CN107241194A - A kind of encryption method of CAD design model - Google Patents

A kind of encryption method of CAD design model Download PDF

Info

Publication number
CN107241194A
CN107241194A CN201710490173.XA CN201710490173A CN107241194A CN 107241194 A CN107241194 A CN 107241194A CN 201710490173 A CN201710490173 A CN 201710490173A CN 107241194 A CN107241194 A CN 107241194A
Authority
CN
China
Prior art keywords
data
encryption
key
encrypting module
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710490173.XA
Other languages
Chinese (zh)
Inventor
吴苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Shandao New Mstar Technology Ltd
Original Assignee
Changsha Shandao New Mstar Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Shandao New Mstar Technology Ltd filed Critical Changsha Shandao New Mstar Technology Ltd
Priority to CN201710490173.XA priority Critical patent/CN107241194A/en
Publication of CN107241194A publication Critical patent/CN107241194A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Power Engineering (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of encryption method of CAD design model, including key memory module and encrypting module, key memory module is connected with encrypting module, for storing key;Encrypting module is used for encryption.The encryption method of the present invention is that whole CAD model is encrypted, so that, the model of design can not be also restored after others obtains the model of encryption, so that having more practical function than existing CAD encryption methods in terms of cipher round results more preferably;What is used simultaneously in CAD model ciphering process whole CAD model acquisition data point is encrypted according to the progress of random data point, and the key of encryption uses the characteristic value of iris, so that the more safety of encryption and whole CAD model can be encrypted.

