Supercharge Your Innovation With Domain-Expert AI Agents!

Chinese character encryption method based on hierarchical shift

An encryption method and technology for Chinese characters, applied in digital transmission systems, secure communication through chaotic signals, secure communication devices, etc., can solve the problems of difficult writing or identification, poor readability and reproducibility of ciphertext, and achieve strong security. Effect

Inactive Publication Date: 2022-05-27
NANTONG UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character encryption method based on hierarchical shift
  • Chinese character encryption method based on hierarchical shift
  • Chinese character encryption method based on hierarchical shift

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] According to the above-mentioned Chinese character encryption method based on hierarchical shift, the steps are as follows:

[0079] (1) Transcoding

[0080] First of all, the basic process of encrypting a certain Chinese character A="" data is to process the original plaintext file or data according to a certain algorithm, making it an unreadable piece of code as "ciphertext", in order to protect the data. 不被非法人窃取、阅读的目的。”,逐字转换为数值型数据,得到高位数值序列P1={202,190,188,195,181,187,177,185,179,190,202,182,212,192, 206,195,206,181,206,188,187,202,190,176,196,214,203,183,189,208,180,192,163,202,198,179,206, 178,191,182,181,210,182,180,194,206,161,195,206,161,163,210,180,181,177,187,202,190,178,177,183,183,200,199,200,161,212,182,181,196,181,161}和低位数值序列P2={253,221,211,220,196,249, 190,253,204,205,199,212,173,180,170,247,196,196,196,254,242,253,221,180,179,214,227,168,248, 208,166,237,172,185,228,201,170,187,201,193,196,187,206,250,235,170,176,220,196,177,172,212, 239,189,163,164,253,221,...

Embodiment 2

[0101] According to the above-mentioned Chinese character encryption method based on hierarchical shift, the basic process of data encryption for a certain Chinese character to be encrypted is to process the original plaintext file or data according to a certain algorithm to make it an unreadable piece of code It is "cipher text" to achieve the purpose of protecting data from being stolen and read by illegal persons.", a Chinese character encryption step based on hierarchical shift is similar to the specific embodiment 1, only the external encryption key changes slightly: α = 0.123450000001; or β = 3.750000000001, the Chinese character encryption results are shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of Chinese characters. It can be seen that the Chinese character encryption method based on hierarchical shift proposed in this patent is sensitive to the external encrypt...

Embodiment 3

[0106] According to a kind of Chinese character encryption method based on the above-mentioned hierarchical shift, its encryption step is similar to the specific embodiment 1, only a certain segment of Chinese characters to be encrypted (“the basic process of data encryption is to encrypt the original plaintext file or data according to a certain algorithm. process to make it an unreadable piece of code as "cipher text", in order to protect the data from being stolen and read by illegal persons.") Subtle changes: "The basic process of Shuju encryption is to encrypt the original plaintext. The file or data is processed according to a certain algorithm to make it an unreadable piece of code as "cipher text", in order to achieve the purpose of protecting the data from being stolen and read by illegal persons."; or "The basic process of data encryption is to encrypt the source code. To process the plaintext file or data according to a certain algorithm, making it an unreadable piec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information encryption, and discloses a Chinese character encryption method based on hierarchical shift, which comprises the following steps: carrying out numeric data and 12bits binary conversion on a certain section of Chinese character to be encrypted to obtain binary matrixes B1 and B2; layering the binary matrix B1 and the binary matrix B2 according to rows, and splicing binary layered sequences in a staggered layer manner to obtain 12 binary layered sequences after staggered layer splicing; performing cyclic shift operation on each binary hierarchical sequence in sequence, updating the initial value and the number of iterations of the chaotic system in real time, and calculating the direction and the number of cyclic shifts by using the chaotic iteration signal to obtain the binary hierarchical sequence after cyclic shift; and finally, numerical data conversion and numerical value and Chinese character conversion are carried out, so that a Chinese character sequence C, namely the encrypted ciphertext of the Chinese character to be encrypted, is obtained. The Chinese character encryption method based on hierarchical shift is simple and feasible, can resist known / selected plaintext attacks, and has very high security.

Description

technical field [0001] The invention belongs to the technical field of information encryption, in particular to a Chinese character encryption method based on hierarchical shift. Background technique [0002] With the development of society, information resources have gradually become an important part of people's lives, and information security has also become a hot topic of people's research. At the same time, with the development of network communication technology, the security and convenience of string communication, especially Chinese characters Sexual needs are gradually increasing. [0003] In the prior art, simple inversion, position exchange, XOR, and DES or RAS hybrid encryption are mainly performed on data, and the encryption performance needs to be improved. Existing Chinese character encryption algorithms, the readability and reproducibility of most of the ciphertext obtained are too poor, there are too many ciphertext characters that are difficult to write or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/001
Inventor 盛苏英吴新华陆国平张小美刘焰森
Owner NANTONG UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More