Home > Software engineering > Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure
Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure
Time:09-18
Hello great god, and I want to have uploaded to the cloud disk after form data encryption, to ensure data security, Do a trouble. XLSM file, a small I, please the code and detailed comments, thank you very much, grateful! The idea is: A, encryption 1, convert numerical to ASCLL code assigned to the array I 2, the manual input password into my ASCLL array code assigned to a 3, after do the arrays I and a matrix operations assigned to the array x 4, the array x into text
Second, decryption
Inverse
The data column contains the content: Id name phone number bank card password home address
Ps: numerical contains letters, symbols and Chinese characters, after the split transcoding
This method can ensure the security of data leakage after?
CodePudding user response:
As long as enough security encryption algorithm, key high complexity, certainly can ensure safety,
Want to use the Excel document to store the encrypted data, You must use the reversible encryption algorithm to encrypt plaintext, and then write back to the corresponding ciphertext into BASE64 encoding cell, "Decryption operation" nature is corresponding "inverse", Encryption to decrypt mainly use the DES algorithm, or AES algorithm, and, of course, also can choose other,
You put "XLSM document", is want to encryption, decryption code are written in the document? This in fact is not so good! Even if you "password protected VBA project", also has the method is easy to get across the "barrier"; Code one exposure, increased the likelihood of your cipher is cracking, degree of safety is reduced,
To insurance, we must put the encryption and decryption procedures, and documentation of the information stored in the separation, Like this: with your "special software," open "plaintext document" encrypt, output encrypted document; Or open the cipher text document, decryption, check the original As long as your "encryption and decryption software" does not leak, to cloud plate "encryption document" is basic don't have to worry about,
Ideas and methods have said to you, the code or write yourself, The "compulsory", I don't want to do a complete project code, can consider paying,
CodePudding user response:
The original poster can see here: http://blog.sina.com.cn/s/blog_1551057520102wtey.html
Content in this blog, is the program I used to write someone the encrypted information, Each line is a message containing login port number, server IP address: port number and other information, and there is "check code", If you "random input ciphertext" (even if it is a list of perfectly legal BASE64 encoding text), After "decryption" can't "check code validation, so also is" invalid "data, This blog, there are about 500,