Patents by Inventor Yujuan SI
Yujuan SI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11750375Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.Type: GrantFiled: April 19, 2019Date of Patent: September 5, 2023Assignees: Zhuhai College of Science And Technology, Jilin UniversityInventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
-
Publication number: 20220150054Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.Type: ApplicationFiled: April 19, 2019Publication date: May 12, 2022Applicants: Zhuhai College of Science And Technology, Jilin UniversityInventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
-
Publication number: 20220109566Abstract: Disclosed are an encryption and decryption method and device based on a random hash and bit operation. The method includes the steps of: S1: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file, and a key file, wherein the key file comes from an existing coding sequence and serves as a shared file for encryption and decryption; S2: providing a reversible hash function set used for encryption and decryption, and then uniformly scattering the plaintext in a known binary random hash by an encryption hash function; and S3: introducing a bit operation rule set, changing values of all or partial binary bits of the binary random hash by a bit operation, and mapping the values to a ciphertext space. The device includes a memory and a processor, and is configured to implement the above method.Type: ApplicationFiled: April 19, 2019Publication date: April 7, 2022Applicants: Jilin University, Zhuhai College of Science And TechnologyInventors: Yujuan SI, Guanghui FENG, Liuqi LANG, Xiaoyang FU, Hao WU
-
Patent number: 11184154Abstract: A method for sequentially encrypting and decrypting doubly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.Type: GrantFiled: June 29, 2018Date of Patent: November 23, 2021Assignees: Zhuhai College of Jilin University, Jilin UniversityInventors: Yujuan Si, Liuqi Lang
-
Patent number: 11165562Abstract: The invention discloses a sequential encryption method based on multi-key stream ciphers, comprising the following steps of: acquiring plaintext data, and storing the acquired plaintext data in the form of a circular linked list; storing a plurality of key sequences in the form of a circular linked list, respectively; performing a bitwise operation on the key sequences according to a specified starting bit to generate a stream random sequence; and, reconstructing the plaintext data according to the stream random sequence to generate encrypted ciphertext data. The method of the invention is simple in encryption and decryption, difficult to decipher, easy to implement by a computer without auxiliary hardware devices, fast in encryption and decryption speed, strong in the diffusion property of the generated ciphertext, and good in anti-interception performance and the like.Type: GrantFiled: April 13, 2018Date of Patent: November 2, 2021Assignee: Zhuhai College of Jilin UniversityInventors: Yujuan Si, Liuqi Lang, Guanghui Feng, Jialiang Chen
-
Patent number: 11082210Abstract: A method for sequentially encrypting and decrypting singly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and calling keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.Type: GrantFiled: June 29, 2018Date of Patent: August 3, 2021Assignees: Zhuhai College of Jilin University, Jilin UniversityInventors: Yujuan Si, Liuqi Lang
-
Patent number: 10951399Abstract: The present invention discloses a binary stream hash modulus encryption and decryption method, including: creating a clear-text set M according to a clear-text file; taking the clear-text set M as an initial set and performing several times of byte order iterative encryption on a reference string to obtain a cipher-text set C; wherein a key set P and an algorithm set A are combined during the iterative encryption; and calling the key set P for the cipher-text set C to perform several times of byte decryption on the reference string, wherein the key set P and the algorithm set A are jointly used during the encryption and shared during the encryption and decryption. By using the present invention, the file cannot be decoded even if intercepted by another person, an existing Internet platform is still used in a transmission environment, but transmitted information is encrypted information.Type: GrantFiled: August 20, 2019Date of Patent: March 16, 2021Inventors: Yujuan Si, Liuqi Lang
-
Publication number: 20200412522Abstract: A method for sequentially encrypting and decrypting singly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and calling keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.Type: ApplicationFiled: June 29, 2018Publication date: December 31, 2020Applicants: Zhuhai College of Jilin University, Jilin UniversityInventors: Yujuan SI, Liuqi LANG
-
Publication number: 20200213080Abstract: A method for sequentially encrypting and decrypting doubly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.Type: ApplicationFiled: June 29, 2018Publication date: July 2, 2020Applicants: Zhuhai College of Jilin University, Jilin UniversityInventors: Yujuan Si, Liuqi Lang
-
Publication number: 20190379532Abstract: The present invention discloses a binary stream hash modulus encryption and decryption method, including: creating a clear-text set M according to a clear-text file; taking the clear-text set M as an initial set and performing several times of byte order iterative encryption on a reference string to obtain a cipher-text set C; wherein a key set P and an algorithm set A are combined during the iterative encryption; and calling the key set P for the cipher-text set C to perform several times of byte decryption on the reference string, wherein the key set P and the algorithm set A are jointly used during the encryption and shared during the encryption and decryption. By using the present invention, the file cannot be decoded even if intercepted by another person, an existing Internet platform is still used in a transmission environment, but transmitted information is encrypted information.Type: ApplicationFiled: August 20, 2019Publication date: December 12, 2019Inventors: Yujuan SI, Liuqi LANG
-
Publication number: 20190207745Abstract: The invention discloses a sequential encryption method based on multi-key stream ciphers, comprising the following steps of: acquiring plaintext data, and storing the acquired plaintext data in the form of a circular linked list; storing a plurality of key sequences in the form of a circular linked list, respectively; performing a bitwise operation on the key sequences according to a specified starting bit to generate a stream random sequence; and, reconstructing the plaintext data according to the stream random sequence to generate encrypted ciphertext data. The method of the invention is simple in encryption and decryption, difficult to decipher, easy to implement by a computer without auxiliary hardware devices, fast in encryption and decryption speed, strong in the diffusion property of the generated ciphertext, and good in anti-interception performance and the like.Type: ApplicationFiled: April 13, 2018Publication date: July 4, 2019Applicant: Zhuhai College of Jilin UniversityInventors: Yujuan SI, Liuqi LANG, Guanghui FENG, Jialiang CHEN