Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption method, data decryption method and nodes

A data encryption and data decryption technology, applied in the field of elliptic curve cryptography, can solve the problems of consuming large computing resources and a large amount of computing

Inactive Publication Date: 2014-07-16
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing elliptic curve public-key cryptosystem, it is necessary to perform point-multiply calculation on the elliptic curve, and the inversion operation in the point-multiply calculation requires a very large amount of calculation, which will consume a lot of computing resources. The hardware of the node equipment of the cryptographic system has very high requirements, which limits the application of the elliptic curve public key cryptosystem on some node terminals with limited functions (such as wireless sensor nodes)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data decryption method and nodes
  • Data encryption method, data decryption method and nodes
  • Data encryption method, data decryption method and nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0114] The present invention aims at the shortage of large amount of encryption and decryption calculations in the existing elliptic curve public key cryptosystem, by converting the coordinate system of the elliptic curve, the doubling operation of the elliptic curve is converted to the projected coordinate system, which reduces the signature authentication. The computational complexity of the algorithm expands the scope of application of the elliptic curve public key cryptosystem. The present invention will be further described through specific embodiments below in conjunction with the accompanying drawings.

[0115] An embodiment of the present invention provides a data encryption method based on an elliptic curve public key cryptosystem. Please refer to figure 1 The data encryption method described in the embodiment of the present invention specifically includes the following steps:

[0116] In step 11, the sending node obtains a preset parameter group of the elliptic cur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data encryption method, a data decryption method, a transmitting node and a receiving node, wherein said data encryption method includes : the transmitting node acquires the pre-set parameter group, key and data information of an elliptic curve; the transmitting node calculates and obtains the data encryption information according to the parameter group, key and data information of the elliptic curve, and sends said data encryption information to the receiving node; wherein, the elliptic curve is converted into an equation under a projection coordinate system when calculating the data encryption information, and the multiplying point operation on the elliptic curve is converted into calculation under the projection coordinate system according to the correspondence between the affine point of the elliptic curve and the projection point on the equation. The present invention may reduce the operation quantity for data encryption and data decryption of the elliptic curve public key password system and may enable the elliptic curve public key password system to be applied to a wireless sensing node of a wireless sensing network.

Description

technical field [0001] The invention relates to the technical field of Elliptic Curve Cryptography (ECC, Elliptic Curve Cryptography), in particular to a data encryption and data decryption method, a sending node and a receiving node based on an elliptic curve public key cryptosystem. Background technique [0002] Cryptosystems can generally be divided into two types: symmetric cryptosystems and public key cryptosystems. Among them, the public key cryptography system was independently proposed by Diffie-Hellman and Merkle. The first paper on public key cryptography, multiuser cryptographic techniques, was submitted to the National Computer Conference in the United States in June 1976. Now more commonly used public key cryptosystems include RSA public key cryptosystem, elliptic curve cryptosystem and so on. Among the existing public key cryptosystems, the elliptic curve cryptosystem is the one with the highest level of encryption per bit among the currently known public key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
CPCH04L2209/80H04W84/18H04L9/3066H04W12/02H04W12/03
Inventor 张震玮王景成何军骆舰张弥赵广磊
Owner ZTE CORP