Supercharge Your Innovation With Domain-Expert AI Agents!

Character string encryption method based on layered scrambling

An encryption method and string technology, which are applied in the fields of digital data protection, complex mathematical operations, nonlinear system models, etc., can solve the problems of poor readability and reproducibility of ciphertext, difficult to write or recognize, and achieve a simple encryption method. Feasible, resistant to known/chosen-plaintext attacks, effect of strong security

Inactive Publication Date: 2022-07-05
NANTONG UNIVERSITY
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Character string encryption method based on layered scrambling
  • Character string encryption method based on layered scrambling
  • Character string encryption method based on layered scrambling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] According to the above-mentioned string encryption method based on hierarchical scrambling, the steps are as follows:

[0087] (1) Transcoding

[0088] First, a certain string to be encrypted A = "string "abc123! @#" encryption: first input a string, encrypt it, and finally add the encrypted characters to an empty string for output.", convert it to numerical data word by word, and get a high-order numerical sequence P1={215,183,180,161,0 ,0,0,0,0,0,0,0,0,161,181,188,195,163,207,202,200,210,184,215,183,180,163,189,208,188,195,163,215,186,189,188,195,186,181,215,183,204,188,181,210,184,191,181,0,0,0,0,0,0,214,202,179,161}和低位数值序列P2={214,251,174,176,97,98,99,49,50,51, 33,64,35,177,196,211,220,186,200,228,235,187,246,214,251,174,172,248,208,211,220,172,238,243,171,211,220,243,196,214,251,237,211,189,187,246,213,196,115,116,114,105,110,103,208,228,246,163},

[0089] Then, use dec2bin(·,10) to convert the element P1 in the high-order numerical sequence P1 i Convert one by o...

Embodiment 2

[0108] According to the above-mentioned string encryption method based on hierarchical scrambling, a certain string to be encrypted is "string" abc123! @#" encryption: first input a string, encrypt, and finally add the encrypted characters to an empty string for output.", the encryption steps are similar to those in specific embodiment 1, only the external encryption key changes slightly : α=0.123450000001; or β=3.750000000001, the string encryption result is shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of the string. It can be seen that the string encryption method based on hierarchical scrambling proposed in this patent has a great effect on the external encryption key. Sensitivity.

[0109] Table 1 String encryption results when the external encryption key changes slightly

[0110]

[0111]

Embodiment 3

[0113] According to the above-mentioned string encryption method based on layered scrambling, the encryption steps are similar to those of the specific embodiment 1, and only a certain segment of the string to be encrypted changes slightly: "substring" abc123! @#" encryption: first input a string, encrypt it, and finally add the encrypted characters to an empty string for output."; or "the string "abc123! Add honey to @#": first input a string, encrypt it, and finally add the encrypted characters to an empty string for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and add the encrypted characters to an empty string for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and finally add the encrypted characters to two empty strings for output."; or "the string "abc123! @#" encryption: first enter a string, encrypt it, and finally add the encrypted characters to an empty string for output!", the string encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a character string encryption method based on layered scrambling, which comprises the following steps of: performing numeric data and 10 bits binary conversion on a certain section of character string to be encrypted to obtain binary matrixes B1 and B2; the method comprises the following steps: respectively layering binary matrixes B1 and B2 according to rows, respectively scrambling binary layered sequences by using a scrambling rule of chaotic signals, then carrying out different splicing operations on the scrambled binary layered sequences according to a scrambling splicing rule, updating scrambling splicing rule parameters in real time, and then carrying out numeric data conversion to obtain a binary data conversion result. Obtaining a numerical sequence D; and finally, numerical value and character conversion is carried out, so that a character sequence C, namely an encrypted ciphertext of the to-be-encrypted character string, is obtained. The character string encryption method based on layered scrambling is simple and feasible, can resist known / selected plaintext attacks, and has very high security.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to a string encryption method based on hierarchical scrambling. Background technique [0002] With the development of society, information resources have gradually become an important part of people's lives, and information security has also become a hot topic of people's research. At the same time, with the development of network communication technology, the security and convenience of data, especially string communication Sexual needs are gradually increasing. In the prior art, simple inversion, position exchange, XOR, and DES or RAS hybrid encryption are mainly performed on data, and the encryption performance needs to be improved. Existing Chinese character encryption algorithms, the readability and reproducibility of most of the ciphertext obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F17/16G06N7/08
CPCG06F21/602G06F17/16G06N7/08
Inventor 刘焰森盛苏英陆国平张小美吴新华张嘉豪范云雷杜宇笙
Owner NANTONG UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More