Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chinese character encryption and decryption method

An encryption method and Chinese character technology, applied in the field of information security, can solve problems such as few, encryption methods are difficult to write or identify ciphertext characters

Active Publication Date: 2019-07-12
NANTONG UNIVERSITY
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the current mainstream information encryption and decryption technologies can only be applied to information composed of single-byte characters such as letters, numbers, and punctuation marks, but can be used to encrypt information files composed of double-byte characters such as computer Chinese characters. There are not many simple and reliable cryptographic systems, and there are too many ciphertext characters that are difficult to write or recognize in the current encryption method; the existing text encryption method usually adopts the traditional substitution encryption method, that is, by replacing the characters in the plaintext with other Chinese characters Chinese characters are used to achieve the purpose of confidentiality. For example, Chinese characters are represented by a group of integer strings that have nothing to do with them, and then the integer strings are encrypted with DES encryption. Considering the security and transmission of the DES key, RSA encryption is used. The method encrypts the DES key three times, thereby converting data and information into unrecognizable ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character encryption and decryption method
  • Chinese character encryption and decryption method
  • Chinese character encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] According to the encryption method of a kind of Chinese character in the above-mentioned specific embodiment, the steps are as follows:

[0090] (1)将某段汉字“信息交换用汉字编码字符集”逐个转换成数值型数据,得到区数值序列P1={208,207,189,187,211,186,215,177,194,215,183,188}和位数值序列P2={197,162,187,187,195,186,214,224,235,214,251,175},其中数值序列P1、P2的长度 Consistent with the length of this section of Chinese characters, it is recorded as L=12;

[0091] (2) at first utilize external encryption key (α=0.12345, β=3.75), calculate according to the formula in the encryption method step (2) of a kind of Chinese character in the above-mentioned specific embodiment, obtain the initial value of chaotic system (x 1 ), parameters (μ), initial iteration steps (m) and sampling interval (n 1 , n 2 )for,

[0092] make but

[0093] x 1 =mod(0.465494791666667+0.12345,0.99998)+0.00002=0.588964791666667,

[0094] μ=3.75+mod(0.465494791666667,0.25)=3.965494791666667,

[0095] m=410+55=465,

[0096] no 1 =8+1=9,

[0097] no ...

Embodiment 2

[0114] According to the above-mentioned encryption method of a Chinese character, a certain section of Chinese characters to be encrypted is a "coded character set of Chinese characters for information exchange", and the encryption steps of a Chinese character are similar to the specific embodiment 1, only the external encryption key changes slightly: α=0.123450000001 ; or β=3.750000000001, the results of Chinese character encryption are shown in Table 1. It can be seen from Table 1 that a slight change in the external encryption key will cause a large change in the encrypted ciphertext of Chinese characters. It can be seen that the encryption method for Chinese characters proposed in this patent is sensitive to the external encryption key.

[0115] Table 1 When the external encryption key changes slightly, the result of Chinese character encryption

[0116]

Embodiment 3

[0118] According to the above-mentioned encryption method of a Chinese character, its encryption steps are similar to the specific embodiment 1, and only a certain section of Chinese characters to be encrypted ("coded character set of Chinese characters for information exchange") has a slight change: "coded character set of Chinese characters for information exchange" ; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or "Chinese character coded character set for information exchange"; or Table 2 shows the encryption results of Chinese characters in "Character Season of Chinese Character Encoding for Information Interchange". It can be seen from Table 2 that slight changes in the plaintext information of the Chinese characters to be encrypted will cause the encrypted ciphertext to be "unrecognizable". It can be seen that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Chinese character encryption and decryption method. The method comprises the following steps of: converting a certain section of Chinese characters into a zone value sequenceand a code value sequence; generating a chaotic signal by using a chaotic system according to the external encryption key and data such as an initial value, parameters, an initial iteration step number and an extraction interval of the chaotic system related to the to-be-encrypted Chinese character; according to the position change scrambling rules before and after the chaos sequences are ranked,respectively scrambling the region value sequence and the code value sequence, then carrying out conversion of values and Chinese characters to obtain an encrypted ciphertext of the section of Chinese characters, so the ciphertext can be decrypted and restored to an original section of Chinese characters through a similar method. The Chinese character encryption and decryption method adopts the scrambling rule of the chaotic sequence to scramble or inversely scramble the numerical sequence formed by converting the Chinese characters, has good performance of resisting known / selected plaintextattacks and ciphertext-only attacks, and ensures the safety and feasibility of Chinese character encryption and decryption.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting Chinese characters. Background technique [0002] With the rapid development of computer and communication technology, computer network has become a means of information exchange in many fields. However, when information is exchanged on a computer network, it is inevitable that there will be many unsafe factors, such as information being stolen, tampered with and forged. In this regard, on the one hand, the security of physical lines and network nodes can be enhanced, and on the other hand, information in transmission can be encrypted. Even if the encrypted information is intercepted by criminals, it is messy and meaningless information to them. [0003] However, most of the current mainstream information encryption and decryption technologies can only be applied to information composed of single-byte characters such as letter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/001H04L9/002H04L63/0428
Inventor 张小美陆国平张振娟盛苏英周磊肖小庆
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products