A file encryption method
A file encryption and chaotic technology, applied in the field of information security, can solve problems such as insufficient encryption strength, slow encryption and decryption speed, and identity-based password encryption is easy to be cracked, achieving high confidentiality and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0094] The specific implementation of the chaotic transformation-based file encryption and decryption method and system of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0095] see figure 1 , a file encryption method based on chaotic transformation, comprising the following steps: S101, preprocessing the password used to encrypt the content; S102, extracting a set of plaintext data, and generating a set of initial values of verification codes; S103, obtaining the second The iteration coefficient and the second iteration number are used to provide parameters for key iteration; S104, perform key iteration according to the second iteration coefficient and the second iteration number, and generate an iteration result; S105, perform the iteration result Perform XOR operation with plaintext data; S106, generate verification code according to plaintext data; S107 write the result of XOR operation in the file, and generate ci...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com