[go: up one dir, main page]

CN114520715B - AES-based encryption coding method, storage medium and system - Google Patents

AES-based encryption coding method, storage medium and system Download PDF

Info

Publication number
CN114520715B
CN114520715B CN202111623062.4A CN202111623062A CN114520715B CN 114520715 B CN114520715 B CN 114520715B CN 202111623062 A CN202111623062 A CN 202111623062A CN 114520715 B CN114520715 B CN 114520715B
Authority
CN
China
Prior art keywords
string
value
numerical
character string
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111623062.4A
Other languages
Chinese (zh)
Other versions
CN114520715A (en
Inventor
张炳阳
李缝兴
叶文华
黄岩
吴烜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Zefu Software Co ltd
Original Assignee
Fujian Zefu Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Zefu Software Co ltd filed Critical Fujian Zefu Software Co ltd
Priority to CN202111623062.4A priority Critical patent/CN114520715B/en
Publication of CN114520715A publication Critical patent/CN114520715A/en
Application granted granted Critical
Publication of CN114520715B publication Critical patent/CN114520715B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

An AES-based encryption encoding method, a storage medium and a system, comprising the following steps: obtaining first information, converting the first information into AES encrypted characters to obtain a first character string, extracting numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string, accumulating the same numerical values in the second numerical string to obtain a third numerical string, and exchanging the characters of preset digits in the first character string according to the value of the x th bit and the value of the y th bit of the third numerical string, wherein y=n+1-x, x is (1, … …, n/2), and n is the number of digits of the third character string to obtain a fourth character string. Through the scheme, the AES character string after the first information is encrypted can be further encrypted, and partial content in the character string can be subjected to bit-shifting encryption according to the preset rule. After application, the security of information encryption can be improved.

