Method for obtaining safe information abstract in authentication header
A security message and authentication protocol technology, applied in the field of network security, can solve the problem of insufficient computation, and achieve the effect of improving efficiency and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] A method for obtaining a security message digest in an authentication protocol includes the following steps:
[0066] Step (1) Add a 1 and a number of 0s (at least 1 and at most 512) after the message to be processed, so that the length of the message becomes 448 after the remainder of 512;
[0067] Step (2) Add a 64-bit binary string after the newly obtained message. The value of the binary string is the original length of the message. At this time, the length of the message is a multiple of 512. Then the message is expanded and grouped to make the original 512-bit The packet becomes a 1024-bit packet, that is, adjacent 512-bit packets form a new 1024-bit packet.
[0068] In the SHA-1 algorithm, the length is less than 2 64 After the message is put together, it is divided into multiple 512-bit packets, one packet at a time. The algorithm first expands the original 512-bit or 16 32-bit words into 80 32-bit words according to certain rules, which is used to meet the requiremen...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com