52ky 发表于 2021-8-8 10:22:37

不可破解文件加密一例

实现不可破解文件加密可能方法很多,这里是基于一次一密加密的基本思路和密钥处理方法。下面是软件的【概述及使用说明】
  如果正确使用本软件可使其加密的文件无法破解。达到安全加密的效果。加密不可破解是从业者一直努力的方向,上世纪初曾经也出现过这样的应用,现在是计算机高速发展的时代,实现安全加密更容易了,实践证明用少量密钥(用户密码)去加密大量数据是不安全的,要想安全加密至少要为每一个被加密的信息配置一个密钥,这样使得密钥和原文件一样大,造成了密钥保存和分发的困难,该付出的成本必须付出,这里的解决办法是让密钥形成文件,使其安全的和原文件的密文放在一起,做到这一点就是对密钥文件或密文再次进行加密,注意现在密文和密钥文件都是乱码数据,对其加密方法得当是不可破解的,因为你不知道乱码文件的任何信息你是无法解密的,没有任何评判标准。这样的结果,实现安全加密的代价,1)占用空间大了一倍,2)操作复杂一些。这对于计算机速度越来越快,存储空间越来越便宜的现代应该是没有问题的。
  这儿有两个加密程序,每个程序都可独立运行,它们的界面上都有各自的使用说明,都能完成对文件的加密,用户需要熟练的应用它们。这两个程序作用不相同,程序 1是以一字一密方式加密文件的,加密后除了生成密文另外还生成一个密钥文件。程序 2是用来给乱码文件加密的,程序2是采用随机置换的加密方式,对乱码数据的加密,即高效又快捷,你需要输入密码,具体用法看各程序在界面上的说明,加密都完成后,密文和乱码文件的密文,可以随便放到什么地方,任何人对这两个文件的攻击都将失败。解密时首先要解密程序2加密的文件,然后再利用密钥文件来解密密文。
  程序1加密的文件为什么不能破解,道理很简单,程序1为每个原文件的字节生成一个字节的未知数,用这个未知数去加密源文件字节,从而生成一个密文字节,也就是
          明密文字节 + 密钥字节 = 密文字节
如此可见一个方程两个未知数,是无解的。要解必须要有密钥字节。
  我们看到,密文和密钥文件的密文都是乱码,如果不加密密钥文件你需要用安全的地方来保存密钥文件,但是如果有安全的地方保存文件你为何不直接保存原文件算了,何必多此一举,而加密后你只要记住密码就可以了。加密后的密钥文件是否安全?如果文件是乱码加密得当是无法破解的,如果用winrar和其它能报告你密码错误的加密软件是不安全的,本质上那类软件是出卖自己的。我们需要不检测结果正误的加密软件,这样才能做到不为窃密者提供信息,才能确保信息安全。破解者因为不知道任何评判标准而无法实施解密。
  这里有三种选择,1)用程序2 加密密钥文件。2)
用程序2 加密密文。3)用程序2 加密密钥文件和密文。都是可以的,但用户必须自己清楚,解密时需按原路返回差一点都不行的。
【使用者须知】
  基本功——首先找一些文件,用程序1和程序2分别进行加密解密试验,从单文件开始,到同时处理几个文件,练习到准确无误。
  然后就可以练习下面的内容了:
  练习一加密部分
  用程序1加密文件A,得到A密文和A密钥文件(密钥文件的特征是扩展名最后是my),然后用程序2加密A的密钥文件,加密结束。注意对文件加密时,文件的名称并未改变,操作者自己要记清楚。
  练习一解密部分
  
操作顺序一定要清楚,最后加密的要最先解密,首先用程序2解密被加密的密钥文件,然后用程序1解密密文。
  上述练习一是三种加密方式的第一种,读者可以尝试另外两种方式。
  程序1是必不可少的,因为这有此种方法理论上是不可破解的这是其它软件做不到的,你可以不用程序2来加密密钥文件,而用随便一种性能不错,又不检测解密正误的程序来加密密钥文件等,同样可以安全加密。
如何挑选第三方软件
  1)如果用此软件加密一个10M以上的单字符大文件,形成的密文能通过NIST检测,说明此软件性能不错。
  2)解密时,如果密码输入错误,不报告错误。这个一试便知。

(There are many possible ways to realize unbreakable file encryption. Here is the basic idea and key processing method based on one-time encryption. The following is the software's
  If the software is used correctly, the encrypted files can not be cracked. Achieve the effect of security encryption. Encryption is unbreakable is the direction that practitioners have been striving for. There were such applications at the beginning of the last century. Now is the era of rapid computer development. It is easier to implement secure encryption. Practice has proved that a small number of keys (user passwords) are used to encrypt a large number of Data is insecure. If you want to encrypt securely, you must configure at least a key for each encrypted information, so that the key is as big as the original file, causing difficulties in key storage and distribution, and the cost must be paid. , The solution here is to make the key form a file to make it securely put together with the ciphertext of the original file. To do this is to encrypt the key file or ciphertext again, pay attention to the current ciphertext and key file It is garbled data, and its encryption method is unbreakable, because you don’t know any information of garbled files, you can’t decrypt it, and there is no judgment standard. As a result, the cost of achieving secure encryption is 1) double the space occupied, and 2) the operation is more complicated. This should be no problem for modern computers where the speed of computers is getting faster and the storage space is getting cheaper.
   There are two encryption programs here, each of which can be run independently, and their interfaces have their own instructions for use, which can complete the encryption of files, and users need to be proficient in applying them. The functions of these two programs are not the same. Program 1 encrypts the file in a word-by-word manner. After encryption, it also generates a key file in addition to the ciphertext. Program 2 is used to encrypt garbled files. Program 2 uses random replacement encryption to encrypt garbled data. It is efficient and fast. You need to enter a password. For specific usage, see the instructions on the interface of each program. Encryption is all After completion, the ciphertext and the ciphertext of the garbled file can be placed anywhere, and anyone's attack on these two files will fail. When decrypting, first decrypt the file encrypted by program 2, and then use the key file to decrypt the cipher text.
  Why can't the file encrypted by program 1 be cracked? The reason is very simple. Program 1 generates a byte unknown number for each byte of the original file, and uses this unknown number to encrypt the source file bytes to generate a ciphertext byte, which is
           plain ciphertext byte + key byte = ciphertext byte
It can be seen that there is no solution for two unknowns in an equation. The key byte is required to solve.
We see that the ciphertext and the ciphertext of the key file are garbled. If you don’t encrypt the key file, you need to save the key file in a safe place, but if there is a safe place to save the file, why don’t you save the original file directly? Forget it, why bother, and after encryption, you just need to remember the password. Is the encrypted key file safe? If the file is garbled and encrypted properly, it cannot be cracked. If you use winrar and other encryption software that can report your password error, it is insecure. In essence, that kind of software is sold out. We need encryption software that does not detect the correctness of the result, so that we can not provide information to the thief and ensure information security. The cracker was unable to decrypt because he did not know any criteria.
   There are three options here, 1) Use program 2 to encrypt the key file. 2)
Use Procedure 2 to encrypt the cipher text. 3) Use program 2 to encrypt the key file and cipher text. All are possible, but the user must be aware that it is almost impossible to return the original way when decrypting.
【User Notice】
  Basic skills-first find some files, use program 1 and program 2 to perform encryption and decryption experiments respectively, starting from a single file, to processing several files at the same time, practice to be accurate.
   Then you can practice the following:
   Practice one encryption part
   Use program 1 to encrypt file A, get A ciphertext and A key file (the feature of the key file is that the extension is my at the end), then use program 2 to encrypt the key file of A, and the encryption ends. Note that when the file is encrypted, the name of the file has not changed, and the operator must remember it clearly.
   Practice one decryption part
  
The order of operation must be clear. The last encrypted one must be decrypted first. First, use Program 2 to decrypt the encrypted key file, and then use Program 1 to decrypt the ciphertext.
   The above exercise one is the first of the three encryption methods. Readers can try the other two methods.
Program 1 is indispensable, because this method is theoretically unbreakable, which other software can’t do. You can use program 2 to encrypt the key file, and use any one with good performance. The program that detects the correctness of decryption to encrypt key files, etc., can also be safely encrypted.
How to choose third-party software
   1) If you use this software to encrypt a large single-character file of more than 10M, the resulting cipher text can pass the NIST test, indicating that this software performs well.
   2) During decryption, if the password is entered incorrectly, no error will be reported. This one will tell.)

页: [1]
查看完整版本: 不可破解文件加密一例