CN110334527A - A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet - Google Patents
A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet Download PDFInfo
- Publication number
- CN110334527A CN110334527A CN201910468661.XA CN201910468661A CN110334527A CN 110334527 A CN110334527 A CN 110334527A CN 201910468661 A CN201910468661 A CN 201910468661A CN 110334527 A CN110334527 A CN 110334527A
- Authority
- CN
- China
- Prior art keywords
- chinese
- phonetic alphabet
- text
- password
- chinese character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 150000001875 compounds Chemical class 0.000 claims abstract description 25
- 238000013518 transcription Methods 0.000 claims description 6
- 230000035897 transcription Effects 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 abstract 1
- 235000006040 Prunus persica var persica Nutrition 0.000 description 2
- 244000144730 Amygdalus persica Species 0.000 description 1
- 240000005809 Prunus persica Species 0.000 description 1
- 238000010009 beating Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet, comprising the following steps: choose the Chinese phonetic alphabet of any sequence as plain code;If any text that puts in order, number, letter, symbol correspond to initial consonant, simple or compound vowel of a Chinese syllable in plain code and replace with password;Five texts, number, letter, the symbol for choosing any sequence correspond to the tone of Chinese character;Text, number, letter, the symbol for choosing any sequence correspond to punctuation mark between text;The Chinese-character pronunciation control password transmitted as needed writes out ciphertext;Transmit information.Beneficial effect is: being based on Chinese phonetic alphabet application; by letter, symbol, number, text conversion at Chinese character; any setting plain code, password, realize Chinese character encrypting and decrypting, form commercial code; it is easy to learn, understandable, easy to remember; do not allow to decode, cover all Chinese characters, number, civilian, commercial text information is suitble to transmit; it can play the role of protection individual privacy, guard business secret.
Description
Technical field
The present invention relates to field of information security technology, more particularly, to a kind of Chinese character encrypting and decrypting side based on the Chinese phonetic alphabet
Method.
Background technique
Text encryption has had many algorithm and processing method, and main method is that literal code is converted and mixed
The word frequency characteristic rule of the method confused processing, and decrypted, ordinary language expression is to crack one of key main method of encryption.
Application No. is the Chinese patents of CN200710062770.9, disclose a kind of text encryption side of logic-based font
Method and system, belong to field of information processing.There are many modes for the encryption of processing text in the prior art, are added by code conversion
It is close, but the word frequency statistics feature of text itself, it is cracked for ciphertext and provides foundation, the present invention is special for the character code of Chinese character
Point, by using a kind of 32 4 byte code mode logical fonts, by the font information of text, including physics font, font word
The information such as body or extension font, which are added in literal code, carries out Hybrid Encryption, improves the degree of aliasing of language word frequency.
Above-mentioned technology is mainly network operator, developer's offer privacy protection, has higher technical requirements, is confined to height
End, it is non-to be conducive to common application.And the information of ordinary user exactly privacy instantly, the severely afflicated area of business secret leakage.Therefore it mentions
Ordinary people is allowed quickly to grasp for one kind, can be in network information transmitting, protection is personal and business information is extremely important.
Summary of the invention
The object of the invention is that providing a kind of Chinese character encryption solution based on the Chinese phonetic alphabet to solve the above-mentioned problems
Decryption method, the encrypting and decrypting method of the application, as plain code, are made by the Chinese phonetic alphabet of arbitrary arrangement with information such as text, numbers
For password, the encrypting and decrypting of text is carried out, it is at low cost, convenient for grasping, while improving information security.
The technical scheme of the present invention is realized as follows:
A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet, comprising the following steps:
(1), the Chinese phonetic alphabet of any sequence is chosen as plain code;
(2), initial consonant, simple or compound vowel of a Chinese syllable that any text that puts in order, number, letter, symbol correspond in plain code are set and replaces with password;
(3), five texts, number, letter, the symbol for choosing any sequence correspond to the tone of Chinese character;
(4), text, number, letter, the symbol for choosing any sequence correspond to the punctuation mark between text;
(5), the Chinese-character pronunciation control password transmitted as needed writes out ciphertext;
(6), information is transmitted;
(7), receive what plain code and code book solution confidential information after ciphertext by control both sides' agreement were transmitted
Data.
Further, in the step (1), initial consonant and simple or compound vowel of a Chinese syllable in the Chinese phonetic alphabet separately sort, and initial consonant and simple or compound vowel of a Chinese syllable
Collating sequence is made by oneself.
Further, in the step (2), the customized each initial consonant of user and the corresponding password of simple or compound vowel of a Chinese syllable, each initial consonant pair
The password answered is not identical, and the corresponding password of each simple or compound vowel of a Chinese syllable is not identical.
