plaintext character string;
removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings;
and splicing the password strings to obtain a file password.
Preferably, the obtaining the first random string, the second random string, the first index, the second index, and the ciphertext string includes:
a first random string, a second random string, a first index of indices, a second index of indices, and a ciphertext string are obtained from a storage medium.
Another aspect of the embodiment of the present invention further provides an encryption device for a file, including:
the character string generating unit is used for generating a first random character string with the length being larger than a set bit number, a second random character string with the length being random and a file password;
An index generation unit for calculating a first index of a subscript of the file password and a second index of a second subscript of the first random string using a random number algorithm;
the password segmentation unit is used for segmenting the file password according to the first index to obtain two sections of password strings, and splicing the password strings at two ends of the second random character string to obtain a plaintext character string;
a first key intercepting unit, configured to intercept the characters with the set bits from the first random string starting from the second index, and determine the characters as a key;
And the character string encryption unit is used for initializing a block encryption algorithm by using the secret key and encrypting the plaintext character string to obtain a ciphertext character string.
Another aspect of the embodiment of the present invention further provides a decryption device for a file, including:
the character string acquisition unit is used for acquiring a first random character string, a second random character string, a first index of subscript, a second index of subscript and a ciphertext character string;
a second key intercepting unit, configured to intercept characters with a set number of bits from the first random string starting from the second index, and determine the characters as a key;
The character string decryption unit is used for initializing a block encryption algorithm by using the secret key, decrypting the ciphertext character string and obtaining a plaintext character string;
The confusion character string removing unit is used for removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings;
and the password string splicing unit is used for splicing the password strings to obtain file passwords.
Another aspect of the embodiment of the invention also provides an electronic device, which includes a processor and a memory;
the memory is used for storing programs;
the processor executes the program to implement the method described above.
Another aspect of the embodiments of the present invention also provides a computer-readable storage medium storing a program that is executed by a processor to implement the above-described method.
Embodiments of the present invention also disclose a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions may be read from a computer-readable storage medium by a processor of a computer device, and executed by the processor, cause the computer device to perform the method described above.
The invention provides a file encryption method, which comprises the following steps: generating a first random character string with the length being greater than a set bit number, a second random character string with the length being random and a file password; calculating a first index of a subscript of the file password and a second index of a second subscript of the first random string by using a random number algorithm; dividing the file password according to the first index to obtain two sections of password strings, and respectively splicing the password strings at two ends of the second random character string to obtain a plaintext character string; the file password is spliced with the second random character string, so that the effect of confusing audio-visual can be achieved, even if the plaintext character string is leaked, the file password cannot be leaked, the safety is higher, and the privacy of the file is further ensured; starting from the second index, intercepting characters with set bit numbers from the first random character string, and determining the characters as keys; and initializing a block encryption algorithm by using a key, and encrypting the plaintext character string to obtain a ciphertext character string. Meanwhile, the encryption of the plaintext character string can further ensure the security of the file password, so that the file password is less prone to leakage.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of an encryption method of a file according to an embodiment of the present invention;
fig. 2 is a flow chart of a method for decrypting a file according to an embodiment of the present invention;
FIG. 3 is a block diagram illustrating a file encryption apparatus according to an embodiment of the present invention;
fig. 4 is a block diagram of a file decrypting apparatus according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, an embodiment of the present invention provides a method for encrypting a file, which specifically includes the following steps:
Step S100: generating a first random character string with the length being larger than the set bit number, a second random character string with the length being random and a file password.
Specifically, the number of bits to be set may be set by the user, for example, 16 bits, 32 bits, or the like, and the lengths of the first and second random strings may be arbitrary, but may be strings of a limited maximum length in order to save the memory space.
Additionally, the process of generating the file password may include: generating a unique identification code by using a UUID algorithm; and encrypting the unique identification code by using an MD5 algorithm to obtain a file password.
Step S110: a first index of a subscript of the file password and a second index of a subscript of the first random string are calculated using a random number algorithm.
Step S120: and dividing the file password according to the first index to obtain two sections of password strings, and respectively splicing the password strings at two ends of the second random character string to obtain a plaintext character string.
Step S130: starting from the second index, the character of the set bit number is intercepted from the first random character string and is determined as a secret key.
Step S140: and initializing a block encryption algorithm by using the secret key, and encrypting the plaintext character string to obtain a ciphertext character string.
In order to safely transmit the encrypted file, the first random character string, the second random character string, the first index, the second index and the ciphertext character string can be stored in a storage medium, and the file password can be obtained according to the stored data in the storage medium to decrypt the file.
Next, referring to fig. 2, an embodiment of the present invention provides a method for decrypting a file, which is used for decrypting a file password in the encryption method for obtaining the file.
Step S200: and acquiring a first random character string, a second random character string, a first index of subscripts, a second index of subscripts and a ciphertext character string.
Specifically, a first random string, a second random string, a first index, a second index, and a ciphertext string may be obtained from a storage medium.
Step S210: and starting from the second index, intercepting characters with set bit numbers from the first random character string, and determining the characters as keys.
Step S220: and initializing a block encryption algorithm by using the secret key, and decrypting the ciphertext character string to obtain a plaintext character string.
Step S230: and removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings.
Step S240: and splicing the password strings to obtain a file password.
Through the decryption method, the file in the encryption method can be decrypted, and the encryption method of the file and the decryption method of the file are reciprocal processes.
In order to describe the present invention in more detail, practical application of the present invention will be described in the following with specific examples.
The method for encrypting the file comprises the following steps:
A. generating a random character string containing an algorithm key, wherein the step A specifically comprises the following steps:
the encryption program generates a string of random strings with a length greater than 16 bits (the invention does not limit the maximum length of the string, but saves storage space by temporarily fetching less than 255 bits).
B. The step B is specifically that:
The encryption program generates a string of random length strings (the invention does not limit the length of strings, but saves storage space by temporarily fetching 255 bits or less).
C. The file password generation step C specifically comprises the following steps:
c1, the encryption program uses UUID algorithm to generate a serial universal unique identification code.
And C2, encrypting the unique identification code generated by the C1 by using an MD5 algorithm by using an encryption program, and taking the ciphertext as an actual password for encrypting the current file.
D. and C, splicing the value of the step B and the value of the step C to obtain a string of plaintext strings, wherein the step D specifically comprises the following steps:
and D1, the encryption program calculates the index of the code by using a random number algorithm according to the length of the file code in the step C.
And D2, the encryption program divides the file password according to the index of the index calculated by the D1, and the confusion codes obtained in the step B are spliced at two ends of the divided password, so that a new string of plaintext character strings DECRYPTSTR is obtained.
E. the encryption method comprises the steps that the SM4 is used for encrypting the plaintext string generated in the step D by intercepting the 16-bit random string in the step A as a secret key, and the step E specifically comprises the following steps:
And E1, the encryption program calculates a subscript index of the starting interception key by using a random number algorithm according to the random character string (length-16) in the step A.
And E2, the encryption program starts to intercept 16 characters from the random character string in the step A as a secret key according to the index of the subscript obtained by the E1.
And E3, initializing the SM4 by the encryption program according to the key obtained by the E2, and encrypting the plaintext character string DECRYPTSTR obtained in the step D2.
Based on the above steps, the related character strings participating in the encryption can be obtained, which are respectively:
① . Step A, generating a random character string containing a secret key: randomStr.
② . And B, generating an confusion code: obfuscate.
③ . E, generating a ciphertext character string: ENCRYPTSTR.
④ . Step D1, obtaining a subscript index of the password segmentation: ruleIndex 1A 1.
⑤ . Step E1, obtaining a subscript index of key interception: ruleIndex2.
⑥ . And C, generating an actual password of the file.
The file resources are encrypted by using the actual file passwords, the obtained ①、②、③、④、⑤ fields (except the actual passwords) are corresponding to the file identifications and are stored in the storage medium, and thus, the file encryption flow of the embodiment of the invention is completed.
The invention relates to a file decryption process which is an inverse process of an encryption process, and the method comprises the following steps:
A. requesting a file decryption interface to obtain information of relevant fields of file decryption, wherein the step A specifically comprises the following steps:
The decryption program requests a file decryption interface according to the file identification, and obtains file decryption information:
① . Random string containing key: randomStr.
② . Confusion code: obfuscate.
③ . Ciphertext: ENCRYPTSTR.
④ . Subscript index for password segmentation: ruleIndex 1A 1.
⑤ . Subscript index of key interception: ruleIndex2.
B. and calculating a file password according to the related field, wherein the step B comprises the following steps:
b1, intercepting 16 characters from the corresponding position of the A- ① field according to the index value of the subscript of the A- ⑤ field in the step A as a secret key.
And B2, initializing the SM4 according to the key obtained in the step B1, and decrypting the A- ③ field to obtain a plaintext character string DECRYPTSTR.
