Method for encrypting and decrypting character string
An encryption method and string technology, applied in the field of information security, can solve the problems of complex encryption operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0119] According to the encryption method of a kind of character string in the above-mentioned specific embodiment, the steps are as follows:
[0120] (1) Convert a certain character string "string encryption and decryption 111aaa" into numerical data one by one, and obtain the high-order numerical sequence P1={215,183,180,188,189,195,0,0,0,0,0,0} and the low-digit numerical sequence P2={ 214,251,174,211,226,220,49,49,49,97,97,97}, where the lengths of the numerical sequences P1 and P2 are consistent with the length of the character string, recorded as L=12;
[0121] (2) at first utilize external encryption key (α=0.12345, β=3.75), calculate according to the formula in the encryption method step (2) of a kind of character string in the above-mentioned specific embodiment, obtain the initial value of chaotic system (x 1 ), parameters (μ), initial iteration steps (m) and sampling interval (n 1 , n 2 )for,
[0122] make but
[0123] x 1 =mod(0.305555555555556+0.12345,0.9999...
Embodiment 2
[0144] According to the above-mentioned encryption method of a string, a certain string to be encrypted is "string encryption and decryption 111aaa", and the encryption steps of a string are similar to the specific embodiment 1, only the external encryption key changes slightly: α= 0.12345000000001; or β=3.75000000000001, the string encryption results are shown in Table 1. It can be seen from Table 1 that a slight change in the external encryption key will cause a large change in the string encryption ciphertext, so it can be seen that a string encryption method proposed in this patent is sensitive to the external encryption key.
[0145] Table 1 When the external encryption key changes slightly, the result of string encryption
[0146]
Embodiment 3
[0148] According to the encryption method of above-mentioned a kind of character string, its encryption step is similar to specific embodiment 1, only a certain section of character string to be encrypted (" character string encryption and decryption 111aaa ") takes place slight change: " subcharacter string encryption and decryption 111aaa "; Or "Character string encryption and decryption 111aaa"; or "string encryption and decryption 111aaa"; or "string encryption and decryption 211aaa"; or "string encryption and decryption 110aaa"; or "string encryption and decryption 111aac", the string encryption result is as follows Table 2 shows. It can be seen from Table 2 that slight changes in the plaintext information of the string to be encrypted will cause the encrypted ciphertext to be "unrecognizable". It can be seen that the string encryption method proposed in this patent is sensitive to the plaintext information of the encrypted string.
[0149] Table 2 When the string to be e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com