Encryption and decryption method for Chinese and English character strings

An encryption method and string technology, applied in the field of information security, can solve the problems of poor readability and reproducibility of ciphertext, difficult to write or identify, etc.

Active Publication Date: 2019-10-01
NANTONG UNIVERSITY
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext charact...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for Chinese and English character strings
  • Encryption and decryption method for Chinese and English character strings
  • Encryption and decryption method for Chinese and English character strings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0139] According to the encryption method of a kind of Chinese and English character string in the above-mentioned specific embodiment, the steps are as follows:

[0140] (1) With a certain section of Chinese and English character strings "encryption method and decryption method of a character, 1+1>2?" Character by character according to the encryption method steps (1) of a kind of Chinese and English character strings in the above-mentioned specific embodiment ) shown in the character and numerical conversion operation, it is converted into numerical data, and the numerical sequence P={82,59,86,86,87,86,55,123,53,68,60,83,67,92 is obtained ,55,61,55,40,58,77,61,98,67,92,55,61,55,40,35,44,0,49,0,43,0,49,0,62,0 ,50,66,112,35,63} and then convert the numerical sequence P into 7bit binary data element by element, and obtain the binary sequence B={1,0,1,0,0,1,0,0,1,1,1 ,0,1,1,1,0,1,0,1,1,0,1,0,1,0,1,1,0,1,0,1,0,1,1,1,1 ,0,1,0,1,1,0,0,1,1,0,1,1,1,1,1,1,1,0,1,1,0,1,1,0,1 ,0,1,1,0...

Embodiment 2

[0152] According to the above-mentioned encryption method of a Chinese and English character string, a Chinese and English character string to be encrypted is "a kind of character encryption method and decryption method, 1+1>2?", and its encryption steps are similar to the specific embodiment 1 , only the encryption key changes slightly: α=0.12345000000001, or β=0.54321000000001, the results of the encryption of Chinese and English strings are shown in Table 1. It can be seen from Table 1 that slight changes in the encryption key will cause great changes in the encrypted ciphertext of the Chinese and English strings. It can be seen that the encryption method for the Chinese and English strings proposed in this patent is sensitive to the encryption key.

[0153] Table 1 Encryption results of Chinese and English strings when the external encryption key changes slightly

[0154]

[0155]

Embodiment 3

[0157] According to the above-mentioned encryption method of a Chinese and English character string, its encryption steps are similar to the specific embodiment 1, only a certain section of Chinese and English character strings to be encrypted ("A kind of character encryption method and decryption method, 1+1>2? ") slight changes: "encryption method and decryption method of two characters, 1+1>2?"; or "encryption method and decryption method of a character, 1+1>2?"; or " A character encryption method and decryption method, 1+1>2?"; or "A character encryption method and decryption method, 1+1>2?"; or "A character encryption method and Decryption method, 1+12."; or "A character encryption method and decryption method, 1+1> 2?", the encryption results of Chinese and English strings are shown in Table 2. It can be seen from Table 2 that slight changes in the plaintext information of the Chinese and English strings to be encrypted will cause the encrypted ciphertext to be "unrecog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption method for Chinese and English character strings, which comprises the following steps of: converting a certain section of Chinese and English character string into numerical data one by one, and converting the numerical data into 7bits binary data to obtain a binary sequence; secondly, scrambling the binary sequence according to the position change rules before and after the chaotic signals are ranked; through a cyclic operation of single iteration of a chaotic system, shifting of binary grouping sequences one by one and parameter adjustmentof the chaotic system, completing shifting of the scrambled binary sequences; and finally, carrying out numerical value and character conversion to obtain an encrypted ciphertext of the Chinese and English character string, and decrypting the ciphertext through a similar method to restore the original Chinese and English character string. According to the method, the password characteristic of the chaotic signal is utilized to encrypt/decrypt a binary sequence formed by converting Chinese and English character strings through scrambling, grouping, shifting and other operations, known/selectedplaintext attacks and only ciphertext attacks can be resisted, and the encryption and decryption safety of the Chinese and English character strings is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for encrypting and decrypting Chinese and English character strings. Background technique [0002] With the rapid development of modern communication technology, computer network has become a means of information exchange in many fields. Since the computer network is an open network, information exchange often faces security issues such as information theft, tampering and forgery. At this time, the research and application of information encryption technology is imperative. [0003] At present, most mainstream information encryption and decryption technologies can only be applied to information composed of single-byte characters such as letters, numbers, and English punctuation marks, while information encryption algorithms that can be used for information composed of double-byte characters such as Chinese characters and Chinese punctuation marks are rare. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/065H04L9/0618H04L9/001
Inventor 盛苏英张振娟张小美陆国平周磊高岩波朱建红任宇任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products