Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption-decryption method based on Base64 and device thereof

An encryption method and an encryption device technology, which are applied in the field of Base64-based encryption and decryption methods and devices, can solve problems such as being easily intercepted, and achieve high security effects

Active Publication Date: 2017-02-01
GUANGDONG YOUMAI INFORMATION COMM TECH
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Base64 encoding is used for encryption and decryption in the field of data security due to its unreadability; however, because its encoding principle is open to the public, decoding tools are very common, so in actual data security applications, usually only Base64 is used for encoding, and other encryption and decryption are used. Means, such as DES, AES, etc., are rarely used alone for encryption and decryption, and are easily intercepted during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption-decryption method based on Base64 and device thereof
  • Encryption-decryption method based on Base64 and device thereof
  • Encryption-decryption method based on Base64 and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Such as figure 1 shown, including the following steps:

[0057] Step 01. Obtain the plaintext information to be encrypted, and perform Base64 encoding on the plaintext information to generate an encoded string A.

[0058] Step 02. Randomly generate two random values ​​between 3-63: a first value m1 and a second value m2.

[0059] Step 03. Obtain the first character c1 corresponding to m1 and the second character c2 corresponding to m2 from the Base64 character mapping table; Table 1 shows the Base64 character mapping table.

[0060] Table 1, Base64 character mapping table

[0061]

[0062]

[0063] Step 04, randomly obtain m1 characters from the Base64 character mapping table, and form the first string str1; and randomly obtain m2 characters from the Base64 character mapping table, and encode the second string str2.

[0064] Step 05, adding the first string str1 to the front of the encoded string, adding the second string str2 to the back of the encoded string,...

Embodiment 2

[0087] A kind of encryption method based on Base64, comprises the steps:

[0088] Step 21, obtaining the plaintext information to be encrypted; performing Base64 encoding on the plaintext information to generate an encoded string A;

[0089] Step 22, randomly generating a first value m1 between 3-63;

[0090] Step 23. Obtain the first character c1 corresponding to the first value m1 from the Base64 character mapping table;

[0091] Step 24, randomly obtain m1 characters from the Base64 character mapping table, and form the first character string str1;

[0092] Step 25. Add the first character string str1 to the front of the encoded character string A, add the first character to the end of the encoded character string A, and generate the final encrypted character string B.

[0093] An encryption device based on Base64, specifically comprising:

[0094] The encoding module is used to obtain the plaintext information to be encrypted; the plaintext information is Base64-encoded...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption-decryption method based on Base64 and a device thereof. The method comprises the steps of obtaining to-be-encrypted plaintext information; carrying out Base 64 encoding on the plaintext information to generate an encoded character string; randomly generating a first numerical value m1 between 3 and 63; obtaining a first character corresponding to the first numerical value from a Base64 character mapping table; randomly obtaining m1 characters from the Base64 character mapping table, and forming a first character string; and adding the first character string to the front of the coded character string, and adding the first character to the rear of the coded character string to generate a final encrypted character string. The encryption-decryption method based on the Base64 and the device thereof disclosed by the invention have the advantage that the encryption is further carried out on the plaintext information based on a Base64 encoding technology and other decryption algorithms cannot be used for decoding, so the security is relatively high.

Description

technical field [0001] The invention relates to the field of data security, in particular to a Base64-based encryption and decryption method and device thereof. Background technique [0002] Base64 is a relatively common data encoding method, which can convert data of non-ASCII characters into ASCII characters. Its encoding speed is fast and needs to be used in many occasions, such as certificate delivery, email data, Http data transmission, etc. Due to its unreadability, Base64 encoding is used for encryption and decryption in the field of data security; however, because its encoding principle is open to the public, decoding tools are very common, so in actual data security applications, usually only Base64 is used for encoding, and then other encryption and decryption are used. Means, such as DES, AES, etc., are rarely used alone for encryption and decryption, and are easily intercepted during transmission. Contents of the invention [0003] In order to overcome the def...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L9/0618
Inventor 陈强梁武
Owner GUANGDONG YOUMAI INFORMATION COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products