Digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on chaotic algorithm

A technology of digital copyright protection and chaotic algorithm, applied in the field of information security, it can solve the problems of troublesome keys, high calculation cost, factorization is not NPC, etc., and achieves the effect of good openness and high security.

Inactive Publication Date: 2012-05-02
厦门博鼎智文传媒科技有限公司
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, the major flaw of RSA is that it cannot theoretically grasp its secrecy performance, and most people in the field of cryptography tend to factorize is not an NPC problem
[0008] The disadvantages of RSA mainly include: 1) It is very troublesome to generate the key, and it is limited by the prime number generation technology, so it is difficult to achieve one-time encryption.
2) The b...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on chaotic algorithm
  • Digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on chaotic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] like figure 1 As shown, a digital copyright protection method based on the N-fold RSA encryption algorithm of the chaotic algorithm of the present invention specifically includes three main steps of private key generation, data encryption and data decryption:

[0046] Step 1. Generate private key parameters, and use this to generate public and private key pairs for encryption and decryption;

[0047] Step 11. First use the chaotic algorithm to randomly generate a random number whose lowest bit is an odd number, because a prime number must be an odd number. If it is an even number, it can be divisible by 2. Then, perform a composite number judgment test on the generated random number. If it passes the test, Then it is a composite number, otherwise when the test of the preset number of times is still not passed, then the random number is regarded as a prime number, and finally, three prime numbers p, q and r are randomly generated by a chaotic algorithm; Miller-Rabin is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital rights management method based on N RSA (Rivest Shamir Adleman) encryption algorithms based on a chaotic algorithm, comprising three steps of privet key generation, data encryption and data decryption. The method comprises the specific steps of: utilizing the chaotic algorithm as the RSA encryption algorithm to generate prime numbers and combining the generated prime numbers to form a public key and a privet key; and then utilizing the public key and the privet key to encrypt and decrypt contents of files. As the chaotic algorithm process provided by the invention has the characteristics of randomness, balance and stability, the generated prime numbers have good quality and fast speed and are uniformly distributed; the calculation of the prime numbers is operated in the class of the prime numbers and is convenient; the response speed of the calculation is fast and results are reliable and accurate; in the encryption process and the decryption process, the length of the privet key is long enough through encrypting and decrypting data of the privet key and the public key; meanwhile, the encryption speed of the data is faster, so that the encryption and the decryption are assured; and meanwhile, the privet key is not easy to crack, so that the practical applicability and the openness of the algorithm are greatly enhanced.

Description

technical field [0001] The invention belongs to information security technology, and relates to a digital copyright protection method based on an N-fold RSA encryption algorithm of a chaotic algorithm. Background technique [0002] Digital Rights Management (DRM) is to use a certain calculation method to realize the protection of digital content. Its specific applications can include the protection of digital content such as eBooks, videos, audios, pictures, and security documents. [0003] There are two main types of digital copyright protection methods, one is to use digital watermark technology, and the other is to use data encryption and anti-copy DRM technology as the core. [0004] Digital watermark (Digital Watermark) technology is to embed covert marks in digital content, which are usually invisible and can only be extracted by special detection tools. Digital watermarking can be used for the copyright protection of pictures, music and movies. Without compromising t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L9/00
Inventor 王炳兴
Owner 厦门博鼎智文传媒科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products