Encryption and decryption algorithm based on Chinese hash

An encryption and decryption algorithm, Chinese technology, applied in the field of encryption and decryption algorithms based on Chinese hash, can solve problems such as inconvenience for users to remember, and achieve the effects of fast encryption, security protection, and privacy protection

Inactive Publication Date: 2016-10-26
GUANGDONG UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing encryption and decryption technologies generally only allow users to use letters, numbers and some special symbols to combine passwords, which is not convenient for users to remember

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption algorithm based on Chinese hash
  • Encryption and decryption algorithm based on Chinese hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] The encryption and decryption algorithm of the present invention uses a hash function to encrypt, and the key can use Chinese. The encryption process is as figure 1 shown, including the following steps:

[0031] S11, first process the input data: input user settings, read the key and the data to be encrypted; check whether the key (also called password) is correct, and then execute step S12 if it is correct;

[0032] S12. Apply for a buffer from the memory, and set the length and suffix of the buffer;

[0033] S13, select a hash function to process the data, and obtain the corresponding position of each plaintext character in the ciphertext; the hash function can be selected: a one-way n-th degree equation method, a method of dividing and leaving a remainder, a random number generation method or a key sorting Law.

[0034] S14. Split the plaintext and apply for a buffer zone;

[0035] S15. Store the temporary value obtained after the data is processed by the hash fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption and decryption algorithm based on Chinese hash. An encryption process comprises: reading a key and data to be encrypted; applying a buffer area in a memory, and setting the length and suffix of the buffer area; selecting a hash function to process data to obtain a corresponding position of each plaintext character in ciphertexts; dividing plaintexts and applying a buffer area; storing temporary values of the data obtained after hash function treatment in the buffer area; filling blank positions in the buffer area; and encrypting each character in the buffer area. An decryption process includes: reading a key and ciphertexts, and processing inputted ciphertexts; setting the size and suffix of the buffer area; selecting a hash function, and diving the ciphertexts; applying a buffer area, and using a hash function to determine the position of the ciphertexts in the buffer area; decrypting each character in the buffer area and intercepting the suffix; and composing plaintexts by characteristics in the buffer area according to the hash function. The encryption and decryption algorithm guarantees the secure storage of user private data, allows users to use Chinese to design passwords, and facilitates memory.

Description

technical field [0001] The invention relates to an encryption and decryption method, in particular to an encryption and decryption algorithm based on Chinese hash. Background technique [0002] With the application of various information systems, people have a lot of private texts or passwords that need to be recorded in a safe storage space, and it will be very popular to maintain a design to implement a method that can safely store user privacy. In addition, for people's memory of passwords, using Chinese is obviously easier to remember than mixing letters and numbers. However, the existing encryption and decryption technologies generally only allow users to use letters, numbers and some special symbols to combine passwords, which is not convenient for users to remember. Contents of the invention [0003] In order to solve the problems existing in the prior art and ensure the security of private data, the present invention proposes an encryption and decryption algorithm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0643
Inventor 姜文超林德熙谢纪东武继刚林穗滕少华刘竹松
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products