Digital signature method based on CSK

A digital signature and digital technology, applied in the field of information security, can solve the problems of slow speed and high cost of digital signature and signature file verification

Active Publication Date: 2008-10-08
胡祥义
View PDF0 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, asymmetric cryptographic algorithms are used to establish digital signature systems at home and abroad, such as: PKI technology. However, the public key stored in the digital signature verification center of PKI technology is vulnerable to hackers. Hackers can impersonate by tampering with the user's public key. At the same t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on CSK
  • Digital signature method based on CSK
  • Digital signature method based on CSK

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following describes the implementation steps for users to digitally sign files and verify signatures with reference to the accompanying drawings:

[0038] figure 1 : Explain the process of the user digitally signing the file. First, the user J inserts the cryptographic key hardware device on the client side, clicks the button of digitally signing the file on the client computer, and the client computer generates a time stamp 1 and a random number 1. Input the file, time stamp 1 and random number 1 together into the chip of the password key, and use the "digest" algorithm such as: HASH function to "digest" the file to obtain the digital "fingerprint 1" of the file, and the client computer in the password key chip Based on the combined symmetric key generation algorithm composed of timestamp 1 and random number 1, the terminal encryption system selects N elements from the "key seed" table of user J, and synthesizes a set of symmetric keys K1, using the symmetric key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A digital signature method based on CSK establishes a digital signature checking center on the website for checking the signature file. A client computer is established with a ciphering system and a digital signature protocol. Each subscriber is distributed with a hardware device of the cipher key. A signature subscriber uses the cipher key for executing digital signature to the file. The digital signature protocol adopts a combined symmetrical cipher technique for executing digital signature to the file and realizes that the signature cipher is different each time. A signature checking subscriber also uses a cipher key for checking the signature file. The digital signature checking center firstly checks the identity of the signature checking subscriber, and subsequently executes the checking to the signature file. The identity checking protocol and the digital signature checking protocol are all completed with a combined symmetrical key technique thereby realizing the digital signature of the file and the checking to the signature file.

Description

Technical field: [0001] The invention relates to the field of information security and is used for digital signatures in the approval process of office automation documents. Background technique: [0002] At present, asymmetric cryptographic algorithms are used to establish digital signature systems at home and abroad, such as: PKI technology. However, the public key stored in the digital signature verification center of PKI technology is vulnerable to hackers. Hackers can impersonate by tampering with the user's public key. At the same time, the key for the user to digitally sign the file is: the cost of updating and maintaining the private key is high. In addition, the digital signature based on the asymmetric cryptographic algorithm and the verification of the signed file are slow. In short, the existing digital None of the signature products can meet the needs of the market. Invention content: [0003] The digital signature method based on CSK (Combined, Symmetric, Ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products