Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method for numeric type data

An encryption method and numerical technology, applied in the field of information security, can solve problems such as hidden safety hazards in backup information

Active Publication Date: 2014-01-22
南通九盛软件有限公司
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] ②Experienced online hackers will "detour" and directly use operating system tools to steal the information content of the database;
[0006] ③Databases that store information in plain text have security risks in their backup information, and all of them have become targets of attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for numeric type data
  • Encryption and decryption method for numeric type data
  • Encryption and decryption method for numeric type data

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0062] According to the encryption and decryption steps of the above numerical data, when the initial value Z in the encryption key 10 ,Z 20 , S 0 and the initial value in the decryption key When consistent, take Z 10 = Z ~ 10 = 0.123 , Z 20 = Z ~ 20 = 0.234 , S 0 = S ~ 0 = 80 , Combined with specific numerical data (such as: -3.1415926, 65536, 1.61803399 and 5.1847e+21) for encryption and decryption, the results are shown in Table 4. It can be seen from the following table: the ciphertext string is disorderly, without any trace of the ...

specific Embodiment 2

[0065] According to the above-mentioned encryption steps of numerical data, the encryption key is similar to the specific embodiment 1. When a certain encryption key changes slightly: Z 10 = 0.123000000000001; or Z 20 = 0.234000000000001; or S 0 =81; or slight changes occur in the numerical data to be encrypted, the encryption result of the numerical data is shown in Table 5. It can be seen from the table below: Once the encryption key changes even slightly, that is, "missing by a tiny bit", the ciphertext string will be "by a thousand miles", so it can be seen that a numerical data encryption method proposed in this patent is key-sensitive. The encryption key is not only related to the initial value of the key, but also associated with the original data to be encrypted, which can better resist known / chosen plaintext attacks.

[0066] Table 5 Encryption and decryption results of numerical data when the encryption and decryption keys are inconsistent

[0067]

specific Embodiment 3

[0068] According to the encryption and decryption steps of the above numerical data, the initial values ​​in the encryption and decryption keys and the numerical data to be encrypted are similar to the specific embodiment 1, except that the decryption key changes slightly: or or Or the ciphertext string to be decrypted changes slightly, and the decryption result of the numerical data is shown in Table 6. It can be seen from the following table: once the encryption key and the decryption key are inconsistent, even if there is a slight difference, the recovered numerical data is useless information. It can be seen that a numerical data encryption and decryption method proposed in this patent is safe and doable.

[0069] Table 6 Encryption and decryption results of numerical data when the encryption and decryption keys are inconsistent

[0070]

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method for numeric type data. The method comprises the following steps that the numeric type data is converted into character strings; each character is sequentially converted into 4 bits according to the correspondence relationship between the numeric characters and the binary system, and a bit stream is formed; the number of 0 and 1 in the bit stream is counted, and an encryption secret key is obtained through calculation; the encryption secret key is utilized, a chaotic sequence with the pseudo-random property is generated by a chaotic system, in addition, chaotic signals are taken from the chaotic sequence and are sequenced in an ascending sequence, and the bit stream is scrambled according to the positions in accordance with the scrambling rule; the corresponding relationship between the four-digit binary coding mode and the visible ciphertext characters is utilized for converting the scrambled bit stream into the visible ciphertext character strings, and the ciphertext can be decrypted and recovered into the original data type data through adopting the similar method. According to the method provided by the invention, the corresponding table customization is adopted, the numeric type data is subjected to binary scrambling chaotic encryption processing, the safety and the feasibility of the data encryption are ensured, and in addition, the encryption efficiency is also greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a numerical data encryption and decryption method. Background technique [0002] With the development and popularization of computer technology, e-commerce and e-government relying on computer networks and databases have also become popular. As we all know, the database system is responsible for storing and managing information. It stores a large amount of data in a centralized manner, and it is directly shared by many users. Leaking or destroying this information will paralyze the enterprise, bring huge losses to the country, and even endanger national security. . According to the warning of a privacy protection consultant in the United States, there are about 10 million data theft cases in the world every year, and the losses amount to about 53 billion US dollars. [0003] The current popular large-scale database systems provide many security technologies, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
Inventor 吴新华
Owner 南通九盛软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products