CN105959098A - Format-reserved encryption algorithm based on multi-segmented Feistel network - Google Patents

Format-reserved encryption algorithm based on multi-segmented Feistel network Download PDF

Info

Publication number
CN105959098A
CN105959098A CN201610275040.6A CN201610275040A CN105959098A CN 105959098 A CN105959098 A CN 105959098A CN 201610275040 A CN201610275040 A CN 201610275040A CN 105959098 A CN105959098 A CN 105959098A
Authority
CN
China
Prior art keywords
feistel network
computing
encryption
format
round
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610275040.6A
Other languages
Chinese (zh)
Inventor
隋传波
刘哲理
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TUNGKONG CO Ltd
Nankai University
Original Assignee
TUNGKONG CO Ltd
Nankai University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TUNGKONG CO Ltd, Nankai University filed Critical TUNGKONG CO Ltd
Priority to CN201610275040.6A priority Critical patent/CN105959098A/en
Publication of CN105959098A publication Critical patent/CN105959098A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a format-reserved encryption algorithm based on multi-segmented Feistel network, and the algorithm comprises the following steps: according to the inherent format of a plaintext space, the plaintext space is divided into t parts: S1, S2, ..., St; wherein the size of the set is n; a secret key k used by round times and round function of a Feistel network, wherein the round times r is an even number related to a partition number; given plaintext m can be formatted as shown in the description; x1, x2,..., xn serve as t inputs for partitioning Feistel network, or the inputs can be recorded as (x1, x2, ..., xt); r round operation is executed, and the final output cryptograph is as shown in the description; the advantages of the algorithm are that: sensitive data is segmented, different segmented range is defined, self-defined pseudorandom function, modular addition and modular minus operation are adopted, the Feistel network is adopted to execute round operation of even number, so that the encryption which can reserve the format can be realized, a numeric data encryption scheme which can reserve any given format can be supported, the data and database cannot be influenced after the encryption, and a possibility of the numeric personal identification information encipherment protection in a database application system in the prior art can be provided.

