Supercharge Your Innovation With Domain-Expert AI Agents!

Character string encryption method based on hierarchical shift

An encryption method and string technology, applied in digital transmission systems, secure communication through chaotic signals, and key distribution, can solve problems such as difficult writing or identification, poor readability and reproducibility of ciphertext, and achieve simple and feasible encryption methods , the effect of strong security

Inactive Publication Date: 2022-05-27
NANTONG UNIVERSITY
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no comprehensive feature of Chinese and English characters. A simple and convenient set is proposed , safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Character string encryption method based on hierarchical shift
  • Character string encryption method based on hierarchical shift
  • Character string encryption method based on hierarchical shift

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Follow one of the preceding string encryption methods based on hierarchical shifts, as follows:

[0066] (1) Transcoding

[0067] Place a certain piece of string to be encrypted A= "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ", character by character converted to numeric data, resulting in the numerical sequence P={ 215,214,183,251,180,174,161,176,97,98,99,49,50,51,33,64,35,161,177,181,196,188,211,195,220,163,186,207,200,202,228,200,235,210,187,184,246,215,214,183,251,180,174,163,172,189,248,208,208,188,211,195,220,163 ,172,215,238,186,243,189,171,188,211,195,220,186,243,181,196,215,214,183,251,204,237,188,211,181,189,210,187,184,246,191,213,181,196,115,116,114,105,110,103,214,208,202,228,179,246,161,163 },

[0068] Using the function dec2bin(·, 8), the element P in the numerical sequence P is used i Converted to a binary sequence of 8 bits {PB one by one i1 ,PB i2 ,PB i3 ,PB i4 ,PB i5 ,...

Embodiment 2

[0079] According to one of the above string encryption methods based on hierarchical shifts, a certain piece of string to be encrypted is "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ", a string encryption step based on hierarchical shifting is similar to specific embodiment 1, only the external encryption key undergoes a slight change: α = 0.1234500000001; or β = 3.750000000001, the string encryption result as shown in Table 1. As can be seen from Table 1, subtle changes in the external encryption key will cause great changes in the string encryption ciphertext, which shows that a string encryption method based on hierarchical shifting proposed in this patent is sensitive to the external encryption key.

[0080] Table 1 String encryption results when the external encryption key changes slightly

[0081]

Embodiment 3

[0083]According to the above one of the above string encryption methods based on hierarchical shifts, the encryption steps thereof are similar to specific embodiment 1, only a certain piece of string to be encrypted ("string" abc123!). @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ") slight changes: "Word pay string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. "; or "string" abc123! @*" encryption: First enter a string, encrypt, and finally add the encrypted character to an empty string output. "; or "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the character of the encryption stone to an empty string output. "; or "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to the output of two empty string. "; or "string" abc123! @#" encryption: first enter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information encryption, and discloses a character string encryption method based on hierarchical shift, which comprises the following steps of: performing numeric data and 8bits binary conversion on a certain section of character string to be encrypted to obtain a binary matrix BB; layering the binary matrix BB according to rows, calculating the direction and the number of cyclic shifts by using a chaos iteration signal, sequentially performing cyclic shift operation on each binary layered sequence, and updating the initial value of the chaos system in real time according to the binary layered sequence after cyclic shift; filling the binary layered sequence after cyclic shift into a binary matrix CC line by line, and performing numeric data conversion to obtain a numeric sequence D; and finally, numerical value and character conversion is carried out, so that a character sequence C, namely an encrypted ciphertext of the to-be-encrypted character string, is obtained. The character string encryption method based on hierarchical shift provided by the invention is simple and feasible, can resist known / selected plaintext attacks, and has very high security.

Description

Technical field [0001] The present invention relates to the field of information encryption technology, in particular to a string encryption method based on hierarchical shifting. Background [0002] With the development of society, information resources have gradually become an important part of people's lives, information security has also become a hot topic for people's research, and with the development of network communication technology, the demand for data, especially the security and convenience of character communication, has gradually increased. [0003] In the prior art, the data is mainly simple to reverse, location exchange, XOR, and DES or RAS hybrid encryption, encryption performance needs to be improved. The existing character encryption algorithm, most of the obtained ciphertext readability and reproducibility is too poor, there are too many ciphertext characters that are not easy to write or identify, and there is no comprehensive Chinese, English character char...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08
CPCH04L9/001H04L9/0861
Inventor 盛苏英刘焰森陆国平张小美吴新华
Owner NANTONG UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More