Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chinese and English character string encryption method

An encryption method and string technology, applied in the field of information security, can solve the problems of poor readability and reproducibility of ciphertext, difficult to write or identify, etc.

Active Publication Date: 2020-01-03
NANTONG UNIVERSITY
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese and English character string encryption method
  • Chinese and English character string encryption method
  • Chinese and English character string encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] According to a kind of Chinese and English character string encryption method in the above-mentioned specific embodiment, the steps are as follows:

[0081] (1) With a certain section of Chinese and English character strings "A Chinese and English character string encryption method, 1+1>2?" 所示字符与数值的转换运算,将其转换成数值型数据,得到数值序列P={210,187,214,214,214,208,211,162,206,196,215,214,183,251,180,174,188,211,195,220,183,189,183,168,163,172,49,43,49,62,50,194,240,163,191},再将数值序列P逐个元素转换成8bits的二进制数据, Get binary bit sequence B={1,1,0,1,0,0,1,0,1,0,1,1,1,0,1,1,1,1,0,1,0,1 ,1,0,1,1,0,1,0,1,1,0,1,1,0,1,0,1,1,0,1,1,0,1,0,0,0 ,0,1,1,0,1,0,0,1,1,1,0,1,0,0,0,1,0,1,1,0,0,1,1,1,0 ,1,1,0,0,0,1,0,0,1,1,0,1,0,1,1,1,1,1,0,1,0,1,1,0,1 ,0,1,1,0,1,1,1,1,1,1,1,1,0,1,1,1,0,1,1,0,1,0,0,1,0 ,1,0,1,1,1,0,1,0,1,1,1,1,0,0,1,1,0,1,0,0,1,1,1,1,0 ,0,0,0,1,1,1,1,0,1,1,1,0,0,1,0,1,1,0,1,1,1,1,0,1,1 ,1,1,0,1,1,0,1,1,0,1,1,1,1,0,1,0,1,0,0,0,1,0,1,0,0 ,0,1,1,1,0,1,0,1,1,0,0,0,0,1,1,0,0,0,1,0,0,1,0,1,0 ,1,1,0,0,1...

Embodiment 2

[0089] According to the above-mentioned a kind of Chinese-English character string encryption method, a certain Chinese-English character string to be encrypted is "a Chinese-English character string encryption method, 1+1>2?", and its encryption steps are similar to the specific embodiment 1, only The encryption key changes slightly: α=0.12345000000001, or β=0.54321000000001, and the encryption results of Chinese and English strings are shown in Table 1. It can be seen from Table 1 that a slight change in the encryption key will cause a large change in the encrypted ciphertext of the Chinese and English strings. It can be seen that the encryption method for the Chinese and English strings proposed in this patent is sensitive to the encryption key.

[0090] Table 1 Encryption results of Chinese and English strings when the external encryption key changes slightly

[0091]

[0092]

Embodiment 3

[0094] According to the above-mentioned a kind of Chinese and English character string encryption method, its encryption step is similar to specific embodiment 1, only a certain section to be encrypted Chinese and English character string ("A kind of Chinese and English character string encryption method, 1+1>2?") Subtle changes: "Two encryption methods for Chinese and English strings, 1+1>2?"; or "One encryption method for Chinese and English strings, 1+1>2?"; or "A Chinese and English string encryption method String sweetening method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1 2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; Encryption method of Chinese and English strings, 1+1>2?", the encryption results of Chinese and English strings are shown in Table 2....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Chinese and English character string encryption method, comprising the following steps: converting a certain section of Chinese and English character string to obtain a binary bit sequence B; carrying out forward shift encryption on the binary bit sequence B and then carrying out reverse shift encryption on the binary bit sequence B; obtaining a binary bit sequence B after bidirectional shift encryption, wherein shift encryption comprises repeated operations of binary bit grouping of nine elements in sequence in the forward / reverse direction, chaotic mapping single iteration, grouping sequence cyclic shift, chaotic mapping initial value adjustment, grouping sequence replacement and updating and the like; and finally, grouping the sequence B by taking six elementsas units in the forward direction, converting the grouped sequence B into numeric data, and converting numerical values and characters to obtain an encrypted ciphertext of the section of Chinese and English character string. According to the Chinese and English character string encryption method, bidirectional shift encryption is carried out on the binary bit sequence converted from the Chinese and English character strings by utilizing the password characteristic of the chaotic signal, so that the Chinese and English character string encryption method has good performance of resisting known / selected plaintext attacks, and can ensure the security and feasibility of Chinese and English character string encryption.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a Chinese and English character string encryption method. Background technique [0002] With the rapid development of modern communication technology, computer network has become a means of information exchange in many fields. Since the computer network is an open network, information exchange often faces security issues such as information theft, tampering and forgery. At this time, the research and application of information encryption technology is imperative. [0003] At present, most mainstream information encryption and decryption technologies can only be applied to information composed of single-byte characters such as letters, numbers, and English punctuation marks, while information encryption algorithms that can be used for information composed of double-byte characters such as Chinese characters and Chinese punctuation marks are rare. Existing encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/0618H04L9/001
Inventor 盛苏英陆国平吴新华张小美张振娟朱建红周磊任洁
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products