A String Encryption and Decryption Method

An encryption method and string technology, applied in the field of information security, can solve problems such as complex encryption operations

Active Publication Date: 2022-01-28
IANGSU COLLEGE OF ENG & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional string encryption is usually carried out using DES and RAS encryption methods, and the encryption operation is relatively complicated. With the development of network communication technology, the demand for security and convenience of string encryption is gradually increasing. A safe and reliable encryption technology is adopted. Encrypting character data is imminent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A String Encryption and Decryption Method
  • A String Encryption and Decryption Method
  • A String Encryption and Decryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0191] According to the encryption method of a kind of character string in the above-mentioned specific embodiment, the steps are as follows:

[0192] (1) First utilize the external encryption key (α=0.12345, β=0.65) to iterate the tilted tent chaotic system shown in the formula in step (1) of a kind of character string encryption method in the above-mentioned specific embodiment, obtain chaos Sequence X, calculate according to the formula in the encryption method step (1) of a kind of character string in the above-mentioned specific embodiment simultaneously, obtain the initial iterative steps of chaotic system (m 1 ) and sampling interval (n 1 ),

[0193] m 1 =523+23=546

[0194] no 1 =19+1=20

[0195] 从混沌序列X中第546个元素开始每隔20个元素取1个,从而形成长度为L=18的混沌序列Y={0.361896018751758,0.707665360260700,0.416287938280632,0.569011637774278,0.276890527259342,0.467623413399187,0.989176495851167,0.169240171895533,0.675028025531495, 0.458815246880602,0.612489131368256,0.174072241734472,0.580925...

Embodiment 2

[0228] According to the above-mentioned method for encrypting a character string, a certain character string to be encrypted is "encryption and decryption of a character string 111111aaaaaa", the encryption steps of a character string are similar to those in Embodiment 1, and only the encryption key changes slightly: α=0.12345000000001 ; or β=0.65000000000001; or Y1 0 =45; or C1 0 =27; or Y2 0 =55; or C2 0 =37, the string encryption result is shown in Table 1. It can be seen from Table 1 that a slight change in the encryption key will cause a large change in the encrypted ciphertext of the string, so it can be seen that a string encryption method proposed in this patent is sensitive to the encryption key.

[0229] Table 1 When the external encryption key changes slightly, the result of string encryption

[0230]

[0231]

Embodiment 3

[0233] According to the above-mentioned encryption method of a character string, its encryption steps are similar to the specific embodiment 1, and only a certain section of the character string to be encrypted ("encryption and decryption of character strings 111111aaaaaa") has a slight change: "encryption and decryption of subcharacter strings 111111aaaaaa"; or "String encryption and decryption 111111aaaaaa"; or "string encryption and decryption 211111aaaaaa"; or "string encryption and decryption 111112aaaaaa"; or "string encryption and decryption 111111baaaaa"; or "string encryption and decryption 111111aaaaaab", the string encryption result is as follows Table 2 shows. It can be seen from Table 2 that slight changes in the plaintext information of the string to be encrypted will cause the encrypted ciphertext to be "unrecognizable". It can be seen that the string encryption method proposed in this patent is sensitive to the plaintext information of the encrypted string.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a string encryption and decryption method, comprising the following steps: first, a chaotic signal is generated by a chaotic system, and a certain string to be encrypted is scrambled according to the scrambling rules of position changes before and after the chaotic sequence is sorted ; Then convert the scrambled string into a high-order numerical sequence and a low-order numerical sequence; then use the chaotic system to generate a chaotic signal, and perform forward and reverse diffusion encryption on the low-digit numerical sequence; finally, convert the numerical value and character to obtain the character The encrypted ciphertext of the string, the ciphertext can be decrypted and restored to an original string through a similar method. The invention adopts the scrambling rules of the chaotic sequence to scramble or reverse the scrambling of the character strings, and at the same time utilizes the cryptographic characteristics of the chaotic sequence to perform two-way diffusion encryption or decryption on the low-digit numerical sequences converted from the character strings, which has good resistance The performance of known / chosen plaintext attack and ciphertext-only attack ensures the security and feasibility of string encryption and decryption.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a character string encryption and decryption method. Background technique [0002] With the rapid development of Internet technology and multimedia technology, data communication has gradually become an important means for people to exchange information. Data transmission via the Internet is convenient and fast, and is not subject to geographical restrictions. However, due to the particularity of some data, both sending parties do not want the data transmitted on the network to be browsed or processed by unauthorized persons. This information not only involves personal privacy, but also involves national security, and has a major relationship with the country's politics, military and diplomacy, so data security and confidentiality are becoming more and more important. In these special fields that require data confidentiality or when data owners need to protect their...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/001
Inventor 吴新华
Owner IANGSU COLLEGE OF ENG & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products