Data encryption method, data decryption method and nodes

A data encryption and data decryption technology, which is applied in the field of elliptic curve cryptography, can solve problems such as large amount of calculation and large consumption of computing resources

Inactive Publication Date: 2010-12-29
ZTE CORP
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing elliptic curve public-key cryptosystem, it is necessary to perform point-multiply calculation on the elliptic curve, and the inversion operation in the point-multiply calculation requires a very large amount of calculation, which will consume a lot of computing resources. The hardware of the node equipment of the cryptographic system has very high requirements, which limits the application of the elliptic curve public key cryptosystem on some node terminals with limited functions (such as wireless sensor nodes)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data decryption method and nodes
  • Data encryption method, data decryption method and nodes
  • Data encryption method, data decryption method and nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] The present invention aims at the shortage of large amount of encryption and decryption calculations in the existing elliptic curve public key cryptosystem, by converting the coordinate system of the elliptic curve, the doubling operation of the elliptic curve is converted to the projected coordinate system, which reduces the signature authentication. The computational complexity of the algorithm expands the scope of application of the elliptic curve public key cryptosystem. The present invention will be further described through specific embodiments below in conjunction with the accompanying drawings.

[0115] An embodiment of the present invention provides a data encryption method based on an elliptic curve public key cryptosystem. Please refer to figure 1 The data encryption method described in the embodiment of the present invention specifically includes the following steps:

[0116] In step 11, the sending node obtains a preset parameter group of the elliptic cur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method, a data decryption method and nodes. The data encryption method comprises that: a transmitting node acquires a parameter group, a key and data information of a preset elliptic curve; and the transmitting node calculates data encryption information by using the parameter group, the key and the data information of the elliptic curve, and transmits the data encryption information to a receiving node, wherein in the process of calculating the data encryption information, the transmitting node converts the elliptic curve into an equation under a projection coordinate system, operates multiple points on the elliptic curve by using the corresponding relationship between an affine point on the elliptic curve and a projection point on the equation, and converts the multiple points under the projection coordinate system to perform operation. The method can reduce the operation amount of data encryption and decryption of an elliptic curve public key password system so that the elliptic curve public key password system can be applied in a wireless sensing node of a wireless sensing network.

Description

technical field [0001] The invention relates to the technical field of Elliptic Curve Cryptography (ECC, Elliptic Curve Cryptography), in particular to a data encryption and data decryption method, a sending node and a receiving node based on an elliptic curve public key cryptosystem. Background technique [0002] Cryptosystems can generally be divided into two types: symmetric cryptosystems and public key cryptosystems. Among them, the public key cryptography system was independently proposed by Diffie-Hellman and Merkle. The first paper on public key cryptography, multiuser cryptographic techniques, was submitted to the National Computer Conference in the United States in June 1976. Now more commonly used public key cryptosystems include RSA public key cryptosystem, elliptic curve cryptosystem and so on. Among the existing public key cryptosystems, the elliptic curve cryptosystem is the one with the highest level of encryption per bit among the currently known public key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L2209/80H04L9/3066H04W84/18H04W12/03
Inventor 何军张震玮张弥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products