B3, dividing the plaintext character string DECRYPTSTR obtained in the step B2 according to the index value of the subscript of the field in the step A- ④.
And B4, removing the confusion code of the plaintext character string according to the length of the A- ② field on the basis of B3, and splicing the remaining two sections of character strings to obtain the password of the file.
The encryption and decryption method provided by the embodiment of the invention can be used for encrypting and decrypting any file taking a password as a carrier, and has the following advantages compared with the existing encryption method:
1. data storage security: the storage medium only needs to store the secret key, the ciphertext and the confusion code which participate in encryption, and does not need to store the actual password, so that the problem of file password leakage caused by the problems of database leakage and the like can be avoided.
2. Network transmission security: in the network transmission process, only the fields such as secret keys, ciphertext, confusion codes and the like participating in encryption are required to be transmitted, and the actual passwords are not required to be transmitted, so that the problems of password leakage and the like caused by packet grabbing or theft brushing of the interface can be avoided.
3. The core algorithm is replaceable: the current symmetric algorithm includes SM4 algorithm, AES algorithm, DES algorithm, 3DES algorithm, blowfish algorithm, etc.
4. The rules are flexible and changeable: the position of each password segmentation and the starting position of key interception are determined through a random number algorithm, so that the diversity of encryption rules is increased.
Referring to fig. 3, an embodiment of the present invention provides an encryption apparatus for a file, including:
the character string generating unit is used for generating a first random character string with the length being larger than a set bit number, a second random character string with the length being random and a file password;
An index generation unit for calculating a first index of a subscript of the file password and a second index of a second subscript of the first random string using a random number algorithm;
the password segmentation unit is used for segmenting the file password according to the first index to obtain two sections of password strings, and splicing the password strings at two ends of the second random character string to obtain a plaintext character string;
a first key intercepting unit, configured to intercept the characters with the set bits from the first random string starting from the second index, and determine the characters as a key;
And the character string encryption unit is used for initializing a block encryption algorithm by using the secret key and encrypting the plaintext character string to obtain a ciphertext character string.
Referring to fig. 4, an embodiment of the present invention provides a decryption apparatus for a file, including:
the character string acquisition unit is used for acquiring a first random character string, a second random character string, a first index of subscript, a second index of subscript and a ciphertext character string;
a second key intercepting unit, configured to intercept characters with a set number of bits from the first random string starting from the second index, and determine the characters as a key;
The character string decryption unit is used for initializing a block encryption algorithm by using the secret key, decrypting the ciphertext character string and obtaining a plaintext character string;
The confusion character string removing unit is used for removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings;
and the password string splicing unit is used for splicing the password strings to obtain file passwords.
Embodiments of the present invention also disclose a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions may be read from a computer-readable storage medium by a processor of a computer device, and executed by the processor, to cause the computer device to perform the method shown in fig. 1.
In some alternative embodiments, the functions/acts noted in the block diagrams may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Furthermore, the embodiments presented and described in the flowcharts of the present invention are provided by way of example in order to provide a more thorough understanding of the technology. The disclosed methods are not limited to the operations and logic flows presented herein. Alternative embodiments are contemplated in which the order of various operations is changed, and in which sub-operations described as part of a larger operation are performed independently.
Furthermore, while the invention is described in the context of functional modules, it should be appreciated that, unless otherwise indicated, one or more of the described functions and/or features may be integrated in a single physical device and/or software module or one or more functions and/or features may be implemented in separate physical devices or software modules. It will also be appreciated that a detailed discussion of the actual implementation of each module is not necessary to an understanding of the present invention. Rather, the actual implementation of the various functional modules in the apparatus disclosed herein will be apparent to those skilled in the art from consideration of their attributes, functions and internal relationships. Accordingly, one of ordinary skill in the art can implement the invention as set forth in the claims without undue experimentation. It is also to be understood that the specific concepts disclosed are merely illustrative and are not intended to be limiting upon the scope of the invention, which is to be defined in the appended claims and their full scope of equivalents.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.
While the preferred embodiment of the present invention has been described in detail, the present invention is not limited to the embodiments described above, and those skilled in the art can make various equivalent modifications or substitutions without departing from the spirit of the present invention, and these equivalent modifications or substitutions are included in the scope of the present invention as defined in the appended claims.

