CN105406960A - Information encrypting and decrypting method - Google Patents
Information encrypting and decrypting method Download PDFInfo
- Publication number
- CN105406960A CN105406960A CN201510954105.5A CN201510954105A CN105406960A CN 105406960 A CN105406960 A CN 105406960A CN 201510954105 A CN201510954105 A CN 201510954105A CN 105406960 A CN105406960 A CN 105406960A
- Authority
- CN
- China
- Prior art keywords
- character
- string
- random number
- key
- xor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an information encrypting and decrypting method. A key is initialized so as to generate a range of a random number below: n to (m-n+1); and the information encrypting method comprises the steps of (1) converting each character in a first character string to a corresponding ASCII code; (2) converting each character in a key character string to a corresponding ASCII code; (3) generating one random number randomly within the generated range of the random number; (4) adding the ASCII code of the first character of the first character string with the random number, dividing (m-n+1) by the added number to obtain a residual value, and performing XOR operation for the residual value and the ASCII code of the first key of the key character string to obtain an XOR value; (5) for all the characters starting from the second character of the first character string, regarding the XOR value which is obtained by operating each former character as the random number of the current character; and (6) splicing each character of the encrypted first character string in sequence to form a third character string.
Description
Technical field
The present invention relates to a kind of method of information encryption and deciphering, especially a kind of encryption method based on random seed.
Background technology
The development of the network communications technology, great facility is created to artificial work, that people can without to prevent or the mode of mobile storage carries out the transmission of information, and the information transmission being undertaken between two equipment by network that can be instant, but communication simultaneously easily, also result in the careless omission of Information Security aspect, need method to be safely and effectively encrypted information.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information encryption and the decryption method that use random seed, to solve prior art Problems existing.
The present invention is by the following technical solutions:
A kind of information ciphering method,
First initialization key, initialization produces the scope of random number: n ~ (m-n+1),
Raw information corresponds to the first character string,
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
In aforesaid operations, if the length of key is less than the length of field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
The scope of described generation random number is 0 ~ 255.
The character of described composition key is letter, mathematic sign or numeral.
A kind of information decryption method,
To the enciphered message of the three-character doctrine string form received, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number;
(1) each character in key string is converted to corresponding ASC II yard respectively;
(2) obtain second character cell of enciphered message, after carrying out XOR process with the ASC II yard of the first character of key, obtain XOR value;
(3) for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
(4) remainder is contrasted the character that ASC II yard returns its correspondence, obtain the first character of the first character string;
(5) to all character cells of three-character doctrine string from the 3rd character cell, each all using the random number of previous character cell as current character unit, the operation of circulation (3) ~ (4), obtains the deciphering character that all encrypted characters of first character string are corresponding;
(6) each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string.
In aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (3), when XOR is to last of key, XOR again carries out from first of key next time.
The character of described composition key is letter, mathematic sign or numeral.
Beneficial effect of the present invention: when the present invention is encrypted information, carry out XOR process and encryption, and the random number of each character is all not identical by the random number of random selection to information, makes information store more safely and not easily crack.
Accompanying drawing explanation
Fig. 1 is ciphering process flow chart of the present invention.
Fig. 2 is decrypting process flow chart of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
The invention provides a kind of information ciphering method, set the original information that need encrypt and correspond to the first character string, set key string simultaneously, the character forming key is one or several of letter, mathematic sign or numeral.First initialization key initialization produce the scope of random number: n ~ (m-n+1).Wherein, m and n is natural number.
Then ciphering process comprises the following steps:
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
In aforesaid operations, because the length of key not necessarily with encryption information length always, if the length of key is less than the length of the field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
The present invention also provides a kind of method of deciphering, to the enciphered message of the three-character doctrine string form received, according to the rule of setting during encryption, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number.
The process of then deciphering comprises the following steps:
A each character in () key string is converted to corresponding ASC II yard respectively;
B () obtains second character cell of enciphered message, after carrying out XOR process, obtain XOR value with the ASC II yard of the first character of key;
C () is for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the then XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
D remainder is contrasted the character that ASC II yard returns its correspondence by (), obtain the first character of the first character string;
E (), to all character cells of the 3rd character cell, at every turn all using the random number of previous character cell as current character unit, circulation (c) ~ (d) operation, obtains the deciphering character that all encrypted characters of first character string are corresponding;
F each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string by ().
In same aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (c), when XOR is to last of key, XOR again carries out from first of key next time.
As a kind of embodiment, in aforesaid operations, the scope that setting produces random number is 0 ~ 255, and random number is converted to the process that 16 systems carry out follow-up ciphering process, and in ciphering process, the final encrypted characters string generated also is converted to the data mode of 16 systems.
Specifically, as depicted in figs. 1 and 2, to be encryptedly called:
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope of 0 ~ 255, a random number m being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number m, what be added is several to 255 remainder operations, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, each XOR value all obtained through operation by previous character is as the random number of current character, carry out the operation in (4), be encrypted respectively all characters of first character string, the character exported after encryption exports through following conversion:
Format('%1.2x',[A]);
// command character starts with %, and 1 of the decimal point left side is width (aliging with space time not enough), the right
// 2 are control precision (filling with 0 when not reaching), x refers to and is exported according to hexadecimal number by A,
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of three-character doctrine string is be initially at the random number produced at random in the scope of random number to carry out following conversion output:
Format (' %1.2x', [B]); B is random number;
Then from the character late of the 3rd character string sequential storage first character string each encryption after character.
And as the method for deciphering, to the enciphered message of the three-character doctrine string form received, according to the rule of setting during encryption, be the fractionation that a unit carries out character string with every two characters, using the first character unit in the character string of fractionation as random number
The process of then deciphering comprises the following steps:
A each character in () key string is converted to corresponding ASC II yard respectively;
B () obtains second character cell of enciphered message, after carrying out XOR process, obtain XOR value with the ASC II yard of the first character of key;
C (), for the XOR value obtained, if XOR value is not more than random number, then deducts random number again after the then XOR value obtained being added with 255 and obtains remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
D remainder is contrasted the character that ASC II yard returns its correspondence by (), obtain the first character of the first character string;
E (), to all character cells of the 3rd character cell, at every turn all using the random number of previous character cell as current character unit, circulation (c) ~ (d) operation, obtains the deciphering character that all encrypted characters of first character string are corresponding;
F each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string by ().
In same aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (c), when XOR is to last of key, XOR again carries out from first of key next time.
I and j wherein in figure is integer.
Claims (7)
1. an information ciphering method, is characterized in that:
First initialization key, initialization produces the scope of random number: n ~ (m-n+1),
Raw information corresponds to the first character string,
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
2. information ciphering method according to claim 1, it is characterized in that: in aforesaid operations, if the length of key is less than the length of the field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
3. information ciphering method according to claim 1, is characterized in that: the scope of described generation random number is 0 ~ 255.
4. information ciphering method according to claim 1, is characterized in that: the character of described composition key is letter, mathematic sign or numeral.
5. an information decryption method, is characterized in that:
To the enciphered message of the three-character doctrine string form received, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number;
(1) each character in key string is converted to corresponding ASC II yard respectively;
(2) obtain second character cell of enciphered message, after carrying out XOR process with the ASC II yard of the first character of key, obtain XOR value;
(3) for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
(4) remainder is contrasted the character that ASC II yard returns its correspondence, obtain the first character of the first character string;
(5) to all character cells of three-character doctrine string from the 3rd character cell, each all using the random number of previous character cell as current character unit, the operation of circulation (3) ~ (4), obtains the deciphering character that all encrypted characters of first character string are corresponding;
(6) each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string.
6. information decryption method according to claim 5, it is characterized in that: in aforesaid operations, if the length of key is less than the length of the three-character doctrine string of needs deciphering, in XOR process so in (3), when XOR is to last of key, XOR again carries out from first of key next time.
