An Encryption and Decryption Method Based on Chinese Hash
A kind of encryption and decryption, Chinese technology, applied in the direction of the encryption device with shift register/memory, etc., can solve the problem of inconvenience for users to remember, and achieve the effect of fast encryption speed, privacy protection and security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0029] The encryption and decryption method of the present invention uses a hash function to encrypt, and the key can use Chinese. The encryption process is as figure 1 shown, including the following steps:
[0030] S11, first process the input data: input user settings, read the key and the data to be encrypted; check whether the key (also called password) is correct, and then execute step S12 if it is correct;
[0031] S12. Apply for a buffer from the memory, and set the length and suffix of the buffer;
[0032] S13, select a hash function to process the data, and obtain the corresponding position of each plaintext character in the ciphertext; the hash function can be selected: a one-way n-th degree equation method, a method of dividing and leaving a remainder, a random number generation method or a key sorting Law.
[0033] S14. Split the plaintext and apply for a buffer zone;
[0034] S15. Store the temporary value obtained after the data is processed by the hash funct...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

