Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for generating message summary

A message digest and message technology, applied in the field of key algorithms, can solve the problems of waste of RAM resources and insufficient RAM resources, and achieve the effects of improving competitiveness, small RAM resources, and reducing requirements

Active Publication Date: 2010-06-02
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0054] The characteristic of the standard SHA1 algorithm is that it requires 80 buffers with a capacity of 32-bit words, and also needs to allocate buffers for the complement length of the message, which causes a waste of RAM resources, and the continuous cost reduction of key generation equipment is The trend of the product is that since the RAM area in the key generation device is usually small (within 256 bytes), it will not be possible to have enough RAM resources to satisfy the SHA1 algorithm operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating message summary
  • Method for generating message summary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0101] The embodiment of the present invention improves the SHA1 algorithm in the prior art, applies the improved SHA1 algorithm to generate a message digest, and uses the message digest generated by the algorithm as the authentication key in the process of information interaction, which not only ensures the security of information interaction , which reduces the storage space occupied in the process of generating the message digest, and lowers the requirements on the device.

[0102] In order to make the purpose, technical solution and advantages of the present invention clearer, a one-time password generating device with a USB interface is taken as an example to specifically illustrate the process of using the improved SHA1 algorithm ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a process for generating message, which belongs to cipher key algorithm field. The process includes: processing covering position, covering length to original message, then dividing new message into multiple message blocks and disposing in sequence, and initializing intermediate quantity buffer zone, calculating current intermediate quantity based on initialization intermediate quantity buffer zone and calculating word change in terms of current intermediate quantity, after disposing every message blocks, current word change is as message summarization. the invention processes calculate again in using intermediate quantity, calculating required intermediate quantity buffer zone only need sixteen word intermediate quantity buffer zone, saving RAM resource, and avoiding these digital data occupation one RAM resource, depressing equipment demand, improving equipment applied competitive power by required message covering position and covering length digital data oftemporarily buffer memory calculating in the sixteen word intermediate quantity buffer zone.

Description

technical field [0001] The invention relates to the field of key algorithms, in particular to a method for generating message summaries. Background technique [0002] In the existing information encryption technology, common information protection methods can be roughly divided into two categories: confidentiality and authentication. The current authentication technology has two methods: user authentication and message authentication. User authentication is used to identify whether the user is a legitimate user; message authentication is to verify that the received message is indeed from the real sender and has not been authenticated. Modified messages can also be verified for order and timeliness of messages. Message authentication actually generates redundant information for the message itself - MAC (Message Authentication Code, message authentication code). The message authentication code uses a key to generate a new data block for the message to be authenticated, and en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products