Supercharge Your Innovation With Domain-Expert AI Agents!

Chinese character encryption method based on layered scrambling

An encryption method and Chinese character technology, applied in digital transmission systems, secure communication devices, digital data protection, etc., can solve problems such as difficult writing or identification, poor readability and reproducibility of ciphertext, and achieve resistance to known/chosen Effect of plaintext attack and strong security

Inactive Publication Date: 2022-07-12
NANTONG UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing Chinese character encryption algorithm, the readability and reproducibility of most of the ciphertexts obtained are too poor, there are too many ciphertext characters that are difficult to write or recognize, and there is no combination of the characteristics of Chinese and English characters. Convenient, safe and reliable encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chinese character encryption method based on layered scrambling
  • Chinese character encryption method based on layered scrambling
  • Chinese character encryption method based on layered scrambling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] According to the above-mentioned Chinese character encryption method based on hierarchical scrambling, the steps are as follows:

[0089] (1) Transcoding

[0090] First of all, the basic process of encrypting a certain Chinese character A="" data is to process the original plaintext file or data according to a certain algorithm, making it an unreadable piece of code as "ciphertext", in order to protect the data. 不被非法人窃取、阅读的目的。”,逐字转换为数值型数据,得到高位数值序列P1={202,190,188,195,181,187,177,185,179,190,202,182,212,192,206,195,206,181,206,188,187,202,190,176,196,214,203,183,189,208,180,192,163,202,198,179,206,178,191,182,181,210,182,180,194,206,161,195,206,161,163,210,180,181,177,187,202,190,178,177,183,183,200,199,200,161,212,182,181,196,181,161}和低位数值序列P2={253,221,211,220,196,249,190,253,204,205,199,212,173,180,170,247,196,196,196,254,242,253,221,180,179,214,227,168,248,208,166,237,172,185,228,201,170,187,201,193,196,187,206,250,235,170,176,220,196,177,172,212,239,189,163,164,253,221,...

Embodiment 2

[0112] According to the above-mentioned Chinese character encryption method based on hierarchical scrambling, the basic process of data encryption for a certain Chinese character to be encrypted is to process the original plaintext file or data according to a certain algorithm to make it an unreadable piece of code It is "cipher text" to achieve the purpose of protecting data from being stolen and read by illegal persons.", the encryption steps are similar to those in specific embodiment 1, only the external encryption key changes slightly: α=0.123450000001; or β=3.750000000001, The Chinese character encryption results are shown in Table 1. It can be seen from Table 1 that the slight change of the external encryption key will cause a great change in the encrypted ciphertext of Chinese characters. It can be seen that the Chinese character encryption method based on hierarchical scrambling proposed in this patent is sensitive to the external encryption key. .

[0113] Table 1 C...

Embodiment 3

[0117] According to the above-mentioned Chinese character encryption method based on layered scrambling, its encryption step is similar to that of specific embodiment 1, and only a certain segment of Chinese characters to be encrypted (“the basic process of data encryption is to encrypt the original plaintext file or data according to a certain algorithm”). process to make it an unreadable piece of code as "ciphertext", in order to protect the data from being stolen and read by illegal persons.") Subtle changes: "The basic process of Shuju encryption is to encrypt the original plaintext. The file or data is processed according to a certain algorithm, making it an unreadable piece of code as "cipher text", in order to achieve the purpose of protecting the data from being stolen and read by illegal persons."; or "The basic process of data encryption is to encrypt the source code. To process the plaintext file or data according to a certain algorithm, make it an unreadable piece o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Chinese character encryption method based on layered scrambling, which comprises the following steps of: performing numeric data and 12bits binary conversion on a certain section of Chinese character to be encrypted to obtain binary matrixes B1 and B2; according to the method, binary matrixes B1 and B2 are layered according to rows, binary layered sequences are scrambled according to a scrambling rule of chaotic signals, then different splicing operations are performed on the scrambled binary layered sequences according to a scrambling splicing rule, and scrambling splicing rule parameters are updated in real time. Numerical data conversion is carried out according to the numerical conversion parameters, and the numerical conversion parameters are updated in real time to obtain numerical sequences D1 and D2; and finally, carrying out numerical value and Chinese character conversion to obtain a Chinese character sequence C, namely the encrypted ciphertext of the Chinese character to be encrypted. The Chinese character encryption method based on layered scrambling is simple and feasible, can resist known / selected plaintext attacks, and has very high security.

Description

technical field [0001] The invention relates to the technical field of information encryption, in particular to a Chinese character encryption method based on hierarchical scrambling. Background technique [0002] With the development of society, information resources have gradually become an important part of people's lives, and information security has also become a hot topic of people's research. At the same time, with the development of network communication technology, the security and convenience of string communication, especially Chinese characters Sexual needs are gradually increasing. In the prior art, simple inversion, position exchange, XOR, and DES or RAS hybrid encryption are mainly performed on data, and the encryption performance needs to be improved. Existing Chinese character encryption algorithms, the readability and reproducibility of most of the ciphertext obtained are too poor, there are too many ciphertext characters that are difficult to write or rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/00
CPCG06F21/602H04L9/001
Inventor 盛苏英刘焰森陆国平张小美吴新华张嘉豪范云雷杜宇笙
Owner NANTONG UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More