CN115834063B - Quantum key-based data compression encryption method - Google Patents
Quantum key-based data compression encryption method Download PDFInfo
- Publication number
- CN115834063B CN115834063B CN202310133279.XA CN202310133279A CN115834063B CN 115834063 B CN115834063 B CN 115834063B CN 202310133279 A CN202310133279 A CN 202310133279A CN 115834063 B CN115834063 B CN 115834063B
- Authority
- CN
- China
- Prior art keywords
- data
- basic
- random number
- key
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to the field of data compression and encryption, in particular to a data compression and encryption method based on a quantum key, which comprises the following steps: obtaining a basic quantum random number by using a quantum random number generator; encrypting the data to be processed by using the basic quantum random number to obtain encrypted data to be processed; compressing the encrypted data to be processed to obtain data to be verified; and carrying out verification encryption processing by utilizing the data to be verified according to the basic quantum random number corresponding to the data to be processed to obtain complete compressed encrypted data, and carrying out encryption-compression-encryption data processing flow, wherein under the condition of keeping the content of the data, the data form is changed and quantum keys are combined, so that the safety of the data and the data integrity after compression and decompression are greatly improved, and the relevance between the decryption and encryption process and the data exists, namely, a certain group of keys have specificity at a certain moment.
Description
Technical Field
The invention relates to the field of data compression and encryption, in particular to a data compression and encryption method based on a quantum key.
Background
In the traditional quantum encryption field, the data is simply encrypted to carry out subsequent processing, the data cannot be related to other operations of the data, a certain obstruction is caused to the subsequent processing, and meanwhile, the encryption process is independently implemented, so that although the security is improved, the risk exists after the data is leaked or intercepted, and therefore, a practical method for relating the data encryption to the data is needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data compression encryption method based on a quantum key, which closely links the encryption process with data in an encryption-compression-encryption mode, thereby improving the pertinence of encryption and the safety of the data.
In order to achieve the above object, the present invention provides a data compression encryption method based on a quantum key, comprising:
obtaining a basic quantum random number by using a quantum random number generator;
encrypting the data to be processed by using the basic quantum random number to obtain encrypted data to be processed;
compressing the encrypted data to be processed to obtain data to be verified;
and verifying and encrypting the data to be verified according to the basic quantum random number corresponding to the data to be processed to obtain the complete compressed and encrypted data.
Preferably, the obtaining the basic quantum random number by using the quantum random number generator includes:
generating a main quantum random number and a backup quantum random number based on the same time by using a quantum random number generator;
the main quantum random number and the backup quantum random number are used as basic quantum random numbers;
the main quantum random number and the backup quantum random number are mutually independent and different, and the lengths of the main quantum random number and the backup quantum random number are the same.
Preferably, the encrypting the data to be processed by using the basic quantum random number includes:
acquiring a basic quantum random number at a corresponding moment according to the occurrence moment of the data to be processed;
dividing the main quantum random numbers in the basic quantum random numbers according to the number of the data to be processed to obtain basic quantum keys;
encrypting the data to be processed by using the basic quantum key to obtain encrypted data to be processed;
wherein the number of basic quantum keys is the same as the number of data to be processed.
Further, performing encryption processing on the data to be processed by using the basic quantum key to obtain encrypted data to be processed includes:
mapping the main quantum random number corresponding to the basic quantum key and the backup quantum random number corresponding to the main quantum random number to obtain a basic quantum mapping relation;
encrypting the data to be processed by using the basic quantum key to obtain basic encrypted data to be processed;
using the basic encryption data to be processed and the basic quantum mapping relation as encryption data to be processed;
the basic quantum mapping relationship is a bidirectional mapping relationship between the main quantum random number and the backup quantum random number.
Preferably, the compressing the encrypted data to be processed to obtain the data to be verified includes:
compressing the encrypted data to be processed based on an RLE algorithm to obtain initial compressed data to be processed;
and obtaining the data to be verified by using the initial compressed data to be processed.
Further, obtaining the data to be verified by using the initial compressed data to be processed includes:
judging whether the initial compressed data to be processed has numbers, if yes, using the remaining numbers of the initial compressed data to be processed as key basic numbers, otherwise, performing binary conversion by using initial fields of the initial compressed data to be processed to obtain field basic numbers;
when the key basic number exists, a first key is obtained by using the key basic number, and the first key and the initial compressed data to be processed are used as data to be verified;
when the field basic number exists, a second key is obtained by using the field basic number, and the second key and the initial compressed data to be processed are used as data to be verified;
the length of the bytes of the key basic number is the same as that of the field basic number, and the first key and the second key are internal keys.