Further, in the step (2), text, number, letter, symbol can be used separately as a series,
It can be with cross-reference.
Further, in the step (5), when the phonetic transcriptions of Chinese characters for needing to transmit is made of initial consonant and simple or compound vowel of a Chinese syllable, each Chinese character
Corresponding ciphertext is made of 3-4 password, and when ciphertext has 3 passwords, first is phonetic initial consonant password, and second is phonetic
Simple or compound vowel of a Chinese syllable password, third position password are Chinese character tone;When ciphertext has 4 password, i.e., there are two simple or compound vowel of a Chinese syllable in the Chinese phonetic alphabet of text, then
Third position is also phonetic simple or compound vowel of a Chinese syllable password, and the 4th is Chinese character tone.
Further, in the step (5), when there is no initial consonant in the phonetic transcriptions of Chinese characters that needs to transmit, the corresponding ciphertext of Chinese character
It is equally made of 3-4 password, the Chinese character initial consonant position of initial consonant is not by tone softly corresponding text, number, letter, symbol
Instead of.
Further, it is separated between the corresponding ciphertext of each Chinese character, symbol using space.
Using the encryption method that above-mentioned technical proposal, the application propose, it is based on Chinese phonetic alphabet application, passes through letter, symbol
Number, number, text conversion at Chinese character, any setting plain code, password realizes Chinese character encrypting and decrypting, forms commercial code, the application
Encryption method it is easy to learn, understandable, easy to remember, do not allow to decode, cover all Chinese characters, number, civilian, commercial text information is suitble to pass
It passs, protection individual privacy can be played the role of, guard business secret.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other drawings based on these drawings.
Fig. 1 is text encryption process sequence schematic diagram of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet, comprising the following steps:
(1), the Chinese phonetic alphabet of any sequence is chosen as plain code;
(2), initial consonant, simple or compound vowel of a Chinese syllable that any text that puts in order, number, letter, symbol correspond in plain code are set and replaces with password;
(3), five texts, number, letter, the symbol for choosing any sequence correspond to the tone of Chinese character;
(4), text, number, letter, the symbol for choosing any sequence correspond to the punctuation mark between text;
(5), the Chinese-character pronunciation control password transmitted as needed writes out ciphertext;
(6), information is transmitted;
(7), receive what plain code and code book solution confidential information after ciphertext by control both sides' agreement were transmitted
Data.
Further, in the step (1), initial consonant and simple or compound vowel of a Chinese syllable in the Chinese phonetic alphabet separately sort, and initial consonant and simple or compound vowel of a Chinese syllable
Collating sequence is made by oneself.
Further, in the step (2), the customized each initial consonant of user and the corresponding password of simple or compound vowel of a Chinese syllable, each initial consonant pair
The password answered is not identical, and the corresponding password of each simple or compound vowel of a Chinese syllable is not identical.
Further, in the step (2), text, number, letter, symbol can be used separately as a series,
It can be with cross-reference.
Further, in the step (5), when the phonetic transcriptions of Chinese characters for needing to transmit is made of initial consonant and simple or compound vowel of a Chinese syllable, each Chinese character
Corresponding ciphertext is made of 3-4 password, and when ciphertext has 3 passwords, first is phonetic initial consonant password, and second is phonetic
Simple or compound vowel of a Chinese syllable password, third position password are Chinese character tone;When ciphertext has 4 password, i.e., there are two simple or compound vowel of a Chinese syllable in the Chinese phonetic alphabet of text, then
Third position is also phonetic simple or compound vowel of a Chinese syllable password, and the 4th is Chinese character tone.
Further, in the step (5), when there is no initial consonant in the phonetic transcriptions of Chinese characters that needs to transmit, the corresponding ciphertext of Chinese character
It is equally made of 3-4 password, the Chinese character initial consonant position of initial consonant is not by tone softly corresponding text, number, letter, symbol
Instead of.
Further, it is separated between the corresponding ciphertext of each Chinese character, symbol using space.
Embodiment one:
With alphabetical " A B C D E F G H I J K L M N O P Q R S T U V W X Y Z " for password, with
" A B C D E " is tone, with " T U V W X Y Z " for punctuation mark, then the wherein one group of password table of comparisons obtained are as follows:
The information of transmitting are as follows: I am Chinese, I likes my motherland.
Ciphertext are as follows: WBD QDE OXB IEBC RQC T WBD AADE WBD ECA SED IEBC X
Embodiment two:
It is close with text " li po multiplies boat and is intended to go to hear suddenly that thousand ruler of the sound The Peach Blossom Pond depth of water of beating time to a song with the feet on the bank gives me feelings not as good as Wang Lun "
Code, with " li po multiply boat will " for tone, with " giving me feelings not as good as Wang Lun " for punctuation mark, then wherein one group of password control for obtaining
Table are as follows:
The information of transmitting are as follows: I am Chinese, I likes my motherland.
Ciphertext are as follows: the pool Ji Baicheng boat boat peach Wang Lee hear will in vain puddle it is white not as good as it is white multiply by Li Zhouzhou and it is white multiply will multiply depth
News, which will be multiplied, to be sent in vain
Embodiment three:
Removing column of figure is password: 0) indicating arrangement serial number 10,1) indicate arrangement serial number 11;(0 indicates arrangement serial number 20,
(1 indicates arrangement serial number 21;And so on;
123456789 0) 1) 2) 3) 4) 5) 6) 7) 8) 9) (0 (1 (2 (3 (4 (5 (6 with " 12345 " be sound
It adjusts,
The wherein one group of password table of comparisons then obtained are as follows:
The information of transmitting are as follows: we are Chinese
Ciphertext are as follows: (323 37) 5 7) 44 5) (41 9,522 8) 7) 2
Example IV:
Removing column symbol is password:
.,:;?!~-" " ... { }@#& $ %/* ﹢ ﹦ () < > " " [] <
With;.,: for tone,
The wherein one group of password table of comparisons then obtained are as follows:
The information of transmitting are as follows: we are Chinese
Ciphertext are as follows:<>,, %;%::& " ".—;,/%,
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (7)
1. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet, it is characterised in that: the following steps are included:
(1), the Chinese phonetic alphabet of any sequence is chosen as plain code;
(2), initial consonant, simple or compound vowel of a Chinese syllable that any text that puts in order, number, letter, symbol correspond in plain code are set and replaces with password;
(3), five texts, number, letter, the symbol for choosing any sequence correspond to the tone of Chinese character;
(4), text, number, letter, the symbol for choosing any sequence correspond to the punctuation mark between text;
(5), the Chinese-character pronunciation control password transmitted as needed writes out ciphertext;
(6), information is transmitted;
(7), the data transmitted after ciphertext by the plain code and code book solution confidential information of control both sides' agreement is received.
2. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: the step
Suddenly in (1), initial consonant and simple or compound vowel of a Chinese syllable in the Chinese phonetic alphabet separately sort, and the collating sequence of initial consonant and simple or compound vowel of a Chinese syllable is made by oneself.
3. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: the step
Suddenly in (2), the customized each initial consonant of user and the corresponding password of simple or compound vowel of a Chinese syllable, the corresponding password of each initial consonant is not identical, each simple or compound vowel of a Chinese syllable
Corresponding password is not identical.
4. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: the step
Suddenly in (2), text, number, letter, symbol can be used separately as a series, can also be with cross-reference.
5. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: the step
Suddenly in (5), when the phonetic transcriptions of Chinese characters for needing to transmit is made of initial consonant and simple or compound vowel of a Chinese syllable, the corresponding ciphertext of each Chinese character is by 3-4 cipher code set
At.
6. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: the step
Suddenly in (5), when not having initial consonant in the phonetic transcriptions of Chinese characters that needs to transmit, the corresponding ciphertext of Chinese character is equally made of 3-4 password.
7. a kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet according to claim 1, it is characterised in that: Mei Gehan
It is separated between the corresponding ciphertext of word, symbol using space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468661.XA CN110334527A (en) | 2019-05-31 | 2019-05-31 | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468661.XA CN110334527A (en) | 2019-05-31 | 2019-05-31 | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110334527A true CN110334527A (en) | 2019-10-15 |
Family
ID=68140678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910468661.XA Pending CN110334527A (en) | 2019-05-31 | 2019-05-31 | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110334527A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625796A (en) * | 2020-05-18 | 2020-09-04 | 金骏(广州)智能科技有限公司 | Data transmission method based on communication terminal and APP |
CN112329003A (en) * | 2020-11-06 | 2021-02-05 | 上海湖顶大数据科技有限公司 | Method and system for generating safe and easy-to-remember password |
CN114221783A (en) * | 2021-11-11 | 2022-03-22 | 杭州天宽科技有限公司 | Data selective encryption and decryption system |
CN117523758A (en) * | 2024-01-04 | 2024-02-06 | 深圳市明心数智科技有限公司 | Biological asset monitoring method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1419223A (en) * | 2002-10-13 | 2003-05-21 | 翁奕 | Encrypted message making method |
CN1661595A (en) * | 2004-02-26 | 2005-08-31 | 肖红华 | Multifunctional cipher codes |
CN101004640A (en) * | 2007-01-08 | 2007-07-25 | 史颖 | Storage method for inputting Chinese word into computer by calculation functional encoding phoneme of word |
CN101833897A (en) * | 2009-03-13 | 2010-09-15 | 张�成 | Text message security technology |
CN101950498A (en) * | 2010-08-25 | 2011-01-19 | 赵洪鑫 | Spoken Chinese encryption method for privacy protection |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
-
2019
- 2019-05-31 CN CN201910468661.XA patent/CN110334527A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1419223A (en) * | 2002-10-13 | 2003-05-21 | 翁奕 | Encrypted message making method |
CN1661595A (en) * | 2004-02-26 | 2005-08-31 | 肖红华 | Multifunctional cipher codes |
CN101004640A (en) * | 2007-01-08 | 2007-07-25 | 史颖 | Storage method for inputting Chinese word into computer by calculation functional encoding phoneme of word |
CN101833897A (en) * | 2009-03-13 | 2010-09-15 | 张�成 | Text message security technology |
CN101950498A (en) * | 2010-08-25 | 2011-01-19 | 赵洪鑫 | Spoken Chinese encryption method for privacy protection |
CN109409101A (en) * | 2018-09-17 | 2019-03-01 | 平安科技(深圳)有限公司 | The method and terminal device of data encryption |
Non-Patent Citations (2)
Title |
---|
红霞等: "让汉字走进国际网络――介绍CRS-汉语拼字方案及理论", 《中国发明与专利》 * |
红霞等: "让汉字走进国际网络――介绍CRS-汉语拼字方案及理论", 《中国发明与专利》, no. 05, 16 May 2006 (2006-05-16), pages 86 - 88 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625796A (en) * | 2020-05-18 | 2020-09-04 | 金骏(广州)智能科技有限公司 | Data transmission method based on communication terminal and APP |
CN112329003A (en) * | 2020-11-06 | 2021-02-05 | 上海湖顶大数据科技有限公司 | Method and system for generating safe and easy-to-remember password |
CN112329003B (en) * | 2020-11-06 | 2023-12-29 | 上海湖顶大数据科技有限公司 | Method and system for generating password with good security |
CN114221783A (en) * | 2021-11-11 | 2022-03-22 | 杭州天宽科技有限公司 | Data selective encryption and decryption system |
CN114221783B (en) * | 2021-11-11 | 2023-06-02 | 杭州天宽科技有限公司 | Data selective encryption and decryption system |
CN117523758A (en) * | 2024-01-04 | 2024-02-06 | 深圳市明心数智科技有限公司 | Biological asset monitoring method, device, equipment and storage medium |
CN117523758B (en) * | 2024-01-04 | 2024-04-02 | 深圳市明心数智科技有限公司 | Biological asset monitoring method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110334527A (en) | A kind of Chinese character encrypting and decrypting method based on the Chinese phonetic alphabet | |
Megyesi et al. | Decryption of historical manuscripts: the DECRYPT project | |
GB2381603A (en) | Selecting a password using discrete sets | |
Davies | A brief history of cryptography | |
CN108418683A (en) | A kind of carrier-free text steganography method based on feature of Chinese characters structure | |
CN108681536B (en) | Carrier-free steganography method based on Chinese pinyin multiple mapping | |
Odeh et al. | Steganography in text by using MS word symbols | |
Lasry et al. | Deciphering papal ciphers from the 16th to the 18th Century | |
Damico | A brief history of cryptography | |
Mullaney | Semiotic sovereignty: The 1871 Chinese telegraph code in historical perspective | |
Zheng et al. | Autoregressive linguistic steganography based on BERT and consistency coding | |
Gelb et al. | Methods of Decipherment1 | |
Lesher et al. | Limits of human word prediction performance | |
Ivasenko et al. | Information Transmission Protection Using Linguistic Steganography With Arithmetic Encoding And Decoding Approach | |
Bonavoglia | The cifra delle caselle a xvi century superencrypted cipher | |
CN103176616A (en) | Input method and device for guqin abbreviated character notation characters | |
Hentschel et al. | The world bank participation sourcebook | |
KR20010104193A (en) | A display methode of text for basic form character | |
Bhattacharyya et al. | Secure data hiding in binary text document for authentication | |
Bonavoglia | A Partenio's Stegano-Crypto Cipher. | |
CN101515207A (en) | General voice input method for global languages on keyboard | |
Mansour et al. | Cryptography protocol: A novel multilingual adaptive encryption technique with phonetic based ciphering | |
Mikhalev et al. | What is the Code for the Code? Historical Cryptology Terminology | |
CN104156078A (en) | Tibetan input method | |
Alabish et al. | A universal lexical steganography technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |