CN105406960A - Information encrypting and decrypting method - Google Patents

Information encrypting and decrypting method Download PDF

Info

Publication number
CN105406960A
CN105406960A CN201510954105.5A CN201510954105A CN105406960A CN 105406960 A CN105406960 A CN 105406960A CN 201510954105 A CN201510954105 A CN 201510954105A CN 105406960 A CN105406960 A CN 105406960A
Authority
CN
China
Prior art keywords
character
string
random number
key
xor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510954105.5A
Other languages
Chinese (zh)
Other versions
CN105406960B (en
Inventor
雷亚歌
尚会领
张斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Thinker Automatic Equipment Co Ltd
Original Assignee
Henan Thinker Automatic Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Thinker Automatic Equipment Co Ltd filed Critical Henan Thinker Automatic Equipment Co Ltd
Priority to CN201510954105.5A priority Critical patent/CN105406960B/en
Publication of CN105406960A publication Critical patent/CN105406960A/en
Application granted granted Critical
Publication of CN105406960B publication Critical patent/CN105406960B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information encrypting and decrypting method. A key is initialized so as to generate a range of a random number below: n to (m-n+1); and the information encrypting method comprises the steps of (1) converting each character in a first character string to a corresponding ASCII code; (2) converting each character in a key character string to a corresponding ASCII code; (3) generating one random number randomly within the generated range of the random number; (4) adding the ASCII code of the first character of the first character string with the random number, dividing (m-n+1) by the added number to obtain a residual value, and performing XOR operation for the residual value and the ASCII code of the first key of the key character string to obtain an XOR value; (5) for all the characters starting from the second character of the first character string, regarding the XOR value which is obtained by operating each former character as the random number of the current character; and (6) splicing each character of the encrypted first character string in sequence to form a third character string.

Description

A kind of information encryption and decryption method
Technical field
The present invention relates to a kind of method of information encryption and deciphering, especially a kind of encryption method based on random seed.
Background technology
The development of the network communications technology, great facility is created to artificial work, that people can without to prevent or the mode of mobile storage carries out the transmission of information, and the information transmission being undertaken between two equipment by network that can be instant, but communication simultaneously easily, also result in the careless omission of Information Security aspect, need method to be safely and effectively encrypted information.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information encryption and the decryption method that use random seed, to solve prior art Problems existing.
The present invention is by the following technical solutions:
A kind of information ciphering method,
First initialization key, initialization produces the scope of random number: n ~ (m-n+1),
Raw information corresponds to the first character string,
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
In aforesaid operations, if the length of key is less than the length of field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
The scope of described generation random number is 0 ~ 255.
The character of described composition key is letter, mathematic sign or numeral.
A kind of information decryption method,
To the enciphered message of the three-character doctrine string form received, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number;
(1) each character in key string is converted to corresponding ASC II yard respectively;
(2) obtain second character cell of enciphered message, after carrying out XOR process with the ASC II yard of the first character of key, obtain XOR value;
(3) for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
(4) remainder is contrasted the character that ASC II yard returns its correspondence, obtain the first character of the first character string;
(5) to all character cells of three-character doctrine string from the 3rd character cell, each all using the random number of previous character cell as current character unit, the operation of circulation (3) ~ (4), obtains the deciphering character that all encrypted characters of first character string are corresponding;
(6) each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string.
In aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (3), when XOR is to last of key, XOR again carries out from first of key next time.
The character of described composition key is letter, mathematic sign or numeral.
Beneficial effect of the present invention: when the present invention is encrypted information, carry out XOR process and encryption, and the random number of each character is all not identical by the random number of random selection to information, makes information store more safely and not easily crack.
Accompanying drawing explanation
Fig. 1 is ciphering process flow chart of the present invention.
Fig. 2 is decrypting process flow chart of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
The invention provides a kind of information ciphering method, set the original information that need encrypt and correspond to the first character string, set key string simultaneously, the character forming key is one or several of letter, mathematic sign or numeral.First initialization key initialization produce the scope of random number: n ~ (m-n+1).Wherein, m and n is natural number.
Then ciphering process comprises the following steps:
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
In aforesaid operations, because the length of key not necessarily with encryption information length always, if the length of key is less than the length of the field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
The present invention also provides a kind of method of deciphering, to the enciphered message of the three-character doctrine string form received, according to the rule of setting during encryption, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number.
The process of then deciphering comprises the following steps:
A each character in () key string is converted to corresponding ASC II yard respectively;
B () obtains second character cell of enciphered message, after carrying out XOR process, obtain XOR value with the ASC II yard of the first character of key;
C () is for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the then XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
D remainder is contrasted the character that ASC II yard returns its correspondence by (), obtain the first character of the first character string;
E (), to all character cells of the 3rd character cell, at every turn all using the random number of previous character cell as current character unit, circulation (c) ~ (d) operation, obtains the deciphering character that all encrypted characters of first character string are corresponding;
F each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string by ().
In same aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (c), when XOR is to last of key, XOR again carries out from first of key next time.
As a kind of embodiment, in aforesaid operations, the scope that setting produces random number is 0 ~ 255, and random number is converted to the process that 16 systems carry out follow-up ciphering process, and in ciphering process, the final encrypted characters string generated also is converted to the data mode of 16 systems.
Specifically, as depicted in figs. 1 and 2, to be encryptedly called:
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope of 0 ~ 255, a random number m being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number m, what be added is several to 255 remainder operations, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, each XOR value all obtained through operation by previous character is as the random number of current character, carry out the operation in (4), be encrypted respectively all characters of first character string, the character exported after encryption exports through following conversion:
Format('%1.2x',[A]);
// command character starts with %, and 1 of the decimal point left side is width (aliging with space time not enough), the right
// 2 are control precision (filling with 0 when not reaching), x refers to and is exported according to hexadecimal number by A,
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of three-character doctrine string is be initially at the random number produced at random in the scope of random number to carry out following conversion output:
Format (' %1.2x', [B]); B is random number;
Then from the character late of the 3rd character string sequential storage first character string each encryption after character.
And as the method for deciphering, to the enciphered message of the three-character doctrine string form received, according to the rule of setting during encryption, be the fractionation that a unit carries out character string with every two characters, using the first character unit in the character string of fractionation as random number
The process of then deciphering comprises the following steps:
A each character in () key string is converted to corresponding ASC II yard respectively;
B () obtains second character cell of enciphered message, after carrying out XOR process, obtain XOR value with the ASC II yard of the first character of key;
C (), for the XOR value obtained, if XOR value is not more than random number, then deducts random number again after the then XOR value obtained being added with 255 and obtains remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
D remainder is contrasted the character that ASC II yard returns its correspondence by (), obtain the first character of the first character string;
E (), to all character cells of the 3rd character cell, at every turn all using the random number of previous character cell as current character unit, circulation (c) ~ (d) operation, obtains the deciphering character that all encrypted characters of first character string are corresponding;
F each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string by ().
In same aforesaid operations, if the length of key is less than the length of three-character doctrine string of needs deciphering, in the XOR process so in (c), when XOR is to last of key, XOR again carries out from first of key next time.
I and j wherein in figure is integer.