Preferably, performing verification encryption processing on the to-be-verified data according to the basic quantum random number corresponding to the to-be-processed data to obtain complete compressed encrypted data includes:
performing reverse verification processing by using the data to be verified based on the backup random number in the basic quantum random numbers corresponding to the data to be processed to obtain a reverse verification result;
and carrying out encryption processing on the data to be verified based on the reverse verification result to obtain complete compressed encrypted data.
Further, performing reverse verification processing by using the data to be verified based on the backup random number in the basic quantum random number corresponding to the data to be processed to obtain a reverse verification result includes:
obtaining a backup quantum key according to the basic quantum mapping relation corresponding to the data to be verified by using the backup random number;
judging whether the backup quantum key and a basic quantum key of the data to be verified have a key association relationship, if so, determining that the reverse verification result is consistent, otherwise, determining that the reverse verification result is inconsistent;
the basic quantum mapping relation and the key association relation are corresponding progressive relations.
Further, performing encryption processing on the data to be verified based on the reverse verification result to obtain complete compressed encrypted data includes:
when the reverse verification result is consistent, encrypting the initial compressed data to be processed of the data to be verified by using the internal key of the data to be verified to obtain complete compressed encrypted data;
and when the reverse verification result is inconsistent, discarding the processing and deleting the basic quantum random number corresponding to the data to be verified.
Preferably, the decryption process corresponding to the data compression encryption method is as follows:
when the complete compressed encrypted data is to be decrypted, decrypting the complete compressed encrypted data by using an internal key of the complete compressed encrypted data to obtain the encrypted data to be decompressed;
judging whether the internal key basic type of the encrypted data to be decompressed is a key basic number, if yes, recovering by using the internal key to obtain a decryption key basic number, otherwise, recovering by using the internal key to obtain a decryption field basic number;
when the decryption key basic number exists, judging whether the decryption key basic number is the same as the residual number of the encrypted data to be decompressed, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
when the basic number of the decryption field exists, judging whether the basic number of the decryption field is the same as the initial field of the encrypted data to be decompressed, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
acquiring the appearance time corresponding to the secondary data to be decrypted;
obtaining a basic quantum random number at a corresponding moment according to the appearance moment corresponding to the secondary data to be decrypted as a secondary decryption basic quantum random number;
judging whether the basic quantum mapping relation of the secondary decryption basic quantum random number is the same as the basic quantum mapping relation of the basic quantum random number of the secondary data to be decrypted, if so, performing secondary decryption by using the secondary decryption basic quantum random number to obtain the data to be decrypted, and if not, discarding the data to be decrypted.
Compared with the closest prior art, the invention has the following beneficial effects:
the quantum random numbers are generated and divided according to the time, two groups of random numbers are generated simultaneously and are mutually independent, a mapping relation is established by utilizing two groups of completely different random numbers, when a certain group of random numbers are leaked, an encryption-compression-encryption data processing flow can be found in time, the data form is changed and a quantum key is combined under the condition of keeping the content of the data, the safety of the data and the data integrity after compression and decompression are greatly improved, and the relevance exists between the decryption and encryption process and the data, namely, a certain group of keys have specificity at a certain moment.
Drawings
Fig. 1 is a flow chart of a data compression encryption method based on a quantum key.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1: the invention provides a data compression encryption method based on a quantum key, which is shown in figure 1 and comprises the following steps:
s1, obtaining a basic quantum random number by using a quantum random number generator;
s2, encrypting the data to be processed by using the basic quantum random number to obtain encrypted data to be processed;
s3, compressing the encrypted data to be processed to obtain data to be verified;
and S4, verifying and encrypting the data to be verified according to the basic quantum random number corresponding to the data to be processed to obtain complete compressed and encrypted data.
S1 specifically comprises:
s1-1, generating a main quantum random number and a backup quantum random number based on the same time by using a quantum random number generator;
s1-2, using the main quantum random number and the backup quantum random number as basic quantum random numbers;
the main quantum random number and the backup quantum random number are mutually independent and different, and the lengths of the main quantum random number and the backup quantum random number are the same.
S2 specifically comprises: s2-1, acquiring a basic quantum random number at a corresponding moment according to the occurrence moment of data to be processed;
s2-2, dividing the main quantum random numbers in the basic quantum random numbers according to the number of the data to be processed to obtain a basic quantum key;
s2-3, encrypting the data to be processed by using the basic quantum key to obtain encrypted data to be processed;
wherein the number of basic quantum keys is the same as the number of data to be processed.
