Safety processing method and apparatus

A security processing and security technology, applied in the field of password verification, can solve the problems of occupying security processing system resources and low efficiency, and achieve the effect of reducing system resources, improving efficiency, and efficient security processing process

Active Publication Date: 2011-09-28
UNITEND TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the value of the parameter p in this algorithm is randomly selected, only the division operation can be used when performing the modulo operation on the parameter p in the subsequent processing, which obviously takes up the resources of the security processing system, and no matter in software or hardware The implementation efficiency is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety processing method and apparatus
  • Safety processing method and apparatus
  • Safety processing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0025] The method provided by the present invention mainly includes: determining in the finite field of the elliptic curve that satisfies The prime number of is used as the value of the parameter p; among them, h is the number of processing digits of the security processing system, hm meets the requirement of encryption digits of the security system, m>n, and both m and n are integers, a k ∈{-1, 0, 1}; use the determined parameter p to determine other elliptic curve parameters, and use the determined elliptic curve parameters to perform data security processing.

[0026] Describe above-mentioned method in detail below in conjunction with specific embodiment, figure 1 The method flowchart provided for the embodiment of the present invention, such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for safe processing and a device, wherein, the method comprises the steps: A. in the limited area of an elliptical curve, a prime number which meets a polynomial as the formula is determined as a parameter p, wherein, h is the processing digit of a safe processing system, hm meets the encryption digit requirement of safe processing, m is more than n, simultaneously, m, n, and k are all integral numbers, ak belongs to the set comprising -1, 0, and 1; B. the parameters of a and b in the elliptical curve y<2> = x<3>+ax+bmod p are determined by the determined parameter p; and C. data safe processing is carried out by utilizing the determined elliptical curve. By adopting the method and the device provided by the invention, the elliptical curve meeting the requirements of encryption digit and safety can be obtained, the efficiency is improved, the occupied system resource is reduced, and the safe processing based on the elliptical curve parameters can be more effective.

Description

technical field [0001] The invention relates to network security technology, in particular to a password verification method and device. Background technique [0002] With the continuous development of network technology, how to improve network security has become more and more concerned, and various key algorithms have emerged as the times require. The key algorithm is mainly divided into: symmetric algorithm (symmetric algorithm) and public-key algorithm (public-key algorithm). Among the public-key algorithms, the algorithm based on elliptic curve parameters with high security is widely used at present. That is, security processing methods such as encryption and decryption, and digital signature verification are all based on elliptic curves. The selection of elliptic curve parameters in this algorithm is very important to ensure the security and efficiency of cryptographic verification processing. [0003] The form of the elliptic curve over a finite field used in the alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 王兴军陈晨雷大明闫峰冰胡坚珉梅红兵
Owner UNITEND TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products