CN110581759A - UOEC-HEX symmetric encryption algorithm - Google Patents

UOEC-HEX symmetric encryption algorithm Download PDF

Info

Publication number
CN110581759A
CN110581759A CN201910859537.6A CN201910859537A CN110581759A CN 110581759 A CN110581759 A CN 110581759A CN 201910859537 A CN201910859537 A CN 201910859537A CN 110581759 A CN110581759 A CN 110581759A
Authority
CN
China
Prior art keywords
character
key
symmetric encryption
encryption algorithm
uoec
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910859537.6A
Other languages
Chinese (zh)
Inventor
王昱博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910859537.6A priority Critical patent/CN110581759A/en
Publication of CN110581759A publication Critical patent/CN110581759A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

the invention relates to a UOEC-HEX symmetric encryption algorithm, which mainly solves the problem of confidentiality during information storage and exchange, and particularly can be used for file encryption to protect the file from being incapable of being obtained by other people during storage and transmission. The main technical characteristics are as follows: 1. any form of file encryption is supported. 2. Double-password encryption is supported. 3. No xor is used in the algorithm. 4. Re-encoding the characters into a UOEC encoding matrix. 5. All characters in UNICODE are supported as keys. The main application is as follows: 1. the server database is encrypted to prevent hackers from stealing data. 2. Personal important files are encrypted to avoid unauthorized access. 3. And the network data packet is encrypted to prevent malicious eavesdropping.

Description

UOEC-HEX symmetric encryption algorithm
Technical Field
The invention relates to the field of computer cryptography, in particular to a symmetric encryption algorithm.
Background
the existing symmetric encryption algorithm causes the reduction of security because of the inevitable requirement that the two parties of information transmission and reception exchange keys. Even if the transmission is made through a dedicated channel, a large amount of key data cannot be transmitted due to bandwidth or the like. Moreover, the existing algorithm is generally not good for the binary file beam, and the support for the key is limited to letters, numbers and half-angle special characters.
Disclosure of Invention
The invention provides a novel symmetric encryption algorithm, aiming at solving the technical problems that the key exchange in the existing symmetric encryption algorithm is unsafe, binary files cannot be encrypted, characters supported by the key are limited, and the like.
The invention can encrypt character string or binary file, which has two working modes, namely, coding mode (first-level encryption) and operation mode (second-level encryption). The working process is as follows:
Encrypting the common text:
In the encoding mode, a key with 16 characters length is provided, the content of the key can be any character in the UNICODE character set, in the operation mode, a key with 16 characters length (key one) is provided, and the content of the key can be the UNICODE character set except for the half-angle character ^ and the half-angle character ^ ""any character outside, should also provide an additional key (key two), and the content may be any character in the UNICODE character set. The algorithm converts each character in the text string to be encrypted into a UNICODE code and completes the code to a length of 5. (for example, 65 in the UNICODE code will be complemented to 00065) and then each bit in the code is passed through an operation formulaTo the UOEC code (e.g., the code 00065 will be converted to five UOEC codes of 0, 0, 0, 144, 100, collectively representing one character). The UOEC code will be converted to hexadecimal and complemented to three bits. (e.g., the code 0, 0, 0, 144, 100 described above would be converted to 000, 000, 000, 090, 064). And then the UOEC codes are exchanged in sequence, namely the first bit of the codes is exchanged with the third bit, and then the second bit and the third bit of the codes after exchange are exchanged. (e.g., 000,000,000,090,064 after the code is exchanged is 000,000,000,009,406). Next, the algorithm divides the code and converts it into binary, i.e., constructs a UOEC code matrix. (e.g., the codes 000,000,000,090,406 described above would be converted to matrices
0000,0000,0000
0000,0000,0000
0000,0000,0000
0000,0000,1001
0100, 0000, 0110, fifteen bits total.) if operating in an encoding mode, the algorithm sequentially corresponds the provided 16-bit secret key to binary 0000 ~ 1111, and constructs a 15-bit ciphertext string according to the binary values in the matrix, at which time, encryption of one character is completed, the algorithm repeats the above process until all the characters in the text string to be encrypted are encrypted, and concatenates the ciphertext strings generated by all the characters to form a complete ciphertext, if operating in an operating mode, the algorithm calculates the total length of the text string to be encrypted, and converts the given secret key two into the same length as the data to be encrypted, in a specific conversion manner, 1, if the length of the secret key two is greater than the length of the text string to be encrypted, and the difference between the length of the secret key two and the length of the text string to be encrypted is an odd number, then the characters in the secret key two are deleted in order from left to right, until the length of the secret key two string is consistent with the length of the text string to be encrypted, if the length of the secret key two is equal to be encrypted and the length of the text string to be encrypted is an even number, then the length of the secret key two string to be encrypted is equal, then the length of the secret key to be encrypted, the two, the secret key is saved, and the length of the two key to be encrypted is saved, and the length of the secret key is saved in the corresponding to be saved, and the length of the two key is saved, and the length of the two, and the secret key is saved, and the length of the key is saved, and the length of the key is saved, and the key is saved, the key, the length of the key is saved, and the key, the key is saved, the key, the length of the key, the key is saved, the key.
encrypting the binary file:
In the encoding mode, a key with the length of 16 characters needs to be provided, the content of the key can be any character in the UNICODE character set, in the operation mode, a key with the length of 16 characters (key one) needs to be provided, the content of the key can be any character except the half-corner character ' A ' and the half-corner character ' in the UNICODE character set, and another key (key two) needs to be provided, the content can be any character in the UNICODE character set, and other requirements are not required. The algorithm reads the content in the binary file and converts the binary data into character strings in the form of 8-bit groups. (for example: 11101101-. At this point the encryption of the binary file is complete.
Decrypting the common text:
When decrypting, if working according to the coding mode, the algorithm converts each bit of the ciphertext into binary according to a given 16-bit key (key one), then restores the UOEC coding matrix according to a mode of 3-bit row and 5-bit column, and reversely restores the matrix into 5-bit UOEC coding. The algorithm exchanges the second bit and the third bit of the restored UOEC code, then exchanges the first bit and the last bit, and converts the codes into decimal system, and uses a formulaAnd the decoding is restored to be UNICODE codes and output as characters, and the decryption is completed at the moment. If the algorithm works according to the operation mode, the state of the second key is confirmed according to the identification character of the first bit of the ciphertext, the state of the second key during encryption is calculated according to the existing cipher length, and the state is processed to be in a corresponding state. And then the algorithm converts the secret key into a binary system, and performs binary subtraction operation on the ciphertext binary system and the secret key binary system to restore a plaintext UOEC coding matrix. And restoring the UOEC encoding matrix of the plaintext UOEC matrix according to a mode of one row of 3 bits and one column of 5 bits, and reversely restoring the matrix into the UOEC encoding of 5 bits. The algorithm exchanges the second bit and the third bit of the restored UOEC code, then exchanges the first bit and the last bit, and converts the codes into decimal system, and uses a formulaAnd the decoding is restored to be UNICODE codes and output as characters, and the decryption is completed at the moment.
And (3) decrypting the binary file:
the algorithm reads the ciphertext in the 'uoechex' file, decrypts the ciphertext in each line according to a common text form, converts each binary character string in front of 'minus' in a plaintext character string obtained by decryption into a corresponding binary value, and writes the binary character string into the homonymous file with 8 bits as a group and the suffix of 'uoechex' removed. The algorithm reads all the ciphertexts in the 'uoechex' file in sequence until the 'uoechex' file is completely read, and at the moment, the binary file decryption is completed.
Compared with the prior art, the design scheme of the invention can achieve the following technical effects:
1. The security is enhanced, and the operation mode encryption is invalid for stealing a single secret key in the secret key transmission process.
2. The degree of freedom of the user is improved, and the character range supported by the key is expanded.
3. the difficulty of cracking the information by an exhaustion method is increased, and the cracking progress is slowed down.

