CN106529352A - Computer client information safe input method - Google Patents
Computer client information safe input method Download PDFInfo
- Publication number
- CN106529352A CN106529352A CN201610899911.1A CN201610899911A CN106529352A CN 106529352 A CN106529352 A CN 106529352A CN 201610899911 A CN201610899911 A CN 201610899911A CN 106529352 A CN106529352 A CN 106529352A
- Authority
- CN
- China
- Prior art keywords
- input
- key
- computer client
- data
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A computer client information safe input method includes a computer client. The method includes the steps: (1) performing user selection on the computer client; (2) sequentially or disorderly arranging key values of a keyboard of the computer client; (3) allowing the user to input information; (4) allowing the user to send the information; (5) performing DES encryption; (6) performing network transmission; (7) allowing a computer server to receive the information; (8) performing DES decryption; and (9) allowing the computer server to verify the information. Information input of computer users is safer; the method can be applied to various industries, and is a very safe user information input method; and the invention provides a feasible solution scheme which has good promotion and use value.
Description
Technical field
The present invention relates to computer client technical field, and in particular to a kind of that computer client information security is input into
Method.
Background technology
With the development of science and technology, computer is all used widely in many fields, as current computer input is related to
To the privacy information of user, the safety of user profile cannot be ensured in various complex environments;Lawless person can pass through
Various ways steal the information of user during user input information and transmission information.Therefore, information encryption, especially one
Plant the encipherment protection research to computer input information to have very important significance.
The content of the invention
The technical problem to be solved is to provide a kind of method to the input of computer client information security.
For realizing the purpose of the present invention, the technical solution adopted in the present invention is:
A kind of method to the input of computer client information security, including computer client, implementing step is:
(1) in computer client, user selects;(2) the key value sequential placement of the keyboard of computer client or out of order cloth
Office;(3) user input information;(4) user sends information;(5) des encryption;(6) network transmission;(7) computer server receives
Information;(8) DES decryption;(9) computer server check information.
Further, described step (2) for keyboard key value position every time putting in order on keyboard be all with
Machine or order, concrete methods of realizing is:An array is defined first, according to the display number of circuit board principle and charactron
According to then the video data coding of definition 0 to 9 and A to Z re-defines two arrays, be respectively used to deposit keyboard value and charactron
Code displaying;Then data above is carried out from new sort with random function rand () and srand ();It is random each time
It is the subscript of first data;Producing for the first time is produced between 0-9, and the data and last position for so producing are carried out
Exchange, the coding of the random data sequence correspondence charactron to producing, is exactly final video data;Finally according to being particularly shown
That data go compare charactron coding, realize the display of data, at the same according to show data in keyboard value array pair
The position answered arranges corresponding value.
Further, the des encryption generates composition by encryption, enciphering transformation and sub-key.
Further, the encryption concrete methods of realizing is:(1) initial conversion table IP is pressed to the plaintext of 64 first
Enter line translation, the 58th for being for example input into is displaced to the 1st when output;Input is the 7th, the quilt in output
Replace the 64th;(2) encryption of the output processed by above-mentioned transposition through 16 wheel enciphering transformations, 64 of initial transposition
Output as input next time, be divided into left and right two 32 by 64, be designated as L0 and R0 respectively, from L0, R0 to L16,
R16, carries out 16 wheel enciphering transformations altogether;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can do following fixed
Justice:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is
Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carry out the transposition of IP-1,
Obtain the ciphertext of 64.
Enciphering transformation is specially:The right half part of 32 is extended into conversion table expansion according to expansion table 3 by repeating some
Open up as 48, and the key of 56 first shift then by select it is therein some reduce to 48, the right half part of 48
Combined by the key of xor operation and 48, and be divided into 8 of 6 and be grouped, this 48 are replaced into by 8 S boxes new
32 data, then replaced once.
Sub-key generates 64 keys of specially input, remove each byte by compression transposition PC-1 the 8th, uses
Making even-odd check, key length being reduced to for 56, per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0
Shift left operation is circulated successively and generates C1 and D1, C1 and D1 is synthesized into 56, then export 48 by compressing transposition PC-2
Sub-key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain
To 16 sub-keys.