Claims (10)

1. A method of encrypting a file, comprising:
Generating a first random character string with the length being greater than a set bit number, a second random character string with the length being random and a file password;
Calculating a first index of a subscript of the file password and a second index of a subscript of the first random string by using a random number algorithm;
Dividing the file password according to the first index to obtain two password strings, and respectively splicing the password strings at two ends of the second random character string to obtain a plaintext character string;
starting from the second index, intercepting the characters with the set digits from the first random character string, and determining the characters as keys;
initializing a block encryption algorithm by using the secret key, and encrypting the plaintext character string by using the initialized block encryption algorithm to obtain a ciphertext character string.
2. The method for encrypting a file according to claim 1, wherein said file password generation process comprises:
Generating a unique identification code by using a UUID algorithm;
And encrypting the unique identification code by using an MD5 algorithm to obtain a file password.
3. The method for encrypting a file according to claim 1, further comprising:
And storing the first random character string, the second random character string, the first index, the second index and the ciphertext character string to a storage medium.
4. A method for decrypting a file, characterized in that a file password used in an encryption method for decrypting a file according to any of claims 1 to 3 is obtained, comprising:
acquiring a first random character string, a second random character string, a first index of subscripts, a second index of subscripts and a ciphertext character string;
starting from the second index, intercepting characters with set bit numbers from the first random character string, and determining the characters as keys;
initializing a block encryption algorithm by using the secret key, and decrypting the ciphertext character string by using the initialized block encryption algorithm to obtain a plaintext character string;
removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings;
and splicing the password strings to obtain a file password.
5. The method according to claim 4, wherein the obtaining the first random string, the second random string, the first index, the second index, and the ciphertext string comprises:
a first random string, a second random string, a first index of indices, a second index of indices, and a ciphertext string are obtained from a storage medium.
6. An encryption apparatus for a document, comprising:
the character string generating unit is used for generating a first random character string with the length being larger than a set bit number, a second random character string with the length being random and a file password;
An index generation unit for calculating a first index of a subscript of the file password and a second index of a second subscript of the first random string using a random number algorithm;
the password segmentation unit is used for segmenting the file password according to the first index to obtain two sections of password strings, and splicing the password strings at two ends of the second random character string to obtain a plaintext character string;
a first key intercepting unit, configured to intercept the characters with the set bits from the first random string starting from the second index, and determine the characters as a key;
and the character string encryption unit is used for initializing a block encryption algorithm by using the secret key, and encrypting the plaintext character string by using the initialized block encryption algorithm to obtain a ciphertext character string.
7. A decrypting apparatus for decrypting a file, characterized by comprising:
the character string acquisition unit is used for acquiring a first random character string, a second random character string, a first index of subscript, a second index of subscript and a ciphertext character string;
a second key intercepting unit, configured to intercept characters with a set number of bits from the first random string starting from the second index, and determine the characters as a key;
the character string decryption unit is used for initializing a block encryption algorithm by using the secret key, and decrypting the ciphertext character string by using the initialized block encryption algorithm to obtain a plaintext character string;
The confusion character string removing unit is used for removing a second random character string in the plaintext character string according to the first index to obtain two-end password strings;
and the password string splicing unit is used for splicing the password strings to obtain file passwords.
8. An electronic device comprising a processor and a memory;
the memory is used for storing programs;
the processor executing the program implements the method of any one of claims 1 to 3, or claims 4 to 5.
9. A computer-readable storage medium, characterized in that the storage medium stores a program that is executed by a processor to implement the method of any one of claims 1 to 3, or claims 4 to 5.
10. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1 to 3, or of claims 4 to 5.
CN202211731330.9A 2022-12-30 2022-12-30 File encryption and decryption method and device and storage medium Active CN116015650B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211731330.9A CN116015650B (en) 2022-12-30 2022-12-30 File encryption and decryption method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211731330.9A CN116015650B (en) 2022-12-30 2022-12-30 File encryption and decryption method and device and storage medium

Publications (2)

Publication Number Publication Date
CN116015650A CN116015650A (en) 2023-04-25
CN116015650B true CN116015650B (en) 2024-06-04

Family

ID=86033265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211731330.9A Active CN116015650B (en) 2022-12-30 2022-12-30 File encryption and decryption method and device and storage medium

Country Status (1)

Country Link
CN (1) CN116015650B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116633536A (en) * 2023-04-26 2023-08-22 深圳市雁联计算系统有限公司 Login password encryption method and device based on national password algorithm and related equipment
CN119740245A (en) * 2024-12-09 2025-04-01 福思(杭州)智能科技有限公司 Device data encryption method, computer device, storage medium and program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917267A (en) * 2010-08-13 2010-12-15 福州星网视易信息系统有限公司 Method for storing random key based on encryption file capable of storing softdog
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securely protecting data in the cloud
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
CN114117517A (en) * 2021-11-12 2022-03-01 浪潮通信信息系统有限公司 Information transmission method, system, device and computer medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11281789B2 (en) * 2019-11-21 2022-03-22 Verizon Patent And Licensing Inc. Secure storage of passwords

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securely protecting data in the cloud
CN101917267A (en) * 2010-08-13 2010-12-15 福州星网视易信息系统有限公司 Method for storing random key based on encryption file capable of storing softdog
CN113364760A (en) * 2021-06-01 2021-09-07 平安科技(深圳)有限公司 Data encryption processing method and device, computer equipment and storage medium
WO2022252632A1 (en) * 2021-06-01 2022-12-08 平安科技(深圳)有限公司 Data encryption processing method and apparatus, computer device, and storage medium
CN114117517A (en) * 2021-11-12 2022-03-01 浪潮通信信息系统有限公司 Information transmission method, system, device and computer medium

Also Published As

Publication number Publication date
CN116015650A (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN109933995B (en) User sensitive data protection and system based on cloud service and block chain
CN116015650B (en) File encryption and decryption method and device and storage medium
US9240883B2 (en) Multi-key cryptography for encrypting file system acceleration
JP6763378B2 (en) Cryptographic information creation device, cryptographic information creation method, cryptographic information creation program, and verification system
US8880879B2 (en) Accelerated cryptography with an encryption attribute
CN115766244B (en) Internet of vehicles information encryption method, device, computer equipment and storage medium
CN109274644A (en) Data processing method, terminal and watermark server
JP2000305453A (en) Ciphering device, deciphering device, and ciphering and deciphering device
Yau et al. Padding oracle attacks on CBC-mode encryption with secret and random IVs
CN112134693B (en) Key encryption storage method, acquisition method and device thereof
CN118802109B (en) Data encryption and decryption processing method, device and medium based on mixed modulus component
CN119598511A (en) Privacy set intersection method, device, equipment and system
CN108809889B (en) Data deterministic deletion method based on data block random position negation
CN118764165A (en) A method, device, equipment and storage medium for encryption protection of big data transmission
CN106357662B (en) A kind of data ciphering method based on MAC Address
CN118301416A (en) Video processing method, device, electronic equipment and storage medium
CN115277064B (en) Data encryption and data decryption methods and devices, electronic equipment and medium
CN115023920B (en) Method and device for data processing in a equity incentive system
CN119070974A (en) A method for encrypted communication, related equipment and encrypted communication system
CN116089980A (en) OFD document sensitive information encryption and decryption method and system
KR102284877B1 (en) Efficient functional encryption for set intersection
CN106682525A (en) File protection method and file protection device
CN115859358B (en) File storage and acquisition method, device, electronic device and storage medium
CN117992989B (en) A decryption method, system, device and storage medium
CN119363348B (en) A multi-tenant cultural and tourism data encryption processing method, system, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant