Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encrypting and decrypting character string

An encryption method and string technology, applied in the field of information security, can solve the problems of complex encryption operation

Active Publication Date: 2019-07-09
NANTONG UNIVERSITY
View PDF8 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional string encryption is usually carried out using DES and RAS encryption methods, and the encryption operation is relatively complicated. With the development of network communication technology, the demand for security and convenience of string encryption is gradually increasing. A safe and reliable encryption technology is adopted. Encrypting character data is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and decrypting character string
  • Method for encrypting and decrypting character string
  • Method for encrypting and decrypting character string

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0119] According to the encryption method of a kind of character string in the above-mentioned specific embodiment, the steps are as follows:

[0120] (1) Convert a certain character string "string encryption and decryption 111aaa" into numerical data one by one, and obtain the high-order numerical sequence P1={215,183,180,188,189,195,0,0,0,0,0,0} and the low-digit numerical sequence P2={ 214,251,174,211,226,220,49,49,49,97,97,97}, where the lengths of the numerical sequences P1 and P2 are consistent with the length of the character string, recorded as L=12;

[0121] (2) at first utilize external encryption key (α=0.12345, β=3.75), calculate according to the formula in the encryption method step (2) of a kind of character string in the above-mentioned specific embodiment, obtain the initial value of chaotic system (x 1 ), parameters (μ), initial iteration steps (m) and sampling interval (n 1 , n 2 )for,

[0122] make but

[0123] x 1 =mod(0.305555555555556+0.12345,0.9999...

Embodiment 2

[0144] According to the above-mentioned encryption method of a string, a certain string to be encrypted is "string encryption and decryption 111aaa", and the encryption steps of a string are similar to the specific embodiment 1, only the external encryption key changes slightly: α= 0.12345000000001; or β=3.75000000000001, the string encryption results are shown in Table 1. It can be seen from Table 1 that a slight change in the external encryption key will cause a large change in the string encryption ciphertext, so it can be seen that a string encryption method proposed in this patent is sensitive to the external encryption key.

[0145] Table 1 When the external encryption key changes slightly, the result of string encryption

[0146]

Embodiment 3

[0148] According to the encryption method of above-mentioned a kind of character string, its encryption step is similar to specific embodiment 1, only a certain section of character string to be encrypted (" character string encryption and decryption 111aaa ") takes place slight change: " subcharacter string encryption and decryption 111aaa "; Or "Character string encryption and decryption 111aaa"; or "string encryption and decryption 111aaa"; or "string encryption and decryption 211aaa"; or "string encryption and decryption 110aaa"; or "string encryption and decryption 111aac", the string encryption result is as follows Table 2 shows. It can be seen from Table 2 that slight changes in the plaintext information of the string to be encrypted will cause the encrypted ciphertext to be "unrecognizable". It can be seen that the string encryption method proposed in this patent is sensitive to the plaintext information of the encrypted string.

[0149] Table 2 When the string to be e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting and decrypting a character string. The method comprises the following steps of converting a certain section of character string into a high-order numerical value sequence and a low-order numerical value sequence; generating a chaotic signal by using a chaotic system according to the external encryption key and data such as an initial value, parameters, an initial iteration step number and an extraction interval of the chaotic system related to the to-be-encrypted character string; according to the position change scrambling rules before and afterchaotic sequence sorting, scrambling the high-order numerical sequence and the low-order numerical sequence respectively, carrying out numerical value and character conversion, obtaining an encrypted ciphertext of the section of character string, and decrypting and restoring the ciphertext to an original section of character string through a similar method. According to the method, a chaotic sequence scrambling rule is adopted to scramble or inversely scramble a numerical sequence formed by character conversion, so that the method has good performance of resisting known / selected plaintext attacks and ciphertext-only attacks, and the security and feasibility of character string encryption and decryption are ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a character string encryption and decryption method. Background technique [0002] With the rapid development of Internet technology and multimedia technology, data communication has gradually become an important means for people to exchange information. Data transmission via the Internet is convenient and fast, and is not subject to geographical restrictions. However, due to the particularity of some data, both sending parties do not want the data transmitted on the network to be browsed or processed by unauthorized persons. This information not only involves personal privacy, but also involves national security, and has a major relationship with the country's politics, military and diplomacy, so data security and confidentiality are becoming more and more important. In these special fields that require data confidentiality or when data owners need to protect their...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/06
CPCH04L9/001H04L9/065
Inventor 盛苏英陆国平华亮张小美张振娟周磊
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products