CN110086603A - Encryption and decryption approaches, device, product identification and the manufacturing method of character string - Google Patents
Encryption and decryption approaches, device, product identification and the manufacturing method of character string Download PDFInfo
- Publication number
- CN110086603A CN110086603A CN201910363087.1A CN201910363087A CN110086603A CN 110086603 A CN110086603 A CN 110086603A CN 201910363087 A CN201910363087 A CN 201910363087A CN 110086603 A CN110086603 A CN 110086603A
- Authority
- CN
- China
- Prior art keywords
- character
- string
- column vector
- mapping relations
- encrypted characters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 10
- 238000013459 approach Methods 0.000 title abstract description 3
- 239000013598 vector Substances 0.000 claims abstract description 73
- 239000011159 matrix material Substances 0.000 claims abstract description 56
- 238000000034 method Methods 0.000 claims abstract description 48
- 238000013507 mapping Methods 0.000 claims abstract description 43
- 230000009466 transformation Effects 0.000 claims abstract description 26
- 230000015654 memory Effects 0.000 claims description 17
- 230000006870 function Effects 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 3
- 230000000717 retained effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012886 linear function Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides encryption and decryption approaches, device, product identification and the manufacturing method of a kind of character string, belongs to encipher-decipher method technical field, can at least partly solve the problems, such as to lack init string information scheme not easy to lose in the prior art.The encryption method of character string of the invention includes: that number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a, wherein, for number corresponding to each character as the one-component in column vector a, position of each character in init string is identical as position of the corresponding component in column vector a;Column vector b is obtained multiplied by column vector a with transformation matrix T, wherein transformation matrix T includes N number of row vector, N > M, and the matrix for taking M row in transformation matrix T to be constituted is appointed to be invertible matrix;Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character combination at encrypted characters string.
Description
Technical field
The invention belongs to encipher-decipher method technical fields, and in particular to a kind of encryption method of character string, a kind of character string
Decryption method, a kind of encryption device of character string, a kind of decryption device of character string, a kind of manufacturing method of product identification,
A kind of product identification.
Background technique
Product identification can be all printed on the outer surface of usual product.Such as the vehicle printed or scribed on the license plate of shared bicycle
The product number etc. printed on the trade mark, computer housing.Existing product identification is mostly easily stolen use in plain text.On the other hand, such as
The case where a certain position or a few positions of the shared bicycle license plate number of fruit appearance are destroyed, it is also difficult to this is recovered from remaining character
The license plate number come.Therefore the encryption method of character string a kind of is needed, on the one hand can be realized encryption function, it on the other hand can be
In encrypted characters string character missing in the case where any position character based on the setting quantity retained in encrypted characters string still
Initial plaintext can be decrypted.
Summary of the invention
The character that the present invention at least partly solves any position based on the setting quantity in encrypted characters string can solve
The problem of close init string out, provide encryption method, a kind of decryption method of character string, a kind of character string of a kind of character string
Encryption device, a kind of decryption device of character string, a kind of manufacturing method of product identification, a kind of product identification.
Solve the encryption method that technical solution used by present invention problem is a kind of character string, comprising:
Determine init string, the length of init string is M, M be more than or equal to
2 integer;
Number corresponding to each character determined in init string according to the first mapping relations, in the first mapping relations
Character and number are one-to-one relationship;
Number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a,
Wherein, number corresponding to each character is as the one-component in column vector a, position of each character in init string with
Position of the corresponding component in column vector a is identical;
Obtain column vector b multiplied by column vector a with transformation matrix T, wherein transformation matrix T include N number of row vector, N > M, and
Appointing the matrix for taking M row in transformation matrix T to be constituted is invertible matrix;
Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character
It is combined into encrypted characters string, wherein character and number are one-to-one relationship in the second mapping relations, and each character is in encrypted characters
Position in string is identical as position of the corresponding component in column vector b.
Optionally, M value is [2,30] and N < 3*M.
