Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Light message abstract extraction method based on new problem

A technology of message summary and extraction method, which is applied in the field of lightweight message summary extraction based on new problems, and can solve problems such as inability to use and restrictions on usage occasions

Inactive Publication Date: 2012-03-28
苏盛辉 +2
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What is even more worrying is that with the emergence of lightweight digital signature technology, their use occasions have become more and more restricted, and even cannot be used at all.
For example, when the modulus length of a lightweight digital signature scheme is 80 bits, the above message digest extraction method cannot be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Light message abstract extraction method based on new problem
  • Light message abstract extraction method based on new problem
  • Light message abstract extraction method based on new problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The lightweight message digest extraction method based on the non-normative sub-set problem includes two parts, and its characteristic is that it can generate a public initial value, and no intermediate value can be deduced from the initial value, so that the initial value is helpful Due to the strong collision-free nature of message digests. More importantly, the length of the summary output by this method is very short, but at the same time it meets the security requirements.

[0098]Each user can obtain an initial value from the designated CA certificate center. The CA certificate center is an organization that registers and manages users, and generates and distributes initial values. It utilizes an initial value generation method to output a non-mutual prime sequence for message digest extraction.

[0099] This message digest extraction method can be implemented with logic circuit chips or programming languages, and it consists of two parts: ① Develop an initial v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a light message abstract extraction method based on a new problem and belongs to the technical fields of passwords and computers. The light message abstract extraction method comprises two parts, namely initial value generation and message abstract extraction, wherein by the initial value generation part, a third-party authority mechanism generates a public non-reciprocal element sequence; by the message abstract extraction part, a digital signer and an identity checking party extract an abstract of a message, namely a digital fingerprint; and the length of the message is not more than 4096 bits; and the length of the abstract is not more than 160 bits, and the method is unidirectional, free of weak collision and desired to be free of strong collision. The method has the characteristics of short abstract, high security, high calculation speed, public technology and the like; and the method can be used for digital signing and identity checking as well as electronic finance, electronic commerce and electronic government affairs.

Description

(1) Technical field [0001] The message digest extraction method (also known as one-way hash algorithm or hash algorithm, abbreviated as Hash) belongs to the field of cryptography and computer technology, and is the core technology of digital signature, identity authentication, electronic financial security, e-commerce security, and electronic government affairs security. one. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. [0003] Public key cryptography includes encryption and digital signature. Commonly used digital signature schemes include RSA, E1Gamal, and ECC. ECC is a fast analog implementation of the E1Gamal scheme on elliptic curves. [0004] When digitally signing a message, in order to improve the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 苏盛辉吕述望蔡吉人
Owner 苏盛辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products