Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms

A technology of SHA-1 and encryption algorithm, which is applied to the public key of secure communication, user identity/authority verification, etc., can solve the problems of hash result difference, derivation of original data, etc., and achieve high security and prevent harm Effect

Active Publication Date: 2014-03-26
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the hash algorithm of SHA-1 is irreversible and has a good avalanche effect, it is impossible to derive any original data from the hash result, and any change in the original data, even one bit, will cause a difference in the hash result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
  • Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with specific examples.

[0026] The communication data encryption and decryption method based on DES, RSA, SHA-1 encryption algorithm described in the present embodiment, its specific situation is as follows:

[0027] 1) Obtain the data to be encrypted and sent;

[0028] 2) Encrypt the data to be sent for the first time, that is, perform group DES encryption;

[0029] 3) Use the SHA-1 encryption algorithm to generate summary content for the data that has been encrypted for the first time;

[0030] 4) Use the RSA encryption public key provided by the receiving end to encrypt the SHA-1 encrypted data and digest;

[0031] 5) Send ciphertext;

[0032] 6) The receiving end receives the ciphertext and uses its own private key to decrypt the ciphertext for the first time;

[0033] 7) Perform identity authentication on the received data;

[0034] 8) Perform DES decryption on the data that has completed t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm-) encryption algorithms. The communication data encryption and decryption method based on DES, RSA and SHA-1 encryption algorithms comprises the following steps: 1, generating data to be encrypted for sending; 2, encrypting the data to be sent for the first time, namely performing block DES encryption; 3, performing SHA-1 encryption algorithm to the data which has been encrypted for the first time to generate abstract content; 4, encrypting the data encrypted by SHA-1 and the abstract by a RSA encryption public key received by a receiving end; 5, sending cryptograph; 6, receiving the cryptograph by the receiving end and decrypting the cryptograph by an own private key for the first time; 7, authenticating the received data; 8, performing DES decryption to the data which has been authenticated, and reading the data content. The communication data encryption and decryption method based on DES, RSA and SHA-1 encryption algorithms utilizes different characteristics of the three encryption algorithms, and respectively encrypts a message to be sent by DES, RSA and SHA-1 encryption algorithms, so that the encrypted message for communication is much safer, and a digital signature is achieved for ensuring that the received message is the original message sent by a sending end without tampering.

Description

technical field [0001] The present invention relates to the technical field of the encryption and decryption process of sending and receiving data by a mobile terminal, in particular to a communication data encryption and decryption method based on DES, RSA, and SHA-1 encryption algorithms. Background technique [0002] With the development of society, the functions of mobile terminals are becoming more and more powerful, and the services provided by various companies and enterprises are also becoming more and more diverse, which greatly facilitates people's lives. However, it is accompanied by the issue of information security. For example, people now transmit information such as account passwords through mobile terminals, and many criminals will use malicious attacks and other means to intercept useful information of users for profit. The encryption process of the mobile terminal proposed by the present invention is based on the following three current technologies. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 谢宗伯蔡琳琳冯久超
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products