Home > Software engineering >  Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure
Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure

Time:09-18

Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure data security,
Do a trouble. XLSM file, a small I, please the code and detailed comments, thank you very much, grateful!
The idea is:
A, encryption
1, convert numerical to ASCLL code assigned to the array I
2, the manual input password into my ASCLL array code assigned to a
3, after do the arrays I and a matrix operations assigned to the array x
4, the array x into text

Second, decryption

Inverse

The data column contains the content:
Id name phone number bank card password home address


Ps: numerical contains letters, symbols and Chinese characters, after the split transcoding

This method can ensure the security of data leakage after?

CodePudding user response:

As long as enough security encryption algorithm, key high complexity, certainly can ensure safety,

Want to use the Excel document to store the encrypted data,
You must use the reversible encryption algorithm to encrypt plaintext, and then write back to the corresponding ciphertext into BASE64 encoding cell,
"Decryption operation" nature is corresponding "inverse",
Encryption to decrypt mainly use the DES algorithm, or AES algorithm, and, of course, also can choose other,

You put "XLSM document", is want to encryption, decryption code are written in the document?
This in fact is not so good!
Even if you "password protected VBA project", also has the method is easy to get across the "barrier";
Code one exposure, increased the likelihood of your cipher is cracking, degree of safety is reduced,

To insurance, we must put the encryption and decryption procedures, and documentation of the information stored in the separation,
Like this: with your "special software," open "plaintext document" encrypt, output encrypted document; Or open the cipher text document, decryption, check the original
As long as your "encryption and decryption software" does not leak, to cloud plate "encryption document" is basic don't have to worry about,

Ideas and methods have said to you, the code or write yourself,
The "compulsory", I don't want to do a complete project code, can consider paying,

CodePudding user response:

The original poster can see here:
http://blog.sina.com.cn/s/blog_1551057520102wtey.html

Content in this blog, is the program I used to write someone the encrypted information,
Each line is a message containing login port number, server IP address: port number and other information, and there is "check code",
If you "random input ciphertext" (even if it is a list of perfectly legal BASE64 encoding text),
After "decryption" can't "check code validation, so also is" invalid "data,
This blog, there are about 500,

CodePudding user response:

refer to the second floor Chen8013 response:
the original poster can see here:
http://blog.sina.com.cn/s/blog_1551057520102wtey.html

Content in this blog, is the program I used to write someone the encrypted information,
Each line is a message containing login port number, server IP address: port number and other information, and there is "check code",
If you "random input ciphertext" (even if it is a list of perfectly legal BASE64 encoding text),
After "decryption" can't "check code validation, so also is" invalid "data,
This blog, there are about 500,

You could change this program made by learning how to learn?

CodePudding user response:

reference u014749730 reply: 3/f
Quote: refer to the second floor Chen8013 response:

The original poster can see here:
http://blog.sina.com.cn/s/blog_1551057520102wtey.html

Content in this blog, is the program I used to write someone the encrypted information,
Each line is a message containing login port number, server IP address: port number and other information, and there is "check code",
If you "random input ciphertext" (even if it is a list of perfectly legal BASE64 encoding text),
After "decryption" can't "check code validation, so also is" invalid "data,
This blog, there are about 500,

You could change this program made by learning how to learn?

Ah, well... You how to "learn"!
If say "send a exe program," are you sure you "learn" what is not;
If sent to the code, it is "much more do you want to"...

Put it this way:
Those "BASE64 encoding text", every line of the "decrypt" (that is, "turn BASE64 binary sequence"), it includes the "key (pseudo)" and the ciphertext,
, of course, the "key" to be sure it is not the real key, but to this group of data through a specific algorithm, to get "the real key";
Just encryption and decryption, are in this group of "pseudo key" as the basis, with "is" the real key,
Here "pseudo key is encrypted, randomly generated a few bytes of data; So each cipher key is different!
Because the key is "random", so what is the "key" real each ciphertext, is "don't know" (only according to my specific algorithm calculated),
But, do you think can "be" the decryption key with respect to OK? Ha ha, pattern...
As I said on the second floor: the content of the IP address and port number, plus "pseudo key", haven't a few bytes of data, after the "encryption" is also not a few bytes;
Plus "pseudo key data", so also didn't how much data,
But you can see the "record" blog some long, some short; BASE64 decrypted is 54 bytes long, short is 30 bytes,
Because I actually to make the "IP address (4 bytes)" embedded in a string of random data (random location, "random" interference effect),
So, in "ciphertext" after decryption, so look is a string of "messy" bytes of data,
, so to speak, even if the "plaintext" to see you, you also don't know how to extract the "valid data",

, of course, I am here say so many, ace can certainly assume from post to me what is the "core encryption algorithm", how many bytes, pseudo key is
Although the information of data, is almost "have no any value for anyone" (except to attack his server), but I would not give details,
If I have said "algorithm details", then "anyone can decrypt",
As long as the "details" not to be, say, in addition to me, no one can decrypt!
(because of the encryption algorithm, BASE64 encoding, are standard, open; From "pseudo key" calculate the real key, and the method of "data confusion" is the "secret")

CodePudding user response:

reference 4 floor Chen8013 response:
Quote: reference u014749730 reply: 3/f

Quote: refer to the second floor Chen8013 response:

The original poster can see here:
http://blog.sina.com.cn/s/blog_1551057520102wtey.html

Content in this blog, is the program I used to write someone the encrypted information,
Each line is a message containing login port number, server IP address: port number and other information, and there is "check code",
If you "random input ciphertext" (even if it is a list of perfectly legal BASE64 encoding text),
After "decryption" can't "check code validation, so also is" invalid "data,
This blog, there are about 500,

You could change this program made by learning how to learn?

Ah, well... You how to "learn"!
If say "send a exe program," are you sure you "learn" what is not;
If sent to the code, it is "much more do you want to"...

Put it this way:
Those "BASE64 encoding text", every line of the "decrypt" (that is, "turn BASE64 binary sequence"), it includes the "key (pseudo)" and the ciphertext,
, of course, the "key" to be sure it is not the real key, but to this group of data through a specific algorithm, to get "the real key";
Just encryption and decryption, are in this group of "pseudo key" as the basis, with "is" the real key,
Here "pseudo key is encrypted, randomly generated a few bytes of data; So each cipher key is different!
Because the key is "random", so what is the "key" real each ciphertext, is "don't know" (only according to my specific algorithm calculated),
But, do you think can "be" the decryption key with respect to OK? Ha ha, pattern...
As I said on the second floor: the content of the IP address and port number, plus "pseudo key", haven't a few bytes of data, after the "encryption" is also not a few bytes;
Plus "pseudo key data", so also didn't how much data,
But you can see the "record" blog some long, some short; nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull
  •  Tags:  
  • VBA