Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Elliptic curve encryption and decryption method and apparatus

An elliptic curve, encryption and decryption technology, applied in secure communication devices, secure communication, digital transmission systems, etc., can solve problems such as incompatibility with ElGamal encryption methods

Inactive Publication Date: 2009-01-14
BEIJING HUADA INFOSEC TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0064] Although this method solves the problem of plaintext embedding, it is not compatible with the ElGamal encryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve encryption and decryption method and apparatus
  • Elliptic curve encryption and decryption method and apparatus
  • Elliptic curve encryption and decryption method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Figure 1 shows a flowchart of the encryption process of the present invention.

[0074] In step 101, the encrypting party A obtains the system parameters and the public key Y disclosed by the decrypting party B B ;

[0075] In step 102, A generates a random number k, where 1≤k≤N-1, where N is the order of the point group of the elliptic curve;

[0076] In step 103, combine k with the public key Y of the base point G and B B Do the point multiplication operation of the elliptic curve to get P=kG, Q=kY B ;

[0077] In step 104, calculate V=v(P), and use the v function to perform further data processing on P, such as compressing or expanding P;

[0078] In step 105, the encryptor obtains a plaintext m of appropriate length, and uses f to perform a preprocessing operation on the plaintext m to obtain f(m). Among them, the function f(m) must have an inverse function, through f -1 (f(m)) must be able to recover m, which can contain the following forms:

[0079] a) f(m)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is a kind of elliptical curve encrypting method. The method obtains the public key YB of deciphering end, and then generates random value k, k carries on elliptical curve dot product calculation with YB and the base point G of the curve, gets the point P=kG, !=kYB on the curve; carries on calculation to P and Q with v and g functions, and gets v(P), g(Q); uses function f to calculate m and gets f(m), uses function u to calculate f(m) and g(Q) and gets u(f(m), g(Q)), gets the v(P), u(f(m), g(Q)); the decoding side receives encrypted text(V,U), calculates with own personal xB and V, gets r(xB, V), calculates r(xB, V) and V with inverse function of u and gets D-u'(U, r(xB, V)), uses inverse function of f to calculate and gets m=f-1(D); the u and u' have following nature: for z-u(x, y), there can get x=u' (z, y).

Description

technical field [0001] The invention relates to data encryption and decryption, which is an encryption method using the discrete logarithm problem of elliptic curves. Background technique [0002] Cryptographic systems are divided into symmetric cryptosystems and asymmetric cryptosystems. [0003] Symmetric ciphers are sometimes called traditional cipher algorithms, that is, the encryption key can be deduced from the decryption key, and vice versa. In most algorithms, the encryption / decryption key is the same. These algorithms, also called secret-key algorithms or single-key algorithms, require the sender and receiver to agree on a key before communicating securely. The security of symmetric cryptography depends on the key, and leaking the key means that anyone can encrypt / decrypt messages. Therefore, although the speed of symmetric encryption is very fast, how to securely distribute the key to legitimate users is a problem. [0004] In the patent "CRYPTOGRAPHIC APPARATU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04K1/00
Inventor 陈建华汪朝晖李莉涂航崔竞松彭蓉
Owner BEIJING HUADA INFOSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products