Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method of Building Anti-Attack Public Key Cryptography

A public key cryptography, anti-attack technology, applied in the field of information security, can solve the problems of public key cryptography identity verification data security hidden dangers and other problems

Inactive Publication Date: 2016-08-10
深圳市鹏鉴科技开发企业
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the hidden dangers of identity verification and data protection based on existing public key cryptography, the purpose of the present invention is to establish a public key cryptography technology that can resist various known attacks, and on this basis give application protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Building Anti-Attack Public Key Cryptography
  • A Method of Building Anti-Attack Public Key Cryptography
  • A Method of Building Anti-Attack Public Key Cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following describes in further detail a public key cryptographic protocol that is resistant to quantum computing attacks according to the present invention with reference to embodiments.

[0061] 1. Establish a platform for public key cryptographic protocol

[0062] The platform for establishing all public key cryptographic protocols is an infinite non-abelian group G and two subgroups A and B of G, so that for any a∈A and any b∈B, the equation ab=ba holds. In addition, due to the needs of encoding and key generation, G must also meet the following conditions:

[0063] 1) The characters representing the elements of G on the generator set of G have a calculable normal form;

[0064] 2) G is at least exponential growth (exponential growth), that is, the number of elements in G whose word length is a positive integer n is bounded by an exponential function about n;

[0065] 3) The product operation and inversion operation based on the normal form of the group are feasible and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of information security, and discloses a method for establishing an anti-attack public key cipher, including a method for generating a shared key, and the method for generating a shared key includes the following steps: (11) establishing an infinite non-exchange group G; (12) Both parties to the agreement select two elements of G as the private key; (13) The second party of the agreement calculates y, and sends y to the first party of the agreement; (14) The first party of the agreement calculates x and z, and Send (x, z) to the second party of the agreement; (15) The second party of the agreement calculates w and v, and sends (w, v) to the first party of the agreement; (16) The first party of the agreement calculates u, and Send u to the second party of the agreement; (17) The first party of the agreement calculates KA, and the second party of the agreement calculates KB; thus a shared key K=KA=KB is reached. The security guarantee of the public key cryptographic algorithm constructed by the present invention depends on the unsolvability of the problem, and has the advantage of resisting quantum computing attacks.

Description

Technical field [0001] The present invention relates to the field of information security, in particular to a cryptographic technique for establishing public key cryptography against quantum computing attacks. Background technique [0002] The verification of the true identity of the sender and receiver of the information, the non-repudiation of the sent / received information after the fact, and the protection of the integrity of the data are two important issues in modern cryptography. [0003] The public-key cryptosystem has provided excellent answers to these two problems, and many new ideas and solutions are continuing to be produced. In the public key system, the encryption key is different from the decryption key. People make the encryption key public and anyone can use it; and the decryption key is only known to the decryptor. The security of modern public key cryptosystems is almost based on two types of mathematical problems that are currently considered difficult to calc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/002H04L9/0844H04L9/3013H04L9/3271H04L9/0852H04L9/3247
Inventor 王晓锋王威鉴林汉玲王晓阳
Owner 深圳市鹏鉴科技开发企业