Description

AES-based encryption coding method, storage medium and system
Technical Field
The invention relates to the field of data encryption, in particular to a method for improving encryption performance.
Background
AES, abbreviation Advanced Encryption Standard, chinese name: advanced encryption standard, also known in cryptography as Rijndael encryption. The conventional encryption process adopts a public encryption algorithm which is easy to crack, and the encryption password is relatively fixed, so that improvement is required for the existing encryption method.
Disclosure of Invention
Accordingly, it is desirable to provide a novel information encryption method.
To achieve the above object, the present inventors provide an AES-based encryption encoding method including the steps of:
acquiring first information, converting the first information into AES encrypted characters to obtain a first character string,
Extracting the numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
Accumulating the same values in the second value string to obtain a third value string,
And according to the value of the x-th bit and the value of the y-th bit of the third numerical string, replacing the character of the preset digit in the first character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the third character string, so as to obtain a fourth character string.
Specifically, the method further comprises the step of interpolating the fourth character string according to the value a of the z-th bit of the third value string, inserting a non-numeric character corresponding to the value of m according to a preset rule at the m-th bit position of the fourth character string to obtain a seventh character string, wherein m=n×a/10, z e (1, … …, q), and q is the number of bits of the third value string.
Specifically, the preset rule is that the inserted english character is the p-th letter of the english alphabet, p=mmod 26.
Specifically, the preset rule is that the inserted english character is the p-th letter of the english alphabet, p=mmod 52, and p >26 is the uppercase english character.
Specifically, the method also comprises the steps of extracting the numerical characters from the seventh character string, carrying out bubbling sequencing on the numerical characters to obtain an eighth numerical string,
Accumulating the same values in the eighth value string to obtain a ninth value string,
And deleting the character from the seventh character string according to the value a of the z-th bit of the ninth character string, and inserting a non-numeric character corresponding to the value of m in the m-th bit of the seventh character string according to a preset rule, wherein m=n×a/10, z is epsilon (1, … …, q), and n is the number of bits of the seventh character string minus the number of bits of the ninth character string, so as to obtain a fourth character string.
Specifically, the method also comprises the steps of extracting the numerical characters from the fourth character string, carrying out bubbling sequencing on the numerical characters to obtain a fifth numerical string,
Accumulating the same values in the fifth value string to obtain a sixth value string,
And according to the value of the x-th bit and the value of the y-th bit of the sixth numerical string, replacing the character of the preset digit in the fourth character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the fourth character string, so as to obtain the first character string.
An AES-based cryptographically encoded storage medium storing a computer program which, when executed, performs steps comprising:
acquiring first information, converting the first information into AES encrypted characters to obtain a first character string,
Extracting the numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
Accumulating the same values in the second value string to obtain a third value string,
And according to the value of the x-th bit and the value of the y-th bit of the third numerical string, replacing the character of the preset digit in the first character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the third character string, so as to obtain a fourth character string.
In particular, the computer program, when executed, further performs the steps comprising:
Extracting the numerical characters from the fourth character string, performing bubbling sequencing on the numerical characters to obtain a fifth numerical string,
Accumulating the same values in the fifth value string to obtain a sixth value string,
And according to the value of the x-th bit and the value of the y-th bit of the sixth numerical string, replacing the character of the preset digit in the fourth character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the fourth character string, so as to obtain the first character string.
In particular, the computer program, when executed, further performs the steps comprising:
And interpolating the fourth character string according to the value a of the z-th bit of the third value string, and inserting a non-numeric character corresponding to the value of m according to a preset rule at the m-th bit of the fourth character string to obtain a seventh character string, wherein m=n×a/10, z epsilon (1, … …, q), and q is the number of bits of the third value string.
An AES-based encryption encoding system comprising the AES-based encryption encoding storage medium according to any one of the above, further comprising an encryption unit, a decryption unit.
Through the scheme, the AES character string after the first information is encrypted can be further encrypted, and partial content in the character string can be subjected to bit-shifting encryption according to the preset rule. After application, the security of information encryption can be improved.
The foregoing summary is merely an overview of the present application, and may be implemented according to the text and the accompanying drawings in order to make it clear to a person skilled in the art that the present application may be implemented, and in order to make the above-mentioned objects and other objects, features and advantages of the present application more easily understood, the following description will be given with reference to the specific embodiments and the accompanying drawings of the present application.
Drawings
The drawings are only for purposes of illustrating the principles, implementations, applications, features, and effects of the present application and are not to be construed as limiting the application.
FIG. 1 is a flowchart of an AES-based encryption encoding method according to an embodiment;
FIG. 2 is a flowchart of a method for decrypting a level shift according to an embodiment;
FIG. 3 is a flowchart of a method for interpolation scrambling according to an embodiment;
FIG. 4 is a schematic diagram of an interpolation codebook according to an embodiment;
FIG. 5 is a flowchart of a method for performing interpolation aliasing decoding according to an embodiment;
fig. 6 is a schematic diagram of an AES-based encryption encoding system according to an embodiment.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of the phrase "in various places in the specification are not necessarily all referring to the same embodiment, nor are they particularly limited to independence or relevance from other embodiments. In principle, in the present application, as long as there is no technical contradiction or conflict, the technical features mentioned in each embodiment may be combined in any manner to form a corresponding implementable technical solution.
Unless defined otherwise, technical terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the present application pertains; the use of related terms herein is for the purpose of describing particular embodiments only and is not intended to limit the application.
In the description of the present application, the term "and/or" is a representation for describing a logical relationship between objects, which means that three relationships may exist, for example a and/or B, representing: there are three cases, a, B, and both a and B. In addition, the character "/" herein generally indicates that the front-to-back associated object is an "or" logical relationship.
In the present application, terms such as "first" and "second" are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any actual number, order, or sequence of such entities or operations.
Without further limitation, the use of the terms "comprising," "including," "having," or other like terms in this specification is intended to cover a non-exclusive inclusion, such that a process, method, or article of manufacture that comprises a list of elements does not include additional elements but may include other elements not expressly listed or inherent to such process, method, or article of manufacture.
In the present application, the expressions "greater than", "less than", "exceeding", etc. are understood to exclude this number; the expressions "above", "below", "within" and the like are understood to include this number. Furthermore, in the description of embodiments of the present application, the meaning of "a plurality of" is two or more (including two), and similarly, the expression "a plurality of" is also to be understood as such, for example, "a plurality of" and the like, unless specifically defined otherwise.
In the description of embodiments of the present application, spatially relative terms such as "center," "longitudinal," "transverse," "length," "width," "thickness," "up," "down," "front," "back," "left," "right," "vertical," "horizontal," "vertical," "top," "bottom," "inner," "outer," "clockwise," "counter-clockwise," "axial," "radial," "circumferential," etc., are used herein as a basis for the description of the embodiments or as a basis for the description of the embodiments, and are not intended to indicate or imply that the devices or components referred to must have a particular position, a particular orientation, or be configured or operated in a particular orientation and therefore should not be construed as limiting the embodiments of the present application.
Unless specifically stated or limited otherwise, the terms "mounted," "connected," "affixed," "disposed," and the like as used in the description of embodiments of the application should be construed broadly. For example, the "connection" may be a fixed connection, a detachable connection, or an integral arrangement; the device can be mechanically connected, electrically connected and communicated; it can be directly connected or indirectly connected through an intermediate medium; which may be a communication between two elements or an interaction between two elements. The specific meaning of the above terms in the embodiments of the present application can be understood by those skilled in the art to which the present application pertains according to circumstances.
In some embodiments, referring to fig. 1, an AES-based encryption encoding method includes the steps of:
S1, obtaining first information, converting the first information into AES encrypted characters to obtain a first character string,
S2, extracting numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
S3, accumulating the same values in the second value string to obtain a third value string,
S4, according to the value of the x-th bit and the value of the y-th bit of the third numerical string, the characters of the preset digits in the first character string are exchanged, y=n+1-x, x is E (1, … …, n/2), and n is the number of the digits of the third character string, so that a fourth character string is obtained.
The first information is information to be encrypted, the first character string is an AES encrypted character string, and the encryption process of the first character string is performed next. By acquiring the numerical characters in the first character string and further encrypting according to the numerical characters, a better encryption effect can be achieved, and the numerical characters are not easy to crack.
In some specific embodiments, if the first message is "hello",
The first string, which is the string encrypted by AES, is:
U2FsdGVkX18xyH1wYqrtY4UunaEP2/iFOcKZzHoU6iU=
Extracting numerical characters in the numerical strings, carrying out bubble sequencing on the numerical characters to obtain a second numerical string, wherein the numerical characters are 2181426: 1122468;
The same values in the second numerical string are accumulated to obtain a third numerical string: 24468 is provided to simplify the numerical string, avoid multiple occurrences of the same character as much as possible, and if the accumulated result is two digits, the accumulated result is also sequentially reserved, and in other embodiments, the second string is 55577888, and the corresponding processed third string is 151424.
The step is carried out, according to the value of the x-th bit and the value of the y-th bit of the third numerical string, the characters of the preset digits in the first character string are exchanged, if n=5 of the third character string, the value of x is 1 and 2; y may take values of 5, 4. Namely, the third numerical string is sequentially valued from the beginning to the end to the middle, when x=1 and y=5, the 2 nd character and the 8 th character in the first character string are positioned, when x=2 and y=4, the 4 th character and the 6 th character in the first character string are positioned, and the fourth character string is obtained as follows: ukFGdsV2x18xyH1wYqrtY4 UunaEP/iFOcKZzHoU 6iu=. Through the encryption step, the technical effect of encryption is better achieved.
In the above steps, we can see that the first string and the fourth string are reversible for steps S1-S4. This is because the two are only exchanged, the number contained therein is unchanged, the second character string obtained by bubbling is also unchanged, and the first character string is changed back by exchanging the characters of the preset digits of the fourth character string by the same rule. In a further embodiment, as shown in fig. 2, we can also perform the following steps:
S22, extracting the numerical characters from the fourth character string, performing bubbling sequencing on the numerical characters to obtain a fifth numerical string 1122468,
S23 adds up the same values in the fifth string of values to obtain a sixth string of values 24468,
