Supercharge Your Innovation With Domain-Expert AI Agents!

Simple and rapid communication encryption and decryption algorithm

An encryption and decryption algorithm and fast technology, applied in wireless communication, encryption device with shift register/memory, secure communication device, etc., can solve problems such as long decryption time, long ciphertext, complicated operation process, etc., and achieve machine work Less time consumption, improved security performance, fast and easy encryption and encryption

Active Publication Date: 2021-01-15
CHENGDU WANJIANGGANGLI TECH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation process of this encryption method is complicated, the encrypted ciphertext is long, and the decryption time is long.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simple and rapid communication encryption and decryption algorithm
  • Simple and rapid communication encryption and decryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] A simple and fast communication encryption and decryption algorithm includes an encryption step and a corresponding decryption step, and the encryption algorithm includes the following steps:

[0031] S1: Input: Process the data to be encrypted in bytes as the input source string; for example, a binary or ASCII data string;

[0032] S2: Preparation: Prepare a key string, an extension sequence and an output sequence. The extension sequence is composed of countless extension codes. Each extension code is an integer and can be repeated. The extension code represents the number of extension bits. The value of the extension code in the extension sequence marks the corresponding extension bit in the output sequence; the data in the key string can be a binary code or ASCII data string, and the input source string and the key string can be the same binary code or ASCII data string;

[0033] S3: length comparison: the length of the input source string is compared with the exten...

Embodiment 2

[0045] On the basis of Embodiment 1, the extension of the extended sequence length or the key length is in the form of a ring string, and the ring position can start from the first bit of the extended sequence length or the key, or from other positions after the first bit. The encryption step The looping position in is consistent with the looping position in the decryption step.

[0046] As the value of the extension code in the extension sequence in the above S2 step, the length is the length of 15 figures, byteextendceode[]={1,3,2,6,3,1,4,6,8,1,2,3, 4,5,1}, if it needs to be extended to 20 digits to match the length of the input source string, the subsequent digits can be followed by the last digit 1 followed by the first digit 1 or the second digit 2 Loop, or start looping from other digit positions behind to form a ring string. Similarly, in the process of step S5, the length of the key data string is compared with the length of the input data string. When the length of t...

Embodiment 3

[0049] On the basis of Embodiment 1, the input source string data in the step S1 is preprocessed by custom byte. For example, a byte of data can be shifted left or right by a few bits. For example, define α to move 4 bits to the left, define β to move 4 bits to the right, and define γ to move 3 bits to the left. If the input source string is 0x43, 0xA4, 0xA4, perform α operation on 0x43 to get 0x34; Perform β operation to obtain 0x4A, and perform γ operation on 0xA4 to obtain 0x25, that is, the input source string data 0x43, 0xA4, 0xA4 becomes 0x34, 0x4A, 0x25 after preprocessing, which further strengthens the security performance of the file to be encrypted.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a simple and rapid communication encryption and decryption algorithm, which comprises an encryption process and a corresponding decryption process. The encryption process comprises six steps of inputting a source string; preparing a key string, an extended sequence and an output sequence; comparing the length of the input source string with the length of the extended sequence; determining an operation operator; performing operation; and enabling an operation result to correspond to the output sequence so as to finish the encryption. The decryption process comprises three steps of determining the operation operator; performing operation; and acquiring the input source string to finish the decryption. According to the method, the output length of the whole input datais extended according to the extended sequence, the length of the encrypted data obtained by a user is prolonged, the cracking difficulty of communication transmission is increased, and the extended code value of the extended sequence adopted by the invention is uncertain, so that the extension bit length of the output sequence is uncertain, other people do not start in the decryption process, andthe safety performance of file transmission is improved.

Description

technical field [0001] The invention relates to the technical field of encryption and decryption of data sent and received by a mobile terminal, in particular to a communication encryption and decryption algorithm. Background technique [0002] In the growing Internet of Things industry, data confidentiality technology is very important in computer network communication security. In the communication process, information collection, storage, transmission, etc. are important parts of the application process, and information is composed of data. Data as It is an important carrier of information, and its encryption protection is an important way to prevent information from being stolen, destroyed, or intentionally tampered with. [0003] At present, the country has also introduced some security specifications for the Internet of Things, but the encryption methods and algorithms are some common mainstream algorithms, which are usually divided into two categories, namely, asymmet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04W12/03H04W12/04
CPCH04L9/0625H04L9/0861
Inventor 邵林贺新杨岚斐罗朝传
Owner CHENGDU WANJIANGGANGLI TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More