Public key encryption and decryption method and digital signature method thereof

An encryption and decryption, public key technology, applied in the field of information security, can solve problems such as inability to resist linearization equation attacks and differential attacks

Inactive Publication Date: 2009-09-23
CHANGSHU NANJING NORMAL UNIV DEV RES INST
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the Matsumoto-Imai cryptosystem has the flaw that it c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key encryption and decryption method and digital signature method thereof
  • Public key encryption and decryption method and digital signature method thereof
  • Public key encryption and decryption method and digital signature method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] (I) Establish the system: first use the basic domain F 2 = {0, 1} to construct small and large fields: small field F 8 =F 2 [X] / (X 3 +X+1), big field F 8 3 = F 8 [ X ] / ( X 3 + X + 1 ) , Then define F 8 3 arrive a bijection of ∀ w = ( w 0 , w 1 , w 2 ) ∈ F 8 3 , So it is possible to pass the bijection small field F 8 He Dayu Element conversion between.

[0080] The reversi...

Embodiment 2

[0101] Example 2 gives a security of at least 2 80 An efficient signature scheme for :

[0102] System parameters: select parameters k=5, n=37, θ=7, r=16, select SHA-1 for the Hash function, and the output length of SHA-1 is 160 bits. So q=2 k = 32, construct the middle domain F 32 He Dayu f 32 =F 2 [x] / (x 5 +x 2 +1), F 32 37 = F 32 [ x ] / ( x 37 + x 12 + x 10 + x 2 + 1 ) . Then generate an 80-bit random seed Seed and in the middle field F 32 Randomly generate two affine bijective U, T, then the system private key is {T -1 , U -1 , Seed}...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a technical proposal of a public key encryption and decryption method and belongs to a multivariate public key cryptographic system. The encryption is provided by triple combination of reversible linear transformation, reversible nonlinear transformation and reversible linear transformation, and only two reversible linear transformations are necessary to be mastered as a private key at decryption. The method is a substantial improvement of a Matsumoto-Imai cryptographic system, and the new proposal can help effectively resist attack methods such as differential attack, linearization attack and the like. The method also follows the advantages of high efficiency, no cryptographic processor, and being especially suitable for smart cards and the like of the multivariate public key cryptographic system. The advantages of the multivariate public key cryptographic system, particularly resistance of attacks by a quantum computer, can not be compared by those of the traditional public key cryptographic system. Once the quantum computer is practically used, the proposal can be used for replacing the traditional public key cryptographies such as RSA, ECC, ELGamal and the like. The invention further provides a safe and efficient digital signature method based on the public key encryption and decryption method.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a public key encryption and decryption method and a corresponding digital signature method. Background technique [0002] The development of quantum computers poses a great threat to traditional public key cryptosystems (such as RSA, ElGamal, etc.). For this reason, public-key cryptography that is resistant to quantum computer attacks has received extensive attention. How to design a public-key cryptography system that can resist quantum computer attacks is an important problem to be solved in the field of information security technology. The public key cryptography currently proposed to resist Shor quantum algorithm attacks mainly includes three types of public key cryptography systems: NTRU, OTU2000 and multivariate quadratic polynomial (MQ for short). NTRU has registered patents in many countries. During the Tenth Five-Year Period, my country also car...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32
Inventor 王后珍张焕国
Owner CHANGSHU NANJING NORMAL UNIV DEV RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products