Further, the S boxes are input into 6, export 4, and in a S box, with 4 kinds of substitution tables, (line number is with 0,1,2,3
Represent), by 6 two select rows of beginning and end being input into, then by selected substitution table by the centre of 6 be input into
4 are substituted.
The DES decryption is specially:Data transfer is decrypted further according to key key to after target machine, and DES decryption is calculated
Method is identical with des encryption algorithm, key inverted order, finally obtains correct input information.
The key code of DES algorithm for encryption is:
A kind of method to the input of computer client information security that the present invention is provided, the present invention adopt keyboard order cloth
Office or out of order layout, des encryption method and new design concept, realize that the information of computer user's information input is more pacified
Entirely;Can be a kind of foolproof user profile input using industry in industry-by-industry;The invention provides a kind of reality can
Capable solution, has good value for applications.
Specific embodiment
The following enforcement to the present invention is further described, so that those skilled in the art can be better understood from simultaneously
Implement.
Embodiment 1
A kind of method to the input of computer client information security, implementing step is:(1) in computer client
Upper user selects;(2) the key value sequential placement of the keyboard of computer client or out of order layout;(3) user input information;
(4) user sends information;(5) des encryption;(6) network transmission;(7) computer server receives information;(8) DES decryption;(9)
Computer server check information.
Step (2) for keyboard key value position every time putting in order on keyboard be all it is random or order
's:An array is defined first, according to circuit board principle and the video data of charactron, defines 0 to 9 and A to Z video data
Coding, then re-defines two arrays, is respectively used to deposit the code displaying of keyboard value and charactron;Then use random function
Rand () and srand () are carried out from new sort to data above;Due to chip itself resource and speed and product itself will
The real-time of display is sought, in this sequencer procedure, is transformed to producing random number, random each time is the first number
According to subscript;Producing for the first time is produced between 0-9, and the data and last position for so producing are swapped, so
Often travel through, will not thus produce the chance of duplicate data, also ensure that speed.To produce with
The coding of machine data sequence correspondence charactron, is exactly final video data;It is right to go finally according to that data being particularly shown
According to the coding of charactron, the display of data is realized, while arranging right according to the data for showing in the corresponding position of keyboard value array
The value answered, correctly to send in user input information.
By encryption, encryption becomes des encryption (DES (key1, encryption) DES (key2, decryption) DES (key1, encryption))
Change to generate with sub-key and constitute.Encryption concrete methods of realizing is:(1) first the plaintext of 64 is entered by initial conversion table IP
Line translation, the 58th for being for example input into is displaced to the 1st when output;Input is the 7th, is set in output
Change to the 64th;(2) encryption of the output processed by above-mentioned transposition through 16 wheel enciphering transformations, initial 64 s' for replacing
Output is divided into left and right two 32 by 64, is designated as L0 and R0 respectively as input next time, from L0, R0 to L16, R16,
16 wheel enciphering transformations are carried out altogether;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can be defined as follows:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is
Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carry out the transposition of IP-1,
Obtain the ciphertext of 64.
Enciphering transformation is specially:The right half part of 32 is extended into conversion table expansion according to expansion table 3 by repeating some
Open up as 48, and the key of 56 first shift then by select it is therein some reduce to 48, the right half part of 48
Combined by the key of xor operation and 48, and be divided into 8 of 6 and be grouped, this 48 are replaced into by 8 S boxes new
32 data, then replaced once.S boxes are input into 6, export 4, in a S box with 4 kinds of substitution tables (line number is with 0,1,
2nd, 3 represent), by 6 of input two select rows of beginning and end, then by selected substitution table by 6 be input into
Middle 4 are substituted.
Sub-key generates 64 keys of specially input, remove each byte by compression transposition PC-1 the 8th, uses
Making even-odd check, key length being reduced to for 56, per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0
Shift left operation is circulated successively and generates C1 and D1, C1 and D1 is synthesized into 56, then export 48 by compressing transposition PC-2
Sub-key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain
To 16 sub-keys.
