Cipher key negotiating method, enciphering/deciphering method and signature/verification method

A key agreement and key technology, applied in user identity/authority verification, public key for secure communication, and key distribution, which can solve the problems of undisclosed facts and increased possibility of being deciphered, and achieve strong anti-attack capability , scale and complexity enhancement, solving the effect of small algorithm space

Inactive Publication Date: 2010-09-22
管海明 +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the security of the above three public key cryptosystems has not been proved by mathematical theory, the possibility cannot be ruled out: after decades of analysis and research, someone has actually found an effective method to decipher them, but This fact is not made public
[0012] Moreover, with the progress of quantum computer research, the possibility of supporting the above three public key cryptosystems to be deciphered increases greatly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key negotiating method, enciphering/deciphering method and signature/verification method
  • Cipher key negotiating method, enciphering/deciphering method and signature/verification method
  • Cipher key negotiating method, enciphering/deciphering method and signature/verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0075] The present invention belongs to the category of information security products, and is mainly used in network trust systems, such as certificates, banks, mobile phones, Internet, e-commerce, e-government, logistics, network monitoring, power control, fund transfer, transactions, data encryption and other links.

[0076] The hardware environment required for applying the present invention belongs to the knowledge well known to those skilled in the art. For example: computers, network devices, handheld or portable devices, programmable consumer electronics devices, smart cards, microcontrollers, dedicated digital signal processing chips, multiprocessor systems, distributed computing environments including any of the above syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key agreement method and an encryption / decryption method and a signature / verification method. The key agreement method comprises the following steps: step 1. an A(x) shared by a user group is prearranged, wherein the user group comprises at least two users; the A(x) is a nonlinear function group from n vector x to n vector y=(y1,ellipsis, yn)=A(x)=(A1(x1,ellipsis,xn),ellipsis, An(x1,ellipsis,xn), wherein n is more than 1; and the A(x) meets the conditions that when the s layer iterative A<(s)>(x) of the A(x) is compared with the A(x), the number and type of the subsections with non-zero x coefficient are kept unchanged, and s is an integer; if B(x) is equal to A(A(x)), A(B(x)) is equal to B(A(x)); step 2: the users in the user group exchange the intermediate results related to the integer layer iteratives of the A(x); and the step 3: the users respectively adopt the received intermediate results to calculate the key K which is shared by the user group. The method has the advantages of unique coding style, strong attack resistance, enhanced scale and complexity of the cryptographic algorithm, and improved space and safety of the algorithm.

Description

technical field [0001] The invention relates to the technical field of information security and encryption, in particular to a public key encryption system capable of completing key negotiation, encryption / decryption and signature / verification of data messages. Background technique [0002] Cryptography is a science and technology that studies encryption and decryption transformations. Usually, people refer to understandable text as plaintext; the unintelligible text transformed from plaintext is called ciphertext. The process of converting plaintext into ciphertext is called encryption; the inverse process, that is, the process of converting ciphertext into plaintext is called decryption. This encryption or decryption transformation is controlled by a key. A cryptographic system used in an open environment should meet the following basic requirements: [0003] Confidentiality: ensure that information is not leaked to unauthorized users; [0004] Integrity: ensuring that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/32H04L29/06
CPCH04L9/0838H04L9/3247
Inventor 管海明
Owner 管海明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products