Built-in file encryption and decryption method for desktop pet robot
A technology of file encryption and encryption method, which is applied in the field of robots, can solve the problems of harming the interests of original personnel, being easily read by others, and taking a long time to decrypt, and achieves the effects of good real-time performance, difficulty in cracking, and small amount of calculation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0023] like figure 1 As shown, a built-in file encryption method for a desktop pet robot includes the following steps:
[0024] Step S1, setting a password sequence; the password sequence includes two sequences, which are respectively the sequence K and sequence P , the length of each sequence is N , the value range of each element in the sequence is 0~255; the sequence K The element is k 1 , k 2 , …, k N ;sequence P The element is p 1 , p 2 , …, p N ; In order to ensure the strength of the password sequence, take N=1024; use random numbers to generate two random series as the password sequence;
[0025] Step S2, setting the encryption starting point of the cipher sequence; the method for calculating the encryption starting point of the cipher sequence includes: obtaining a file name, performing a hash operation (such as SHA-1) on the character string of the file name, and obtaining a corresponding integer m ;use m divide by N Take the remainder to get the ...
specific Embodiment approach 2
[0033] A method for decrypting a built-in file of a desktop pet robot, comprising: setting the same password sequence and encryption starting point as in the encryption method; reading an encrypted file; decrypting the content of the encrypted file byte by byte from beginning to end, and the decryption algorithm is as follows:
[0034]
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