Description

Reservation form AES based on multi-split Feistel network
Technical field
The invention belongs to field of data encryption, be specifically related to a kind of numeric type encryption method retaining any given form, The method can application in needing the environment (data base, network, smart card virtual machine etc.) being encrypted sensitive information.
Background technology
The fast development of the Internet so that the sensitive data in storage medium (data base, mobile device, smart card etc.) is more The most easily to be stolen, basic reason is that they still use mode in plain text to the storage of these sensitive datas, and encrypts It it is the most effective mode strengthening the sensitive data safety stored.Sensitive data often comprises the set form of self, example Such as identification card number, bank's card number etc..But traditional AES, such as AES, 3DES etc., all can destroy the form of data so that Data after encryption cannot store in original data base or node, and can destroy the function of existing operation system.As The encryption of these information is not the most destroyed its intrinsic form, to guarantee that existing operation system, database store structure to the greatest extent may be used by what The change that energy is few, is a problem that have to solve.
Summary of the invention
The present invention seeks to solve traditional AES and can destroy the form of data so that the data after encryption cannot be The problem of storage in the storage mediums such as original data base, mobile device or smart card, it is provided that the reservation of a kind of sensitive data Form encryption method.
The present invention for achieving the above object, is achieved through the following technical solutions:
Reservation form AES based on multi-split Feistel network, the method comprises the steps:
1.1. by plaintext spaceSIt is divided into according to its intrinsic formtPart:S 1 , S 2 , … ,S t .Wherein remember setS i Size Forn i
1.2. the wheel number of times of Feistel network is setrThe key used with round functionk, wherein take turns number of timesrFor with segmentation NumbertRelevant even number;
1.3. for given plaintextm, formatted expression:m =x 1 || x 2 || … || x t , wherein:x 1 S 1 , x 2 S 2 ,… ,x t S t ;Willx 1 , x 2 , … ,x n AstSegmentation Feistel networktIndividual input, or remember that input is
1.4. performing the wheel computing of r wheel, the ciphertext of final output isc =y 1 || y 2 || … || y t , wherein:y 1 S 1 , y 2 S 2 ..., y t S t
Wheel computing in 1.4:
2.1. segmentation Feistel network operations is taken turns for each, if input is:
Then it is output as:
First pass through pseudo-random permutation function
WillPass throughFIt is mapped toOn.
If 2.2.S i Size ben i , then can be byS i It is considered as ring, thenFFor by this, to take turns encryption key well-determined On displacement:
2.3. random permutationFThe standard encryption methods such as AES/DES can be used, encrypted result is being carried out corresponding modular arithmetic ?.
The mould used in 2.1 adds computing:
3.1. mould adds computingResult belong to set, above-mentioned mould adds computing abstract representation and is:
The most right, have
Further, still can be byS i It is considered as ring, thus
3.2. mould adds computingDetailed process (here withAs a example by):
The most in following manner, respectively willWithIt is embedded intoUpper:
,
Specifically, as,
B. the above results is existedIn carry out additive operation (being addition of integer), i.e. existIn carry out additive operation:
C. willMiddle element carries out mouldComputing, obtainsIn result, such as:
In sum, complete mould to add
In this example, it is specially,
It is an advantage of the current invention that: by by sensitive data segmentation the codomain that defines different segmentation, using self-defining Pseudo-random function, Mo Jia and mould subtract computing, use Feistel network to perform the wheel computing of even number round, to realize retaining form Constant encryption, can support to retain the numeric type data encipherment scheme of any given form, does not affect data and data after encryption The compatibility of storehouse, node and operation system, for the encipherment protection of numeric type personally identifiable information in the application system of data with existing storehouse Provide possibility.
Accompanying drawing explanation
Fig. 1 is that I type t of the present invention splits Feistel AES schematic diagram.
Detailed description of the invention
Reservation form AES based on multi-split Feistel network of the present invention comprises the steps:
1. a sensitive cleartext information is divided, according to its given format, be divided intotIndividual data segment.That is, by plaintext spaceSIt is divided into according to its intrinsic formtPart:S 1 , S 2 , … ,S t .So,SJust can be expressed as:
Wherein, if note is gatheredS i Size ben i , the most further can be bySIt is expressed as:
2. determinetThe wheel number of times of segmentation Feistel networkr, and the key that every round function is used
,
Wherein take turns number of timesrFortEven-multiple;
3. useRepresent a legal sensitive data, wherein:x 1 S 1 ,x 2 S 2 ,… ,x t S t ;The most respectively willx 1 , x 2 , … ,x n AstThe segmentation Feistel network first roundtIndividual input.
4. perform the wheel computing of r wheel: if a certain input taken turns is
Then it is output as:
,y 1 S 1 , y 2 S 2 ..., y t S t
According to Fig. 1tSegmentation Feistel network,It is:
The most each take turns used dynamic analog and add the result of computing and belong to set, above-mentioned mould adds computingAbstract representation is:
The most right, have
Further, can be byS i It is considered as ring, thus
6. mould adds computingDetailed process (here withAs a example by):
The most in following manner, respectively willWithIt is embedded intoUpper:
,
Specifically, as,
B. the above results is existedIn carry out additive operation (being addition of integer), i.e. existIn carry out additive operation:
C. willMiddle element carries out mouldComputing, obtainsIn result, such as:
In sum, complete mould to add
In this example, it is specially,
The basic concepts relevant with data encryption that the present invention relates to:
(1) block cipher: block cipher be by clear-text message coded representation after numeral (be called for short in plain text numeral) sequence, be divided into The packet (can regard the vector of a length of n as) of a length of n, each packet is transformed into isometric output the most under the control of the key Numeral (being called for short ciphertext numeral) sequence.
(2) 3DES:3DES(or referred to as Triple DES) it is triple DEA (TDEA, Triple Data Encryption Algorithm) common name of block cipher.It is the equal of that each packet is applied three des encryptions calculate Method.Due to the enhancing of Computing ability, the key length of master DES password becomes easily by Brute Force;3DES is i.e. Be designed to provide for a kind of relatively simple method, i.e. by increase attack that the key length of DES avoids being similar to rather than Design a kind of brand-new block cipher.
(3) AES: the Advanced Encryption Standard (Advanced Encryption Standard, AES) in cryptography, is beautiful A kind of block encryption standard that federal government of state uses.This standard is used for substituting original DES, has in many ways been analyzed and extensively Used by the whole world.Through the selection flow process of 5 years, Advanced Encryption Standard was by National Institute of Standards and Technology (NIST) it is published on FIPS PUB 197 November 26 calendar year 2001, and becomes effective standard on May 26th, 2002.2006 Year, Advanced Encryption Standard becomes one of most popular algorithm in symmetric key encryption already.
(4) Feistel network: Feistel network is a kind of symmetrical structure for block cipher design.A lot of password marks Standard all have employed Feistel structure, including DES.The advantage of Feistel is: owing to it is symmetrical cryptography architecture, So the most very much like to the encryption of information and the process of deciphering, the most just the same.This allows for during implementing, right The requirement of encoding amount and line transmission just decreases almost half.
(5) pseudo-random permutation function: in computer, communication system use random number, random code be pseudo random number, Pseudo noise code.So-called " random code ", it is simply that no matter this yard has the phenomenon how long circulated all without appearance, and " pseudo noise code " exists Can start the cycle over from its first when code length reaches to a certain degree, owing to the length of the cycle occurred is quite big, such as CDMA uses The pseudo noise code of 42, the probability of repetition is 4.4 part per trillion, it is possible to use as random code.
The segmentation of the sensitive information with specific format represents
The segmentation of the sensitive information that the present invention provides is expressed as follows:
One sensitive information is divided into t data sectional by its feature:, each data sectional is by having phase Form with the numerical value of data characteristics, can express with an integer finite field.
Such as, the ID (identity number) card No. of legal 18 can be divided into seven parts: , represent area code, year of birth, the birth moon, date of birth, sequence code and check code respectively.Wherein, the character length of every part is: 6、4、2、2、3、1;The codomain of every part is: S1={0, …, 999999}, S2={1900, …, 2050}, S3={1, …, 12}, S4={1, …, 31}, S5={1, …, 999}, S6={0, …, 9, ‘X’}。
The encryption method retaining form based on t segmentation, as a example by ID (identity number) card No., is described in detail by the present invention.
AES:
The first, the ID (identity number) card No. of legal 18 is divided into six parts:, point Do not represent area code, year of birth, the birth moon, date of birth, random number and check code.Wherein, often part is a length of: 6,4, 2,2,3,1;The codomain of every part is:S 1=0 ..., 999999}(ignores the meaning of area code here, is considered as being 0, ..., 999999 set constituted),S 2={1901, …, 2050}, S 3={1, …, 12}, S 4={0, …, 31}, S 5 ={1, …, 999}, S 6={0, …, 9, ‘X’};WhereinS 6Value can by first five part use check code computing and Draw, but herein for convenient narration, it is assumed that it is independent with first five part.
UseRepresent a legal ID (identity number) card No., wherein:x 1 S 1 ,x 2 S 2 ,… ,x 6 S 6
The second, in order to ciphering process is described, set I type 6 and split the wheel number of times of Feistel networkrThe actual application of=6(is taken turns Number of times is the multiple of 6, and needs to take turns more than 6), and random permutation functionFThe key needed
3rd, willAs the input of Feistel network, perform altogetherrThe wheel fortune that=6 take turns Calculate:
The first round:
Second takes turns input is, the rest may be inferred.
4th, complete the 6th take turns after, obtain one isometric with input and have the output of same format, wherein:y 1 S 1 , y 2 S 2 ..., y 6 S 6
5th, decrypting process and the 3rd encryption are contrary, willAs input, perform altogetherr=6 take turns Wheel computing:
The first round:
Wherein e isInverse operation;
Second takes turns input is, the rest may be inferred.
Specifically perform process:
Ciphering process:
Input ID (identity number) card No. is 370722196304091511 in plain text, in conjunction with above Definition, its obtaining actually entering formats statement:.Here random permutation functionAdopt Use standard AES encryption, if plaintext space is, then encrypted result is carried out mouldOperation so that displacement result still falls within
------------------------r=1 (first round)------------------------
Input:, wherein:
Calculate:
,
Output:
------------------------r=2(second takes turns)------------------------
Input:
Calculate:
,
Output:
-----------------------r=3(third round)------------------------
Input:
Calculate:
,
Output:
-----------------------r=4(fourth round)------------------------
Input:
Calculate:
,
Output:
-----------------------r=5(the 5th takes turns)------------------------
Input:
Calculate:
,
Output:
-----------------------the r=6(first round)------------------------
Input:
Calculate:
,
Output:
Finally it is reduced to identification card number form obtain:
I.e.
Decrypting process:
Input ID (identity number) card No. ciphertext is 370903202306042605,
-----------------------the r=1(first round)------------------------
Input:
Calculate:
,
Output:
-----------------------r=2(second takes turns)------------------------
Input:
Calculate:
,
Output:
-----------------------r=3(third round)------------------------
Input:
Calculate:
,
Output:
-----------------------r=4(fourth round)------------------------
Input:
Calculate:
,
Output:
------------------------r=5(the 5th takes turns)------------------------
Input:
Calculate:
,
Output:
------------------------the r=1(first round)------------------------
Input:, wherein:
Calculate:
,
Output:
Finally it is reduced to identification card number form obtain:
Obtain 370722196304091511.

Claims (3)

1. reservation form AES based on multi-split Feistel network, it is characterised in that: the method comprises the steps:
1.1. by plaintext spaceSIt is divided into according to its intrinsic formtPart:S 1 , S 2 , … ,S t , wherein remember setS i Size ben i
1.2. the wheel number of times of Feistel network is setrThe key used with round functionk, wherein take turns number of timesrFor with segmentation numbert Relevant even number;
1.3. for given plaintextm, formatted expression:m =x 1 || x 2 || … || x t , wherein:x 1 S 1 , x 2 S 2 ,… ,x t S t ;Willx 1 , x 2 , … ,x n AstSegmentation Feistel networktIndividual input, or remember that input is;
1.4. performing the wheel computing of r wheel, the ciphertext of final output isc =y 1 || y 2 || … || y t , wherein:y 1 S 1 , y 2 S 2 ..., y t S t
2. reservation form AES based on multi-split Feistel network, it is characterised in that: the wheel computing in 1.4:
2.1. segmentation Feistel network operations is taken turns for each, if input is:
Then it is output as:
First pass through pseudo-random permutation function
WillPass throughFIt is mapped toOn;
If 2.2.S i Size ben i , then can be byS i It is considered as ring, thenFFor by this, to take turns encryption key well-determinedOn Displacement:
2.3. random permutationFThe standard encryption methods such as AES/DES can be used, encrypted result is being carried out corresponding modular arithmetic i.e. Can.
3. reservation form AES based on multi-split Feistel network, it is characterised in that: the mould used in 2.1 adds computing:
Mould adds computingResult belong to set, above-mentioned mould adds computing abstract representation and is:
The most right, have
Further, still can be byS i It is considered as ring, thus
3.2. mould adds computingDetailed process (here withAs a example by);
The most in following manner, respectively willWithIt is embedded intoUpper:
,
Specifically, as,
B. the above results is existedIn carry out additive operation (being addition of integer), i.e. existIn carry out additive operation:
C. willMiddle element carries out mouldComputing, obtainsIn result, such as:
In sum, complete mould to add
In this example, it is specially,
CN201610275040.6A 2016-04-28 2016-04-28 Format-reserved encryption algorithm based on multi-segmented Feistel network Pending CN105959098A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610275040.6A CN105959098A (en) 2016-04-28 2016-04-28 Format-reserved encryption algorithm based on multi-segmented Feistel network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610275040.6A CN105959098A (en) 2016-04-28 2016-04-28 Format-reserved encryption algorithm based on multi-segmented Feistel network

