Method for performing camouflage and camouflage removal on characters based on unrepeated keys

A key pair and character technology, applied in the field of information security, can solve problems such as complex algorithms, easy to be deciphered, and inability to distinguish whether data is camouflaged data

Active Publication Date: 2018-02-02
SICHUAN QIAODUOTIANGONG PRECISION EQUIP CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data encryption technology is an information security technology that is widely used and effective, and data camouflage is essentially a data encryption technology. The difference is that the camouflage of plaintext characters is to encrypt plaintext in a certain way. Or after the transformation, it is still displayed in front of the user in a readable form, which makes it impossible for ordinary users to distinguish whether the data is fake data, making the data more confusing
[0003] In the prior art, the traditional encryption method is easy to be deciphered due to its regularity. Another example is the traditional RSA and DES data encryption algorithm. Due to its complexity or security issues, a simple, efficient and difficult to decipher Camouflage algorithm; In addition, there is no technical scheme for camouflaging plaintext characters in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing camouflage and camouflage removal on characters based on unrepeated keys
  • Method for performing camouflage and camouflage removal on characters based on unrepeated keys
  • Method for performing camouflage and camouflage removal on characters based on unrepeated keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further elaborated below in conjunction with the accompanying drawings and embodiments.

[0054] Because the characters contained in "Thousand Characters" are different, in this embodiment, the characters contained in "Thousand Characters" are selected as the key characters.

[0055] Such as figure 1 As shown, a method for disguising characters based on non-repeating keys comprises the following steps:

[0056] S100: Load plaintext: input the plaintext that needs to be camouflaged;

[0057] S200: building a key dictionary, comprising the following steps:

[0058] S201: The key character is formed into a key character matrix of 16*16 with 16 characters as a row and 16 characters as a column: as figure 2 As shown, the characters contained in "Thousand Characters" are selected as the key characters. Since the number of characters in "Thousand Characters" is 1000, it is divided into blocks according to each 16*16 key character matrix, and 24 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing camouflage and camouflage removal on characters based on unrepeated keys. The method is characterized by comprising the following steps: S100: loading plaintext; S200: constructing a key dictionary; S300: determining a key block number; S400: generating UNICODE codes of plaintext characters; S500: converting the UNICODE codes into 4 bytes of Hex codes 0xyYhH, wherein when the Hex codes are less than 4 bytes, filling the bytes via 0; S600: performing camouflage on the plaintext characters by using the Hex codes, and outputting camouflage characters; S700: judging whether the camouflage of the plaintext characters is completed, if so, executing step S800, and otherwise, executing step S300; and S800: merging the camouflage characters of the plaintext characters in sequence, and outputting a camouflage text. The camouflage removal can be performed on the camouflage text by a reverse method, and the plaintext is output.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for disguising and uncamouflaging data, in particular to a method for disguising and uncamouflaging characters based on non-repetitive keys. Background technique [0002] With the rapid development of computer network, computer information and computer technology, more and more people attach great importance to the security and confidentiality of information. Data encryption technology is an information security technology that is widely used and effective, and data camouflage is essentially a data encryption technology. The difference is that the camouflage of plaintext characters is to encrypt the plaintext in a certain way. Or after transformation, it is still displayed in front of the user in a readable form, so that ordinary users cannot distinguish whether the data is fake data, making the data more confusing. [0003] In the prior art, the traditional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 梁效宁聂学良
Owner SICHUAN QIAODUOTIANGONG PRECISION EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products