Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and?device

An encryption method and ciphertext technology, applied in the field of information security and encryption, can solve problems such as no solution, inability to meet performance, etc., and achieve the effect of high speed

Active Publication Date: 2014-05-28
深圳市太和物联信息技术有限公司
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, in the traditional encryption method, the plaintext input each time must be fixed-length data
To achieve variable-length encryption, it can only be achieved by padding data bits and repeatedly encrypting different plaintext segments repeatedly, which obviously cannot meet the performance requirements
[0004] For the above-mentioned problems existing in related technologies, effective solutions have not yet been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and?device
  • Encryption method and?device
  • Encryption method and?device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. The embodiments in the present application and the features in the embodiments can be combined with each other. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0042] The present invention proposes a Character Based Bidirection Cyclic Replacement (Character Based Bidirection Cyclic Replacement) encryption method and a corresponding decryption method. They are respectively described as follows.

[0043] figure 1 is a flowchart of an encryption method according to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method based on characters. The method comprises steps of building a basic transposition table?TB and using a secret key to initialize the basic transposition table to an operation transposition table?TO, converting an input character string into a plaintext sequence number string according to a pre-defined character and sequence number corresponding?table TC, using the operation transposition table?TO for carrying out transposition on the plaintext sequence number string to obtain a ciphertext sequence number string, and converting the ciphertext sequence number string into a ciphertext character string. According to the method, a character?position services as a basic processing unit, dynamic variable data length encryption is realized, length?consistency and?visibility of the ciphertext and the plaintext can be ensured, and platform adaptability and high calculation efficiency are realized.

Description

technical field [0001] The invention relates to the technical field of information security and encryption, in particular to a method for forming an encryption code to protect information by using a computer and coding technology. Background technique [0002] With the rapid development and wide application of computer and data communication technology, the society relies more and more on the safe storage, safe processing and safe transmission of information, and the issue of information security protection becomes more important. Reliable encryption methods can make some sensitive and confidential information safely stored or transmitted on media without protective measures. [0003] Although traditional encryption methods such as DES and AES have strong encryption performance and the ability to prevent cracking, they are all byte-based encryption methods, and the encryption results will make the ciphertext into unrecognizable characters. These characters are If it cannot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 曾国波户才来
Owner 深圳市太和物联信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products