Publications (1)

Publication Number Publication Date
CN105959098A true CN105959098A (en) 2016-09-21

Family

ID=56916049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610275040.6A Pending CN105959098A (en) 2016-04-28 2016-04-28 Format-reserved encryption algorithm based on multi-segmented Feistel network

Country Status (1)

Country Link
CN (1) CN105959098A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768617A (en) * 2018-06-06 2018-11-06 贵州大学 A kind of holding format encryption method based on legacy packets password
CN110334530A (en) * 2019-06-26 2019-10-15 上海派拉软件股份有限公司 Encryption method for database numerical field
CN110750810A (en) * 2019-10-23 2020-02-04 卓尔智联(武汉)研究院有限公司 Data desensitization method and device, computer equipment and storage medium
CN110768797A (en) * 2019-11-13 2020-02-07 西北师范大学 Data desensitization method based on identity format reserved encryption
CN110795762A (en) * 2019-10-30 2020-02-14 贵州大学 Reserved format encryption method based on stream cipher
CN111753317A (en) * 2020-05-27 2020-10-09 长沙睿永信息技术有限公司 Method for realizing equal-length digital encryption
CN111783112A (en) * 2020-06-09 2020-10-16 北京三未信安科技发展有限公司 Method, system, medium and device for quickly realizing reserved format encryption
CN113079010A (en) * 2021-06-07 2021-07-06 深圳奥联信息安全技术有限公司 Security enhancement method and device based on reserved format algorithm
CN113204781A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Implementation method and device for reserved format encryption algorithm
CN113204779A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Implementation method and device of reserved format encryption algorithm based on symmetric cryptographic algorithm
CN113204780A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Method and device for realizing reserved format encryption algorithm
CN113259934A (en) * 2021-06-25 2021-08-13 贵州大学 Short message verification code encryption method, decryption method and encryption and decryption system
CN114826590A (en) * 2022-05-19 2022-07-29 北京海泰方圆科技股份有限公司 Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment
CN116049841A (en) * 2022-09-08 2023-05-02 北京海泰方圆科技股份有限公司 Encryption method, device, equipment and medium for identity card number

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768617B (en) * 2018-06-06 2021-02-23 贵州大学 Format-preserving encryption method based on traditional block cipher
CN108768617A (en) * 2018-06-06 2018-11-06 贵州大学 A kind of holding format encryption method based on legacy packets password
CN110334530A (en) * 2019-06-26 2019-10-15 上海派拉软件股份有限公司 Encryption method for database numerical field
CN110334530B (en) * 2019-06-26 2020-09-22 上海派拉软件股份有限公司 Encryption method for database numerical field
CN110750810A (en) * 2019-10-23 2020-02-04 卓尔智联(武汉)研究院有限公司 Data desensitization method and device, computer equipment and storage medium
CN110795762B (en) * 2019-10-30 2023-04-11 贵州大学 Reserved format encryption method based on stream cipher
CN110795762A (en) * 2019-10-30 2020-02-14 贵州大学 Reserved format encryption method based on stream cipher
CN110768797A (en) * 2019-11-13 2020-02-07 西北师范大学 Data desensitization method based on identity format reserved encryption
CN111753317A (en) * 2020-05-27 2020-10-09 长沙睿永信息技术有限公司 Method for realizing equal-length digital encryption
CN111783112A (en) * 2020-06-09 2020-10-16 北京三未信安科技发展有限公司 Method, system, medium and device for quickly realizing reserved format encryption
CN111783112B (en) * 2020-06-09 2023-09-12 三未信安科技股份有限公司 Method, system, medium and device for realizing reserved format encryption rapidly
CN113204781A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Implementation method and device for reserved format encryption algorithm
CN113204780A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Method and device for realizing reserved format encryption algorithm
CN113204780B (en) * 2021-05-20 2022-02-18 郑州信大捷安信息技术股份有限公司 Method and device for realizing reserved format encryption algorithm
CN113204781B (en) * 2021-05-20 2022-04-15 郑州信大捷安信息技术股份有限公司 Implementation method and device for reserved format encryption algorithm
CN113204779B (en) * 2021-05-20 2022-04-15 郑州信大捷安信息技术股份有限公司 Implementation method and device of reserved format encryption algorithm based on symmetric cryptographic algorithm
CN113204779A (en) * 2021-05-20 2021-08-03 郑州信大捷安信息技术股份有限公司 Implementation method and device of reserved format encryption algorithm based on symmetric cryptographic algorithm
CN113079010B (en) * 2021-06-07 2022-01-04 深圳奥联信息安全技术有限公司 Security enhancement method and device based on reserved format algorithm
CN113079010A (en) * 2021-06-07 2021-07-06 深圳奥联信息安全技术有限公司 Security enhancement method and device based on reserved format algorithm
CN113259934A (en) * 2021-06-25 2021-08-13 贵州大学 Short message verification code encryption method, decryption method and encryption and decryption system
CN114826590A (en) * 2022-05-19 2022-07-29 北京海泰方圆科技股份有限公司 Packet mode encryption method, packet mode decryption method, packet mode encryption device, packet mode decryption device and packet mode decryption equipment
CN116049841A (en) * 2022-09-08 2023-05-02 北京海泰方圆科技股份有限公司 Encryption method, device, equipment and medium for identity card number
CN116049841B (en) * 2022-09-08 2023-09-19 北京海泰方圆科技股份有限公司 Encryption method, device, equipment and medium for identity card number

Similar Documents

Publication Publication Date Title
CN105959098A (en) Format-reserved encryption algorithm based on multi-segmented Feistel network
TWI750223B (en) Blockchain encrypted radio frequency chip storage design method
CN103595539B (en) Retain the encryption method of the numeric type personally identifiable information of form
CN108667595B (en) Compression encryption method for big data file
EP1997265B1 (en) Integrity of a data processing system using white-box for digital content protection
CN101149768B (en) Special processor software encryption and decryption method
US8966285B2 (en) Securing implementation of a cryptographic process having fixed or dynamic keys
CN102752101A (en) Hierarchical data encryption/decryption apparatus and method thereof
CN107637010A (en) Data encryption device and method and data deciphering device and method
Alsaidi et al. Compression multi-level crypto stego security of texts utilizing colored email forwarding
CN105406969A (en) Apparatus And Method For Data Encryption
CN108023728A (en) Encryption device and method
CN106598882A (en) Secure memory data protection method and device
CN102546156A (en) Method, system and device for grouping encryption
CN106936820B (en) Data variable length modification method and application thereof in big data encryption
CN103051446A (en) Key encryption and storage method
CN102456108B (en) Encryption method for ibus pinyin code table
Attaullah et al. Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
Geetha et al. Tamilian cryptography: an efficient hybrid symmetric key encryption algorithm
CN107273724A (en) Input and output watermarking for whitepack embodiment
CN104794243B (en) Third party's cipher text retrieval method based on filename
CN106656500A (en) Encryption device and method
Siahaan et al. Implementation of super playfair in messaging
Saxena et al. A new way to enhance efficiency & security by using symmetric cryptography
KR101790325B1 (en) Encryption and Decryption System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160921