High security character string symmetrical encryption and decryption method

A high-security, symmetric encryption technology, which is applied in the field of high-security string symmetric encryption and decryption, can solve the problems of weak security and weak encryption algorithm, and achieves the goal of protecting security, high dynamics, and improving the degree of security. Effect

Active Publication Date: 2018-06-15
上海高顿教育科技有限公司
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the continuous development of computer system capabilities, the security of DES will be much weaker than when it first appeared. With the continuous breakthrough of quantum computing, the sharp leap in its computer capabilities will bring new challenges to network security—many encryption algorithms will become quite fragile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High security character string symmetrical encryption and decryption method
  • High security character string symmetrical encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0060] like figure 1 and figure 2 As shown, the present embodiment proposes a high-security string symmetric encryption and decryption method, and the encryption method includes the following steps:

[0061] A1) Receive the string to be encrypted, the encryption vector and the encryption offset;

[0062] A2) According to the encrypted vector received in step A1), an encrypted dynamic factor is generated, and the string to be encrypted is split by the encrypted dynamic factor to obtain two split character strings, including:

[0063] A21) According to the encrypted vector received ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a high security character string symmetrical encryption and decryption method. The encryption method comprises the steps of receiving a to-be-encrypted character string, an encryption vector and encryption offset; generating an encryption dynamic factor according to the encryption vector, and splitting the to-be-encrypted character string, thereby obtaining two sections ofsplit character strings; and generating a time encryption factor according to current time, adding the time encryption factor to the two sections of split character strings, combining the split character strings, and encrypting the combined character string according to the encryption offset, thereby obtaining the encrypted character string. The decryption method is reverse operation of the encryption method. Difference is calculated through utilization of a current time decryption factor and the time encryption factor extracted after the split is carried out. Decryption is carried out if a difference value does not exceed a threshold. Decryption failure is returned if the difference value exceeds the threshold. Compared with the prior art, the methods have the advantages that the security performance is high, the exhaustion break is prevented, and the break difficulty is high.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a high-safety string symmetric encryption and decryption method. Background technique [0002] Encryption and decryption of software is a fascinating field of study that can be closely integrated with almost any kind of computer technology—cryptography, programming languages, operating systems, data structures. The existing commonly used encryption technology is symmetric encryption, which uses symmetric cipher coding technology, and its feature is that the same key is used for file encryption and decryption, that is, the encryption key can also be used as the decryption key. It is called a symmetric encryption algorithm in science. The symmetric encryption algorithm is simple and quick to use, the key is short, and it is difficult to decipher. In addition to the Data Encryption Standard (DES), another symmetric key encryption system is the International Data Encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00H04L9/08
CPCH04L9/002H04L9/0625H04L9/0643H04L9/0872
Inventor 康岳来陈雪洋
Owner 上海高顿教育科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products