S24, according to the value of the x bit and the value of the y bit of the sixth numerical string, the characters of the preset digits in the fourth character string are exchanged, y=n+1-x, x is epsilon (1, … …, n/2), and n is the number of the digits of the fourth character string, so that the first character string is obtained. If n=5 of the sixth string, the value of x is 1 and 2; y may take values of 5, 4. Namely, the sixth numerical string is sequentially valued from the beginning to the end to the middle, when x=1 and y=5, the 2 nd character and the 8 th character in the fourth character string are positioned, when x=2 and y=4, the 4 th character and the 6 th character in the fourth character string are positioned, and the decryption is carried out to obtain the first character string as follows: u2FsdGVkX, 18xyH1wYqrtY, uunaEP/iFOcKZzHoU, 6 iu=. By means of the above scheme we have done decryption of the relevant scheme.
In some further embodiments, as shown in fig. 3, the method further includes the step of S5 interpolating the fourth string according to the value a of the z-th bit of the third string, and inserting a non-numeric character corresponding to the value of m according to a preset rule at the m-th bit of the fourth string to obtain a seventh string, where m=n×a/10, z e (1, … …, q), and q is the number of bits of the third string.
Specifically, also taking the fourth string as an example:
UkFGdsV2X18xyH1wYqrtY4UunaEP2/iFOcKZzHoU6iU=;n=44,
When the third numerical string is 24468 and q=5 and z is 1,2, 3, 4, 5, a is 2,4, 6, 8, respectively. The calculated m is 9, 18, 28, 38 (rounded off when not integer). Non-numeric characters are inserted at bits 9, 18, 28, 38 of the fourth string according to a preset rule. The meaning of inserting the non-numeric character is that the value of the third character string cannot be influenced, so that decryption cannot be performed, and the non-numeric character can be inserted, so that the codebook can be designed, and the character specifically inserted in the codebook can be corresponding to the value of m or not. It can be correspondingly considered that AES characters have no special characters, and english alphabets can be preferably used. In some specific embodiments, the preset rule (codebook) is that the inserted english character is the p-th letter of the english alphabet, p=mmod 26. If m is 9, then insert i … …, and so on. In other embodiments, it is also contemplated to insert capital letters, such as the codebook shown in fig. 4, where the predetermined rule is that the inserted english character is the p-th letter of the english alphabet, and p=m mod 52, p >26 is the capital english character. In this embodiment, i is inserted when m is 9, r is inserted when m is 18, B is inserted when m is 28, and L is inserted when m is 38.
Inserting the confusion character of the fourth character string according to the rule, and obtaining a seventh character string as follows: ukFGdsV 2xi.18 xyh1wYrrqrtY 4. 4UunBaEP 2/iFOcLKZzHoU.sup.6iu=. By the scheme, the encryption degree is further improved, and the security of data encryption is further enhanced.
In a further embodiment, as shown in fig. 5, the method further includes a step of deleting the confusion character of the seventh character string, and the step may be performed, wherein the step S25 extracts the numerical character in the seventh character string, and performs bubbling sequencing on the numerical character to obtain an eighth numerical string, where the eighth numerical string is 1122468,
S26, accumulating the same values in the eighth value string to obtain a ninth value string, 24468, wherein the ninth value string can be seen to be the same as the third value string.
And S27, deleting characters from the seventh character string according to the value a of the z-th bit of the ninth character string, and inserting non-numeric characters corresponding to the value of m at the m-th bit position of the seventh character string according to a preset rule to obtain a fourth character string, wherein m=n a/10, z epsilon (1, … …, q), n is the number of bits 49 of the seventh character string minus the number of bits 5 of the ninth character string, n=44, q=5, and z is respectively 2, 4, 6 and 8 when z is respectively 1,2, 3, 4 and 5. The calculated m is 9, 18, 28, 38 (rounded off when not integer). The reverse decryption problem can be solved by deleting the characters of the digits in sequence. Through the scheme, the safety of the invention is further improved.
An AES-based cryptographically encoded storage medium storing a computer program which, when executed, performs steps comprising:
acquiring first information, converting the first information into AES encrypted characters to obtain a first character string,
Extracting the numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
Accumulating the same values in the second value string to obtain a third value string,
And according to the value of the x-th bit and the value of the y-th bit of the third numerical string, replacing the character of the preset digit in the first character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the third character string, so as to obtain a fourth character string. By decrypting the storage medium, the technical effect of encryption can be better achieved.
In particular, the computer program, when executed, further performs the steps comprising:
Extracting the numerical characters from the fourth character string, performing bubbling sequencing on the numerical characters to obtain a fifth numerical string,
Accumulating the same values in the fifth value string to obtain a sixth value string,
And according to the value of the x-th bit and the value of the y-th bit of the sixth numerical string, replacing the character of the preset digit in the fourth character string, wherein y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the fourth character string, so as to obtain the first character string.
In particular, the computer program, when executed, further performs the steps comprising:
And interpolating the fourth character string according to the value a of the z-th bit of the third value string, and inserting a non-numeric character corresponding to the value of m according to a preset rule at the m-th bit of the fourth character string to obtain a seventh character string, wherein m=n×a/10, z epsilon (1, … …, q), and q is the number of bits of the third value string.
An AES-based encryption encoding system, as shown in fig. 6, includes an AES-based encryption encoding storage medium 60 as set forth in any one of the above, and further includes an encryption unit 61, a decryption unit 62. In some specific examples, encryption unit 61 may be used to perform methods S1-S5. Encrypting and interpolating the AES character string. The decryption unit 62 may be configured to perform the methods S22-S24, S25-S27 to perform the relevant decryption steps, and by using the above encryption encoding system, further encryption can be performed according to the numeric characters, so that a better encryption effect can be achieved, and the decryption is not easy to crack.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present invention is not limited thereby. Therefore, based on the innovative concepts of the present invention, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the invention.

