CN112165380A - Split type binary data encryption method - Google Patents
Split type binary data encryption method Download PDFInfo
- Publication number
- CN112165380A CN112165380A CN201910365763.9A CN201910365763A CN112165380A CN 112165380 A CN112165380 A CN 112165380A CN 201910365763 A CN201910365763 A CN 201910365763A CN 112165380 A CN112165380 A CN 112165380A
- Authority
- CN
- China
- Prior art keywords
- data
- numbers
- binary data
- binary
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 11
- 238000007906 compression Methods 0.000 description 3
- 230000006835 compression Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a split type binary data encryption method, which solves the problem that the development of the information communication industry is restricted because the space occupied by the encrypted binary data is increased or the encrypted binary data is easy to crack. The method is to carry out data encryption on binary data in a splitting mode, the space occupied by the original data is not increased except for a small amount of simple keys after the data are encrypted, and the encrypted data and the original data have no logical relation, so that the aim of transmitting and storing the data more safely is fulfilled.
Description
Technical Field
The invention relates to a split type binary data encryption method, which solves the problem that the development of the information communication industry is restricted because the space occupied by the encrypted binary data is increased or the encrypted binary data is easy to crack. The method is to carry out data encryption on binary data in a splitting mode, the space occupied by the original data is not increased except for a small amount of simple keys after the data are encrypted, and the encrypted data and the original data have no logical relation, so that the aim of transmitting and storing the data more safely is fulfilled.
Technical Field
At present, the development of the computer and information communication industry is restricted because the space occupied by the encrypted binary data is increased or the encrypted binary data is easy to crack.
Disclosure of Invention
In order to better perform reliable encryption on the binary data under the premise of not increasing the occupied space of the data, the invention creates a method for reliably encrypting the binary data, and effectively improves the safety of the binary data.
Firstly, binary coding is an arrangement consisting of 0 and 1 data, and continuous same type data in the binary data is regarded as a number; the two types of numbers are regularly staggered one by one, and the numbers are divided into two groups according to the types to form the arrangement of the numbers consisting of one single type of data; recording the first data type in binary coding and the length of space occupied by the arrangement of numbers formed by the data as a key; if the binary data 1101001110001111000011111 are separated by type, the numbers 11, 1, 111, 1111, 11111 consisting of binary data 1 and 0, 00, 000, 0000 consisting of binary data 0 are formed, and the key is 1 type and 15 bits long.
Secondly, in the arrangement of the numbers composed of the first data types in the binary codes, only one bit of the numbers is kept unchanged, and the rest bits of the numbers with two or more bits unchanged are inverted or the rest bits with tail bits unchanged are inverted, and then the groups of numbers are combined to form a new first group of binary data; another set of numbers is arranged to form a new second set of binary data in the same way; for example, in the first step, only one bit of the numbers 11, 1, 111, 1111, 11111 consisting of binary data 1 is kept unchanged, and the remaining bits of two or more bits are not changed to form a new first set of binary data 101100100010000, only one bit of the numbers 0, 00, 000, 0000 consisting of binary data 0 is kept unchanged, and the remaining bits of two or more bits are not changed to form a new second set of binary data 0010110111.
Thirdly, combining the first group of the two groups of new binary data formed in the second step after the first group or the second group after the first group to form encrypted data; for example, in the second step, the first group of two new binary data groups is combined with the second group to form 1011001000100000010110111.
Since the encrypted data is still binary data, repeated encryption can be performed by the above method, and finally binary data which cannot be decrypted without a key is obtained.
The decryption of the data is the compression process above the inverse operation.
Detailed Description
The following data consisting of binary data is encrypted:
{1101001110001111000011111}
the first step is as follows: the {11, 1, 111, 1111, 11111} key is of type 1 and 15 bits in length.
The second step is that: {101100100010000}{0010110111}
The third step: {1011001000100000010110111}
A compression result will be obtained:
the key is of type 1 and 15 bits in length 1011001000100000010110111.
The decryption of data is the inverse of the compression process and is not described.
The present invention has been described in detail. It should be noted that the specific embodiments described herein are only for explaining the present invention and are not used to limit the present invention.
Claims (2)
1. A split type binary data encryption method is characterized in that: firstly, binary coding is an arrangement consisting of 0 and 1 data, and continuous same type data in the binary data is regarded as a number; the two types of numbers are regularly staggered one by one, and the numbers are divided into two groups according to the types to form the arrangement of the numbers consisting of one single type of data; recording the first data type in binary coding and the length of space occupied by the arrangement of numbers formed by the data as a key; secondly, in the arrangement of the numbers composed of the first data types in the binary codes, only one bit of the numbers is kept unchanged, and the rest bits of the numbers with two or more bits unchanged are inverted or the rest bits with tail bits unchanged are inverted, and then the groups of numbers are combined to form a new first group of binary data; another set of numbers is arranged to form a new second set of binary data in the same way; and thirdly, combining the two groups of new binary data formed in the second step, wherein the first group is behind the second group or the second group is behind the first group, and the encrypted data is formed.
2. A decryption method, characterized by: the decryption of the data is the reverse operation of the encryption process in claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910365763.9A CN112165380A (en) | 2019-04-24 | 2019-04-24 | Split type binary data encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910365763.9A CN112165380A (en) | 2019-04-24 | 2019-04-24 | Split type binary data encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112165380A true CN112165380A (en) | 2021-01-01 |
Family
ID=73859286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910365763.9A Pending CN112165380A (en) | 2019-04-24 | 2019-04-24 | Split type binary data encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112165380A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115361680A (en) * | 2022-10-20 | 2022-11-18 | 华信咨询设计研究院有限公司 | Medical insurance data intelligent sharing and exchanging system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003060691A2 (en) * | 2002-01-16 | 2003-07-24 | Infineon Technologies Ag | Arithmetic unit and method for carrying out an arithmetic operation with coded operands |
US7720013B1 (en) * | 2004-10-12 | 2010-05-18 | Lockheed Martin Corporation | Method and system for classifying digital traffic |
US20100146013A1 (en) * | 2008-12-09 | 2010-06-10 | Andrew Harvey Mather | Generalised self-referential file system and method and system for absorbing data into a data store |
CN103699646A (en) * | 2013-12-24 | 2014-04-02 | 吕志强 | Tagging reversible compression method for binary data |
CN105446666A (en) * | 2015-12-25 | 2016-03-30 | 惠州Tcl移动通信有限公司 | Full digital sequence storage method and system based on mobile terminal |
-
2019
- 2019-04-24 CN CN201910365763.9A patent/CN112165380A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003060691A2 (en) * | 2002-01-16 | 2003-07-24 | Infineon Technologies Ag | Arithmetic unit and method for carrying out an arithmetic operation with coded operands |
US7720013B1 (en) * | 2004-10-12 | 2010-05-18 | Lockheed Martin Corporation | Method and system for classifying digital traffic |
US20100146013A1 (en) * | 2008-12-09 | 2010-06-10 | Andrew Harvey Mather | Generalised self-referential file system and method and system for absorbing data into a data store |
CN103699646A (en) * | 2013-12-24 | 2014-04-02 | 吕志强 | Tagging reversible compression method for binary data |
CN105446666A (en) * | 2015-12-25 | 2016-03-30 | 惠州Tcl移动通信有限公司 | Full digital sequence storage method and system based on mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115361680A (en) * | 2022-10-20 | 2022-11-18 | 华信咨询设计研究院有限公司 | Medical insurance data intelligent sharing and exchanging system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101295343B (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
US20100239087A1 (en) | Encrypting variable-length passwords to yield fixed-length encrypted passwords | |
US20120134490A1 (en) | Selective Data Encryption and Decryption Method and Apparatus | |
CN101034978A (en) | Table splitting for cryptographic processes | |
CN114640523B (en) | Computer data security encryption method and system | |
CN110149200A (en) | A kind of color image encrypting method based on dynamic DNA and 4D chaos | |
CN109547663A (en) | A kind of improvement LSB image latent writing method of combining cipher | |
CN114338217B (en) | Data encryption transmission method | |
JPWO2020214464A5 (en) | ||
CN112165380A (en) | Split type binary data encryption method | |
JP5992651B2 (en) | ENCRYPTION METHOD, PROGRAM, AND SYSTEM | |
CN117375836A (en) | Encryption and decryption method and system for long text segment based on RSA encryption algorithm | |
CN107135064B (en) | Information encryption method based on depth self-encoder | |
CN111130755B (en) | Matrix double encryption method based on signature | |
CN1127240C (en) | Privacy method for multimedium data | |
CN115834163A (en) | Method, device, equipment and storage medium for generating secret key of encrypted data | |
CN114519194A (en) | Coding and encryption method based on network space knowledge data | |
CN116484407B (en) | Data security protection method and device, electronic equipment and storage medium | |
CA3167530A1 (en) | A method for symmetric asynchronous generative encryption | |
CN110581759A (en) | UOEC-HEX symmetric encryption algorithm | |
CN117407906B (en) | Software development data security encryption method based on DES algorithm | |
Shoukat et al. | An Improved Method of Vigenere Cipher to Securely Compress the Text by using Relative Frequency | |
CN114459633B (en) | Data encryption and decryption method for anti-oxidation gold bonding wire equipment based on Internet of things | |
CN110351084B (en) | Secret processing method for urban basic mapping data | |
KRISHNACHELLURI et al. | FOR STANDARD DATA ENCRYPTION ALGORITHMS WITH (MODDES) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210101 |
|
RJ01 | Rejection of invention patent application after publication |