Description

A kind of encryption method of CAD design model
Technical field
The present invention relates to field of encryption, especially, it is related to a kind of encryption method of CAD design model.
Background technology
CAD data is not only the key data source of geospatial information acquisition, while being also domestic enterprise and designing unit The achievement of Computer Aided Design is carried out using AutoCAD.In recent years, as digitlization and network times are developed rapidly, CAD data Storage, transmission, replicate and all become very convenient quick.The illegal copies of CAD data and duplication, not only result in CAD data The owner suffer huge economic losses, more entail dangers to national security, national defense safety etc..
Access control method in the collaborative product design environment of early stage is the CAD model data for directly painting grass as general Logical file is managed, and the access of the careless CAD model file painted mainly is controlled by the Permission Levels of user.Painted in view of grass CAD model data in often both comprising shared information simultaneously or comprising sensitive information, therefore the CAD model file that grass is painted is made The local message in model can not be protected for the minimum particle size of access control.
Notification number discloses a kind of CAD model local cypher side painted based on grass for CN 103778383B Chinese patent Method, this method is that local model is encrypted, so that CAD model can not be restored, but this method is Local model part is changed, some experienced designers can go out the mould of a part according to the modelling of a part Type, thus this method encryption security it is not high, it is impossible to encrypt after CAD model cause other people can not restoring data model effect Really, also there is more not foot point.
The content of the invention
Present invention aims at a kind of encryption method of CAD design model is provided, to solve existing CAD model encryption method The security of middle encryption is not high and could not carry out technical problem that whole model is encrypted.
To achieve the above object, the invention provides a kind of encryption method of CAD design model, including key memory module With encrypting module, key memory module is connected with encrypting module, for storing key;Encrypting module is used for encryption;Including Following steps:
Step 1:When encrypting module receives encrypted instruction, the grade for needing to encrypt is extracted from encrypted instruction;
Step 2:The data break that encrypting module is set according to user obtain the drafting points on whole CAD model According to;
Step 3:Encrypting module determines to obtain data starting point according to random function, according to data break since starting point Progress, which is chosen, needs encryption data point on whole CAD model;
Step 4:Encrypting module, which is chosen, to be needed after encryption data point, and encrypted instruction is sent to key memory module;
Step 5:Key memory module is received after encrypted instruction and secret grade, chooses original key data and according to encryption Grade is iterated calculation process to original key data and obtains ripe key data;
Step 6:Ripe key data are transmitted to encrypting module by key memory module, and encrypting module is used each data point Ripe key data carry out one-time pad encryption and obtain initial ciphertext data point;
Step 7:All initial ciphertext data points are carried out packet and obtain initial ciphertext block by encrypting module;Each The initial ciphertext data points of initial ciphertext block are n, n>1 integer, the beginning ciphertext data of last packet are counted less than n When, remaining data are used as a packet;
Step 8:Encrypting module circulate shifting L to the left or to the right initial ciphertext block and obtains intermediate ciphertext packet, L For the digit of beginning ciphertext block cyclic shift;
Step 9:Encrypting module carries out secondary irreversible operation to the packet of each intermediate ciphertext using ripe key data and added Close to obtain encryption data, encryption is completed.
In such scheme, the data break preferably in step 2 is by user's sets itself, and data break, which is less than, to be needed to add The length on any one side in close CAD model.
In such scheme, selection needs the process of encryption data point to be since starting point, to rise preferably in step 3 Initial point data obtain needing encryption data point plus the integer multiple data of data break number, and encryption data point belongs to the need for selection In the point in CAD model.
In such scheme, the original key data stored in the key memory module preferably in step 5 are iris feature Value Data, the acquisition process of iris feature Value Data is the iris that volunteer's eyes are gathered by iris capturing device, collection Iris iris is encrypted encryption iris data by high order two based on high order second order logistic formulas, to encryption rainbow Film data carry out characteristics extraction and obtain iris feature Value Data.
In such scheme, the interative computation formula preferably in step 5 maps formula using logistic, to original key Data are iterated 5-10 times and obtain ripe key data.
In such scheme, preferably the process of one-time pad encryption is in step 6, each data point and ripe key data XOR is carried out, then operation result is carried out leftward or rightward move being obtained again with ripe key data XOR after 8 just Beginning ciphertext data point.
In such scheme, irreversible operation formula is MD5 encryption formula preferably in step 7.
The invention has the advantages that:
The encryption method of the present invention is that whole CAD model is encrypted, so that, in terms of cipher round results more preferably The model of design can not be also restored after others obtains the model of encryption, so that being had more than existing CAD encryption methods There is practical function;What is used simultaneously in CAD model ciphering process is carried out to the acquisition of whole CAD model according to random data point Data point is encrypted, and the key encrypted uses the characteristic value of iris, and the characteristic value of iris is directly known by iris Other acquisition device is directly gathered and obtained from the eyes of people, and the secret collection of the process use in collection, so that Simultaneously whole CAD model can be encrypted for the key of encryption more safety.
In addition to objects, features and advantages described above, the present invention also has other objects, features and advantages. Below with reference to figure, the present invention is further detailed explanation.
Brief description of the drawings
The accompanying drawing for constituting the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention Apply example and its illustrate to be used to explain the present invention, do not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the design sketch of prior art encryption;
Fig. 2 is the encryption block diagram of the preferred embodiment of the present invention;
Fig. 3 is the Encryption Model figure of the preferred embodiment of the present invention;
Fig. 4 is the encryption pre-structure schematic diagram of the preferred embodiment of the present invention;
Fig. 5 be the preferred embodiment of the present invention encryption after design sketch.
Embodiment
Embodiments of the invention are described in detail below in conjunction with accompanying drawing, but the present invention can be limited according to claim Fixed and covering multitude of different ways is implemented.
As shown in figure 1, being the cipher round results figure of prior art in figure, the clandestine method is simply to emphasis structure above part Portion is encrypted, and does not carry out that whole part is encrypted, so that the structure substantially of whole part is still with bright The form of text shows that the person of decoding can be decrypted according to structural model substantially and the scene of application, will be encryption Part also is cracked out, so that the encryption method has the characteristics of security is not high, it is impossible to which whole part is added It is close, so that the shredder meeting bigger to cracker.
A kind of encryption method of CAD design model, as shown in Figure 2,3, including key memory module and encrypting module, key Memory module is connected with encrypting module, for storing key;Encrypting module is used for encryption.Specific encryption method includes as follows Step:
Step 1:When encrypting module receives encrypted instruction, the grade for needing to encrypt is extracted from encrypted instruction.User Input needs the grade encrypted from software interface, and software is the CAD model and secret grade for needing to encrypt together by plain text Data-in port enters encrypting module.Wherein, CAD model can be that two dimensional model can also be threedimensional model.
Step 2:The data break that encrypting module is set according to user carries out the drafting point data on acquisition CAD model.Number According to interval by user's sets itself, data break, which is less than, needs to encrypt the length on any one side in CAD model.As shown in Fig. 2 just Cube is needs the CAD model encrypted, when the length of side of square is 2 centimetres, then the data break interval data of user's input 2 centimetres can not be more than.
Step 3:Encrypting module determines to obtain data starting point according to random function, according to data break since starting point Carrying out selection needs encryption data point.Random function is existing random function, for any in two dimension or three-dimensional coordinate Selected point.Selection needs the process of encryption data point to be that since starting point, starting point data adds the integer of data break number Haplotype data obtains needing encryption data point, the point that encryption data point is belonged in CAD model the need for selection.As described in Figure 2, when The starting point of selection be a points when, a point coordinates be (0,0,0), and data break data be 1 when, then e points for choose point, e points Coordinate be (1,1,1), wherein, point b, c, d, a ', b ', c ' and d ' these turning points belong to need the selected point of encryption. In actual ciphering process, general data space-number all obtains smaller, typically takes three data after decimal point so that CAD moulds The minimum length of side in type typically can be data break number hundred times or thousands of times.
Step 4:Encrypting module, which is chosen, to be needed after encryption data point, and encrypted instruction and encryption are sent to key memory module Grade.Encrypting module is referred to first to needing encryption data point temporarily to be stored by data-signal to the transmission of key memory module Order.
Step 5:Key memory module is received after encrypted instruction and after secret grade, chooses original key data and according to adding Close grade is iterated calculation process to original key data and obtains ripe key data.What is stored in key memory module is original secret Key data are iris feature Value Data.Iris feature value has just been begun with equipment by producer and the eyes progress iris of people has been adopted Collection, and the iris feature value of collection is stored in key memory module as original key data, so that original key data It is safer.Wherein, interative computation formula maps formula using logistic, is iterated 5-10 times to original key data and obtains Ripe key data.
Step 6:Ripe key data are transmitted to encrypting module by key memory module, and encrypting module is used each data point Ripe key data carry out one-time pad encryption and obtain initial ciphertext data point.The process of one-time pad encryption is, each data point with into Ripe key data carry out XOR, then operation result move to the left or to the right after 8 again with ripe key data XOR Computing obtains initial ciphertext data point.
Step 7:All initial ciphertext data points are carried out packet and obtain initial ciphertext block by encrypting module;Each The initial ciphertext data points of initial ciphertext block are n, n>1 integer, the beginning ciphertext data of last packet are counted less than n When, remaining data are used as a packet.It is general to be grouped using the data of 4 points as one, when the points of last packet A packet is also served as during less than 4.
Step 8:Encrypting module circulate shifting L to the left or to the right initial ciphertext block and obtains intermediate ciphertext packet, L For the digit of beginning ciphertext block cyclic shift.For convenience of computing and processing, general use moves right 8, and each initial close The mobile order of text packet is different, and the data bit simply moved is identical, so that more safe and reliable.
Step 9:Encrypting module carries out secondary irreversible operation to the packet of each intermediate ciphertext using ripe key data and added Close to obtain encryption data, encryption is completed and by ciphertext data output into external device.Wherein, irreversible operation formula is MD5 Encryption formula, md5 encryption algorithm is existing known irreversible algorithm.Using MD5 carry out it is secondary encryption so that Obtain encryption data more safe and reliable.
It is illustrated in figure 4 the CAD model mechanical structure artwork before present invention encryption.Using the encryption method of the present invention to machine Tool structure obtains design sketch as shown in Figure 5 after being encrypted.As can be seen from the figure the whole mould of the mechanical structure after encrypting Type has changed, so that the person of decoding can not collect the general model for identifying former mechanical structure from the figure after encryption, so that So that the person of decoding can not guess, so that encryption is safer.Wherein, the position for occurring being recessed exists for AES of the present invention The point chosen during data decimation point is carried out, after the point of selection is encrypted, so that the data of the point occur in that expansion (there is data increase in X-axis, Y-axis or Z axis a wherein axle multiaxis), it is also possible to the situation of depression occurs, is entered by Fig. 4 and Fig. 5 Row contrast is as can be seen which point occurs in that depression (data reduction occur in X-axis, Y-axis or Z axis a wherein axle multiaxis).So that The person of decoding is obtained after the encryption figure of encryption is obtained it is difficult to be difficult to carry out also original structure of decoding from the characteristic point of structure, so that It must encrypt safer.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (7)

1. a kind of encryption method of CAD design model, it is characterised in that including key memory module and encrypting module, key is deposited Storage module is connected with encrypting module, for storing key;Encrypting module is used for encryption;Comprise the following steps:
Step 1:When encrypting module receives encrypted instruction, the number of the grade for needing to encrypt and setting is extracted from encrypted instruction According to space-number;
Step 2:The data break number that encrypting module is set according to user carries out obtaining the drafting point data on whole CAD model;
Step 3:Encrypting module is determined to obtain data starting point according to random function, carried out since starting point according to data break Choosing needs encryption data point on whole CAD model;
Step 4:Encrypting module, which is chosen, to be needed after encryption data point, and encrypted instruction is sent to key memory module;
Step 5:Key memory module is received after encrypted instruction and secret grade, chooses original key data and according to secret grade Calculation process is iterated to original key data and obtains ripe key data;
Step 6:Ripe key data are transmitted to encrypting module by key memory module, and encrypting module uses each data point ripe Key data carry out one-time pad encryption and obtain initial ciphertext data point;
Step 7:All initial ciphertext data points are carried out packet and obtain initial ciphertext block by encrypting module;It is each initial The initial ciphertext data points of ciphertext block are n, n>1 integer, when the beginning ciphertext data of last packet are counted less than n, Remaining data are used as a packet;
Step 8:Encrypting module circulate shifting L to the left or to the right initial ciphertext block and obtains intermediate ciphertext packet, and L is to begin The digit of ciphertext block cyclic shift;
Step 9:Encrypting module carries out secondary irreversible operation to the packet of each intermediate ciphertext using ripe key data and encrypted To encryption data, encryption is completed.
2. a kind of encryption method of CAD design model according to claim 1, it is characterised in that the number in the step 2 According to interval by user's sets itself, data break, which is less than, needs to encrypt the length on any one side in CAD model.
3. the encryption method of a kind of CAD design model according to claim 1, it is characterised in that chosen in the step 3 The process for needing encryption data point is, since starting point, and starting point data is obtained plus the integer multiple data of data break number Encryption data point is needed, the point that encryption data point is belonged in CAD model the need for selection.
4. a kind of encryption method of CAD design model according to claim 1, it is characterised in that the key in the step 5 The original key data stored in memory module are iris feature Value Data, and the acquisition process of iris feature Value Data is to pass through rainbow Film collector gathers the iris of volunteer's eyes, and the iris of collection is based on high order second order logistic formulas pair by high order two Encryption iris data is encrypted in iris, and carrying out characteristics extraction to encryption iris data obtains iris feature Value Data.
5. a kind of encryption method of CAD design model according to claim 1, it is characterised in that changing in the step 5 Formula is mapped using logistic for arithmetic expression, 5-10 times is iterated to original key data and obtains ripe key data.
6. the encryption method of a kind of CAD design model according to claim 1, it is characterised in that in the step 6 once The process of encryption is, each data point and ripe key data are carried out XOR, then operation result carry out to the left or to Move to right and obtain initial ciphertext data point with ripe key data XOR again after 8.
7. the encryption method of a kind of CAD design model according to claim 1, it is characterised in that can not in the step 9 Inverse operation formula is MD5 encryption formula.
CN201710490173.XA 2017-06-25 2017-06-25 A kind of encryption method of CAD design model Pending CN107241194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710490173.XA CN107241194A (en) 2017-06-25 2017-06-25 A kind of encryption method of CAD design model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710490173.XA CN107241194A (en) 2017-06-25 2017-06-25 A kind of encryption method of CAD design model