Claims (7)

1. an information ciphering method, is characterized in that:
First initialization key, initialization produces the scope of random number: n ~ (m-n+1),
Raw information corresponds to the first character string,
(1) each character in the first character string is converted to respectively corresponding ASC II yard;
(2) each character in key string is converted to corresponding ASC II yard respectively;
(3) in the scope producing random number, a random number being used for encrypting is produced at random;
(4) ASC II yard of the first character of the first character string is added with random number, the several of addition operate (m-n+1) remainder, obtain remainder values, the ASC II yard of first key of remainder values and key string is carried out xor operation and obtains XOR value, complete the encryption of the first character to first character string;
(5) to all characters that second character of the first character string starts, at every turn all using previous character through operation obtain XOR value as the random number of current character, carry out the operation in (4), all characters of first character string be encrypted respectively;
(6) each character sequence of the first character string after encryption is spliced to form three-character doctrine string, the first character of described three-character doctrine string be initially at random number scope in the random random number produced, from second character of the 3rd character string sequential storage first character string each encryption after character.
2. information ciphering method according to claim 1, it is characterized in that: in aforesaid operations, if the length of key is less than the length of the field of needs encryption, in XOR process so in (4), when XOR is to last of key, XOR again carries out from first of key next time.
3. information ciphering method according to claim 1, is characterized in that: the scope of described generation random number is 0 ~ 255.
4. information ciphering method according to claim 1, is characterized in that: the character of described composition key is letter, mathematic sign or numeral.
5. an information decryption method, is characterized in that:
To the enciphered message of the three-character doctrine string form received, be the fractionation that a unit carries out character string often to set a character, using the first character in the character string of fractionation as random number;
(1) each character in key string is converted to corresponding ASC II yard respectively;
(2) obtain second character cell of enciphered message, after carrying out XOR process with the ASC II yard of the first character of key, obtain XOR value;
(3) for the XOR value obtained, if XOR value is not more than random number, deduct random number again after then the XOR value obtained being added with (m-n+1) and obtain remainder, if XOR value is greater than random number, then the then XOR value obtained directly is deducted random number and obtain remainder;
(4) remainder is contrasted the character that ASC II yard returns its correspondence, obtain the first character of the first character string;
(5) to all character cells of three-character doctrine string from the 3rd character cell, each all using the random number of previous character cell as current character unit, the operation of circulation (3) ~ (4), obtains the deciphering character that all encrypted characters of first character string are corresponding;
(6) each character sequence of the first character string after the deciphering of acquisition is spliced to form the first original character string.
6. information decryption method according to claim 5, it is characterized in that: in aforesaid operations, if the length of key is less than the length of the three-character doctrine string of needs deciphering, in XOR process so in (3), when XOR is to last of key, XOR again carries out from first of key next time.
7. information decryption method according to claim 5, is characterized in that: the character of described composition key is letter, mathematic sign or numeral.
CN201510954105.5A 2015-12-20 2015-12-20 A kind of method of information encryption and decryption Active CN105406960B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510954105.5A CN105406960B (en) 2015-12-20 2015-12-20 A kind of method of information encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510954105.5A CN105406960B (en) 2015-12-20 2015-12-20 A kind of method of information encryption and decryption

Publications (2)

Publication Number Publication Date
CN105406960A true CN105406960A (en) 2016-03-16
CN105406960B CN105406960B (en) 2019-02-22

Family

ID=55472225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510954105.5A Active CN105406960B (en) 2015-12-20 2015-12-20 A kind of method of information encryption and decryption

Country Status (1)

Country Link
CN (1) CN105406960B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof
CN106685922A (en) * 2016-11-17 2017-05-17 江西远成汽车技术股份有限公司 Data encryption method and apparatus thereof
CN106899607A (en) * 2017-03-21 2017-06-27 杭州迪普科技股份有限公司 The method and device that a kind of information encryption is sent and decryption is received
CN107483193A (en) * 2017-08-31 2017-12-15 郑州云海信息技术有限公司 A kind of encryption method, decryption method, encryption device and decryption device
CN108418684A (en) * 2018-03-09 2018-08-17 江苏科建教育软件有限责任公司 A kind of character string symmetric cryptography and decryption method
CN108712424A (en) * 2018-05-21 2018-10-26 中国石油天然气集团公司 Based on mapping control point outcome table to the method for text encryption
CN109409143A (en) * 2018-12-21 2019-03-01 北京思源互联科技有限公司 A kind of safety keyboard system and method
CN111314061A (en) * 2019-10-29 2020-06-19 苏州科达科技股份有限公司 Random number generation method and system
CN111475543A (en) * 2020-03-27 2020-07-31 深圳壹账通智能科技有限公司 Fuzzy search method and device, computer equipment and storage medium
CN112149186A (en) * 2020-10-19 2020-12-29 福建天晴在线互动科技有限公司 Data tamper-proofing method and system based on abstract algorithm
CN113095042A (en) * 2021-03-23 2021-07-09 广州零端科技有限公司 Character string encryption method, system, device and storage medium
CN113810174A (en) * 2021-09-16 2021-12-17 金蝶软件(中国)有限公司 Data processing method and related equipment
CN116502253A (en) * 2023-06-29 2023-07-28 北京天健源达科技股份有限公司 Electronic medical record character encryption method and device
CN117315808A (en) * 2023-11-28 2023-12-29 成都博瑞科传科技有限公司 Portable water quality inspection instrument based on data integrity verification and acquisition method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109217945A (en) * 2018-09-14 2019-01-15 深圳市琦志航智能科技有限公司 A kind of sound wave communication method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020159588A1 (en) * 2001-04-27 2002-10-31 Kauffman Jason R. Cryptography with unconditional security for the internet, commercial intranets, and data storage
KR20050086746A (en) * 2002-11-20 2005-08-30 스태픈 로렌스 보렌 Method of generating a stream cipher using multiple keys
CN101895390A (en) * 2010-02-05 2010-11-24 上海复旦天臣新技术有限公司 Method, device and system for encryption and decryption
CN104811298A (en) * 2015-05-14 2015-07-29 中国联合网络通信集团有限公司 Method and device for realizing encryption
CN105099652A (en) * 2014-05-04 2015-11-25 博雅网络游戏开发(深圳)有限公司 Data encryption and decryption method and devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020159588A1 (en) * 2001-04-27 2002-10-31 Kauffman Jason R. Cryptography with unconditional security for the internet, commercial intranets, and data storage
KR20050086746A (en) * 2002-11-20 2005-08-30 스태픈 로렌스 보렌 Method of generating a stream cipher using multiple keys
CN101895390A (en) * 2010-02-05 2010-11-24 上海复旦天臣新技术有限公司 Method, device and system for encryption and decryption
CN105099652A (en) * 2014-05-04 2015-11-25 博雅网络游戏开发(深圳)有限公司 Data encryption and decryption method and devices
CN104811298A (en) * 2015-05-14 2015-07-29 中国联合网络通信集团有限公司 Method and device for realizing encryption

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375083A (en) * 2016-09-30 2017-02-01 广东网金控股股份有限公司 Encryption-decryption method based on Base64 and device thereof
CN106375083B (en) * 2016-09-30 2019-10-01 广东网金控股股份有限公司 A kind of encipher-decipher method and its device based on Base64
CN106685922A (en) * 2016-11-17 2017-05-17 江西远成汽车技术股份有限公司 Data encryption method and apparatus thereof
CN106685922B (en) * 2016-11-17 2019-12-03 江西远成汽车技术股份有限公司 Data ciphering method and device
CN106899607A (en) * 2017-03-21 2017-06-27 杭州迪普科技股份有限公司 The method and device that a kind of information encryption is sent and decryption is received
CN107483193A (en) * 2017-08-31 2017-12-15 郑州云海信息技术有限公司 A kind of encryption method, decryption method, encryption device and decryption device
CN108418684A (en) * 2018-03-09 2018-08-17 江苏科建教育软件有限责任公司 A kind of character string symmetric cryptography and decryption method
CN108712424B (en) * 2018-05-21 2020-10-20 中国石油天然气集团有限公司 Method for encrypting text based on mapping control point result table
CN108712424A (en) * 2018-05-21 2018-10-26 中国石油天然气集团公司 Based on mapping control point outcome table to the method for text encryption
CN109409143B (en) * 2018-12-21 2022-05-17 北京思源理想控股集团有限公司 Safety keyboard system and method thereof
CN109409143A (en) * 2018-12-21 2019-03-01 北京思源互联科技有限公司 A kind of safety keyboard system and method
CN111314061A (en) * 2019-10-29 2020-06-19 苏州科达科技股份有限公司 Random number generation method and system
CN111475543A (en) * 2020-03-27 2020-07-31 深圳壹账通智能科技有限公司 Fuzzy search method and device, computer equipment and storage medium
CN112149186A (en) * 2020-10-19 2020-12-29 福建天晴在线互动科技有限公司 Data tamper-proofing method and system based on abstract algorithm
CN113095042A (en) * 2021-03-23 2021-07-09 广州零端科技有限公司 Character string encryption method, system, device and storage medium
CN113095042B (en) * 2021-03-23 2023-12-19 广州零端科技有限公司 Character string encryption method, system, device and storage medium
CN113810174A (en) * 2021-09-16 2021-12-17 金蝶软件(中国)有限公司 Data processing method and related equipment
CN116502253A (en) * 2023-06-29 2023-07-28 北京天健源达科技股份有限公司 Electronic medical record character encryption method and device
CN116502253B (en) * 2023-06-29 2023-09-22 北京天健源达科技股份有限公司 Electronic medical record character encryption method and device
CN117315808A (en) * 2023-11-28 2023-12-29 成都博瑞科传科技有限公司 Portable water quality inspection instrument based on data integrity verification and acquisition method
CN117315808B (en) * 2023-11-28 2024-02-13 成都博瑞科传科技有限公司 Portable water quality inspection instrument based on data integrity verification and acquisition method

Also Published As

Publication number Publication date
CN105406960B (en) 2019-02-22

Similar Documents

Publication Publication Date Title
CN105406960A (en) Information encrypting and decrypting method
CN103684760A (en) Method, device and system for encryption and decryption of communication
CN101996298A (en) Encrypting method and decrypting method corresponding to same
CN103067162A (en) Method and device of data transmission
CN102546181A (en) Cloud storage encrypting and deciphering method based on secret key pool
CN104486073A (en) Encryption and decryption method of character data
CN109951268B (en) Encryption and decryption method and device based on bit permutation and bit permutation
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN105100085A (en) Information encryption and decryption methods and devices
CN105916141B (en) A kind of realization system and method for self synchronous Zu Chongzhi's enciphering and deciphering algorithm
CN103441841A (en) Automatic encrypting and decrypting system and method for welding data
KR102033351B1 (en) Computer-executable lightweight white-box cryptographic method and apparatus thereof
CN103731822A (en) System and method for implementing Zuichong algorithm
CN110401536B (en) General encryption algorithm based on deep learning
CN101826959B (en) Byte-oriented key stream generation method and encryption method
CN104618380A (en) Secret key update method suitable for internet of things
CN114124359A (en) Method and device for preserving format encrypted data, electronic equipment and storage medium
CN106452754B (en) Multi-user online dynamic encryption method and device
Wang et al. Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices
CN103701591A (en) Sequence password realization method and key stream generating method and device
Kumar et al. A novel approach for securing data in IoTcloud using DNA cryptography and Huffman coding algorithm
CN106921486A (en) The method and apparatus of data encryption
CN106850192A (en) A kind of method for optimizing mobile device data storehouse encryption efficiency
CN104579693A (en) Embedded encryption method based on high-order second-order logistic mapping and embedded encryption device based on high-order second-order logistic mapping

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant