Symmetric encryption and decryption method of character strings

An encryption method, string technology, applied in the field of information security

Inactive Publication Date: 2018-08-17
江苏科建教育软件有限责任公司
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the technical problems raised by the above-mentioned background technology, the present invention aims to provide a string symmetric encryption and decryption method, which can achieve message encryption and decryption when the messages are quickly transmitted between the various modules of the system and basically does not affect the module response time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric encryption and decryption method of character strings
  • Symmetric encryption and decryption method of character strings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0024] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.

[0025] Those skill...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symmetric encryption and decryption method of character strings. The encryption steps are as follows: converting an encryption source into a character array, and obtaining anASCII code of the character array; generating a random decimal integer by using an encryption seed and a random number, performing operation by using the random integer and the ASCII code through a fixed formula to generate an encrypted decimal integer, converting the generated encrypted decimal integer into a hexavigesimal integer to obtain one or more character strings; performing operation onthe previously generated random decimal integer through the fixed formula to generate a new decimal integer, and converting the new decimal integer into a hexavigesimal integer to obtain one or more character strings; and splicing the obtained character strings according to a fixed rule to finally obtain a complete encrypted character string. By adoption of the symmetric encryption and decryptionmethod of character stringsdisclosed by the invention, when messages are quickly transmitted between the modules of a system, the encryption and decryption of the messages are achieved, and the response times of the modules are not affected.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a string symmetric encryption and decryption method. Background technique [0002] At present, there are a variety of relatively mature symmetric and asymmetric encryption algorithms in the industry. Among them, the development of decryptable symmetric encryption algorithms is more mature, most of which are public, and various tools are used to brute force crack common algorithms. Algorithms usually rely on some existing class libraries. At the same time, such algorithms are not friendly to Chinese encryption and decryption, and the encoding of the original Chinese text affects the results of encryption and decryption. [0003] With the increasing popularity of distributed systems, different modules of a system will be deployed on different machines or even different networks, and the information transmission within the system is particularly frequent. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0618H04L9/0869
Inventor 马腾
Owner 江苏科建教育软件有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products