Novel authentication mechanism for encrypting vector

A vector and key technology, applied in the field of new vector encryption authentication mechanism, can solve problems such as difficulty in resisting third-party attacks, separation of encryption and authentication, and low implementation efficiency

Inactive Publication Date: 2009-01-28
冯振周
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the two existing cryptographic technologies, 3DES, IDEA, and AES belong to single-key secrecy, RSA, DSS, ECC, etc. belong to public key signature, and comprehensive types such as PGP, PKI, IPsec, etc. belong to the combined application of two cryptographic systems. The biggest flaw of the application t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel authentication mechanism for encrypting vector
  • Novel authentication mechanism for encrypting vector
  • Novel authentication mechanism for encrypting vector

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0159] Embodiment 1. Mixed software and hardware embodiment

[0160] figure 2 with image 3 It is a preferred hardware and software hybrid embodiment of the present invention, figure 2 The key generation / regenerator of the company uses a digital chip or a smart card to form a hardware system, image 3 The software program is used to realize the formation of an encryption authentication software system, and the hardware system and the software system realize information interaction through the USB interface or the sensing interface. Each digital chip or smart card has a globally unique hardware serial number-space code, which determines the range of vector key space that the hardware can generate and regenerate. In practical applications, the serial number must be used by an authoritative third party The identity information of the user is bound to the serial number and publicized, so that other users can verify their identity and directly communicate with them.

[0161] figure...

Example Embodiment

[0169] Embodiment 2. Identity-based Trusted Computing Module PTM

[0170] Such as Figure 4 Shown is the trusted computing platform core module-PTM encryption authentication module implemented by hardware using the method and system of the present invention. In this implementation method, the key generation / regenerator and encryption authentication algorithm of the present invention are made in On the same digital chip, it is connected to a terminal such as a computer through a parallel interface to form a trusted terminal. Figure 4 In the local space code unit, the key generation / regeneration unit, the random number generator unit and the tamper detection electrical damage unit are constituted as figure 2 As shown in the key generation / regeneration part of the present invention, the local space code is a globally unique production serial number assigned by each PTM module, which determines the encryption key space range used by each PTM module, and the local space code It can be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel vector encryption authentication mechanism and relates to a vector cryptography method, belonging to the technical field of information security. The method comprises the following steps: a cipher system selects a large number encryption key space M which is twice divided into 2*2 encryption key subspaces which are provided with 2 vectors with different orientations in order that each cipher system of the system possesses a unique encryption key subspace and a unique decryption key subspace; according to the method, the novel vector encryption authentication mechanism can be constructed; the mechanism adopts a hardware tamperproof encryption key generation/regeneration technology to realize the secondary division of the large number encryption key space and endow the encryption key with vector property; and the mechanism adopts a dissymmetrical symmetric algorithm array for encryption/decryption, thereby realizing high strength security, anti-replay, integral control, identity authentication and digital signature and having no problem of the management of the encryption key.

Description

technical field [0001] The invention belongs to the basic technical field of information security, and specifically relates to a vector cipher encoding method and a novel vector cipher authentication mechanism constructed by the method. Background technique [0002] Cryptography technology is one of the main basic technologies for ensuring the security of information networks today. According to the different forms of keys used, cryptographic technology can be divided into symmetric cryptosystems and asymmetric cryptosystems or single-key (private key) cryptosystems and double-key (public key) cryptosystems. key) cryptographic system. In today's network environment, in order to ensure the security of information network and information, it is necessary to use cryptographic technology in order to realize the confidentiality of information, the identity authentication of information generators, digital signatures to prevent repudiation, and digital fingerprints to prevent infr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/22H04L9/32H04L9/30
Inventor 冯振周冯龙冯帆
Owner 冯振周
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products