Unlock instant, AI-driven research and patent intelligence for your innovation.

Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm

An encryption algorithm and public key technology, applied in the public key of secure communication, user identity/authority verification, etc., can solve the problems of lack of universality and interoperability, inability to call automatically, and no specified type of data structure, etc.

Active Publication Date: 2013-10-16
WUHAN UNIV OF TECH +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although the current standard interfaces of cryptographic modules, such as CryptoSPI and PKCS#11, can support these newly proposed and used public key encryption algorithms through expansion in principle, there is still a problem with how to provide the cryptographic calling functions of these new algorithms through related interfaces. No specific and clear regulations have been given. Therefore, each developer can develop and implement relevant cryptographic functions in his own way, so that the support of relevant cryptographic modules for relevant encryption algorithms lacks versatility and interoperability; At the same time, related operating systems, such as Windows, do not provide corresponding support for how to use these recent public key encryption algorithms, such as the widely used Windows operating systems (including Windows XP, Windows 2003, etc.) , the CSP type of IBE and the corresponding data structure; finally, due to the above two reasons and the reasons of the application software itself (such as an old application that does not know the latest public key encryption algorithm), the current existing or newly developed applications The software cannot and cannot call the cryptographic functions of recent public key encryption algorithms such as ECC and IBE through the standard cryptographic interface. If an application software wants to use the ECC and IBE encryption algorithms, the developer must develop a special (non-standard) cryptographic module , and the relevant application software makes special and specific calls
As a result, many standard applications, such as Outlook, cannot automatically invoke these new public key encryption algorithms through standard password application programming interfaces and corresponding settings.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings.

[0026] Such as figure 1 As shown, the data encryption system based on the present invention is made up of following several parts:

[0027] Cryptographic module, a software or software or hardware module that implements a standard cryptographic module interface (such as CryptoSPI, PKCS#11) that supports RSA encryption algorithm function calls, it provides cryptographic function calls for recent public key encryption algorithms, and its functions include recent Key operations of public-key encryption algorithms, such as generation, export, import, and deletion, and encryption operations based on recent public-key encryption algorithms, such as data encryption, decryption, digital signature, signature verification, etc.

[0028] IBE key server (Key Server), only needs this key server when described cryptographic module provides IBE encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a pseudo-Rivest, Shamir and Adleman (RSA)-key-based application method for a recent public key cryptography algorithm. A data encryption system based on the method consists of a cryptographic module, an identity based encryption (IBE) key server, a pseudo RSA digital certificate signing and issuing tool or system and cryptography application software, wherein the cryptographic module realizes a standard cryptographic module interface supporting an RSA algorithm function, and embeds a key of the recent public key cryptography algorithm into the data structure of a corresponding RSA key to form a pseudo RSA key; the pseudo RSA digital certificate signing and issuing tool or system generates a pseudo RSA digital certificate for the application software to use based on the pseudo RSA key; and the cryptographic module automatically converts the cryptographic calling of the cryptography application software for the pseudo RSA key into the cryptographic calling for a corresponding recent public key cryptography algorithm and a corresponding key. By the method, the technical problems of the recent public key cryptography algorithm about specific application and realization are solved.

Description

technical field [0001] The present invention belongs to the technical field of encryption, and is a pseudo-based encryption algorithm that solves the technical problem that the recent public key encryption algorithm (that is, the newly proposed and used public key encryption algorithm) cannot be effectively applied through the standard cryptographic interface in practical applications. The application realization method of the new public key encryption algorithm of RSA key. Background technique [0002] Public Key Cryptography (Public Key Cryptography), also known as Asymmetric Key Cryptography (Asymmetric Key Cryptography), involves a pair of interrelated keys (called a public key pair), one of which can be made public, called the public key (Public Key), used for data encryption and verification of digital signatures; the other private key (Private Key), which is owned and saved by a specific entity, is used for decryption of encrypted data and digital signatures. There a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 龙毅宏唐志红
Owner WUHAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More