Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for encrypting and decrypting broadcast of network information

A technology for encryption and decryption, network information, applied in the field of ensuring information security in network information broadcasting, can solve problems such as complex algorithms, and achieve the effect of simple decryption algorithm, strong practicability, and simple encryption and decryption processes

Inactive Publication Date: 2009-09-23
JIANGSU WENTRY TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Technical problem: The purpose of the present invention is to provide an encryption and decryption method for network information broadcasting to solve the problem of complex algorithms in the broadcasting process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and decrypting broadcast of network information
  • Method for encrypting and decrypting broadcast of network information
  • Method for encrypting and decrypting broadcast of network information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] like figure 1 Shown, the encryption and decryption method of the network broadcast information provided by the present invention is, the user in the network is recorded as Idi, and i is a natural number, and each user Idi has a pair of keys (Qi, Si), and Qi is the Hash function value of user Idi , Si is a key; the encryption and decryption method of the network information broadcast adopts the asymmetric encryption algorithm of the identity mark, and the parameters in the asymmetric encryption algorithm are: π = { q , G 1 , G 2 , e ^ , n , P , P pub , H 1 , H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an encryption and decryption method for network information broadcasting. The encryption steps of the encryption and decryption method for network information broadcasting are as follows: Firstly, after first encryption, an intermediate result is obtained, ..., the first encryption method is: Step 11: Obtain the Hash function H1 value Qi of user Idi in the network, i.e. Qi=H1(Idi); Step 12: Obtain N intermediate results after encryption, which are respectively the first intermediate result and the second intermediate result As a result, ... the Nth intermediate result, the encryption algorithm for broadcast information in the present invention is simple and practical; the decryption process is to solve a linear equation system, and the decryption algorithm is simple.

Description

technical field [0001] The invention relates to a method for ensuring network information security, in particular to a method for ensuring information security in network information broadcasting. Background technique [0002] In recent years, the Internet and communication networks have developed rapidly around the world, which has had a great impact and change on the way of life of human society, and the subsequent network information security issues are becoming more and more important , especially the security of multicast and broadcast information requires more effective means of protection. The encryption method of broadcast information has always been a hot research topic. [0003] There are two main encryption methods: symmetric encryption algorithm and asymmetric encryption algorithm. The symmetric encryption algorithm has only one key, and the calculation of encryption and decryption is small, but the management of the key is more complicated, because both partie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28
Inventor 杨庚陈建新王江涛陈珊珊
Owner JIANGSU WENTRY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products