Character string encryption method based on hierarchical shift
An encryption method and string technology, applied in digital transmission systems, secure communication through chaotic signals, and key distribution, can solve problems such as difficult writing or identification, poor readability and reproducibility of ciphertext, and achieve simple and feasible encryption methods , the effect of strong security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0065] Follow one of the preceding string encryption methods based on hierarchical shifts, as follows:
[0066] (1) Transcoding
[0067] Place a certain piece of string to be encrypted A= "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ", character by character converted to numeric data, resulting in the numerical sequence P={ 215,214,183,251,180,174,161,176,97,98,99,49,50,51,33,64,35,161,177,181,196,188,211,195,220,163,186,207,200,202,228,200,235,210,187,184,246,215,214,183,251,180,174,163,172,189,248,208,208,188,211,195,220,163 ,172,215,238,186,243,189,171,188,211,195,220,186,243,181,196,215,214,183,251,204,237,188,211,181,189,210,187,184,246,191,213,181,196,115,116,114,105,110,103,214,208,202,228,179,246,161,163 },
[0068] Using the function dec2bin(·, 8), the element P in the numerical sequence P is used i Converted to a binary sequence of 8 bits {PB one by one i1 ,PB i2 ,PB i3 ,PB i4 ,PB i5 ,...
Embodiment 2
[0079] According to one of the above string encryption methods based on hierarchical shifts, a certain piece of string to be encrypted is "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ", a string encryption step based on hierarchical shifting is similar to specific embodiment 1, only the external encryption key undergoes a slight change: α = 0.1234500000001; or β = 3.750000000001, the string encryption result as shown in Table 1. As can be seen from Table 1, subtle changes in the external encryption key will cause great changes in the string encryption ciphertext, which shows that a string encryption method based on hierarchical shifting proposed in this patent is sensitive to the external encryption key.
[0080] Table 1 String encryption results when the external encryption key changes slightly
[0081]
Embodiment 3
[0083]According to the above one of the above string encryption methods based on hierarchical shifts, the encryption steps thereof are similar to specific embodiment 1, only a certain piece of string to be encrypted ("string" abc123!). @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. ") slight changes: "Word pay string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to an empty string output. "; or "string" abc123! @*" encryption: First enter a string, encrypt, and finally add the encrypted character to an empty string output. "; or "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the character of the encryption stone to an empty string output. "; or "string" abc123! @#" encryption: First enter a string, encrypt, and finally add the encrypted characters to the output of two empty string. "; or "string" abc123! @#" encryption: first enter...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com