DES decryption is specially:Data transfer is decrypted (DES (key1, solution further according to key key to after target machine
It is close) DES (key2, encryption) DES (key1, decryption)), DES decipherment algorithms are identical with des encryption algorithm, key inverted order, most
After obtain correct input information.
The key code of DES algorithm for encryption is:
The key code of encryption is:
SymmetricStreamDecryptor ssd=des.CreateDecryptor ();
Cms=new CryptoMemoryStream ();
ssd.SetSink(cms);
ssd.Write(encryptedData);
ssd.CloseStream();
Byte [] decryptedData=cms.Data;
Char [] decryptedCharArray=
utf8Encoding.GetChars(decryptedData);
Data after Console.WriteLine (" decryption:");
Console.Write(decryptedCharArray);
Console.WriteLine();}
}。
Claims (8)
1. it is a kind of to computer client information security input method, including computer client, it is characterised in that the method
The step that implements be:(1) in computer client, user selects;(2) key value of the keyboard of computer client is suitable
Sequence layout or out of order layout;(3) user input information;(4) user sends information;(5) des encryption;(6) network transmission;(7)
Computer server receives information;(8) DES decryption;(9) computer server check information.
2. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute
Putting in order on keyboard be all random or order every time to state the position of key value that step (2) is keyboard, specifically
Implementation method is:An array is defined first, according to circuit board principle and the video data of charactron, defines 0 to 9 and A to Z
Video data is encoded, and then re-defines two arrays, is respectively used to deposit the code displaying of keyboard value and charactron;Then with
Machine function rand () and srand () are carried out from new sort to data above;Random each time is the subscript of first data;
Producing for the first time is produced between 0-9, and the data and last position for so producing are swapped, to the random number for producing
The coding of charactron is answered according to sequence pair, is exactly final video data;Go to compare number finally according to that data being particularly shown
The coding of code pipe, realizes the display of data, while arranging corresponding according to the data for showing in the corresponding position of keyboard value array
Value.
3. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute
State des encryption and composition is generated by encryption, enciphering transformation and sub-key.
4. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute
Stating encryption concrete methods of realizing is:(1) line translation is entered by initial conversion table IP to the plaintext of 64 first, for example, is input into
58th, the 1st is displaced to when output;Input is the 7th, is displaced to the 64th in output;
(2) encryption of the output processed to above-mentioned transposition through 16 wheel enciphering transformations, the output of initial 64 for replacing are made
For input next time, it is divided into left and right two 32 by 64, is designated as L0 and R0 respectively, from L0, R0 to L16, R16, carries out altogether
16 wheel enciphering transformations;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can be defined as follows:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is
Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carries out the transposition of IP-1, obtained
The ciphertext of 64.
5. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute
State enciphering transformation to be specially:The right half part of 32 is extended into conversion table according to expansion table 3 expand to 48 by repeating some
Position, and the key of 56 is first shifted then by select it is therein some reduce to 48, the right half part of 48 is by different
Or operate the key with 48 to combine, and it is divided into 8 packets of 6,32 new digits are replaced into by 8 S boxes by this 48
According to, then replaced once.
6. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute
64 keys that sub-key generates specially input are stated, removes the 8th of each byte by compression transposition PC-1, as odd even
Verification, reduces to key length for 56, and per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0 and enters successively
The operation of row ring shift left generates C1 and D1, and C1 and D1 is synthesized 56, then by compressing the sub close of transposition PC-2 outputs 48
Key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain 16
Sub-key.
7. according to a kind of method to the input of computer client information security described in claim 5, it is characterised in that institute
State S boxes and be input into 6, export 4, there are in a S box 4 kinds of substitution tables (line number is represented with 0,1,2,3), by 6 be input into
Two select rows of beginning and end, then the centre 4 of 6 being input into is substituted by selected substitution table.
8. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute
State DES decryption to be specially:Data transfer is decrypted further according to key key to after target machine, and DES decipherment algorithms and DES add
Close algorithm is identical, key inverted order, finally obtains correct input information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610899911.1A CN106529352A (en) | 2016-10-15 | 2016-10-15 | Computer client information safe input method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610899911.1A CN106529352A (en) | 2016-10-15 | 2016-10-15 | Computer client information safe input method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529352A true CN106529352A (en) | 2017-03-22 |
Family
ID=58332444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610899911.1A Withdrawn CN106529352A (en) | 2016-10-15 | 2016-10-15 | Computer client information safe input method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529352A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848073A (en) * | 2018-05-31 | 2018-11-20 | 唐山智能电子有限公司 | The data of real-time data acquisition system are carried out with the method and system of encrypting and decrypting |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662483A (en) * | 2012-02-28 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | A method for cloud computing business intelligent terminal users to safely input information |
CN103996011A (en) * | 2014-06-05 | 2014-08-20 | 福建天晴数码有限公司 | Method and device for protecting codes to be input safely |
CN105930714A (en) * | 2016-04-20 | 2016-09-07 | 上海瀚银信息技术有限公司 | Password input method and system as well as intelligent terminal |
-
2016
- 2016-10-15 CN CN201610899911.1A patent/CN106529352A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662483A (en) * | 2012-02-28 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | A method for cloud computing business intelligent terminal users to safely input information |
CN103996011A (en) * | 2014-06-05 | 2014-08-20 | 福建天晴数码有限公司 | Method and device for protecting codes to be input safely |
CN105930714A (en) * | 2016-04-20 | 2016-09-07 | 上海瀚银信息技术有限公司 | Password input method and system as well as intelligent terminal |
Non-Patent Citations (1)
Title |
---|
龙夏等: "基于3DES加密的ATM乱序密码键盘的设计", 《电脑知识与技术》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848073A (en) * | 2018-05-31 | 2018-11-20 | 唐山智能电子有限公司 | The data of real-time data acquisition system are carried out with the method and system of encrypting and decrypting |
CN108848073B (en) * | 2018-05-31 | 2021-04-13 | 唐山智能电子有限公司 | Method and system for encrypting and decrypting data of real-time data acquisition system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105046636B (en) | Digital image encryption method based on chaotic system and nucleotide sequence database | |
CN106411518B (en) | A kind of unfixed symmetrical whitepack encryption method of key and device | |
CN1993922B (en) | Stream cipher combining system and method | |
CN106952213B (en) | New chaotic image encryption method based on bit permutation Yu dynamic DNA encoding | |
CN107070630B (en) | A kind of fast and safely hardware configuration of aes algorithm | |
CN106663387A (en) | Encryption/decryption function generating method, an encryption/decryption method and related apparatuses | |
CN101383703B (en) | Dynamic ciphering method based on broad sense information field | |
CN101394268B (en) | Advanced ciphering system and method based on broad sense information field | |
CN101814985B (en) | Block cipher system using multi-chaotic mapping multi-dynamic S-box | |
CN108123791A (en) | A kind of implementation method and device of lightweight block cipher SCS | |
Gautam et al. | An enhanced Cipher technique using Vigenere and modified Caesar cipher | |
CN107147487A (en) | The random block cipher of symmetric key | |
CN109768854A (en) | A kind of implementation method of lightweight block cipher Wheel | |
CN106656470A (en) | Data encryption method based on improved AES (Advanced Encryption Standard) algorithm | |
CN107578363B (en) | Digital image encryption and decryption method based on multiple chaotic chain algorithms and bit planes | |
US20030210783A1 (en) | Method and system of encryption | |
CN109344627B (en) | Novel Shannon perfect secrecy method | |
CN107078900A (en) | Cryptographic system based on reproducible random sequences | |
CN106529352A (en) | Computer client information safe input method | |
CN109714154A (en) | Whitepack cryptographic algorithm under code cubage difficulty whitepack security model | |
Kumar et al. | Image encryption using simplified data encryption standard (S-DES) | |
CN107835070B (en) | Simple embedded encryption method | |
CN107493164B (en) | DES encryption method and system based on chaotic system | |
CN106921486A (en) | The method and apparatus of data encryption | |
CN116055650A (en) | DES-based urine test paper image encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170322 |
|
WW01 | Invention patent application withdrawn after publication |