Novel identity identification and digital signature method

An identity authentication and identity technology, applied in the field of security authentication and digital signature, can solve the problem of limited capacity of K shield

Inactive Publication Date: 2008-06-11
NANJING E SECURITY TECHNALOGY
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Obviously, due to the limited capacity of K-shield, the password pool and certificate pool may not be the best method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] According to the first embodiment of the present invention, a more secure digital signature method is as follows.

[0040] First of all, there is a cryptographically large composite number M in the K-shield 1 =P 1 *Q 1 where P 1 and Q 1 are strong primes, M 1 We call it the RSA number, P can be destroyed for safety 1 , Q 1 , that is, no one knows P 1 , Q 1 Make sure 1cannot be deciphered, we call this M 1 is the RSA password;

[0041] Personal random generation number K 1 , which can be recorded on paper or other hard-to-find places, or stored in different places using a secret sharing scheme; choose a key K that is relatively easy to remember 2 , which is equivalent to the password password that the current security system requires us to remember, we call K 1 and K 2 Master key seed; K is calculated from the master key seed 3 =K 1 K2 MOD M 1 , known K 1 , K 3 and M 1 ask for K 2 is a discrete logarithm problem. K 1 and K 2 It is the most import...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a novel method for the identity authentification and the digital signature. The invention provides a method for the safe identity authentification and the digital signature under the circumstance that the challenge times are not revealed. An RSA number or an RSA magic number can compose a safer method for the identity authentification and the digital signature. In addition, the RSA number or the RSA magic number can be adopted to accomplish the authentification and the digital signature of a plurality of websites. Besides, a method for generating a user password (a private key) corresponding to the website through the information provided by the website is provided.

Description

field of invention [0001] The invention relates to a safety authentication and digital signature method. Specifically, it relates to a method of security authentication and digital signature without exposing the challenge number. Background technique [0002] Identity authentication and digital signature are important issues in computer security, and the general authentication method is the so-called "claim-challenge-response" mode. In the existing mode, the challenge (number) is generally given in plain text, and we think there is some unsafe factor in this. For example, the selection of the challenge number E in the famous schnorr authentication algorithm (Bruce Schneier's "Applied Cryptography" 366 pages published by Mechanical Industry Press in 2000, here we use this book as a part of the technical background of this application) is just like this. [0003] Currently, the feasible schemes in identity authentication mainly include: user name-password, two-factor and pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 邵通
Owner NANJING E SECURITY TECHNALOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products