Chinese character encryption and decryption method
An encryption method and Chinese character technology, applied in the field of information security, can solve problems such as few, encryption methods are difficult to write or identify ciphertext characters
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0089] According to the encryption method of a kind of Chinese character in the above-mentioned specific embodiment, the steps are as follows:
[0090] (1)将某段汉字“信息交换用汉字编码字符集”逐个转换成数值型数据,得到区数值序列P1={208,207,189,187,211,186,215,177,194,215,183,188}和位数值序列P2={197,162,187,187,195,186,214,224,235,214,251,175},其中数值序列P1、P2的长度 Consistent with the length of this section of Chinese characters, it is recorded as L=12;
[0091] (2) at first utilize external encryption key (α=0.12345, β=3.75), calculate according to the formula in the encryption method step (2) of a kind of Chinese character in the above-mentioned specific embodiment, obtain the initial value of chaotic system (x 1 ), parameters (μ), initial iteration steps (m) and sampling interval (n 1 , n 2 )for,
[0092] make but
[0093] x 1 =mod(0.465494791666667+0.12345,0.99998)+0.00002=0.588964791666667,
[0094] μ=3.75+mod(0.465494791666667,0.25)=3.965494791666667,
[0095] m=410+55=465,
[0096] no 1 =8+1=9,
[0097] no ...
Embodiment 2
[0114] According to the above-mentioned encryption method of a Chinese character, a certain section of Chinese characters to be encrypted is a "coded character set of Chinese characters for information exchange", and the encryption steps of a Chinese character are similar to the specific embodiment 1, only the external encryption key changes slightly: α=0.123450000001 ; or β=3.750000000001, the results of Chinese character encryption are shown in Table 1. It can be seen from Table 1 that a slight change in the external encryption key will cause a large change in the encrypted ciphertext of Chinese characters. It can be seen that the encryption method for Chinese characters proposed in this patent is sensitive to the external encryption key.
[0115] Table 1 When the external encryption key changes slightly, the result of Chinese character encryption
[0116]
Embodiment 3
[0118] According to the above-mentioned encryption method of a Chinese character, its encryption steps are similar to the specific embodiment 1, and only a certain section of Chinese characters to be encrypted ("coded character set of Chinese characters for information exchange") has a slight change: "coded character set of Chinese characters for information exchange" ; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or Table 2 shows the encryption results of Chinese characters in "Character Season of Chinese Character Encoding for Information Interchange". It can be seen from Table 2 that slight changes in the plaintext information of the Chinese characters to be encrypted will cause the encrypted ciphertext to be "unrecognizable". It can be seen that t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com