Chinese character encryption method based on hierarchical shift
An encryption method and technology for Chinese characters, applied in digital transmission systems, secure communication through chaotic signals, secure communication devices, etc., can solve the problems of difficult writing or identification, poor readability and reproducibility of ciphertext, and achieve strong security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] According to the above-mentioned Chinese character encryption method based on hierarchical shift, the steps are as follows:
[0079] (1) Transcoding
[0080] First of all, the basic process of encrypting a certain Chinese character A="" data is to process the original plaintext file or data according to a certain algorithm, making it an unreadable piece of code as "ciphertext", in order to protect the data. 不被非法人窃取、阅读的目的。”,逐字转换为数值型数据,得到高位数值序列P1={202,190,188,195,181,187,177,185,179,190,202,182,212,192, 206,195,206,181,206,188,187,202,190,176,196,214,203,183,189,208,180,192,163,202,198,179,206, 178,191,182,181,210,182,180,194,206,161,195,206,161,163,210,180,181,177,187,202,190,178,177,183,183,200,199,200,161,212,182,181,196,181,161}和低位数值序列P2={253,221,211,220,196,249, 190,253,204,205,199,212,173,180,170,247,196,196,196,254,242,253,221,180,179,214,227,168,248, 208,166,237,172,185,228,201,170,187,201,193,196,187,206,250,235,170,176,220,196,177,172,212, 239,189,163,164,253,221,...
Embodiment 2
[0101] According to the above-mentioned Chinese character encryption method based on hierarchical shift, the basic process of data encryption for a certain Chinese character to be encrypted is to process the original plaintext file or data according to a certain algorithm to make it an unreadable piece of code It is "cipher text" to achieve the purpose of protecting data from being stolen and read by illegal persons.", a Chinese character encryption step based on hierarchical shift is similar to the specific embodiment 1, only the external encryption key changes slightly: α = 0.123450000001; or β = 3.750000000001, the Chinese character encryption results are shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of Chinese characters. It can be seen that the Chinese character encryption method based on hierarchical shift proposed in this patent is sensitive to the external encrypt...
Embodiment 3
[0106] According to a kind of Chinese character encryption method based on the above-mentioned hierarchical shift, its encryption step is similar to the specific embodiment 1, only a certain segment of Chinese characters to be encrypted (“the basic process of data encryption is to encrypt the original plaintext file or data according to a certain algorithm. process to make it an unreadable piece of code as "cipher text", in order to protect the data from being stolen and read by illegal persons.") Subtle changes: "The basic process of Shuju encryption is to encrypt the original plaintext. The file or data is processed according to a certain algorithm to make it an unreadable piece of code as "cipher text", in order to achieve the purpose of protecting the data from being stolen and read by illegal persons."; or "The basic process of data encryption is to encrypt the source code. To process the plaintext file or data according to a certain algorithm, making it an unreadable piec...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com