CN106529352A - Computer client information safe input method - Google Patents

Computer client information safe input method Download PDF

Info

Publication number
CN106529352A
CN106529352A CN201610899911.1A CN201610899911A CN106529352A CN 106529352 A CN106529352 A CN 106529352A CN 201610899911 A CN201610899911 A CN 201610899911A CN 106529352 A CN106529352 A CN 106529352A
Authority
CN
China
Prior art keywords
input
key
computer client
data
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610899911.1A
Other languages
Chinese (zh)
Inventor
胡克荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihai Yishengyuan Farmers LLC
Original Assignee
Beihai Yishengyuan Farmers LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihai Yishengyuan Farmers LLC filed Critical Beihai Yishengyuan Farmers LLC
Priority to CN201610899911.1A priority Critical patent/CN106529352A/en
Publication of CN106529352A publication Critical patent/CN106529352A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A computer client information safe input method includes a computer client. The method includes the steps: (1) performing user selection on the computer client; (2) sequentially or disorderly arranging key values of a keyboard of the computer client; (3) allowing the user to input information; (4) allowing the user to send the information; (5) performing DES encryption; (6) performing network transmission; (7) allowing a computer server to receive the information; (8) performing DES decryption; and (9) allowing the computer server to verify the information. Information input of computer users is safer; the method can be applied to various industries, and is a very safe user information input method; and the invention provides a feasible solution scheme which has good promotion and use value.

Description

A kind of method to the input of computer client information security
Technical field
The present invention relates to computer client technical field, and in particular to a kind of that computer client information security is input into Method.
Background technology
With the development of science and technology, computer is all used widely in many fields, as current computer input is related to To the privacy information of user, the safety of user profile cannot be ensured in various complex environments;Lawless person can pass through Various ways steal the information of user during user input information and transmission information.Therefore, information encryption, especially one Plant the encipherment protection research to computer input information to have very important significance.
The content of the invention
The technical problem to be solved is to provide a kind of method to the input of computer client information security.
For realizing the purpose of the present invention, the technical solution adopted in the present invention is:
A kind of method to the input of computer client information security, including computer client, implementing step is: (1) in computer client, user selects;(2) the key value sequential placement of the keyboard of computer client or out of order cloth Office;(3) user input information;(4) user sends information;(5) des encryption;(6) network transmission;(7) computer server receives Information;(8) DES decryption;(9) computer server check information.
Further, described step (2) for keyboard key value position every time putting in order on keyboard be all with Machine or order, concrete methods of realizing is:An array is defined first, according to the display number of circuit board principle and charactron According to then the video data coding of definition 0 to 9 and A to Z re-defines two arrays, be respectively used to deposit keyboard value and charactron Code displaying;Then data above is carried out from new sort with random function rand () and srand ();It is random each time It is the subscript of first data;Producing for the first time is produced between 0-9, and the data and last position for so producing are carried out Exchange, the coding of the random data sequence correspondence charactron to producing, is exactly final video data;Finally according to being particularly shown That data go compare charactron coding, realize the display of data, at the same according to show data in keyboard value array pair The position answered arranges corresponding value.
Further, the des encryption generates composition by encryption, enciphering transformation and sub-key.
Further, the encryption concrete methods of realizing is:(1) initial conversion table IP is pressed to the plaintext of 64 first Enter line translation, the 58th for being for example input into is displaced to the 1st when output;Input is the 7th, the quilt in output Replace the 64th;(2) encryption of the output processed by above-mentioned transposition through 16 wheel enciphering transformations, 64 of initial transposition Output as input next time, be divided into left and right two 32 by 64, be designated as L0 and R0 respectively, from L0, R0 to L16, R16, carries out 16 wheel enciphering transformations altogether;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can do following fixed Justice:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carry out the transposition of IP-1, Obtain the ciphertext of 64.
Enciphering transformation is specially:The right half part of 32 is extended into conversion table expansion according to expansion table 3 by repeating some Open up as 48, and the key of 56 first shift then by select it is therein some reduce to 48, the right half part of 48 Combined by the key of xor operation and 48, and be divided into 8 of 6 and be grouped, this 48 are replaced into by 8 S boxes new 32 data, then replaced once.
Sub-key generates 64 keys of specially input, remove each byte by compression transposition PC-1 the 8th, uses Making even-odd check, key length being reduced to for 56, per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0 Shift left operation is circulated successively and generates C1 and D1, C1 and D1 is synthesized into 56, then export 48 by compressing transposition PC-2 Sub-key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain To 16 sub-keys.
Further, the S boxes are input into 6, export 4, and in a S box, with 4 kinds of substitution tables, (line number is with 0,1,2,3 Represent), by 6 two select rows of beginning and end being input into, then by selected substitution table by the centre of 6 be input into 4 are substituted.
The DES decryption is specially:Data transfer is decrypted further according to key key to after target machine, and DES decryption is calculated Method is identical with des encryption algorithm, key inverted order, finally obtains correct input information.
The key code of DES algorithm for encryption is:
A kind of method to the input of computer client information security that the present invention is provided, the present invention adopt keyboard order cloth Office or out of order layout, des encryption method and new design concept, realize that the information of computer user's information input is more pacified Entirely;Can be a kind of foolproof user profile input using industry in industry-by-industry;The invention provides a kind of reality can Capable solution, has good value for applications.
Specific embodiment
The following enforcement to the present invention is further described, so that those skilled in the art can be better understood from simultaneously Implement.
Embodiment 1
A kind of method to the input of computer client information security, implementing step is:(1) in computer client Upper user selects;(2) the key value sequential placement of the keyboard of computer client or out of order layout;(3) user input information; (4) user sends information;(5) des encryption;(6) network transmission;(7) computer server receives information;(8) DES decryption;(9) Computer server check information.
Step (2) for keyboard key value position every time putting in order on keyboard be all it is random or order 's:An array is defined first, according to circuit board principle and the video data of charactron, defines 0 to 9 and A to Z video data Coding, then re-defines two arrays, is respectively used to deposit the code displaying of keyboard value and charactron;Then use random function Rand () and srand () are carried out from new sort to data above;Due to chip itself resource and speed and product itself will The real-time of display is sought, in this sequencer procedure, is transformed to producing random number, random each time is the first number According to subscript;Producing for the first time is produced between 0-9, and the data and last position for so producing are swapped, so Often travel through, will not thus produce the chance of duplicate data, also ensure that speed.To produce with The coding of machine data sequence correspondence charactron, is exactly final video data;It is right to go finally according to that data being particularly shown According to the coding of charactron, the display of data is realized, while arranging right according to the data for showing in the corresponding position of keyboard value array The value answered, correctly to send in user input information.
By encryption, encryption becomes des encryption (DES (key1, encryption) DES (key2, decryption) DES (key1, encryption)) Change to generate with sub-key and constitute.Encryption concrete methods of realizing is:(1) first the plaintext of 64 is entered by initial conversion table IP Line translation, the 58th for being for example input into is displaced to the 1st when output;Input is the 7th, is set in output Change to the 64th;(2) encryption of the output processed by above-mentioned transposition through 16 wheel enciphering transformations, initial 64 s' for replacing Output is divided into left and right two 32 by 64, is designated as L0 and R0 respectively as input next time, from L0, R0 to L16, R16, 16 wheel enciphering transformations are carried out altogether;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can be defined as follows:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carry out the transposition of IP-1, Obtain the ciphertext of 64.
Enciphering transformation is specially:The right half part of 32 is extended into conversion table expansion according to expansion table 3 by repeating some Open up as 48, and the key of 56 first shift then by select it is therein some reduce to 48, the right half part of 48 Combined by the key of xor operation and 48, and be divided into 8 of 6 and be grouped, this 48 are replaced into by 8 S boxes new 32 data, then replaced once.S boxes are input into 6, export 4, in a S box with 4 kinds of substitution tables (line number is with 0,1, 2nd, 3 represent), by 6 of input two select rows of beginning and end, then by selected substitution table by 6 be input into Middle 4 are substituted.
Sub-key generates 64 keys of specially input, remove each byte by compression transposition PC-1 the 8th, uses Making even-odd check, key length being reduced to for 56, per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0 Shift left operation is circulated successively and generates C1 and D1, C1 and D1 is synthesized into 56, then export 48 by compressing transposition PC-2 Sub-key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain To 16 sub-keys.
DES decryption is specially:Data transfer is decrypted (DES (key1, solution further according to key key to after target machine It is close) DES (key2, encryption) DES (key1, decryption)), DES decipherment algorithms are identical with des encryption algorithm, key inverted order, most After obtain correct input information.
The key code of DES algorithm for encryption is:
The key code of encryption is:
SymmetricStreamDecryptor ssd=des.CreateDecryptor ();
Cms=new CryptoMemoryStream ();
ssd.SetSink(cms);
ssd.Write(encryptedData);
ssd.CloseStream();
Byte [] decryptedData=cms.Data;
Char [] decryptedCharArray=
utf8Encoding.GetChars(decryptedData);
Data after Console.WriteLine (" decryption:");
Console.Write(decryptedCharArray);
Console.WriteLine();}
}。

Claims (8)

1. it is a kind of to computer client information security input method, including computer client, it is characterised in that the method The step that implements be:(1) in computer client, user selects;(2) key value of the keyboard of computer client is suitable Sequence layout or out of order layout;(3) user input information;(4) user sends information;(5) des encryption;(6) network transmission;(7) Computer server receives information;(8) DES decryption;(9) computer server check information.
2. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute Putting in order on keyboard be all random or order every time to state the position of key value that step (2) is keyboard, specifically Implementation method is:An array is defined first, according to circuit board principle and the video data of charactron, defines 0 to 9 and A to Z Video data is encoded, and then re-defines two arrays, is respectively used to deposit the code displaying of keyboard value and charactron;Then with Machine function rand () and srand () are carried out from new sort to data above;Random each time is the subscript of first data; Producing for the first time is produced between 0-9, and the data and last position for so producing are swapped, to the random number for producing The coding of charactron is answered according to sequence pair, is exactly final video data;Go to compare number finally according to that data being particularly shown The coding of code pipe, realizes the display of data, while arranging corresponding according to the data for showing in the corresponding position of keyboard value array Value.
3. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute State des encryption and composition is generated by encryption, enciphering transformation and sub-key.
4. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute Stating encryption concrete methods of realizing is:(1) line translation is entered by initial conversion table IP to the plaintext of 64 first, for example, is input into 58th, the 1st is displaced to when output;Input is the 7th, is displaced to the 64th in output;
(2) encryption of the output processed to above-mentioned transposition through 16 wheel enciphering transformations, the output of initial 64 for replacing are made For input next time, it is divided into left and right two 32 by 64, is designated as L0 and R0 respectively, from L0, R0 to L16, R16, carries out altogether 16 wheel enciphering transformations;Wherein, point after the process of n wheels or so 32 is respectively Ln and Rn, can be defined as follows:
Ln=Rn-1
Rn=Ln-1
Wherein, kn is the sub-key of 48 to the n-th wheel input, and Ln-1 and Rn-1 is the output of the (n-1)th wheel respectively, and f is Mangler functions;
(3) after carrying out the enciphering transformation of 16 wheels, L16 and R16 are synthesized into the data of 64, then carries out the transposition of IP-1, obtained The ciphertext of 64.
5. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute State enciphering transformation to be specially:The right half part of 32 is extended into conversion table according to expansion table 3 expand to 48 by repeating some Position, and the key of 56 is first shifted then by select it is therein some reduce to 48, the right half part of 48 is by different Or operate the key with 48 to combine, and it is divided into 8 packets of 6,32 new digits are replaced into by 8 S boxes by this 48 According to, then replaced once.
6. according to a kind of method to the input of computer client information security described in claim 3, it is characterised in that institute 64 keys that sub-key generates specially input are stated, removes the 8th of each byte by compression transposition PC-1, as odd even Verification, reduces to key length for 56, and per layer is divided into two parts, and upper part 28 is C0, and bottom is divided into D0, C0 and D0 and enters successively The operation of row ring shift left generates C1 and D1, and C1 and D1 is synthesized 56, then by compressing the sub close of transposition PC-2 outputs 48 Key K1, then C1 and D1 are circulated move to left and PC-2 compression transposition, obtain sub-key K2...... by that analogy, obtain 16 Sub-key.
7. according to a kind of method to the input of computer client information security described in claim 5, it is characterised in that institute State S boxes and be input into 6, export 4, there are in a S box 4 kinds of substitution tables (line number is represented with 0,1,2,3), by 6 be input into Two select rows of beginning and end, then the centre 4 of 6 being input into is substituted by selected substitution table.
8. according to a kind of method to the input of computer client information security described in claim 1, it is characterised in that institute State DES decryption to be specially:Data transfer is decrypted further according to key key to after target machine, and DES decipherment algorithms and DES add Close algorithm is identical, key inverted order, finally obtains correct input information.
CN201610899911.1A 2016-10-15 2016-10-15 Computer client information safe input method Withdrawn CN106529352A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610899911.1A CN106529352A (en) 2016-10-15 2016-10-15 Computer client information safe input method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610899911.1A CN106529352A (en) 2016-10-15 2016-10-15 Computer client information safe input method

Publications (1)

Publication Number Publication Date
CN106529352A true CN106529352A (en) 2017-03-22

Family

ID=58332444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610899911.1A Withdrawn CN106529352A (en) 2016-10-15 2016-10-15 Computer client information safe input method

Country Status (1)

Country Link
CN (1) CN106529352A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848073A (en) * 2018-05-31 2018-11-20 唐山智能电子有限公司 The data of real-time data acquisition system are carried out with the method and system of encrypting and decrypting

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662483A (en) * 2012-02-28 2012-09-12 浪潮电子信息产业股份有限公司 A method for cloud computing business intelligent terminal users to safely input information
CN103996011A (en) * 2014-06-05 2014-08-20 福建天晴数码有限公司 Method and device for protecting codes to be input safely
CN105930714A (en) * 2016-04-20 2016-09-07 上海瀚银信息技术有限公司 Password input method and system as well as intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662483A (en) * 2012-02-28 2012-09-12 浪潮电子信息产业股份有限公司 A method for cloud computing business intelligent terminal users to safely input information
CN103996011A (en) * 2014-06-05 2014-08-20 福建天晴数码有限公司 Method and device for protecting codes to be input safely
CN105930714A (en) * 2016-04-20 2016-09-07 上海瀚银信息技术有限公司 Password input method and system as well as intelligent terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
龙夏等: "基于3DES加密的ATM乱序密码键盘的设计", 《电脑知识与技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848073A (en) * 2018-05-31 2018-11-20 唐山智能电子有限公司 The data of real-time data acquisition system are carried out with the method and system of encrypting and decrypting
CN108848073B (en) * 2018-05-31 2021-04-13 唐山智能电子有限公司 Method and system for encrypting and decrypting data of real-time data acquisition system

Similar Documents

Publication Publication Date Title
CN105046636B (en) Digital image encryption method based on chaotic system and nucleotide sequence database
CN106411518B (en) A kind of unfixed symmetrical whitepack encryption method of key and device
CN1993922B (en) Stream cipher combining system and method
CN106952213B (en) New chaotic image encryption method based on bit permutation Yu dynamic DNA encoding
CN107070630B (en) A kind of fast and safely hardware configuration of aes algorithm
CN106663387A (en) Encryption/decryption function generating method, an encryption/decryption method and related apparatuses
CN101383703B (en) Dynamic ciphering method based on broad sense information field
CN101394268B (en) Advanced ciphering system and method based on broad sense information field
CN101814985B (en) Block cipher system using multi-chaotic mapping multi-dynamic S-box
CN108123791A (en) A kind of implementation method and device of lightweight block cipher SCS
Gautam et al. An enhanced Cipher technique using Vigenere and modified Caesar cipher
CN107147487A (en) The random block cipher of symmetric key
CN109768854A (en) A kind of implementation method of lightweight block cipher Wheel
CN106656470A (en) Data encryption method based on improved AES (Advanced Encryption Standard) algorithm
CN107578363B (en) Digital image encryption and decryption method based on multiple chaotic chain algorithms and bit planes
US20030210783A1 (en) Method and system of encryption
CN109344627B (en) Novel Shannon perfect secrecy method
CN107078900A (en) Cryptographic system based on reproducible random sequences
CN106529352A (en) Computer client information safe input method
CN109714154A (en) Whitepack cryptographic algorithm under code cubage difficulty whitepack security model
Kumar et al. Image encryption using simplified data encryption standard (S-DES)
CN107835070B (en) Simple embedded encryption method
CN107493164B (en) DES encryption method and system based on chaotic system
CN106921486A (en) The method and apparatus of data encryption
CN116055650A (en) DES-based urine test paper image encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170322

WW01 Invention patent application withdrawn after publication