CN110086603A - Encryption and decryption approaches, device, product identification and the manufacturing method of character string - Google Patents

Encryption and decryption approaches, device, product identification and the manufacturing method of character string Download PDF

Info

Publication number
CN110086603A
CN110086603A CN201910363087.1A CN201910363087A CN110086603A CN 110086603 A CN110086603 A CN 110086603A CN 201910363087 A CN201910363087 A CN 201910363087A CN 110086603 A CN110086603 A CN 110086603A
Authority
CN
China
Prior art keywords
character
string
column vector
mapping relations
encrypted characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910363087.1A
Other languages
Chinese (zh)
Inventor
于城
李晖
邢雨桐
智晓欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910363087.1A priority Critical patent/CN110086603A/en
Publication of CN110086603A publication Critical patent/CN110086603A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides encryption and decryption approaches, device, product identification and the manufacturing method of a kind of character string, belongs to encipher-decipher method technical field, can at least partly solve the problems, such as to lack init string information scheme not easy to lose in the prior art.The encryption method of character string of the invention includes: that number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a, wherein, for number corresponding to each character as the one-component in column vector a, position of each character in init string is identical as position of the corresponding component in column vector a;Column vector b is obtained multiplied by column vector a with transformation matrix T, wherein transformation matrix T includes N number of row vector, N > M, and the matrix for taking M row in transformation matrix T to be constituted is appointed to be invertible matrix;Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character combination at encrypted characters string.

Description

Encryption and decryption approaches, device, product identification and the manufacturing method of character string
Technical field
The invention belongs to encipher-decipher method technical fields, and in particular to a kind of encryption method of character string, a kind of character string Decryption method, a kind of encryption device of character string, a kind of decryption device of character string, a kind of manufacturing method of product identification, A kind of product identification.
Background technique
Product identification can be all printed on the outer surface of usual product.Such as the vehicle printed or scribed on the license plate of shared bicycle The product number etc. printed on the trade mark, computer housing.Existing product identification is mostly easily stolen use in plain text.On the other hand, such as The case where a certain position or a few positions of the shared bicycle license plate number of fruit appearance are destroyed, it is also difficult to this is recovered from remaining character The license plate number come.Therefore the encryption method of character string a kind of is needed, on the one hand can be realized encryption function, it on the other hand can be In encrypted characters string character missing in the case where any position character based on the setting quantity retained in encrypted characters string still Initial plaintext can be decrypted.
Summary of the invention
The character that the present invention at least partly solves any position based on the setting quantity in encrypted characters string can solve The problem of close init string out, provide encryption method, a kind of decryption method of character string, a kind of character string of a kind of character string Encryption device, a kind of decryption device of character string, a kind of manufacturing method of product identification, a kind of product identification.
Solve the encryption method that technical solution used by present invention problem is a kind of character string, comprising:
Determine init string, the length of init string is M, M be more than or equal to
2 integer;
Number corresponding to each character determined in init string according to the first mapping relations, in the first mapping relations Character and number are one-to-one relationship;
Number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a, Wherein, number corresponding to each character is as the one-component in column vector a, position of each character in init string with Position of the corresponding component in column vector a is identical;
Obtain column vector b multiplied by column vector a with transformation matrix T, wherein transformation matrix T include N number of row vector, N > M, and Appointing the matrix for taking M row in transformation matrix T to be constituted is invertible matrix;
Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character It is combined into encrypted characters string, wherein character and number are one-to-one relationship in the second mapping relations, and each character is in encrypted characters Position in string is identical as position of the corresponding component in column vector b.
Optionally, M value is [2,30] and N < 3*M.
Optionally, the first mapping relations and the second mapping relations are identical mapping relations.
The decryption method that technical solution used by present invention problem is a kind of character string is solved, it is aforementioned for decrypting The encrypted characters string that encryption method obtains, the decryption method include:
M character in encrypted characters string is chosen, and determines number corresponding to the M character according to the second mapping relations Word;
Number corresponding to each character of the M is combined into column vector b ';
The row vector in transformation matrix T corresponding to each component is combined into just according to the sequence of each component in column vector b ' Beginning matrix T ';
The inverse matrix of calculating initial matrix T ' is counter to be pushed away matrix T ";
Matrix T " is pushed away multiplied by column vector b ' with counter to obtain column vector a ';
According to the first mapping relations determine each component in column vector a ' corresponding to character, and according to the component corresponding to it Sequence of positions in column vector a ' is combined into decryption character string.
Optionally, further includes: it is any to choose M character different in encrypted characters string, and judge according to any different M Whether the column vector a ' that a character is decrypted is equal, and if it is determines that the encrypted characters string is not tampered with, if not Then determine that the encrypted characters string is tampered.
Solve the encryption device that technical solution used by present invention problem is a kind of character string, including the first storage Device and first processor, first memory store instruction, first processor run the instruction to execute adding for character string above-mentioned Decryption method.
The decryption device that technical solution used by present invention problem is a kind of character string is solved, for adding above-mentioned The encrypted characters string that decryption method obtains decrypts init string, which includes second memory and second processor, There is instruction in second memory, second processor runs the instruction to execute the decryption method of character string above-mentioned.
Solve present invention problem used by technical solution be a kind of product identification manufacturing method, comprising: will before Encrypted characters string determined by the encryption method for the character string stated is produced on product surface.
Optionally, encrypted characters string is fabricated on license plate.
Solving technical solution used by present invention problem is a kind of product identification, and making on the product identification has According to encrypted characters string determined by the encryption method of character string above-mentioned.
Optionally, the product identification is license plate.
Based on the encryption method of above-mentioned character string, the corresponding transformation square as described in M characters any in encrypted characters string The matrix that row vector in battle array T is constituted is invertible matrix.This is equivalent to number corresponding to each character in init string Word is dependent variable, using each component of M selected row vector as corresponding coefficient, with selected in encrypted characters string The equation group that number corresponding to M characters is obtained as fruit variable has unique solution.As long as so determining encrypted characters string In any M characters, and the matrix constituted based on the row vector in transformation matrices T corresponding to the M character, Ji Keyun Calculation obtains init string.The encryption to init string is so on the one hand realized, as long as on the other hand in encrypted characters string M can be retained, init string can be recovered from the position M of reservation.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the encryption method of character string of the embodiment of the present invention;
Fig. 2 is a kind of flow chart of the decryption method of character string of the embodiment of the present invention;
Fig. 3 is a kind of block diagram of the encryption device of character string of the embodiment of the present invention;
Fig. 4 is a kind of block diagram of the decryption device of character string of the embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party Present invention is further described in detail for formula.
Embodiment 1:
As shown in Figure 1, including the following steps the present embodiment provides a kind of encryption method of character string.
In step S11, determine init string, the length of init string is M, M
For the integer more than or equal to 2.Init string is, for example, " AB " or " 158632 "
Etc. arbitrary string.
In step S12, the number according to corresponding to each character that the first mapping relations determine in init string, first Character and number are one-to-one relationship in mapping relations.
Character is mapped as by number according to preset look-up table.Following table is an example of the first mapping relations.It needs Illustrate, as long as guaranteeing that character and number are one-to-one relationships, the specific corresponding number of some character is how many simultaneously It is unlimited.
It is combined in step S13, by number corresponding to each character of the init string obtained according to the first mapping relations At column vector a, wherein number corresponding to each character is as the one-component in column vector a, and each character is in init string In position it is identical as position of the corresponding component in column vector a.
Obtain column vector b multiplied by column vector a in step S14, with transformation matrix T, wherein transformation matrix T include N number of row to Amount, N > M, and the matrix for taking M row in transformation matrix T to be constituted is appointed to be invertible matrix.
For example, init string is " 12 ", the column vector a obtained according to above-mentioned first mapping relations are as follows:
Transformation matrix T is, for example:
So T*a obtains column vector b are as follows:
In this example, since the matrix of 2 row vectors any in transformation matrix T composition is invertible matrix.So As long as instructing any two component and their position in column vector b, column vector a counter can be released.
Such as two components in vector a is enabled to be followed successively by a from top to bottom1And a2, after currently just knowing that in vector b two from Top to bottm is followed successively by 5 and 15.Due to transformation matrix T be it is known, i.e. in column vector b 5 corresponding to parameter 1 and 2 and column 15 corresponding parameters 1 and 7 in vector b are known.It so can establish equation group:
Since the matrix that in design transformation matrix T, any two row vector is constituted is invertible matrix, then above-mentioned equation Group must have unique solution.A is released so as to counter1And a2
In step S15, character corresponding to each component determined in column vector b according to the second mapping relations, and by institute Determining character combination is at encrypted characters string, wherein character and number are one-to-one relationship, each character in the second mapping relations It is identical as position of the corresponding component in column vector b in the position in encrypted characters string.
For example, it is assumed that the second mapping relations are identical mapping relations with the first mapping relations, and continue to use previous example Son obtains encrypted characters string " 35F " according to column vector b.If printing the encrypted characters string on the license plate of shared bicycle " 35F " can be according to counter two released in column vector b of the second mapping relations as long as having 2 can be identified in 3 characters A component, so it is counter release column vector a, and then obtain init string according to the first mapping relations.
The encrypted characters string obtained according to the above encryption method, not only realizes encryption function, moreover it is possible to as long as realizing encrypted word There is the character of quantity identical with init string to be retained in symbol string, just can determine that out init string.To further protect The safe and reliable type of encrypted characters string information is demonstrate,proved.
Optionally, M value is [2,30] and N < 3*M.For applied field as the product number to state such as in kind Scape, the limited bits of product number, the digit for being further able to the encrypted characters string allowed are also limited.Therefore above-mentioned M and N have Preferred value range so.
Optionally, the first mapping relations and the second mapping relations are identical mapping relations.Method entire in this way is relatively simple It is single.But confidentiality in order to further increase, the first mapping relations and the second mapping relations can also make different mapping relations.
It should be noted that for this specific application area of the product identification of material object, by character institute energy in character string The numberical range of expression is limited, such as character string is consist of only digits, and the digital scope of each character is between 0-9.Example again Such as license plate number, digital scope expressed by each of which character is between 0-33.It should be to each element in transformation matrix T Value is designed, and the numerical value that each component is obtained according to the second mapping relations in the vector b obtained with guarantee is still specific at these In the numberical range of application scenarios defined.
Certainly, in order to realize the simplification of algorithm, each element is integer in preferably transformation matrix T.
In order to further increase the confidentiality of encryption, preferably each row vector at least 2 components are not in transformation matrix T Equal to 0.To which each character has included at least the partial information of two characters in init string in encrypted characters string.
Embodiment 2:
As shown in Fig. 2, the present embodiment provides a kind of decryption method of character string, obtain for decrypting aforementioned encryption method Encrypted characters string, the decryption method include the following steps.
The M character in step S21, selection encrypted characters string, and the M character institute is determined according to the second mapping relations Corresponding number.Any M character can be with i.e. in encrypted characters string.
Column vector b ' is combined into step S22, by number corresponding to each character of the M;
Step S23, according to each component in column vector b ' sequence by the row in transformation matrix T corresponding to each component to Amount is combined into initial matrix T '.
Anti- matrix T " is pushed away in step S24, the inverse matrix for calculating initial matrix T '.
Matrix T " is pushed away multiplied by column vector b ' in step S25, with counter to obtain column vector a '.
It being readily appreciated that, step S23- step S25, which is combined, to be equivalent to using the corresponding number of init string as dependent variable, with Number corresponding to selected M character is as fruit variable, with the coefficient in this corresponding transformation matrix in M character position Coefficient as dependent variable constructs the M member linear function group comprising M equation.Any M row in known transform matrix The matrix that vector is constituted is invertible matrix, then this equation group necessarily has unique solution.
Step S26, according to the first mapping relations determine each component in column vector a ' corresponding to character, and according to its institute Sequence of positions of the corresponding component in column vector a ' is combined into decryption character string.
As long as counter can be released initial in this way, any M character and their position in encrypted characters string has been determined Character string.
The introduction of above section does not consider whether encrypted characters string is tampered.That is default encryption character string is not usurped Change.If it is considered that encrypted characters string may be tampered, then the encrypted characters string obtained according to the method for embodiment 1 also has centainly Tamper-resistance.Concrete principle is as follows:
Optionally, decryption method further include: it is any to choose M character different in encrypted characters string, and judge that basis is appointed Whether the column vector a ' that M character for anticipating different is decrypted is equal, and if it is determines that the encrypted characters string is not usurped Change, if otherwise determining that the encrypted characters string is tampered.
If encrypted characters string is not tampered, wherein any M character no matter is chosen, can obtain unique initial word Symbol string.If encrypted characters string is distorted, it is equivalent to and changes some row vector in transformation matrix T, be decrypted When, in the case of whether be tampered comprising this in selected encrypted characters string two kinds of character, the decryption character decrypted String is necessarily different.So as to judge that encrypted characters string is distorted.
Although the problem of encryption method and decryption method of above-mentioned character string is the applied field from product codings such as license plate numbers Caused by scape, but it is using without being limited thereto.The scene for arbitrarily needing to encrypt character string is applicable in.
Embodiment 3:
As shown in figure 3, the present embodiment provides a kind of encryption device of character string, including at first memory 101 and first Device 102,101 store instruction of first memory are managed, first processor 102 runs the instruction to execute the character string of embodiment 1 Encryption method.
So realize the encryption method of the character string of embodiment 1.
First memory 101 is, for example, read-only memory or random access memory etc. arbitrarily with the device of storing data function Part.First processor 102 is, for example, any device with computing function such as central processing unit (CPU).Certainly in some applications In, first memory 101 and first processor 102 are integrated in a device (such as single-chip microcontroller, server).
Embodiment 4:
As shown in figure 4, the present embodiment provides a kind of decryption device of character string, for obtaining the encryption method of embodiment 1 To encrypted characters string decrypt init string, which includes second memory 201 and second processor 202, There is instruction in two memories 201, second processor 202 runs the instruction to execute the decryption method of the character string of embodiment 2.
So realize the decryption method of the character string of embodiment 2.
Second memory 201 is, for example, read-only memory or random access memory etc. arbitrarily with the device of storing data function Part.Second processor 202 is, for example, any device with computing function such as central processing unit (CPU).Certainly in some applications In, second memory 201 and second processor 202 are integrated in a device (such as single-chip microcontroller, server).
Embodiment 5:
The present embodiment provides a kind of manufacturing methods of product identification, comprising: by the encryption method institute of the character string of embodiment 1 Determining encrypted characters string is produced on product surface.Optionally, encrypted characters string is fabricated on license plate.Can certainly be Computer cabinet casing is printed or be burnt to encrypted characters string, on phone housing etc..
So manufacturing obtained product identification not only has cipher round results, moreover it is possible to have init string information not easy to lose The advantages of.
Embodiment 6:
The present embodiment provides a kind of product identification, adding for the character string of with good grounds embodiment 1 is made on the product identification Encrypted characters string determined by decryption method.For example, the product identification is license plate.
This product identification not only has certain confidentiality, but also with not easy to lose excellent of init string information Point.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.For those skilled in the art, essence of the invention is not being departed from In the case where mind and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.

Claims (10)

1. a kind of encryption method of character string characterized by comprising
Determine init string, the length of init string is M, and M is the integer more than or equal to 2;
Number corresponding to each character determined in init string according to the first mapping relations, character in the first mapping relations It is one-to-one relationship with number;
Number corresponding to each character by the init string obtained according to the first mapping relations is combined into column vector a, wherein Number corresponding to each character as the one-component in column vector a, position of each character in init string with it is corresponding Position of the component in column vector a it is identical;
Column vector b is obtained multiplied by column vector a with transformation matrix T, wherein transformation matrix T includes N number of row vector, N > M, and appoints and take The matrix that M row in transformation matrix T is constituted is invertible matrix;
Character corresponding to each component determined in column vector b according to the second mapping relations, and by identified character combination At encrypted characters string, wherein character and number are one-to-one relationship in the second mapping relations, and each character is in encrypted characters string Position it is identical as position of the corresponding component in column vector b.
2. encryption method according to claim 1, which is characterized in that M value is [2,30] and N < 3*M.
3. encryption method according to claim 1, which is characterized in that the first mapping relations are identical with the second mapping relations Mapping relations.
4. a kind of decryption method of character string, which is characterized in that the encrypted characters string obtained for decrypting claim 1, the solution Decryption method includes:
M character in encrypted characters string is chosen, and determines number corresponding to the M character according to the second mapping relations;
Number corresponding to each character of the M is combined into column vector b ';
The row vector in transformation matrix T corresponding to each component is combined into initial square according to the sequence of each component in column vector b ' Battle array T ';
The inverse matrix of calculating initial matrix T ' is counter to be pushed away matrix T ";
Matrix T " is pushed away multiplied by column vector b ' with counter to obtain column vector a ';
According to the first mapping relations determine each component in column vector a ' corresponding to character, and arranged according to the component corresponding to it Sequence of positions in vector a ' is combined into decryption character string.
5. decryption method according to claim 4, which is characterized in that further include:
It is any to choose M character different in encrypted characters string, and judge what any M different characters of basis was decrypted Whether column vector a ' is equal, and if it is determines that the encrypted characters string is not tampered with, if otherwise determining the encrypted characters string It is tampered.
6. a kind of encryption device of character string, which is characterized in that including first memory and first processor, first memory is deposited Storage instruction, first processor run the instruction to execute the encryption side of character string according to claim 1 to 3 Method.
7. a kind of decryption device of character string, which is characterized in that the encrypted characters string for obtaining claim 6 decrypts just Beginning character string, the decryption device include second memory and second processor, and second memory has instruction, second processor fortune The instruction go to execute the decryption method of character string according to claim 4 or 5.
8. a kind of manufacturing method of product identification characterized by comprising
Encrypted characters string determined by the encryption method of character string described in claim 1-3 any one is produced on product table On face.
9. manufacturing method according to claim 8, which is characterized in that encrypted characters string is fabricated on license plate.
10. a kind of product identification, which is characterized in that make with good grounds claim 1-3 any one institute on the product identification Encrypted characters string determined by the encryption method for the character string stated.
CN201910363087.1A 2019-04-30 2019-04-30 Encryption and decryption approaches, device, product identification and the manufacturing method of character string Pending CN110086603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910363087.1A CN110086603A (en) 2019-04-30 2019-04-30 Encryption and decryption approaches, device, product identification and the manufacturing method of character string

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910363087.1A CN110086603A (en) 2019-04-30 2019-04-30 Encryption and decryption approaches, device, product identification and the manufacturing method of character string

Publications (1)

Publication Number Publication Date
CN110086603A true CN110086603A (en) 2019-08-02

Family

ID=67418170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910363087.1A Pending CN110086603A (en) 2019-04-30 2019-04-30 Encryption and decryption approaches, device, product identification and the manufacturing method of character string

Country Status (1)

Country Link
CN (1) CN110086603A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158218A (en) * 2021-05-21 2021-07-23 上海幻电信息科技有限公司 Data encryption method and device and data decryption method and device
CN113779554A (en) * 2021-09-01 2021-12-10 中国银行股份有限公司 Information encryption transmission method, device and related equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1121754A (en) * 1993-05-05 1996-05-01 刘尊全 A repertoire of mappings for a cryptosystem
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
CN104410501A (en) * 2014-12-25 2015-03-11 广东威创视讯科技股份有限公司 Encryption method and encryption device
CN104486073A (en) * 2014-12-23 2015-04-01 南通大学 Encryption and decryption method of character data
CN107634832A (en) * 2017-09-12 2018-01-26 云南撇捺势信息技术有限公司 Character string encryption, verification method, device, computer-readable recording medium
CN108847924A (en) * 2018-04-22 2018-11-20 平安科技(深圳)有限公司 Encryption method, device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1121754A (en) * 1993-05-05 1996-05-01 刘尊全 A repertoire of mappings for a cryptosystem
CN102314580A (en) * 2011-09-20 2012-01-11 西安交通大学 Vector and matrix operation-based calculation-supported encryption method
CN104486073A (en) * 2014-12-23 2015-04-01 南通大学 Encryption and decryption method of character data
CN104410501A (en) * 2014-12-25 2015-03-11 广东威创视讯科技股份有限公司 Encryption method and encryption device
CN107634832A (en) * 2017-09-12 2018-01-26 云南撇捺势信息技术有限公司 Character string encryption, verification method, device, computer-readable recording medium
CN108847924A (en) * 2018-04-22 2018-11-20 平安科技(深圳)有限公司 Encryption method, device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158218A (en) * 2021-05-21 2021-07-23 上海幻电信息科技有限公司 Data encryption method and device and data decryption method and device
CN113779554A (en) * 2021-09-01 2021-12-10 中国银行股份有限公司 Information encryption transmission method, device and related equipment

Similar Documents

Publication Publication Date Title
Sohal et al. BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
JP5249053B2 (en) Data processing system integrity
US10097342B2 (en) Encoding values by pseudo-random mask
US9602273B2 (en) Implementing key scheduling for white-box DES implementation
CN106888081B (en) Wide coding of intermediate values within white-box implementations
US20180262326A1 (en) Protecting white-box feistel network implementation against fault attack
EP3099002A1 (en) Diversifying control flow of white-box implementation
US10700849B2 (en) Balanced encoding of intermediate values within a white-box implementation
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
CN105978680B (en) Encryption operation method for encryption key
CN106209346B (en) White-box cryptography interleaving lookup table
CN105721134B (en) It is realized using the single whitepack with multiple external encodes
CN112865957A (en) Data encryption transmission method and device, computer target equipment and storage medium
CN110086603A (en) Encryption and decryption approaches, device, product identification and the manufacturing method of character string
Mendonca Data security in cloud using AES
EP3413509B1 (en) Cmac computation using white-box implementations with external encodings
CN114430321B (en) DFA self-adaptive security-based black box traceable key attribute encryption method and device
Sunder et al. Securing big data in hadoop using hybrid encryption
Ferdush et al. A new image encryption technique combining the idea of one time pad with RGB value
Yao et al. An Effective Privacy‐Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Ekka et al. Enrichment of security using hybrid algorithm
Panchami et al. A Lightweight Image Cryptosystem for Multimedia Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190802

RJ01 Rejection of invention patent application after publication