Claims (12)

1. A symmetric encryption algorithm comprises a UOEC matrix character coding algorithm, a key length processing algorithm and a binary file to character string algorithm, and is characterized by supporting all character encryption and serving as keys in a UNICODE character set range.
2. The symmetric encryption algorithm of claim 1, wherein: each character in the string is converted into a UOEC encoding matrix.
3. The symmetric encryption algorithm of claim 1, wherein: the method supports double-key encryption, the length of a first-level key is 16 bits with a fixed length, and a second-level key is unlimited.
4. The symmetric encryption algorithm of claim 1, wherein: any binary file may be encrypted.
5. The symmetric encryption algorithm of claim 1, wherein: processing the length of the secondary key to be consistent with the length of the text to be encrypted
The symmetric encryption algorithm of claim 1, wherein: no xor operation is used.
6. the symmetric encryption algorithm of claim 1, wherein: and generating the plaintext and the secret key into the ciphertext by using binary addition operation and binary subtraction operation.
7. The symmetric encryption algorithm of claim 2, wherein: the UOEC encoding matrix is oneAnd (4) matrix.
8. A character coding mode comprises the processing of UNICODE coding and the generation of a coding matrix, which is used for coding characters in a UOEC-HEX symmetric encryption algorithm, and is characterized in that: the UNICODE code of the character is divided, reversed in order and converted into a matrix form.
9. The character encoding method according to claim 8, wherein: converting UNICODE code into 5 bits and using formula for each bitThe operation is performed and converted to three-bit hexadecimal.
10. The character encoding method according to claim 8, wherein: formula used in reduction to UNICODE coding
11. The character encoding method according to claim 8, wherein: the code to be converted into hexadecimal is exchanged first for the first and last bits and then for the second and third bits.
12. The character encoding method according to claim 8, wherein: and converting each bit of the exchanged codes into a binary system respectively, and generating a code matrix.
CN201910859537.6A 2019-09-13 2019-09-13 UOEC-HEX symmetric encryption algorithm Withdrawn CN110581759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910859537.6A CN110581759A (en) 2019-09-13 2019-09-13 UOEC-HEX symmetric encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910859537.6A CN110581759A (en) 2019-09-13 2019-09-13 UOEC-HEX symmetric encryption algorithm

Publications (1)

Publication Number Publication Date
CN110581759A true CN110581759A (en) 2019-12-17

Family

ID=68811793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910859537.6A Withdrawn CN110581759A (en) 2019-09-13 2019-09-13 UOEC-HEX symmetric encryption algorithm

Country Status (1)

Country Link
CN (1) CN110581759A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199248A (en) * 2020-09-14 2021-01-08 中标慧安信息技术股份有限公司 Operation and maintenance method based on artificial intelligence edge equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199248A (en) * 2020-09-14 2021-01-08 中标慧安信息技术股份有限公司 Operation and maintenance method based on artificial intelligence edge equipment
CN112199248B (en) * 2020-09-14 2021-07-27 中标慧安信息技术股份有限公司 Operation and maintenance method based on artificial intelligence edge equipment

Similar Documents

Publication Publication Date Title
KR100657062B1 (en) Method for encrypting information and device for realization of the method
CN106656475B (en) Novel symmetric key encryption method for high-speed encryption
KR102136904B1 (en) Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program
KR101187854B1 (en) Permutation Data Transformation to Enhance Security
CN109861810B (en) Data encryption method and decryption method based on chaotic block encryption algorithm
EP3178190B1 (en) Encoder, decoder and method
CN108768617B (en) Format-preserving encryption method based on traditional block cipher
JP2013047822A (en) Encryption method for message authentication
KR20120089396A (en) Encryption apparatus and encryption method thereof
CN117278324B (en) Message encryption transmission method and system
Joshy et al. Text to image encryption technique using RGB substitution and AES
RU2459367C2 (en) Method to generate alternating key for unit coding and transfer of coded data
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
WO2015166701A1 (en) Encryption method, program, and system
JP4317593B2 (en) Data decorrelation method
Mattsson Format controlling encryption using datatype preserving encryption
CN110581759A (en) UOEC-HEX symmetric encryption algorithm
CN116405194A (en) Data encryption transmission method based on Beidou short message
CN116796345A (en) Encryption and decryption method, device, equipment and storage medium
CN107493164B (en) DES encryption method and system based on chaotic system
CN114826558A (en) Mass data rapid encryption method and system
CN110061832B (en) Method for realizing symmetric cipher algorithm using Chinese character as cipher
CN111130755B (en) Matrix double encryption method based on signature
KR20220137024A (en) Symmetric Asynchronous Generation Encryption Method
CN103746793A (en) Number form text encryption and decryption methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20191217

WW01 Invention patent application withdrawn after publication