Encryption and decryption method of character data

An encryption method and character-based technology, which is applied in the field of information security and can solve the problems of algorithm complexity, security, and easy to be deciphered.

Active Publication Date: 2015-04-01
SHANGHAI TAIYU INFORMATION TECH
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional encryption methods such as scrambling encryption (permuting) or substitution encryption (substituting) methods are easy t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method of character data
  • Encryption and decryption method of character data
  • Encryption and decryption method of character data

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0099] According to the encryption and decryption steps of the above character data, when x in the encryption key 0 、y 0 , μ 1 , μ 2 with the decryption key When the correspondence is consistent, take x 0 = x ~ 0 = 0.2345 , y 0 = y ~ 0 = 0.54321 , μ 1 = μ ~ 1 = 3.85 , At the same time, let the encryption key in C1 0 ,C2 0 with the decryption key in R1 0 ,R2 0 Equal, if the value is C1 0 =C2 0 =R1 0 =R2 0 =85, in conjunction with specific character data (such as: "0123," "abcd; ", and "impedance.") to encrypt and decrypt, the operation results of ea...

specific Embodiment 2

[0103] According to the encryption steps of the above-mentioned character data, the encryption key is similar to the specific embodiment 1, and only a certain encryption key changes slightly: x 0 = 0.234500000000001; or y 0 = 0.543210000000001; or μ 1 = 3.850000000000001; or μ 2 =3.860000000000001, the encryption result of character data is shown in Table 2. It can be seen from the following table: once the encryption key changes even slightly, that is, "missing by a tiny bit", the ciphertext string will be "distanced by a thousand miles", so it can be seen that a character data encryption method proposed in this patent is key-sensitive. sex.

[0104] Table 2 Encryption results of character data when the encryption key changes slightly

[0105]

specific Embodiment 3

[0106] According to the encryption steps of the above-mentioned character data, the encryption key is similar to the specific embodiment 1, for the character data to be encrypted (such as "aaaaaaaaaaa", "baaaaaaaaaa", "aaaaaaaaaab", "aaaaabaaaaa" and "aaaaaaaaaa" slightly changed ) are encrypted separately, and the encryption results are shown in Table 3. It can be seen from the table below that slight changes in the data to be encrypted (plaintext) will cause the encrypted ciphertext string to be "unrecognizable", so it can be seen that the character data encryption method proposed in this patent is sensitive to encrypted character data. As can be seen from the analysis of the above-mentioned specific embodiment 2 and example 3, the ciphertext produced by a character data encryption method proposed in this patent is not only closely related to the encryption key, but also depends on the character data (plaintext) to be encrypted. A character data encryption method is proposed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method of character data. The encryption and decryption method comprises the following steps: converting plaintext character data into a numerical sequence; carrying out bidirectional encryption on all elements in the numerical sequence by utilizing a chaotic signal generated by a variable key chaotic system and obtaining a bidirectional chaotic encryption numerical sequence; self-defining a corresponding relation between numerical data and a visible ciphertext character, converting the bidirectional chaotic encryption numerical sequence into a visible ciphertext character sequence, obtaining a ciphertext string unequal to the plaintext character data in length, and decrypting and restoring a ciphertext into original character data through a similar method. The encryption and decryption method has the benefits that the self-defined corresponding relation is adopted for carrying out bidirectional chaos encryption processing on the character data so as to generate the length-variable ciphertext string, and the ciphertext string has good resistance to known/chosen-plaintext attack, ciphertext-only attack, so that the safety and the feasibility of data encryption and decryption are ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting character data. Background technique [0002] With the rapid development of computer technology, information technology and network technology, a huge information network centered on computers is gradually forming all over the world. Obviously, more and more people pay more and more attention to the security and confidentiality of information, ranging from state secrets to ordinary people's lives, such as credit cards, automatic teller machines, confidential telephones, confidential faxes, e-commerce, financial services, etc. Electronic, database storage, etc., all need a set of practical security measures. Among them, data encryption technology is an information security technology with wide application and ideal effect. Traditional encryption methods such as scrambling encryption (permuting) or substitution encryption (subst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
Inventor 盛苏英陆国平堵俊吴晓吴新华张振娟
Owner SHANGHAI TAIYU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products