Publications (1)

Publication Number Publication Date
CN107241194A true CN107241194A (en) 2017-10-10

Family

ID=59987220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710490173.XA Pending CN107241194A (en) 2017-06-25 2017-06-25 A kind of encryption method of CAD design model

Country Status (1)

Country Link
CN (1) CN107241194A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6678378B1 (en) * 1998-06-09 2004-01-13 Monolith Co., Ltd. 3-dimensional shape data encryption and decryption
CN1747379A (en) * 2004-09-09 2006-03-15 村田机械株式会社 Encryption device
WO2006098151A1 (en) * 2005-03-15 2006-09-21 Sony Corporation Disc manufacturing method, data recording device, information recording medium, information processing device and method, and computer program
CN102456114A (en) * 2010-10-25 2012-05-16 湖南大学 Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
CN103778383A (en) * 2014-02-21 2014-05-07 武汉大学 Sketch based computer-aided design (CAD) model local encryption method
CN106057066A (en) * 2015-04-02 2016-10-26 汤姆逊许可公司 Devices and methods for encryption and decryption of graphical 3D objects
CN106452732A (en) * 2016-09-28 2017-02-22 广州凯耀资产管理有限公司 Information encryption method and apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6678378B1 (en) * 1998-06-09 2004-01-13 Monolith Co., Ltd. 3-dimensional shape data encryption and decryption
CN1747379A (en) * 2004-09-09 2006-03-15 村田机械株式会社 Encryption device
WO2006098151A1 (en) * 2005-03-15 2006-09-21 Sony Corporation Disc manufacturing method, data recording device, information recording medium, information processing device and method, and computer program
CN102456114A (en) * 2010-10-25 2012-05-16 湖南大学 Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
CN103778383A (en) * 2014-02-21 2014-05-07 武汉大学 Sketch based computer-aided design (CAD) model local encryption method
CN106057066A (en) * 2015-04-02 2016-10-26 汤姆逊许可公司 Devices and methods for encryption and decryption of graphical 3D objects
CN106452732A (en) * 2016-09-28 2017-02-22 广州凯耀资产管理有限公司 Information encryption method and apparatus

Similar Documents

Publication Publication Date Title
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN110266682B (en) Data encryption method and device, mobile terminal and decryption method
CN104134022A (en) Information hiding and protecting method based on image
CN102945356B (en) The access control method of search engine under cloud environment and system
CN104281794A (en) Password storing and verifying method and password storing and verifying device
CN104065680A (en) Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
CN110378138A (en) Data encryption, decryption method and neural network training method and equipment
CN105007256A (en) Security module for secure function execution on untrusted platform
Mizher et al. A simple flexible cryptosystem for meshed 3D objects and images
CN109934001A (en) A kind of data ciphering method based on normal cloud model
CN102456114A (en) Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
CN105471577B (en) A kind of anti-leak key encryption method based on 3D modeling
CN109309562A (en) Encrypt Algorithm of Irrational Number
Srichavengsup et al. Data encryption scheme based on rules of cellular automata and chaotic map function for information security.
CN112822010A (en) Removable storage medium management method based on quantum key and block chain
CN107241194A (en) A kind of encryption method of CAD design model
CN111314052B (en) Data encryption and decryption method
CN106357662B (en) A kind of data ciphering method based on MAC Address
Wang et al. Analyses and encryption implementation of a new chaotic system based on semitensor product
Hassani et al. Image Encryption Based on Chaotic Tent Map in Time and Frequency Domains.
Yu et al. A compressible image encryption method based on nondegenerate hyperchaotic system and its implementation on ZYNQ
CN109426727A (en) Data ciphering method, decryption method, encryption system and decryption system
Dixit et al. Multilevel network security combining cryptography and steganography on ARM platform
Salim et al. Data security inside optical communication networks through encoding and steganography
Li et al. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171010