7. information decryption method according to claim 5, is characterized in that: the character of described composition key is letter, mathematic sign or numeral.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510954105.5A CN105406960B (en) | 2015-12-20 | 2015-12-20 | A kind of method of information encryption and decryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510954105.5A CN105406960B (en) | 2015-12-20 | 2015-12-20 | A kind of method of information encryption and decryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105406960A true CN105406960A (en) | 2016-03-16 |
CN105406960B CN105406960B (en) | 2019-02-22 |
Family
ID=55472225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510954105.5A Active CN105406960B (en) | 2015-12-20 | 2015-12-20 | A kind of method of information encryption and decryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105406960B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375083A (en) * | 2016-09-30 | 2017-02-01 | 广东网金控股股份有限公司 | Encryption-decryption method based on Base64 and device thereof |
CN106685922A (en) * | 2016-11-17 | 2017-05-17 | 江西远成汽车技术股份有限公司 | Data encryption method and apparatus thereof |
CN106899607A (en) * | 2017-03-21 | 2017-06-27 | 杭州迪普科技股份有限公司 | The method and device that a kind of information encryption is sent and decryption is received |
CN107483193A (en) * | 2017-08-31 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method, encryption device and decryption device |
CN108418684A (en) * | 2018-03-09 | 2018-08-17 | 江苏科建教育软件有限责任公司 | A kind of character string symmetric cryptography and decryption method |
CN108712424A (en) * | 2018-05-21 | 2018-10-26 | 中国石油天然气集团公司 | Based on mapping control point outcome table to the method for text encryption |
CN109409143A (en) * | 2018-12-21 | 2019-03-01 | 北京思源互联科技有限公司 | A kind of safety keyboard system and method |
CN111314061A (en) * | 2019-10-29 | 2020-06-19 | 苏州科达科技股份有限公司 | Random number generation method and system |
CN111475543A (en) * | 2020-03-27 | 2020-07-31 | 深圳壹账通智能科技有限公司 | Fuzzy search method and device, computer equipment and storage medium |
CN112149186A (en) * | 2020-10-19 | 2020-12-29 | 福建天晴在线互动科技有限公司 | Data tamper-proofing method and system based on abstract algorithm |
CN113095042A (en) * | 2021-03-23 | 2021-07-09 | 广州零端科技有限公司 | Character string encryption method, system, device and storage medium |
CN113810174A (en) * | 2021-09-16 | 2021-12-17 | 金蝶软件(中国)有限公司 | Data processing method and related equipment |
CN116502253A (en) * | 2023-06-29 | 2023-07-28 | 北京天健源达科技股份有限公司 | Electronic medical record character encryption method and device |
CN117315808A (en) * | 2023-11-28 | 2023-12-29 | 成都博瑞科传科技有限公司 | Portable water quality inspection instrument based on data integrity verification and acquisition method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109217945A (en) * | 2018-09-14 | 2019-01-15 | 深圳市琦志航智能科技有限公司 | A kind of sound wave communication method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020159588A1 (en) * | 2001-04-27 | 2002-10-31 | Kauffman Jason R. | Cryptography with unconditional security for the internet, commercial intranets, and data storage |
KR20050086746A (en) * | 2002-11-20 | 2005-08-30 | 스태픈 로렌스 보렌 | Method of generating a stream cipher using multiple keys |
CN101895390A (en) * | 2010-02-05 | 2010-11-24 | 上海复旦天臣新技术有限公司 | Method, device and system for encryption and decryption |
CN104811298A (en) * | 2015-05-14 | 2015-07-29 | 中国联合网络通信集团有限公司 | Method and device for realizing encryption |
CN105099652A (en) * | 2014-05-04 | 2015-11-25 | 博雅网络游戏开发(深圳)有限公司 | Data encryption and decryption method and devices |
-
2015
- 2015-12-20 CN CN201510954105.5A patent/CN105406960B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020159588A1 (en) * | 2001-04-27 | 2002-10-31 | Kauffman Jason R. | Cryptography with unconditional security for the internet, commercial intranets, and data storage |
KR20050086746A (en) * | 2002-11-20 | 2005-08-30 | 스태픈 로렌스 보렌 | Method of generating a stream cipher using multiple keys |
CN101895390A (en) * | 2010-02-05 | 2010-11-24 | 上海复旦天臣新技术有限公司 | Method, device and system for encryption and decryption |
CN105099652A (en) * | 2014-05-04 | 2015-11-25 | 博雅网络游戏开发(深圳)有限公司 | Data encryption and decryption method and devices |
CN104811298A (en) * | 2015-05-14 | 2015-07-29 | 中国联合网络通信集团有限公司 | Method and device for realizing encryption |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375083A (en) * | 2016-09-30 | 2017-02-01 | 广东网金控股股份有限公司 | Encryption-decryption method based on Base64 and device thereof |
CN106375083B (en) * | 2016-09-30 | 2019-10-01 | 广东网金控股股份有限公司 | A kind of encipher-decipher method and its device based on Base64 |
CN106685922A (en) * | 2016-11-17 | 2017-05-17 | 江西远成汽车技术股份有限公司 | Data encryption method and apparatus thereof |
CN106685922B (en) * | 2016-11-17 | 2019-12-03 | 江西远成汽车技术股份有限公司 | Data ciphering method and device |
CN106899607A (en) * | 2017-03-21 | 2017-06-27 | 杭州迪普科技股份有限公司 | The method and device that a kind of information encryption is sent and decryption is received |
CN107483193A (en) * | 2017-08-31 | 2017-12-15 | 郑州云海信息技术有限公司 | A kind of encryption method, decryption method, encryption device and decryption device |
CN108418684A (en) * | 2018-03-09 | 2018-08-17 | 江苏科建教育软件有限责任公司 | A kind of character string symmetric cryptography and decryption method |
CN108712424B (en) * | 2018-05-21 | 2020-10-20 | 中国石油天然气集团有限公司 | Method for encrypting text based on mapping control point result table |
CN108712424A (en) * | 2018-05-21 | 2018-10-26 | 中国石油天然气集团公司 | Based on mapping control point outcome table to the method for text encryption |
CN109409143B (en) * | 2018-12-21 | 2022-05-17 | 北京思源理想控股集团有限公司 | Safety keyboard system and method thereof |
CN109409143A (en) * | 2018-12-21 | 2019-03-01 | 北京思源互联科技有限公司 | A kind of safety keyboard system and method |
CN111314061A (en) * | 2019-10-29 | 2020-06-19 | 苏州科达科技股份有限公司 | Random number generation method and system |
CN111475543A (en) * | 2020-03-27 | 2020-07-31 | 深圳壹账通智能科技有限公司 | Fuzzy search method and device, computer equipment and storage medium |
CN112149186A (en) * | 2020-10-19 | 2020-12-29 | 福建天晴在线互动科技有限公司 | Data tamper-proofing method and system based on abstract algorithm |
CN113095042A (en) * | 2021-03-23 | 2021-07-09 | 广州零端科技有限公司 | Character string encryption method, system, device and storage medium |
CN113095042B (en) * | 2021-03-23 | 2023-12-19 | 广州零端科技有限公司 | Character string encryption method, system, device and storage medium |
CN113810174A (en) * | 2021-09-16 | 2021-12-17 | 金蝶软件(中国)有限公司 | Data processing method and related equipment |
CN116502253A (en) * | 2023-06-29 | 2023-07-28 | 北京天健源达科技股份有限公司 | Electronic medical record character encryption method and device |
CN116502253B (en) * | 2023-06-29 | 2023-09-22 | 北京天健源达科技股份有限公司 | Electronic medical record character encryption method and device |
CN117315808A (en) * | 2023-11-28 | 2023-12-29 | 成都博瑞科传科技有限公司 | Portable water quality inspection instrument based on data integrity verification and acquisition method |
CN117315808B (en) * | 2023-11-28 | 2024-02-13 | 成都博瑞科传科技有限公司 | Portable water quality inspection instrument based on data integrity verification and acquisition method |
Also Published As
Publication number | Publication date |
---|---|
CN105406960B (en) | 2019-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105406960A (en) | Information encrypting and decrypting method | |
CN103684760A (en) | Method, device and system for encryption and decryption of communication | |
CN101996298A (en) | Encrypting method and decrypting method corresponding to same | |
CN103067162A (en) | Method and device of data transmission | |
CN102546181A (en) | Cloud storage encrypting and deciphering method based on secret key pool | |
CN104486073A (en) | Encryption and decryption method of character data | |
CN109951268B (en) | Encryption and decryption method and device based on bit permutation and bit permutation | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN105184181B (en) | File encryption method, file decryption method and file encryption device | |
CN105100085A (en) | Information encryption and decryption methods and devices | |
CN105916141B (en) | A kind of realization system and method for self synchronous Zu Chongzhi's enciphering and deciphering algorithm | |
CN103441841A (en) | Automatic encrypting and decrypting system and method for welding data | |
KR102033351B1 (en) | Computer-executable lightweight white-box cryptographic method and apparatus thereof | |
CN103731822A (en) | System and method for implementing Zuichong algorithm | |
CN110401536B (en) | General encryption algorithm based on deep learning | |
CN101826959B (en) | Byte-oriented key stream generation method and encryption method | |
CN104618380A (en) | Secret key update method suitable for internet of things | |
CN114124359A (en) | Method and device for preserving format encrypted data, electronic equipment and storage medium | |
CN106452754B (en) | Multi-user online dynamic encryption method and device | |
Wang et al. | Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices | |
CN103701591A (en) | Sequence password realization method and key stream generating method and device | |
Kumar et al. | A novel approach for securing data in IoTcloud using DNA cryptography and Huffman coding algorithm | |
CN106921486A (en) | The method and apparatus of data encryption | |
CN106850192A (en) | A kind of method for optimizing mobile device data storehouse encryption efficiency | |
CN104579693A (en) | Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |