File Encryption and Decryption Method and System Based on Chaotic Transformation

A file encryption and chaotic technology, applied in the field of information security, can solve problems such as insufficient encryption strength, slow encryption and decryption speed, and identity-based password encryption is easy to be cracked, achieving high confidentiality and increasing difficulty

Inactive Publication Date: 2017-02-08
SHANGHAI SIMCOM LTD
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity-based password encryption is relatively easy to crack, and file content encryption has problems such as slow encryption and decryption speed and insufficient encryption strength.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File Encryption and Decryption Method and System Based on Chaotic Transformation
  • File Encryption and Decryption Method and System Based on Chaotic Transformation
  • File Encryption and Decryption Method and System Based on Chaotic Transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The specific implementation of the chaotic transformation-based file encryption and decryption method and system of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0095] see figure 1 , a file encryption method based on chaotic transformation, comprising the following steps: S101, preprocessing the password used to encrypt the content; S102, extracting a set of plaintext data, and generating a set of initial values ​​of verification codes; S103, obtaining the second The iteration coefficient and the second iteration number are used to provide parameters for key iteration; S104, perform key iteration according to the second iteration coefficient and the second iteration number, and generate an iteration result; S105, perform the iteration result Perform XOR operation with plaintext data; S106, generate verification code according to plaintext data; S107 write the result of XOR operation in the file, and generate ci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a file encryption method based on chaos transformation. The file encryption method comprises: (a1) preprocessing a password for encrypted content; (a2) extracting a group of plaintext data and generating the initial values of a group of vertificaiton codes; (a3) obtaining a second iteration coefficient and the number of second iteration times; (a4) executing secret key iteration and generating an iteration result according to the second iteration coefficient and the number of second iteration times; (a5) performing xor operation on the iteration result and the plaintext data; (a6) generating a verification code according to the plaintext data; (a7) writing the result of the xor operation in a file and generating a cryptograph; (a8) determining whether the secret key iteration is executed to the tail portion of the encrypted content, and executing a step (a9) if yes or continuously executing the step (a4) if not; (a9) the successive iteration result of the plaintext data and all the iteration results are converted into integers and the encryption key generated by the last next iteration is saved in the tail of the encrypted content.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for rapidly encrypting and decrypting files, and is applicable to fields such as mobile phones, notebooks, and tablet computers that need to keep private files secret. Background technique [0002] In a computer, a file is an organizational form of data. In order to ensure the security of the file during storage, transmission and use, it must be encrypted. Encryption is generally implemented through a cryptographic system. The cryptographic system encrypts the original information and decrypts the encrypted information based on mathematical principles. At present, there are mainly two ways to encrypt files: authentication-based password encryption and file content encryption. The authentication-type password encryption refers to proving the user's identity according to the password information known to the user, for example, a static password, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 赵昆
Owner SHANGHAI SIMCOM LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products