Unlock instant, AI-driven research and patent intelligence for your innovation.

A Compass Encryption and Decryption Method Based on SCM

A technology of encryption and decryption and single-chip microcomputer, which is applied in the field of new algorithms for letter encryption and decryption, and can solve problems such as insecurity and easy cracking

Inactive Publication Date: 2016-03-23
XIJING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The same letter symbol is represented by the same character in the same encrypted document, which is not safe and can be easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Compass Encryption and Decryption Method Based on SCM
  • A Compass Encryption and Decryption Method Based on SCM
  • A Compass Encryption and Decryption Method Based on SCM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The encryption and decryption algorithm of the present invention is realized based on 51 single-chip microcomputers, and the core of the algorithm is to adopt a dynamic encryption method; the algorithm is mainly introduced here, and the size of the array in this program is 26+4.

[0025] Such as figure 1 As shown, the encryption algorithm of the present invention uses a key determined by two kinds of keys, the public key and the private key, to carry out the encryption operation. The public key is the character sequence obtained after initializing the array during encryption and decryption. The array has the following characteristics: 1. It consists of 26 letters. 2. The order of the 26 letters is determined by the user. 3. Each array is independent of each other. The private key is 3 letters, the number of private key digits is determined by the number of arrays, and each character can be the same or different. After the array initialization is completed, each time a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a compass encryption and decryption method based on a single chip microcomputer. The method can be utilized in the encryption of English plaintext and the plaintext encryption of Chinese pinyin, and the encryption ideas of the above two encryption are consistent. If a number appears in a weight of a ciphertext, the transmission of secret information indicated by a letter and a numerical symbol can be realized too. In the condition of special application, ciphertext symbols can be customized, thus another text symbol can be used to realize the many-to-one dynamic encryption of plaintext. One advantage of the algorithm is that in the decryption process, not only must a public key and a private key which are utilized in encryption be utilized, but all ciphertext should be known, and only in the condition that the three conditions are known can the decryption work be correctly carried out combined with an encryption algorithm.

Description

technical field [0001] The invention relates to a novel algorithm for encrypting and decrypting letters, in particular to a method for encrypting and decrypting self-defined characters such as letters and numbers. Background technique [0002] At present, the encryption device used in our leather bag is composed of three 10-digit digital compasses. The one-digit number on each compass can constitute one digit in the password, but the overall capacity is not large, only 1000 types. For example, we can enumerate passwords within a certain period of time. The same letter symbol is represented by the same character in the same encrypted document, which is not safe and can be easily cracked. Contents of the invention [0003] The purpose of the present invention is to provide a compass-type encryption and decryption method based on a single-chip microcomputer. The core idea of ​​this algorithm is to use dynamic encryption, which greatly improves the security of plaintext encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28H04L9/32E05B37/20E05B65/52
Inventor 蔡红专刘强
Owner XIJING UNIV