Claims (7)

1. An AES-based encryption encoding method, characterized by comprising the steps of:
acquiring first information, converting the first information into AES encrypted characters to obtain a first character string,
Extracting the numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
Accumulating the same values in the second value string to obtain a third value string,
According to the value of the x-th bit and the value of the y-th bit of the third numerical string, the characters of the preset digits in the first character string are exchanged, y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the third numerical string, so that a fourth character string is obtained;
The method further comprises the following steps of interpolating the fourth character string according to the value a of the z-th bit of the third value string, inserting a non-numeric character corresponding to the value of m at the m-th bit position of the fourth character string according to a preset rule to obtain a seventh character string, wherein m=n×a/10, and z epsilon (1, … …, n).
2. The AES-based encryption encoding method according to claim 1, wherein the preset rule is that the inserted english character is a p-th letter of the english alphabet, p=mmod 26.
3. The AES-based encryption encoding method according to claim 1, wherein the predetermined rule is that the inserted english character is a p-th letter of the english alphabet, p=mmod 52, and p >26 is a capital english character.
4. The AES encryption encoding method according to claim 1, further comprising the step of extracting numeric characters from the fourth string, performing bubbling ordering on the numeric characters to obtain a fifth numeric string,
Accumulating the same values in the fifth value string to obtain a sixth value string,
And according to the value of the x1 bit and the value of the y1 bit of the sixth numerical string, replacing the character of the preset digit in the fourth character string, wherein y1=n1+1-x 1, x1 epsilon (1, … …, n 1/2), and n1 is the number of digits of the sixth numerical string, so as to obtain the first character string.
5. An AES-based encryption encoding storage medium, characterized in that a computer program is stored, which when executed performs the steps comprising:
acquiring first information, converting the first information into AES encrypted characters to obtain a first character string,
Extracting the numerical characters from the first character string, performing bubbling sequencing on the numerical characters to obtain a second numerical string,
Accumulating the same values in the second value string to obtain a third value string,
According to the value of the x-th bit and the value of the y-th bit of the third numerical string, the characters of the preset digits in the first character string are exchanged, y=n+1-x, x is epsilon (1, … …, n/2), and n is the digit of the third numerical string, so that a fourth character string is obtained;
the computer program when executed further performs the steps comprising:
And interpolating the fourth character string according to the value a of the z-th bit of the third value string, and inserting a non-numeric character corresponding to the value of m according to a preset rule at the m-th bit of the fourth character string to obtain a seventh character string, wherein m=n×a/10, and z epsilon (1, … …, n).
6. The AES-based encryption encoding storage medium of claim 5, wherein the computer program when executed further performs the steps of:
Extracting the numerical characters from the fourth character string, performing bubbling sequencing on the numerical characters to obtain a fifth numerical string,
Accumulating the same values in the fifth value string to obtain a sixth value string,
And according to the value of the x1 bit and the value of the y1 bit of the sixth numerical string, replacing the character of the preset digit in the fourth character string, wherein y1=n1+1-x 1, x1 epsilon (1, … …, n 1/2), and n1 is the number of digits of the sixth numerical string, so as to obtain the first character string.
7. An AES-based encryption encoding system, comprising an AES-based encryption encoding storage medium according to any one of claims 5 to 6, further comprising an encryption unit, a decryption unit.
CN202111623062.4A 2021-12-28 2021-12-28 AES-based encryption coding method, storage medium and system Active CN114520715B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111623062.4A CN114520715B (en) 2021-12-28 2021-12-28 AES-based encryption coding method, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111623062.4A CN114520715B (en) 2021-12-28 2021-12-28 AES-based encryption coding method, storage medium and system

Publications (2)

Publication Number Publication Date
CN114520715A CN114520715A (en) 2022-05-20
CN114520715B true CN114520715B (en) 2024-06-25

Family

ID=81597203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111623062.4A Active CN114520715B (en) 2021-12-28 2021-12-28 AES-based encryption coding method, storage medium and system

Country Status (1)

Country Link
CN (1) CN114520715B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202729A (en) * 2020-09-11 2021-01-08 微梦创科网络科技(中国)有限公司 Dynamic obfuscated encryption and decryption method and device
CN113496111A (en) * 2020-04-03 2021-10-12 华为技术有限公司 Character string processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8938067B2 (en) * 2009-10-30 2015-01-20 Voltage Security, Inc. Format preserving encryption methods for data strings with constraints

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496111A (en) * 2020-04-03 2021-10-12 华为技术有限公司 Character string processing method and device
CN112202729A (en) * 2020-09-11 2021-01-08 微梦创科网络科技(中国)有限公司 Dynamic obfuscated encryption and decryption method and device

Also Published As

Publication number Publication date
CN114520715A (en) 2022-05-20

Similar Documents

Publication Publication Date Title
CN116032474B (en) A computer network security protection system based on big data
CN115865523B (en) Data encryption transmission method for information analysis system
Wei et al. Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps
CN101610088A (en) System and method for encoding data based on compression techniques with security features
CN115694784A (en) Data safety storage method
US11277259B2 (en) Multi-layer encryption employing Kaprekar routine and letter-proximity-based cryptograms
CN116796354B (en) Information security enhancement method for computer system
Hamed et al. Hybrid technique for steganography-based on DNA with n-bits binary coding rule
Hamad Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data.
CN115834163B (en) Method, device, equipment and storage medium for generating secret key of encrypted data
CN111224778A (en) Data reserved format encryption method
CN115941189A (en) Encryption method for document data
Deepthi A survey paper on Playfair cipher and its variants
Paragas et al. Hill cipher modification: A simplified approach
Vinodhini et al. A survey on DNA and image steganography
Bhargava et al. A new algorithm combining substitution & transposition cipher techniques for secure communication
JP2009503580A (en) Symmetric key data encryption method
Agrawal et al. Data hiding using dictionary based substitution method in DNA sequences
CN114520715B (en) AES-based encryption coding method, storage medium and system
KR101584127B1 (en) System and method for deniable encryption
Choubey et al. Cryptographic techniques in information security
CN119995837A (en) An improved AES encryption method and system with side channel attack resistance
Stallings Format-preserving encryption: Overview and NIST specification
Mavanai et al. Message transmission using DNA crypto-system
Gupta et al. ASCII conversion based two keys V4S scheme for encryption and decryption—A four step approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant