Information encryption method, information decryption method, terminal and computer readable storage medium

A technology for information encryption and information decryption, which is applied in the field of decryption methods, terminals and computer-readable storage media, and information encryption, and can solve the problems of easy deciphering of encryption methods and low information security

Active Publication Date: 2019-08-30
重庆葵海数字科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a new information encryption and decryption scheme to solve the problem that the encryption method in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption method, information decryption method, terminal and computer readable storage medium
  • Information encryption method, information decryption method, terminal and computer readable storage medium
  • Information encryption method, information decryption method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0074] If the original information to be protected includes m data, according to the information encryption scheme provided in the related art, when the original information is encrypted, the processing for each of the m data is the same , for example, for the character string "I LOVE YOU", a typical encryption method in the related art is to add k to each value of the character string, for example, in one scheme, the value of k is 1 , then the ciphertext obtained after encryption is "J MPWFZPV", comparing the original information and the ciphertext, it is easy to see that since the processing of each data is exactly the same, the same data in the original information is also in the ciphertext identical. For this encryption scheme, the mapping relationship is simple. Once the ciphertext is intercepted, the risk of being deciphered is very high, which seriously threatens the user's information security. In order to solve this problem, this embodiment provides an information enc...

no. 2 example

[0101] This embodiment will provide an information decryption method corresponding to the information encryption method in the first embodiment, please refer to Figure 5 The flow chart of the information decryption method shown:

[0102] S502: The decryption terminal acquires the encrypted information to be decrypted.

[0103] It should be understood that the decryption terminal can receive the encrypted information through the network. For example, the mobile phone of user A and the mobile phone of user B perform encrypted communication. After the mobile phone of user A encrypts the original information to generate encrypted information, it is transmitted through the network. To the mobile phone of user B, in this case, the mobile phone of user B obtains the encrypted information from the network. Of course, those skilled in the art can understand that there are many other ways for the decryption terminal to obtain encrypted information, for example, copying encrypted infor...

no. 3 example

[0121] In order to make those skilled in the art more aware of the advantages and details of the information encryption method and information decryption method provided by the present invention, this embodiment will further illustrate the process background management method with examples: First, assume that the terminal in this embodiment for mobile phones, such as Figure 7As shown, the mobile phone 700 communicates with another tablet computer. It is assumed that the mobile phone 700 needs to transmit a file to the tablet computer. The information contained in the file is sensitive and requires high security protection. Therefore, the mobile phone 700 and the tablet computer are based on The information encryption and decryption scheme provided in the foregoing embodiments encrypts and transmits files to be transmitted. See Figure 8 Provided flow chart of interaction between mobile phone 700 and tablet computer:

[0122] S802: The mobile phone converts the obtained orig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information encryption method, an information decryption method, a terminal and a computer readable storage medium. In order to solve the problem that an encryption mode ina related information encryption scheme is simple, the ciphertext is easy to decode, and the information security degree is not high. According to the information encryption and decryption scheme provided by the embodiment of the invention, the Josepher ring is applied to generate the Josepher ring sequence, so that all data in the decimal data sequence obtained by converting the original information are processed differently, and the decoding difficulty after the ciphertext is intercepted is enhanced. Moreover, because the Josepher ring parameters are variable, even if the number of the datain the decimal data sequence obtained by converting the original information is not changed, different Josepher ring sequences can be obtained, so that the key matrix is diversified, and the information security is enhanced. The embodiment of the invention further provides a terminal and a computer readable storage medium, the information security is improved, the user information security guarantee is enhanced, and the user experience is maintained.

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, to an information encryption and decryption method, a terminal and a computer-readable storage medium. Background technique [0002] With the development of network technology, information security is paid more and more attention by users. In order to prevent information from being maliciously attacked or intercepted during transmission, which may lead to information leakage, users will encrypt information during transmission. For example, when users at the information sending end need to transmit sensitive information, they will use encryption algorithms to The information is encrypted, and the encrypted ciphertext is transmitted to the information receiving end. The information sending end and the information receiving end can pre-agree on the information encryption method. Therefore, after the information receiving end receives the ciphertext, it can be encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04M1/725
CPCH04L9/06H04M2250/22H04M1/7243
Inventor 王国龙
Owner 重庆葵海数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products