Unlock instant, AI-driven research and patent intelligence for your innovation.

Information encrypting method

A technology of information encryption and encrypted ciphertext, which is applied to key distribution, can solve the problems of high time cost, unfavorable communication encryption of large data volume, and increased economic cost

Active Publication Date: 2013-01-30
SHENZHEN GENVICT TECH
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Commonly used symmetric key encryption methods include standard public algorithms such as DES and AES, but these public algorithms have a very large amount of calculation, and the time cost of encryption and decryption is very high, which is not conducive to the encryption of large data communication
In order to increase the calculation speed, various hardware-based DES encryption chips have appeared, so that the system increases the economic cost of the system while improving the encryption operation speed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encrypting method
  • Information encrypting method
  • Information encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The data encryption method according to Embodiment 1 of the present invention is described below. The character map has a length of 256.

[0040] First, randomly generate a character mapping table, the character mapping table has 256 pages, and the content of each page is all 256 ASCII characters (that is, all 256 ASCII characters appear only once in each page of the character mapping table), recorded as Dict1[ 256][256].

[0041] In more detail, each page of the character mapping table can be generated in the following manner: (1) the initial content of the array P[256] is set (for example, the initial content of the array P[256] can be the content of the standard ASCII character table ); (2) Randomly take two random numbers R1 and R2, (0≤R1≤255, 0≤R2≤255); exchange P[R1] with P[R2]; (3) Repeat operation (2) , loop N times (for example, N≥128).

[0042] The contents of the character map thus generated are random. The generated character mapping table can be copied ...

Embodiment 2

[0048] In the encryption method according to Embodiment 1 of the present invention, each character of the information is encoded into 2 bytes, which doubles the length of the encrypted information. The data encryption method according to Embodiment 2 of the present invention has been improved as follows :

[0049] The character mapping table has only 1 page, and the content is all 256 ASCII characters, and each ASCII code character only appears once in the character mapping table, and the character mapping table is marked as Dict2[256], and a page of character mapping table is generated according to embodiment 1 The content method to generate random 1-page character map content. Since the content of one page of the character map is relatively small, the character map can be compiled as a source program into the communication program to complete the distribution of the character map.

[0050] Communication node A encodes information M before sending information M, and the enco...

Embodiment 3

[0055] image 3 and Figure 4 The encryption flow and the decryption flow of the data encryption method according to Embodiment 3 of the present invention are respectively shown.

[0056] In the encryption method according to Embodiment 2 of the present invention, although the information code does not become longer, it is necessary to look up the position of the character m in the decrypted character mapping table during decoding, and the decoding speed is not fast enough. According to the data encryption method of Embodiment 3 of the present invention The method has been improved as follows.

[0057] The content and generation method of the character mapping table are consistent with the embodiment 2, and the distribution method of the character mapping table is also consistent with the embodiment 2, and the character mapping table is marked as Dict3_enc[256].

[0058] Before the communication node A sends the information M, it encodes the information M. The encoding proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information encrypting method. The method includes the steps of randomly constructing a character map containing a plurality of pages; for every character m in information to be transmitted, randomly selecting a random number r which is not smaller than zero and not larger than the number of the character map pages, looking up the position of the character m in the character map on the rth page, and taking the random number r and the obtained position information as an encryption ciphertext for the character m; and taking encryption ciphertexts of all characters in the information as the encryption ciphertext for the information, wherein each character map page includes all ASCII (American standard code for information interchange) characters, and each ASCII character appears at least one time on every character map page. A powerful key is matched with a simple algorithm in the method, and the problem that the information during transmission is illegally intercepted and restored is mainly solved.

Description

technical field [0001] The invention relates to the technical field of data encryption, and more specifically, the invention relates to an information encryption method using a character mapping table, which belongs to the encryption method of a symmetric key. Background technique [0002] Data encryption methods are generally divided into two types: symmetric key encryption method and asymmetric key (public key) encryption method. As the amount of modern communication information continues to increase, people's awareness and requirements for data security are getting higher and higher. In order to ensure that the communication content will not be leaked during the transmission process, there are many data encryption transmission methods available. Since the known asymmetric key methods (such as RSA, ECC, etc.) are too computationally intensive, they are not suitable for use in communication of large amounts of data. Relatively speaking, symmetric key encryption methods are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 王政吴恒志林树亮
Owner SHENZHEN GENVICT TECH