Character string encryption method based on layered scrambling
An encryption method and string technology, which are applied in the fields of digital data protection, complex mathematical operations, nonlinear system models, etc., can solve the problems of poor readability and reproducibility of ciphertext, difficult to write or recognize, and achieve a simple encryption method. Feasible, resistant to known/chosen-plaintext attacks, effect of strong security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] According to the above-mentioned string encryption method based on hierarchical scrambling, the steps are as follows:
[0087] (1) Transcoding
[0088] First, a certain string to be encrypted A = "string "abc123! @#" encryption: first input a string, encrypt it, and finally add the encrypted characters to an empty string for output.", convert it to numerical data word by word, and get a high-order numerical sequence P1={215,183,180,161,0 ,0,0,0,0,0,0,0,0,161,181,188,195,163,207,202,200,210,184,215,183,180,163,189,208,188,195,163,215,186,189,188,195,186,181,215,183,204,188,181,210,184,191,181,0,0,0,0,0,0,214,202,179,161}和低位数值序列P2={214,251,174,176,97,98,99,49,50,51, 33,64,35,177,196,211,220,186,200,228,235,187,246,214,251,174,172,248,208,211,220,172,238,243,171,211,220,243,196,214,251,237,211,189,187,246,213,196,115,116,114,105,110,103,208,228,246,163},
[0089] Then, use dec2bin(·,10) to convert the element P1 in the high-order numerical sequence P1 i Convert one by o...
Embodiment 2
[0108] According to the above-mentioned string encryption method based on hierarchical scrambling, a certain string to be encrypted is "string" abc123! @#" encryption: first input a string, encrypt, and finally add the encrypted characters to an empty string for output.", the encryption steps are similar to those in specific embodiment 1, only the external encryption key changes slightly : α=0.123450000001; or β=3.750000000001, the string encryption result is shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of the string. It can be seen that the string encryption method based on hierarchical scrambling proposed in this patent has a great effect on the external encryption key. Sensitivity.
[0109] Table 1 String encryption results when the external encryption key changes slightly
[0110]
[0111]
Embodiment 3
[0113] According to the above-mentioned string encryption method based on layered scrambling, the encryption steps are similar to those of the specific embodiment 1, and only a certain segment of the string to be encrypted changes slightly: "substring" abc123! @#" encryption: first input a string, encrypt it, and finally add the encrypted characters to an empty string for output."; or "the string "abc123! Add honey to @#": first input a string, encrypt it, and finally add the encrypted characters to an empty string for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and add the encrypted characters to an empty string for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and finally add the encrypted characters to two empty strings for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and finally add the encrypted characters to an empty string for output!", the string encryp...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com