Research Article
[Retracted] Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Algorithm 3
The following diagram depicts the ASCII encryption and decryption method.
Algorithm Encryption | { | SD = Secret Date, K = Key, Pid = Public ID Encrypt () | Begin | string[] = SD [] = to convert ASCII String2 (SD) | Split(String2,10) until the duration is reached (String2)[]=DeciConv String2 (String2) | Until String[SD]10 split(String2)String2[SD]Pid Cipher=Cipher[] should be returned. | Return 1[] String | End | } | Algorithm DecryptionE | { | public static String decrypt(String algorithm, String cipherText, SecretKey key) | Cipher cipher = Cipher.getInstance(key); | cipher.init(Cipher.DECRYPT_MODE, key); | byte[] plainText = cipher.doFinal(Base64.getDecoder() | .decode(cipherText)); | return new String(plainText); | } |
|