Optionally, the first mapping relations and the second mapping relations are identical mapping relations.
The decryption method that technical solution used by present invention problem is a kind of character string is solved, it is aforementioned for decrypting
The encrypted characters string that encryption method obtains, the decryption method include:
M character in encrypted characters string is chosen, and determines number corresponding to the M character according to the second mapping relations
Word;
Number corresponding to each character of the M is combined into column vector b ';
The row vector in transformation matrix T corresponding to each component is combined into just according to the sequence of each component in column vector b '
Beginning matrix T ';
The inverse matrix of calculating initial matrix T ' is counter to be pushed away matrix T ";
Matrix T " is pushed away multiplied by column vector b ' with counter to obtain column vector a ';
According to the first mapping relations determine each component in column vector a ' corresponding to character, and according to the component corresponding to it
Sequence of positions in column vector a ' is combined into decryption character string.
Optionally, further includes: it is any to choose M character different in encrypted characters string, and judge according to any different M
Whether the column vector a ' that a character is decrypted is equal, and if it is determines that the encrypted characters string is not tampered with, if not
Then determine that the encrypted characters string is tampered.
Solve the encryption device that technical solution used by present invention problem is a kind of character string, including the first storage
Device and first processor, first memory store instruction, first processor run the instruction to execute adding for character string above-mentioned
Decryption method.
The decryption device that technical solution used by present invention problem is a kind of character string is solved, for adding above-mentioned
The encrypted characters string that decryption method obtains decrypts init string, which includes second memory and second processor,
There is instruction in second memory, second processor runs the instruction to execute the decryption method of character string above-mentioned.
Solve present invention problem used by technical solution be a kind of product identification manufacturing method, comprising: will before
Encrypted characters string determined by the encryption method for the character string stated is produced on product surface.
Optionally, encrypted characters string is fabricated on license plate.
Solving technical solution used by present invention problem is a kind of product identification, and making on the product identification has
According to encrypted characters string determined by the encryption method of character string above-mentioned.
Optionally, the product identification is license plate.
Based on the encryption method of above-mentioned character string, the corresponding transformation square as described in M characters any in encrypted characters string
The matrix that row vector in battle array T is constituted is invertible matrix.This is equivalent to number corresponding to each character in init string
Word is dependent variable, using each component of M selected row vector as corresponding coefficient, with selected in encrypted characters string
The equation group that number corresponding to M characters is obtained as fruit variable has unique solution.As long as so determining encrypted characters string
In any M characters, and the matrix constituted based on the row vector in transformation matrices T corresponding to the M character, Ji Keyun
Calculation obtains init string.The encryption to init string is so on the one hand realized, as long as on the other hand in encrypted characters string
M can be retained, init string can be recovered from the position M of reservation.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the encryption method of character string of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of the decryption method of character string of the embodiment of the present invention;
Fig. 3 is a kind of block diagram of the encryption device of character string of the embodiment of the present invention;
Fig. 4 is a kind of block diagram of the decryption device of character string of the embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party
Present invention is further described in detail for formula.
Embodiment 1:
As shown in Figure 1, including the following steps the present embodiment provides a kind of encryption method of character string.
In step S11, determine init string, the length of init string is M, M
For the integer more than or equal to 2.Init string is, for example, " AB " or " 158632 "
Etc. arbitrary string.
In step S12, the number according to corresponding to each character that the first mapping relations determine in init string, first
Character and number are one-to-one relationship in mapping relations.
Character is mapped as by number according to preset look-up table.Following table is an example of the first mapping relations.It needs
Illustrate, as long as guaranteeing that character and number are one-to-one relationships, the specific corresponding number of some character is how many simultaneously
It is unlimited.
It is combined in step S13, by number corresponding to each character of the init string obtained according to the first mapping relations
At column vector a, wherein number corresponding to each character is as the one-component in column vector a, and each character is in init string
In position it is identical as position of the corresponding component in column vector a.
Obtain column vector b multiplied by column vector a in step S14, with transformation matrix T, wherein transformation matrix T include N number of row to
Amount, N > M, and the matrix for taking M row in transformation matrix T to be constituted is appointed to be invertible matrix.
For example, init string is " 12 ", the column vector a obtained according to above-mentioned first mapping relations are as follows:
Transformation matrix T is, for example:
So T*a obtains column vector b are as follows:
In this example, since the matrix of 2 row vectors any in transformation matrix T composition is invertible matrix.So
As long as instructing any two component and their position in column vector b, column vector a counter can be released.
Such as two components in vector a is enabled to be followed successively by a from top to bottom1And a2, after currently just knowing that in vector b two from
Top to bottm is followed successively by 5 and 15.Due to transformation matrix T be it is known, i.e. in column vector b 5 corresponding to parameter 1 and 2 and column
15 corresponding parameters 1 and 7 in vector b are known.It so can establish equation group:
Since the matrix that in design transformation matrix T, any two row vector is constituted is invertible matrix, then above-mentioned equation
Group must have unique solution.A is released so as to counter1And a2。
In step S15, character corresponding to each component determined in column vector b according to the second mapping relations, and by institute
Determining character combination is at encrypted characters string, wherein character and number are one-to-one relationship, each character in the second mapping relations
It is identical as position of the corresponding component in column vector b in the position in encrypted characters string.
For example, it is assumed that the second mapping relations are identical mapping relations with the first mapping relations, and continue to use previous example
Son obtains encrypted characters string " 35F " according to column vector b.If printing the encrypted characters string on the license plate of shared bicycle
" 35F " can be according to counter two released in column vector b of the second mapping relations as long as having 2 can be identified in 3 characters
A component, so it is counter release column vector a, and then obtain init string according to the first mapping relations.
The encrypted characters string obtained according to the above encryption method, not only realizes encryption function, moreover it is possible to as long as realizing encrypted word
There is the character of quantity identical with init string to be retained in symbol string, just can determine that out init string.To further protect
The safe and reliable type of encrypted characters string information is demonstrate,proved.
Optionally, M value is [2,30] and N < 3*M.For applied field as the product number to state such as in kind
Scape, the limited bits of product number, the digit for being further able to the encrypted characters string allowed are also limited.Therefore above-mentioned M and N have
Preferred value range so.
Optionally, the first mapping relations and the second mapping relations are identical mapping relations.Method entire in this way is relatively simple
It is single.But confidentiality in order to further increase, the first mapping relations and the second mapping relations can also make different mapping relations.
It should be noted that for this specific application area of the product identification of material object, by character institute energy in character string
The numberical range of expression is limited, such as character string is consist of only digits, and the digital scope of each character is between 0-9.Example again
Such as license plate number, digital scope expressed by each of which character is between 0-33.It should be to each element in transformation matrix T
Value is designed, and the numerical value that each component is obtained according to the second mapping relations in the vector b obtained with guarantee is still specific at these
In the numberical range of application scenarios defined.
Certainly, in order to realize the simplification of algorithm, each element is integer in preferably transformation matrix T.
In order to further increase the confidentiality of encryption, preferably each row vector at least 2 components are not in transformation matrix T
Equal to 0.To which each character has included at least the partial information of two characters in init string in encrypted characters string.
Embodiment 2:
As shown in Fig. 2, the present embodiment provides a kind of decryption method of character string, obtain for decrypting aforementioned encryption method
Encrypted characters string, the decryption method include the following steps.
The M character in step S21, selection encrypted characters string, and the M character institute is determined according to the second mapping relations
Corresponding number.Any M character can be with i.e. in encrypted characters string.
Column vector b ' is combined into step S22, by number corresponding to each character of the M;
Step S23, according to each component in column vector b ' sequence by the row in transformation matrix T corresponding to each component to
Amount is combined into initial matrix T '.
Anti- matrix T " is pushed away in step S24, the inverse matrix for calculating initial matrix T '.
Matrix T " is pushed away multiplied by column vector b ' in step S25, with counter to obtain column vector a '.
It being readily appreciated that, step S23- step S25, which is combined, to be equivalent to using the corresponding number of init string as dependent variable, with
Number corresponding to selected M character is as fruit variable, with the coefficient in this corresponding transformation matrix in M character position
Coefficient as dependent variable constructs the M member linear function group comprising M equation.Any M row in known transform matrix
The matrix that vector is constituted is invertible matrix, then this equation group necessarily has unique solution.
Step S26, according to the first mapping relations determine each component in column vector a ' corresponding to character, and according to its institute
Sequence of positions of the corresponding component in column vector a ' is combined into decryption character string.
As long as counter can be released initial in this way, any M character and their position in encrypted characters string has been determined
Character string.
The introduction of above section does not consider whether encrypted characters string is tampered.That is default encryption character string is not usurped
Change.If it is considered that encrypted characters string may be tampered, then the encrypted characters string obtained according to the method for embodiment 1 also has centainly
Tamper-resistance.Concrete principle is as follows:
Optionally, decryption method further include: it is any to choose M character different in encrypted characters string, and judge that basis is appointed
Whether the column vector a ' that M character for anticipating different is decrypted is equal, and if it is determines that the encrypted characters string is not usurped
Change, if otherwise determining that the encrypted characters string is tampered.
If encrypted characters string is not tampered, wherein any M character no matter is chosen, can obtain unique initial word
Symbol string.If encrypted characters string is distorted, it is equivalent to and changes some row vector in transformation matrix T, be decrypted
When, in the case of whether be tampered comprising this in selected encrypted characters string two kinds of character, the decryption character decrypted
String is necessarily different.So as to judge that encrypted characters string is distorted.
Although the problem of encryption method and decryption method of above-mentioned character string is the applied field from product codings such as license plate numbers
Caused by scape, but it is using without being limited thereto.The scene for arbitrarily needing to encrypt character string is applicable in.
Embodiment 3:
As shown in figure 3, the present embodiment provides a kind of encryption device of character string, including at first memory 101 and first
Device 102,101 store instruction of first memory are managed, first processor 102 runs the instruction to execute the character string of embodiment 1
Encryption method.
So realize the encryption method of the character string of embodiment 1.
First memory 101 is, for example, read-only memory or random access memory etc. arbitrarily with the device of storing data function
Part.First processor 102 is, for example, any device with computing function such as central processing unit (CPU).Certainly in some applications
In, first memory 101 and first processor 102 are integrated in a device (such as single-chip microcontroller, server).
Embodiment 4:
As shown in figure 4, the present embodiment provides a kind of decryption device of character string, for obtaining the encryption method of embodiment 1
To encrypted characters string decrypt init string, which includes second memory 201 and second processor 202,
There is instruction in two memories 201, second processor 202 runs the instruction to execute the decryption method of the character string of embodiment 2.
So realize the decryption method of the character string of embodiment 2.
Second memory 201 is, for example, read-only memory or random access memory etc. arbitrarily with the device of storing data function
Part.Second processor 202 is, for example, any device with computing function such as central processing unit (CPU).Certainly in some applications
In, second memory 201 and second processor 202 are integrated in a device (such as single-chip microcontroller, server).
Embodiment 5:
The present embodiment provides a kind of manufacturing methods of product identification, comprising: by the encryption method institute of the character string of embodiment 1
Determining encrypted characters string is produced on product surface.Optionally, encrypted characters string is fabricated on license plate.Can certainly be
Computer cabinet casing is printed or be burnt to encrypted characters string, on phone housing etc..
So manufacturing obtained product identification not only has cipher round results, moreover it is possible to have init string information not easy to lose
The advantages of.
Embodiment 6:
The present embodiment provides a kind of product identification, adding for the character string of with good grounds embodiment 1 is made on the product identification
Encrypted characters string determined by decryption method.For example, the product identification is license plate.
This product identification not only has certain confidentiality, but also with not easy to lose excellent of init string information
Point.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses
Mode, however the present invention is not limited thereto.For those skilled in the art, essence of the invention is not being departed from
In the case where mind and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.
Claims (10)
1. a kind of encryption method of character string characterized by comprising
Determine init string, the length of init string is M, and M is the integer more than or equal to 2;
Number corresponding to each character determined in init string according to the first mapping relations, character in the first mapping relations
It is one-to-one relationship with number;
Number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a, wherein
Number corresponding to each character as the one-component in column vector a, position of each character in init string with it is corresponding
Position of the component in column vector a it is identical;
Column vector b is obtained multiplied by column vector a with transformation matrix T, wherein transformation matrix T includes N number of row vector, N > M, and appoints and take
The matrix that M row in transformation matrix T is constituted is invertible matrix;
Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character combination
At encrypted characters string, wherein character and number are one-to-one relationship in the second mapping relations, and each character is in encrypted characters string
Position it is identical as position of the corresponding component in column vector b.
2. encryption method according to claim 1, which is characterized in that M value is [2,30] and N < 3*M.
3. encryption method according to claim 1, which is characterized in that the first mapping relations are identical with the second mapping relations
Mapping relations.
4. a kind of decryption method of character string, which is characterized in that the encrypted characters string obtained for decrypting claim 1, the solution
Decryption method includes:
M character in encrypted characters string is chosen, and determines number corresponding to the M character according to the second mapping relations;
Number corresponding to each character of the M is combined into column vector b ';
The row vector in transformation matrix T corresponding to each component is combined into initial square according to the sequence of each component in column vector b '
Battle array T ';
The inverse matrix of calculating initial matrix T ' is counter to be pushed away matrix T ";
Matrix T " is pushed away multiplied by column vector b ' with counter to obtain column vector a ';
According to the first mapping relations determine each component in column vector a ' corresponding to character, and arranged according to the component corresponding to it
Sequence of positions in vector a ' is combined into decryption character string.
5. decryption method according to claim 4, which is characterized in that further include:
It is any to choose M character different in encrypted characters string, and judge what any M different characters of basis was decrypted
Whether column vector a ' is equal, and if it is determines that the encrypted characters string is not tampered with, if otherwise determining the encrypted characters string
It is tampered.
6. a kind of encryption device of character string, which is characterized in that including first memory and first processor, first memory is deposited
Storage instruction, first processor run the instruction to execute the encryption side of character string according to claim 1 to 3
Method.
7. a kind of decryption device of character string, which is characterized in that the encrypted characters string for obtaining claim 6 decrypts just
Beginning character string, the decryption device include second memory and second processor, and second memory has instruction, second processor fortune
The instruction go to execute the decryption method of character string according to claim 4 or 5.
8. a kind of manufacturing method of product identification characterized by comprising
Encrypted characters string determined by the encryption method of character string described in claim 1-3 any one is produced on product table
On face.
9. manufacturing method according to claim 8, which is characterized in that encrypted characters string is fabricated on license plate.
10. a kind of product identification, which is characterized in that make with good grounds claim 1-3 any one institute on the product identification
Encrypted characters string determined by the encryption method for the character string stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910363087.1A CN110086603A (en) | 2019-04-30 | 2019-04-30 | Encryption and decryption approaches, device, product identification and the manufacturing method of character string |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910363087.1A CN110086603A (en) | 2019-04-30 | 2019-04-30 | Encryption and decryption approaches, device, product identification and the manufacturing method of character string |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110086603A true CN110086603A (en) | 2019-08-02 |
Family
ID=67418170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910363087.1A Pending CN110086603A (en) | 2019-04-30 | 2019-04-30 | Encryption and decryption approaches, device, product identification and the manufacturing method of character string |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110086603A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158218A (en) * | 2021-05-21 | 2021-07-23 | 上海幻电信息科技有限公司 | Data encryption method and device and data decryption method and device |
CN113779554A (en) * | 2021-09-01 | 2021-12-10 | 中国银行股份有限公司 | Information encryption transmission method, device and related equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1121754A (en) * | 1993-05-05 | 1996-05-01 | 刘尊全 | A repertoire of mappings for a cryptosystem |
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
CN104410501A (en) * | 2014-12-25 | 2015-03-11 | 广东威创视讯科技股份有限公司 | Encryption method and encryption device |
CN104486073A (en) * | 2014-12-23 | 2015-04-01 | 南通大学 | Encryption and decryption method of character data |
CN107634832A (en) * | 2017-09-12 | 2018-01-26 | 云南撇捺势信息技术有限公司 | Character string encryption, verification method, device, computer-readable recording medium |
CN108847924A (en) * | 2018-04-22 | 2018-11-20 | 平安科技(深圳)有限公司 | Encryption method, device, computer equipment and storage medium |
-
2019
- 2019-04-30 CN CN201910363087.1A patent/CN110086603A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1121754A (en) * | 1993-05-05 | 1996-05-01 | 刘尊全 | A repertoire of mappings for a cryptosystem |
CN102314580A (en) * | 2011-09-20 | 2012-01-11 | 西安交通大学 | Vector and matrix operation-based calculation-supported encryption method |
CN104486073A (en) * | 2014-12-23 | 2015-04-01 | 南通大学 | Encryption and decryption method of character data |
CN104410501A (en) * | 2014-12-25 | 2015-03-11 | 广东威创视讯科技股份有限公司 | Encryption method and encryption device |
CN107634832A (en) * | 2017-09-12 | 2018-01-26 | 云南撇捺势信息技术有限公司 | Character string encryption, verification method, device, computer-readable recording medium |
CN108847924A (en) * | 2018-04-22 | 2018-11-20 | 平安科技(深圳)有限公司 | Encryption method, device, computer equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158218A (en) * | 2021-05-21 | 2021-07-23 | 上海幻电信息科技有限公司 | Data encryption method and device and data decryption method and device |
CN113779554A (en) * | 2021-09-01 | 2021-12-10 | 中国银行股份有限公司 | Information encryption transmission method, device and related equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sohal et al. | BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing | |
JP5249053B2 (en) | Data processing system integrity | |
US10097342B2 (en) | Encoding values by pseudo-random mask | |
US9602273B2 (en) | Implementing key scheduling for white-box DES implementation | |
CN106888081B (en) | Wide coding of intermediate values within white-box implementations | |
US20180262326A1 (en) | Protecting white-box feistel network implementation against fault attack | |
EP3099002A1 (en) | Diversifying control flow of white-box implementation | |
US10700849B2 (en) | Balanced encoding of intermediate values within a white-box implementation | |
CN108494546A (en) | A kind of whitepack encryption method, device and storage medium | |
CN105978680B (en) | Encryption operation method for encryption key | |
CN106209346B (en) | White-box cryptography interleaving lookup table | |
CN105721134B (en) | It is realized using the single whitepack with multiple external encodes | |
CN112865957A (en) | Data encryption transmission method and device, computer target equipment and storage medium | |
CN110086603A (en) | Encryption and decryption approaches, device, product identification and the manufacturing method of character string | |
Mendonca | Data security in cloud using AES | |
EP3413509B1 (en) | Cmac computation using white-box implementations with external encodings | |
CN114430321B (en) | DFA self-adaptive security-based black box traceable key attribute encryption method and device | |
Sunder et al. | Securing big data in hadoop using hybrid encryption | |
Ferdush et al. | A new image encryption technique combining the idea of one time pad with RGB value | |
Yao et al. | An Effective Privacy‐Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation | |
Ekka et al. | Enrichment of security using hybrid algorithm | |
Panchami et al. | A Lightweight Image Cryptosystem for Multimedia Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190802 |
|
RJ01 | Rejection of invention patent application after publication |