Encryption method and?device
An encryption method and ciphertext technology, applied in the field of information security and encryption, can solve problems such as no solution, inability to meet performance, etc., and achieve the effect of high speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0041] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings. It should be understood that these descriptions are exemplary only and are not intended to limit the scope of the invention. The embodiments in this application and the features in the embodiments can be combined with each other. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.
[0042] The invention proposes a character-based bidirectional cyclic replacement (Character Based Bidirection Cyclic Replacement) encryption method and a corresponding decryption method. They are described as follows.
[0043] figure 1 is a flow chart of an encryption method according to an embodiment of the present invention. like ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap