Secret-key-free encryption and decryption method for numbers
A key encryption, number technology, applied in the field of decryption, number keyless encryption, can solve problems such as high computational pressure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] A method for keyless encryption and decryption of numbers, including a mobile phone number encryption process and a mobile phone number decryption process;
[0025] Such as figure 1 As shown, the mobile phone number encryption process includes the following steps:
[0026] Step 1: Put the mobile phone number in plaintext P 0 As the key of the RC4 encryption algorithm, the plaintext P of the mobile phone number 0 Perform RC4 encryption to obtain the intermediate ciphertext M;
[0027] Step 2: Concatenate the plaintext P0 of the mobile phone number and the intermediate ciphertext M in order to form new data P to be processed 1 ;
[0028] Step 3: Put P 1 Perform the SHA256 algorithm operation to obtain the final ciphertext, and the encryption ends.
[0029] Such as figure 2 As shown, the mobile phone number decryption process includes the following steps:
[0030] Step 1: Generate the plaintext of all mobile phone numbers according to the rules of mobile phone num...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


