Chinese and English character string encryption method
An encryption method and string technology, applied in the field of information security, can solve the problems of poor readability and reproducibility of ciphertext, difficult to write or identify, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] According to a kind of Chinese and English character string encryption method in the above-mentioned specific embodiment, the steps are as follows:
[0081] (1) With a certain section of Chinese and English character strings "A Chinese and English character string encryption method, 1+1>2?" 所示字符与数值的转换运算,将其转换成数值型数据,得到数值序列P={210,187,214,214,214,208,211,162,206,196,215,214,183,251,180,174,188,211,195,220,183,189,183,168,163,172,49,43,49,62,50,194,240,163,191},再将数值序列P逐个元素转换成8bits的二进制数据, Get binary bit sequence B={1,1,0,1,0,0,1,0,1,0,1,1,1,0,1,1,1,1,0,1,0,1 ,1,0,1,1,0,1,0,1,1,0,1,1,0,1,0,1,1,0,1,1,0,1,0,0,0 ,0,1,1,0,1,0,0,1,1,1,0,1,0,0,0,1,0,1,1,0,0,1,1,1,0 ,1,1,0,0,0,1,0,0,1,1,0,1,0,1,1,1,1,1,0,1,0,1,1,0,1 ,0,1,1,0,1,1,1,1,1,1,1,1,0,1,1,1,0,1,1,0,1,0,0,1,0 ,1,0,1,1,1,0,1,0,1,1,1,1,0,0,1,1,0,1,0,0,1,1,1,1,0 ,0,0,0,1,1,1,1,0,1,1,1,0,0,1,0,1,1,0,1,1,1,1,0,1,1 ,1,1,0,1,1,0,1,1,0,1,1,1,1,0,1,0,1,0,0,0,1,0,1,0,0 ,0,1,1,1,0,1,0,1,1,0,0,0,0,1,1,0,0,0,1,0,0,1,0,1,0 ,1,1,0,0,1...
Embodiment 2
[0089] According to the above-mentioned a kind of Chinese-English character string encryption method, a certain Chinese-English character string to be encrypted is "a Chinese-English character string encryption method, 1+1>2?", and its encryption steps are similar to the specific embodiment 1, only The encryption key changes slightly: α=0.12345000000001, or β=0.54321000000001, and the encryption results of Chinese and English strings are shown in Table 1. It can be seen from Table 1 that a slight change in the encryption key will cause a large change in the encrypted ciphertext of the Chinese and English strings. It can be seen that the encryption method for the Chinese and English strings proposed in this patent is sensitive to the encryption key.
[0090] Table 1 Encryption results of Chinese and English strings when the external encryption key changes slightly
[0091]
[0092]
Embodiment 3
[0094] According to the above-mentioned a kind of Chinese and English character string encryption method, its encryption step is similar to specific embodiment 1, only a certain section to be encrypted Chinese and English character string ("A kind of Chinese and English character string encryption method, 1+1>2?") Subtle changes: "Two encryption methods for Chinese and English strings, 1+1>2?"; or "One encryption method for Chinese and English strings, 1+1>2?"; or "A Chinese and English string encryption method String sweetening method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1 2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; or "A Chinese and English string encryption method, 1+1>2?"; Encryption method of Chinese and English strings, 1+1>2?", the encryption results of Chinese and English strings are shown in Table 2....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com