Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method of ciphertext

A technology of encryption, decryption and ciphertext, applied in the field of information communication security and security, it can solve the problems of limited thesaurus dictionary size, low embedding rate and security, and extremely strict requirements for differences in word meanings, and achieve high efficiency.

Inactive Publication Date: 2016-08-17
GUIZHOU UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In principle, although this method applies the coding principle, it avoids the limitation that the existing information hiding method with text information as the carrier must rely on a specific file format. However, this method can only embed the hidden information in the originally meaningful text. information, rather than hiding information and transforming the structure and content of the original information;
[0011] The information hiding of the grammatical and semantic method is generally hidden by the replacement of synonyms. This method has extremely strict requirements on the difference in meaning of words, and due to the limited size of the dictionary of synonyms, the embedding rate and security are not very high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method of ciphertext
  • Encryption and decryption method of ciphertext
  • Encryption and decryption method of ciphertext

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment 1: as Figure 1 ~ Figure 3 As shown, a method for encrypting and decrypting ciphertext, the method includes a dictionary generation module, an address book conversion module and a ciphertext conversion module, and the encryption steps are as follows:

[0030] (1) Dictionary generation module: collect the surnames and commonly used names of Chinese citizens, generate corresponding databases respectively, and remove the data with low randomness. The establishment of the dictionary satisfies the rationality of names, including the common use and pronunciation of Chinese population names ,significance;

[0031] (2) Obtain the plaintext that needs to be transmitted;

[0032] (3) encryption: adopt symmetric encryption algorithm and key generator to generate the key of encrypted plaintext to encrypt the plaintext in step (2) to generate ciphertext garbled characters;

[0033] (4) Address book conversion module: determine the maximum conversion rate according to th...

Embodiment 2

[0037] Embodiment 2: Example of address book format text:

[0038] 密钥生成:输入任一字符串的安全参数:164512121;输入初始密钥:50DAC7E4375BA89899FCC3D4BBFEFB9B;安全参数和初始密钥生成实际密钥:1937CBD97F321D7E2E2748B3BBED6A911589855E5B5491E28A43ACBD9E11284D,明文:FAB69830108696702FB6926DABE13C6FEA1FFFD4C5F8205E727B069ECD83E41E141BC93776E3898C1A30ACABBA45E56C592CFF2Fa8FCE907FA47F232402ABC7;采用对称加密算法获得密文乱码:50DAC7E4375BA89899FCC3D4BBFEFB9B; The generated meaningful address book text is shown in Table 1.

[0039] Table 1 Address Book Format

[0040] Name

[0041] Decryption process: Enter the actual key and address book, and use the symmetric encryption algorithm to obtain the plaintext.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption and decryption method of a ciphertext. According to the method, a randomness database of family names and given names is produced; a secret key which is generated by a plaintext through a symmetric encryption algorithm and a secret key generator is encrypted and is generated into ciphertext messy code; the messy code is segmented and filled, then is converted into an address book and then is generated into the original plaintext by an inverse converter. According to the method, the plaintext is hidden in the address book text; the plaintext information is hidden; the encryption information is hidden; dual security guarantee is realized; encryption and encryption hide of the plaintext information are realized; the ciphertext messy code encrypted by a security encryption algorithm is hidden in the text; the high redundancy demands on videos and pictures are solved; the conversion efficiency is very high; there is no any demand on the original information; and the realization technique of generating the meaningful ciphertext is independent of the format of the text and is more flexible.

Description

technical field [0001] The invention relates to a method for encrypting and decrypting ciphertext, and belongs to the technical field of information communication security. Background technique [0002] Using text as a carrier is to achieve information embedding by changing some features or formats of the text, and it is required that this embedding operation will not cause a gap in human vision. But text files have little room for redundancy, especially unformatted plain text documents. Text information is the most commonly used information transmission method; [0003] Information hiding with text as the carrier usually has the following categories: basic file structure, text-based sorting format, and natural language-based processing methods. [0004] A method based on the structure of the document, which is independent of the text itself. It mainly involves file structure features, such as the redundant space in the cross-reference table of the PDF document and the st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F17/21
CPCG06F40/10H04L9/0822
Inventor 彭长根马海峰田有亮丁红发
Owner GUIZHOU UNIV