S2-3 specifically comprises: s2-3-1, mapping the main quantum random number corresponding to the basic quantum key and the backup quantum random number corresponding to the main quantum random number to obtain a basic quantum mapping relation;
s2-3-2, encrypting the data to be processed by using the basic quantum key to obtain basic encrypted data to be processed;
s2-3-3, using the basic encryption data to be processed and the basic quantum mapping relation as encryption data to be processed;
the basic quantum mapping relationship is a bidirectional mapping relationship between the main quantum random number and the backup quantum random number.
S3 specifically comprises:
s3-1, compressing the encrypted data to be processed based on an RLE algorithm to obtain initial compressed data to be processed;
s3-2, obtaining data to be verified by utilizing the initial compressed data to be processed.
S3-2 specifically comprises:
s3-2-1, judging whether the initial compressed data to be processed has numbers, if yes, using the remaining numbers of the initial compressed data to be processed as key basic numbers, otherwise, performing binary conversion by using initial fields of the initial compressed data to be processed to obtain field basic numbers;
s3-2-2, when the key basic number exists, obtaining a first key by using the key basic number, and using the first key and the initial compressed data to be processed as data to be verified;
s3-2-3, when field basic numbers exist, obtaining a second secret key by using the field basic numbers, and using the second secret key and the initial compressed data to be processed as data to be verified;
the length of the bytes of the key basic number is the same as that of the field basic number, and the first key and the second key are internal keys.
In this embodiment, in a data compression encryption method based on a quantum key, an initial field of initial compressed data to be processed is defined as a preceding byte of the initial compressed data to be processed, and the length of the initial field is smaller than all bytes of the initial compressed data to be processed, and the initial field can be adjusted according to the actual data size.
S4 specifically comprises the following steps:
s4-1, performing reverse verification processing by utilizing the data to be verified based on the backup random number in the basic quantum random number corresponding to the data to be processed to obtain a reverse verification result;
s4-2, encrypting the data to be verified based on the reverse verification result by utilizing the data to be verified to obtain complete compressed encrypted data.
S4-1 specifically comprises:
s4-1-1, obtaining a backup quantum key according to a basic quantum mapping relation corresponding to the data to be verified by using the backup random number;
s4-1-2, judging whether a key association relation exists between the backup quantum key and a basic quantum key of data to be verified, if so, determining that the reverse verification result is consistent, otherwise, determining that the reverse verification result is inconsistent;
the basic quantum mapping relation and the key association relation are corresponding progressive relations.
S4-2 specifically comprises: s4-2-1, when the reverse verification result is consistent, encrypting the initial compressed data to be processed of the data to be verified by using the internal key of the data to be verified to obtain complete compressed encrypted data;
s4-2-2, when the reverse verification result is inconsistent, discarding the processing and deleting the basic quantum random number corresponding to the data to be verified.
S5, the decryption process corresponding to the data compression encryption method is as follows: s5-1, when the complete compressed encrypted data exists to be decrypted, decrypting the complete compressed encrypted data by using an internal key of the complete compressed encrypted data to obtain the encrypted data to be decompressed;
s5-2, judging whether the internal key basic type of the encrypted data to be decompressed is a key basic number, if yes, recovering by using the internal key to obtain a decryption key basic number, otherwise, recovering by using the internal key to obtain a decryption field basic number;
s5-3, judging whether the decryption key basic number is the same as the rest numbers of the encrypted data to be decompressed when the decryption key basic number exists, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
s5-4, judging whether the basic number of the decryption field is the same as the initial field of the encrypted data to be decompressed when the basic number of the decryption field exists, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
s5-5, acquiring the appearance time corresponding to the secondary data to be decrypted;
s5-6, obtaining a basic quantum random number at a corresponding moment according to the appearance moment corresponding to the secondary data to be decrypted as a secondary decryption basic quantum random number;
s5-7, judging whether the basic quantum mapping relation of the secondary decryption basic quantum random number is the same as the basic quantum mapping relation of the basic quantum random number of the secondary data to be decrypted, if so, performing secondary decryption by using the secondary decryption basic quantum random number to obtain the data to be decrypted, and finishing decryption and decompression processing, otherwise, giving up processing.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.
