Character compression encrypting method

An encryption method and character technology, applied in the field of information security protection, can solve the problems of difficulty in lossless restoration of ciphertext, garbled or wrong information, lossy restoration of ciphertext, etc. Effect

Inactive Publication Date: 2012-10-31
CHONGQING COLLEGE OF ELECTRONICS ENG
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Chinese character strings or Chinese document content that need to be protected in practical problems generally contain Western letters or symbols, and there may also be half-width punctuation marks. This is a technical difficulty in researching double-byte text encryption algorithms. ASCII code character sets are used to realize Chinese characters It is difficult to realize the lossless restoration of ciphertext due to the digitization of ciphertext. When

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Character compression encrypting method
  • Character compression encrypting method
  • Character compression encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment one: if figure 1 Shown, a kind of character compression encryption method comprises the following steps:

[0036] Step 1, convert the character to be encrypted into the location code corresponding to the unicode UTF-16 character set;

[0037] Step 2. Convert each area code and bit code obtained in step 1 into a 7-digit binary number. When the area code or bit code is converted into a binary number with less than 7 digits, add "0" before the high bit until the The binary numbers converted from the above area codes or bit codes are all 7 digits;

[0038] Step 3, merging and arranging the binary numbers of each location code sequentially according to the character order;

[0039] Step 4, judge whether the number of binary codes in the binary number string after merging is an integral multiple of 16; Add "0" to the end of the binary code, until the binary code in the combined binary string is a multiple of 16;

[0040] Step 5, sequentially intercept 16-bit bi...

Embodiment 2

[0046] Embodiment two: if figure 2 As shown, the flow process of this embodiment is basically the same as that of Embodiment 1, the difference is: it also includes the step of quickly calculating the number of missing zeros; The sum of the numbers is an integer multiple of 16;

[0047] A1. Calculate T=16-(2×7×N) mod16, T is the number of missing zeros, N is the number of characters, T≥0, N is a positive integer;

[0048] A2. Add T "0"s at the end of the binary code in the combined binary number string.

Embodiment 3

[0049] Embodiment three: as image 3 As shown, the flow process of this embodiment is basically the same as that of Embodiment 2, the difference is: after the character to be encrypted is converted into the location code corresponding to the unicode UTF-16 character set, it also includes the location code of the character using the elliptic curve cryptography mechanism The step of encrypting, correspondingly, also includes the step of decrypting the character location code encrypted by the elliptic curve cryptographic mechanism.

[0050] First construct the Weierstrass equation Y 2 =X 3 +aX+b(modP), where P is a prime number, a and b are non-negative integers less than P, 4a 3 +27b 2 ≠0, define the elliptic curve E on the rational number field P (a,b), on the elliptic curve E P Take a point G with prime number order n on (a, b), choose a private key k in the interval [1, n-1] to calculate the public key Q, Q=k×G, k is a positive integer , where G, P, and Q are all public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a character compression encrypting method, belonging to the field of information security protection. The character compression encrypting method comprises the following steps: converting characters into region-position codes corresponding to a Unicode character set, and converting the region-position codes into binary codes; then carrying out zero filling operation on the binary codes; and finally converting the binary codes into new characters, and simultaneously carrying out elliptical encryption on information to be encrypted firstly. The method adopted by the invention is simple to realize, is capable of carrying out the safety encryption on Chinese characters, letters, figures, and the like simultaneously, and is easy to implement; the character compression encrypting method has better anti-attack performance than other existing Chinese character encryption algorithms, and the information volume after encryption is smaller; therefore, the lossless restitution of ciphertext can be realized.

Description

technical field [0001] The invention belongs to the field of information security protection, in particular to a Hanzi compression and encryption method. Background technique [0002] With the development of information technology, the requirement for confidentiality of information transmission is increasing day by day. Whether it is database security storage, information communication, e-commerce activities, it is urgent to ensure information security. Network security and information security have become the bottleneck of the development of information technology. The issue of information security has been promoted to the core position of relational informatization construction and development. Research on encryption algorithms makes it difficult for people to find decryption methods for encrypted information, and realizes trusted exchange of untrusted public channels or secure storage of shared data information. . [0003] ECC (Elliptic Curve Cryptosystems, Elliptic Cur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 王俊峰王姗
Owner CHONGQING COLLEGE OF ELECTRONICS ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products