Unlock instant, AI-driven research and patent intelligence for your innovation.

Chinese character encryption method based on layered bidirectional diffusion

An encryption method and a two-way diffusion technology, applied in digital data protection, digital transmission systems, and key distribution, can solve the problems of poor readability and reproducibility of ciphertext, difficult writing or identification, etc., and achieve resistance to known/selected plaintext Attacks, Effects of Strong Security

Inactive Publication Date: 2022-07-08
NANTONG UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character encryption method based on layered bidirectional diffusion
  • Chinese character encryption method based on layered bidirectional diffusion
  • Chinese character encryption method based on layered bidirectional diffusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] According to the above-mentioned Chinese character encryption method based on hierarchical bidirectional diffusion, the steps are as follows:

[0118] (1) Transcoding

[0119] First of all, the basic process of encrypting a certain Chinese character A="" data is to process the original plaintext file or data according to a certain algorithm, making it an unreadable piece of code as "ciphertext", in order to protect the data. 不被非法人窃取、阅读的目的。”,逐字转换为数值型数据,得到高位数值序列P1={202,190,188,195,181,187,177,185,179,190,202,182,212,192,206,195,206,181,206,188,187,202,190,176,196,214,203,183,189,208,180,192,163,202,198,179,206,178,191,182,181,210,182,180,194,206,161,195,206,161,163,210,180,181,177,187,202,190,178,177,183,183,200,199,200,161,212,182,181,196,181,161}和低位数值序列P2={253,221,211,220,196,249,190,253,204,205,199,212,173,180,170,247,196,196,196,254,242,253,221,180,179,214,227,168,248,208,166,237,172,185,228,201,170,187,201,193,196,187,206,250,235,170,176,220,196,177,172,212,239,189,163...

Embodiment 2

[0138] According to the above-mentioned Chinese character encryption method based on hierarchical bidirectional diffusion, the basic process of data encryption for a certain Chinese character to be encrypted is to process the original plaintext file or data according to a certain algorithm to make it an unreadable piece of code It is "cipher text", in order to protect the data from being stolen and read by illegal persons.", a Chinese character encryption step based on hierarchical bidirectional diffusion is similar to the specific embodiment 1, only the external encryption key changes slightly: α = 0.123450000001; or β = 3.750000000001, the Chinese character encryption results are shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of Chinese characters. It can be seen that the Chinese character encryption method based on hierarchical bidirectional diffusion proposed in this p...

Embodiment 3

[0143] According to the above-mentioned Chinese character encryption method based on hierarchical bidirectional diffusion, its encryption steps are similar to those of specific embodiment 1, and only a certain segment of Chinese characters to be encrypted (“the basic process of data encryption is to encrypt the original plaintext file or data by a certain algorithm”). process to make it an unreadable piece of code as "cipher text", so as to protect the data from being stolen and read by illegal persons.") Subtle changes: "The basic process of Shuju encryption is to encrypt the original plaintext. The file or data is processed according to a certain algorithm to make it an unreadable piece of code as "cipher text", in order to achieve the purpose of protecting the data from being stolen and read by illegal persons."; or "The basic process of data encryption is to encrypt the source code. To process the plaintext file or data according to a certain algorithm, making it an unreada...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information encryption, and discloses a Chinese character encryption method based on hierarchical bidirectional diffusion, which comprises the following steps of: performing numeric data and 12bits binary conversion on a certain section of Chinese character to be encrypted to obtain binary matrixes B1 and B2; layering and split-level splicing are carried out on the binary matrixes B1 and B2 according to rows; performing forward diffusion and reverse diffusion on the binary layered sequence subjected to split-level splicing in a layer-by-layer grouping manner by using a chaotic signal generated by chaotic mapping, and updating forward and reverse sampling step numbers and forward and reverse diffusion values in real time according to ciphertexts of forward and reverse diffusion to obtain a binary layered sequence subjected to bidirectional diffusion; and finally, numerical data conversion and numerical value and Chinese character conversion are carried out, so that a Chinese character sequence C, namely the encrypted ciphertext of the Chinese character to be encrypted, is obtained. The Chinese character encryption method provided by the invention is simple and feasible, can resist known / selected plaintext attacks, and has very high security.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to a Chinese character encryption method based on hierarchical bidirectional diffusion. Background technique [0002] With the development of society, information resources have gradually become an important part of people's lives, and information security has also become a hot topic of people's research. At the same time, with the development of network communication technology, the security and convenience of string communication, especially Chinese characters Sexual needs are gradually increasing. In the prior art, simple inversion, position exchange, XOR, and DES or RAS hybrid encryption are mainly performed on data, and the encryption performance needs to be improved. Existing Chinese character encryption algorithms, the readability and reproducibility of most of the ciphertext obtained are too poor, there are too many ciphertext characters that are difficult to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08G06F21/60
CPCH04L9/001H04L9/007H04L9/0816H04L9/0863G06F21/602
Inventor 盛苏英刘焰森吴新华陆国平张小美张嘉豪
Owner NANTONG UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More