A kind of encryption method and device

An encryption method and key technology, applied in the field of information security and encryption, can solve problems such as no solution, inability to meet performance, etc., and achieve the effect of fast speed

Active Publication Date: 2019-05-03
深圳市太和物联信息技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Secondly, in the traditional encryption method, - each input plaintext must be fixed-length data
To achieve variable-length encryption, it can only be achieved by padding data bits and repeatedly encrypting different plaintext segments repeatedly, which obviously cannot meet the performance requirements
[0004] For the above-mentioned problems existing in related technologies, effective solutions have not yet been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of encryption method and device
  • A kind of encryption method and device
  • A kind of encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. The embodiments in the present application and the features in the embodiments can be combined with each other. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0036] The invention proposes a Character Based Bidirection Cyclic Replacement (Character Based Bidirection Cyclic Replacement) encryption method. They are respectively described as follows.

[0037] figure 1 is a flowchart of an encryption method according to an embodiment of the present invention. Such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method based on characters. The method comprises steps of building a basic transposition table?TB and using a secret key to initialize the basic transposition table to an operation transposition table?TO, converting an input character string into a plaintext sequence number string according to a pre-defined character and sequence number corresponding?table TC, using the operation transposition table?TO for carrying out transposition on the plaintext sequence number string to obtain a ciphertext sequence number string, and converting the ciphertext sequence number string into a ciphertext character string. According to the method, a character?position services as a basic processing unit, dynamic variable data length encryption is realized, length?consistency and?visibility of the ciphertext and the plaintext can be ensured, and platform adaptability and high calculation efficiency are realized.

Description

technical field [0001] The invention relates to the technical field of information security and encryption, in particular to a method for forming an encryption code to protect information by using a computer and coding technology. Background technique [0002] With the rapid development and wide application of computer and data communication technology, the society relies more and more on the safe storage, safe processing and safe transmission of information, and the issue of information security protection becomes more important. Reliable encryption methods can make some sensitive and confidential information safely stored or transmitted on media without protective measures. [0003] Although traditional encryption methods such as DES and AES have strong encryption performance and the ability to prevent cracking, they are all byte-based encryption methods, and the encryption results will make the ciphertext into unrecognizable characters. These characters are If it cannot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 曾国波户才来
Owner 深圳市太和物联信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products