Claims (8)
1. A data compression encryption method based on a quantum key, comprising:
s1, obtaining a basic quantum random number by using a quantum random number generator;
s2, encrypting the data to be processed by using the basic quantum random number to obtain encrypted data to be processed;
s2-1, acquiring a basic quantum random number at a corresponding moment according to the occurrence moment of data to be processed;
s2-2, dividing the main quantum random numbers in the basic quantum random numbers according to the number of the data to be processed to obtain a basic quantum key;
s2-3, encrypting the data to be processed by using the basic quantum key to obtain encrypted data to be processed;
s2-3-1, mapping the main quantum random number corresponding to the basic quantum key and the backup quantum random number corresponding to the main quantum random number to obtain a basic quantum mapping relation;
s2-3-2, encrypting the data to be processed by using the basic quantum key to obtain basic encrypted data to be processed;
s2-3-3, using the basic encryption data to be processed and the basic quantum mapping relation as encryption data to be processed;
the basic quantum mapping relationship is a bidirectional mapping relationship between the main quantum random number and the backup quantum random number;
the quantity of the basic quantum keys is the same as the quantity of data to be processed;
s3, compressing the encrypted data to be processed to obtain data to be verified;
and S4, verifying and encrypting the data to be verified according to the basic quantum random number corresponding to the data to be processed to obtain complete compressed and encrypted data.
2. The method for data compression and encryption based on quantum key according to claim 1, wherein the obtaining the basic quantum random number by using the quantum random number generator comprises:
generating a main quantum random number and a backup quantum random number based on the same time by using a quantum random number generator;
the main quantum random number and the backup quantum random number are used as basic quantum random numbers;
the main quantum random number and the backup quantum random number are mutually independent and different, and the lengths of the main quantum random number and the backup quantum random number are the same.
3. The method for compressing and encrypting data based on a quantum key according to claim 1, wherein compressing the encrypted data to be processed to obtain data to be verified comprises:
compressing the encrypted data to be processed based on an RLE algorithm to obtain initial compressed data to be processed;
and obtaining the data to be verified by using the initial compressed data to be processed.
4. A data compression encryption method based on quantum key according to claim 3, wherein obtaining data to be verified using the initial compressed data to be processed comprises:
judging whether the initial compressed data to be processed has numbers, if yes, using the remaining numbers of the initial compressed data to be processed as key basic numbers, otherwise, performing binary conversion by using initial fields of the initial compressed data to be processed to obtain field basic numbers;
when the key basic number exists, a first key is obtained by using the key basic number, and the first key and the initial compressed data to be processed are used as data to be verified;
when the field basic number exists, a second key is obtained by using the field basic number, and the second key and the initial compressed data to be processed are used as data to be verified;
the length of the bytes of the key basic number is the same as that of the field basic number, and the first key and the second key are internal keys.
5. The method for compressing and encrypting data based on quantum key according to claim 1, wherein verifying and encrypting data to be verified according to the basic quantum random number corresponding to the data to be processed to obtain complete compressed and encrypted data comprises:
performing reverse verification processing by using the data to be verified based on the backup random number in the basic quantum random numbers corresponding to the data to be processed to obtain a reverse verification result;
and carrying out encryption processing on the data to be verified based on the reverse verification result to obtain complete compressed encrypted data.
6. The method for data compression and encryption based on quantum key according to claim 5, wherein performing reverse verification processing on the data to be verified based on the backup random number in the basic quantum random number corresponding to the data to be processed to obtain a reverse verification result comprises:
obtaining a backup quantum key according to the basic quantum mapping relation corresponding to the data to be verified by using the backup random number;
judging whether the backup quantum key and a basic quantum key of the data to be verified have a key association relationship, if so, determining that the reverse verification result is consistent, otherwise, determining that the reverse verification result is inconsistent;
the basic quantum mapping relation and the key association relation are corresponding progressive relations.
7. The method of claim 6, wherein encrypting the data to be verified based on the reverse verification result to obtain the complete compressed encrypted data comprises:
when the reverse verification result is consistent, encrypting the initial compressed data to be processed of the data to be verified by using the internal key of the data to be verified to obtain complete compressed encrypted data;
and when the reverse verification result is inconsistent, discarding the processing and deleting the basic quantum random number corresponding to the data to be verified.
8. The data compression encryption method based on quantum key according to claim 1, wherein the decryption process corresponding to the data compression encryption method is as follows:
when the complete compressed encrypted data is to be decrypted, decrypting the complete compressed encrypted data by using an internal key of the complete compressed encrypted data to obtain the encrypted data to be decompressed;
judging whether the internal key basic type of the encrypted data to be decompressed is a key basic number, if yes, recovering by using the internal key to obtain a decryption key basic number, otherwise, recovering by using the internal key to obtain a decryption field basic number;
when the decryption key basic number exists, judging whether the decryption key basic number is the same as the residual number of the encrypted data to be decompressed, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
when the basic number of the decryption field exists, judging whether the basic number of the decryption field is the same as the initial field of the encrypted data to be decompressed, if so, performing decompression processing to obtain secondary data to be decrypted, otherwise, discarding processing;
acquiring the appearance time corresponding to the secondary data to be decrypted;
obtaining a basic quantum random number at a corresponding moment according to the appearance moment corresponding to the secondary data to be decrypted as a secondary decryption basic quantum random number;
judging whether the basic quantum mapping relation of the secondary decryption basic quantum random number is the same as the basic quantum mapping relation of the basic quantum random number of the secondary data to be decrypted, if so, performing secondary decryption by using the secondary decryption basic quantum random number to obtain the data to be decrypted, and if not, discarding the data to be decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310133279.XA CN115834063B (en) | 2023-02-20 | 2023-02-20 | Quantum key-based data compression encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310133279.XA CN115834063B (en) | 2023-02-20 | 2023-02-20 | Quantum key-based data compression encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115834063A CN115834063A (en) | 2023-03-21 |
CN115834063B true CN115834063B (en) | 2023-05-05 |
Family
ID=85521873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310133279.XA Active CN115834063B (en) | 2023-02-20 | 2023-02-20 | Quantum key-based data compression encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115834063B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116453670A (en) * | 2023-06-16 | 2023-07-18 | 高密市人民医院 | Storage system and method for blood sample test data |
CN117544308B (en) * | 2024-01-09 | 2024-04-19 | 广东广宇科技发展有限公司 | Quantum key-based data transmission verification method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760047A (en) * | 2020-12-28 | 2022-07-15 | 科大国盾量子技术股份有限公司 | Quantum key management method, device and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9619665B2 (en) * | 2014-07-22 | 2017-04-11 | Cheng-Han KO | Method and system for adding dynamic labels to a file and encrypting the file |
CN107038389A (en) * | 2017-03-13 | 2017-08-11 | 上海青橙实业有限公司 | Data encryption processing method, data deciphering processing method and mobile terminal |
CN114650528A (en) * | 2020-12-21 | 2022-06-21 | 科大国盾量子技术股份有限公司 | An Emergency Communication Method Based on Quantum Keys |
CN115442163B (en) * | 2022-11-08 | 2023-01-17 | 广东广宇科技发展有限公司 | Big data one-way encryption transmission method based on asymmetric algorithm |
-
2023
- 2023-02-20 CN CN202310133279.XA patent/CN115834063B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760047A (en) * | 2020-12-28 | 2022-07-15 | 科大国盾量子技术股份有限公司 | Quantum key management method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN115834063A (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115834063B (en) | Quantum key-based data compression encryption method | |
CN111526009B (en) | Forward security editable block chain construction method suitable for alliance chain | |
CN112311865B (en) | File encryption transmission method and device | |
CN115801257B (en) | Big data secure transmission method based on quantum encryption | |
CN106452776A (en) | Data encryption method | |
CN115442163B (en) | Big data one-way encryption transmission method based on asymmetric algorithm | |
CN112994875B (en) | Encryption method, decryption method, communication method, system and device thereof | |
CN111314050B (en) | Encryption and decryption method and device | |
CN113904768B (en) | Online offline decryption method based on SM9 key packaging mechanism | |
CN115883052A (en) | Data encryption method, data decryption method, device and storage medium | |
CN114826590B (en) | Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment | |
CN116318687B (en) | Data dynamic encryption method based on bidirectional mapping matrix | |
CN114285610A (en) | Method for encrypting and transmitting information | |
CN111314052B (en) | A data encryption and decryption method | |
CN117278339A (en) | Data independent transmission verification method based on bidirectional synchronous key pool | |
CN117828630A (en) | Cloud storage deduplication method based on blockchain and fusion encryption technology | |
CN112398655A (en) | File transmission method, server and computer storage medium | |
CN106650342B (en) | Jar package reinforcement method and system | |
CN117544308B (en) | Quantum key-based data transmission verification method | |
CN114329614A (en) | A data desensitization method and system based on string obfuscation | |
JP3711821B2 (en) | Prime number generation method and apparatus, and storage medium storing prime number generation program | |
CN116192388B (en) | Mixed key encryption processing method based on digital fingerprint | |
CN114143014B (en) | Media file encryption method, decryption method, transmission method, device and system | |
CN111581607B (en) | License activating method | |
CN113849385B (en) | Log file generation and analysis method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |