Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authenticated encryption method of public key and digital signature method

An authenticated encryption and public key technology, applied in the field of information security, can solve problems such as lack of secure encryption and encryption functions, MQ signature algorithm insecurity, etc.

Active Publication Date: 2010-09-15
常熟紫金知识产权服务有限公司
View PDF3 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Other MQ signature algorithms such as Square, TTM, etc. have also been proved to be insecure
In addition, currently all MQ public key ciphers can only be used for signatures, and do not have encryption functions for secure encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticated encryption method of public key and digital signature method
  • Authenticated encryption method of public key and digital signature method
  • Authenticated encryption method of public key and digital signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] This embodiment is the implementation process of the public key authentication and encryption method provided by the present invention, and the specific steps are as follows:

[0090] (I) System establishment: standard hash function H( ) selects SHA-1, finite field parameter k=8; specifies system parameters n=20, δ=17 and μ=6; randomly selects finite field GF(2 8 ) on 20-dimensional affine bijective transformation U, 26-dimensional affine bijective transformation T and 20-dimensional reversible multivariate quadratic nonlinear transformation F, where F is expressed as:

[0091] (t 1 ..., t 20 ) = F(z 1 …,z 20 )=(f 1 (z 1 ,…,z 20 ),..., f n (z 1 …,z 20 ))

[0092] Among them, f i is a quadratic polynomial function of 20 elements, the form is as follows:

[0093] f i ( z 1 , . . . , z ...

Embodiment 2

[0106] This embodiment is the implementation process of the digital signature method provided by the present invention, which specifically includes the following steps:

[0107] (I) System establishment: standard hash function H( ) selects SHA-1, finite field parameter k=8; specifies system parameters n=31, δ=10 and μ=-5; randomly selects finite field GF(2 8 ) on 31-dimensional affine bijective transformation U, 26-dimensional affine bijective transformation T and 31-dimensional reversible multivariate quadratic nonlinear transformation F, where F is expressed as:

[0108] (t 1 ..., t 31 ) = F(z 1 …,z 31 )=(f 1 (z 1 …,z 31 ),...,f n (z 1 …,z 31 ))

[0109] Among them, f i is a quadratic polynomial function with 31 elements, the form is as follows:

[0110] f i ( z 1 , . . . , z 31 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information safety and particularly discloses an authenticated encryption method of a public key and a digital signature method. The invention adopts a multivariable public key password system as a main body part, is combined with a Hash function authentication technology and provides double safety protection by efficiently compounding the multivariable public key password system and the Hash function authentication technology. When applying the scheme to carry out encryption or digital signature, the invention has the advantages of high realization efficiency, no need for a password algorithm coprocessor high safety, impact resistance of a quantum computer and the like and has more superiority in the safety field of intelligent cards, wireless sensing networks and the like compared with the traditional public key encryption algorithm such as RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curve Crypto) and the like. The methods can be widely applied to the field of information safety systems of network safety, electronic commerce, bill, identity authentication and the like.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a public key authentication and encryption method and a digital signature method. Background technique [0002] The development of quantum computers poses a great threat to traditional public key cryptosystems such as RSA. For this reason, public key cryptography with resistance to quantum computer attacks has received extensive attention. The public key cryptography proposed at present to resist Shor quantum algorithm attacks mainly includes NTRU, OTU2000, and multivariate quadratic polynomial (MQ) public key cryptography. types of systems. NTRU has registered patents in many countries, among which it was authorized by the China Intellectual Property Office in 2004. During the Tenth Five-Year Period, my country also carried out theoretical research on NTRU, but did not produce basic research results with independent intellectual property rights; OTU2000 The process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
Inventor 王后珍张焕国
Owner 常熟紫金知识产权服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products