Method for establishing anti-attack public key cryptogram

A public key cryptography, anti-attack technology, applied in the field of information security, can solve problems such as hidden dangers in the security of public key cryptography identity verification data protection

Inactive Publication Date: 2013-11-27
深圳市鹏鉴科技开发企业
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the hidden dangers of identity verification and data protection based on existing public key cryptography, the purpose of the present invention is to establish a public key cryptography technology that can resist various known attacks, and on this basis give application protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing anti-attack public key cryptogram
  • Method for establishing anti-attack public key cryptogram
  • Method for establishing anti-attack public key cryptogram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] A public key cryptographic protocol against quantum computing attacks of the present invention will be further described in detail below in conjunction with embodiments.

[0061] 1. Establish a platform for public key cryptographic protocols

[0062] The platform for establishing all public-key cryptographic protocols is an infinite non-abelian group G and two subgroups A and B of G, so that for any a∈A and any b∈B, the equation ab=ba holds. In addition, due to the needs of encoding and key generation, G must also meet the following conditions:

[0063] 1) A word representing an element of G on the generator set of G has a computable normal form;

[0064] 2) G is at least exponential growth (exponential growth), that is, the number of elements in G whose word length is a positive integer n is bounded by an exponential function about n;

[0065] 3) The product operation and inversion operation based on the normal form of the group are feasible and computable.

[0066] F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information safety, and discloses a method for establishing an anti-attack public key cryptogram. The method includes a shared key generating method. The shared key generating method includes the following steps that (11) an infinite non-communicative group G is established; (12) both parties in an agreement select two elements of the G as private keys; (13) the party B in the agreement calculates y and sends the y to the party A in the agreement; (14) the party A in the agreement calculates x and z and sends (x, z) to the party B in the agreement; (15) the party B in the agreement calculates w and v and sends the (w, v) to the party A in the agreement; (16) the party A in the agreement calculates u and sends the u to the party B in the agreement; (17) the party A in the agreement calculates KA, and the party B in the agreement calculates KB; therefore, the shared key K=KA=KB is formed. Safety assurance of the established public key cryptographic algorithm depends on unsolvability of a problem, and therefore the method has the advantage of being resistant to quantum computing attack.

Description

technical field [0001] The invention relates to the field of information security, in particular to a cryptographic technology for establishing a public key cryptography resistant to quantum computing attacks. Background technique [0002] The verification of the real identity of the information sender and receiver, the non-repudiation of the sent / received information after the event, and the guarantee of data integrity are two important issues in the subject of modern cryptography. [0003] The public key cryptosystem has provided excellent answers to these two problems, and is continuing to produce many new ideas and schemes. In a public key system, the encryption key is different from the decryption key. People make the encryption key public, and anyone can use it; and the decryption key is only known to the decryptor himself. The security of modern public-key cryptosystems is almost always based on two types of mathematical problems that are currently considered to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/002H04L9/0844H04L9/3013H04L9/3271H04L9/0852H04L9/3247
Inventor 王晓锋王威鉴林汉玲王晓阳
Owner 深圳市鹏鉴科技开发企业
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products