Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm
An encryption algorithm and public key technology, applied in the public key of secure communication, user identity/authority verification, etc., can solve the problems of lack of universality and interoperability, inability to call automatically, and no specified type of data structure, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings.
[0026] Such as figure 1 As shown, the data encryption system based on the present invention is made up of following several parts:
[0027] Cryptographic module, a software or software or hardware module that implements a standard cryptographic module interface (such as CryptoSPI, PKCS#11) that supports RSA encryption algorithm function calls, it provides cryptographic function calls for recent public key encryption algorithms, and its functions include recent Key operations of public-key encryption algorithms, such as generation, export, import, and deletion, and encryption operations based on recent public-key encryption algorithms, such as data encryption, decryption, digital signature, signature verification, etc.
[0028] IBE key server (Key Server), only needs this key server when described cryptographic module provides IBE encrypt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 