Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method and device

A technology of data encryption and encrypted words, applied in the field of data processing, can solve the problem of unsafe protection of data transmission and so on

Active Publication Date: 2019-12-03
JIANGXI KEBUKE AUTOMOTIVE TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing data encryption methods are too simple and relatively easy to crack. Relevant technicians can quickly discover the rules and crack the ciphertext, which cannot safely protect data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device
  • Data encryption method and device
  • Data encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. Several embodiments of the invention are shown in the drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that the disclosure of the present invention will be thorough and complete.

[0023] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention. As used herein, the term "and / or" includes any and all combinations of one or more of the associated listed items.

[0024] see fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data encryption method. The method comprises the following steps of acquiring an ith bit character of a character string to be encrypted, inquiring a sequence number corresponding to the ith bit character in a preset appointed word stock, inquiring a character corresponding to the sequence number in an encrypted word stock, forming an ith bit encrypted character, and rotating the ith bit encrypted character in an inner ring of the encrypted word stock to a preset target position in an anticlockwise displacement mode; and acquiring an i+1th bit character of the character string to be encrypted, and traversing the above steps till that the character string to be encrypted is encrypted. The invention also provides a data encryption device. The device comprises the appointed word stock module, an encrypted word stock module, a data acquisition module, a data query module and an adjusting module. By using the data encryption method and the apparatus thereof, through continuously changing an arrangement mode of characters in the encrypted word stock, arrangement sequences of the characters in the encrypted word stock corresponding to each character to be encrypted are different; and decoding difficulty of data is increased and data safety is increased too.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a data encryption method and device. Background technique [0002] With the development of information technology, the security requirements for data transmission and storage are getting higher and higher. For example, in the communication process, if the data in the transmission link appears in the form of plain text, then anyone who intercepts the data can directly interpret the data; on the contrary, if the data appears in the form of cipher text, then even if the data is Interception, the other party can not understand the meaning of the data. [0003] In the existing data encryption method, when the plaintext is obtained, the corresponding encrypted character is queried in the corresponding encrypted database, and then the encrypted character is output to complete the encryption of the plaintext to obtain the ciphertext, and then send it out. This method can avoid any interce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L63/0428
Inventor 单磊磊王远青田世钰
Owner JIANGXI KEBUKE AUTOMOTIVE TECH