Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm

A technology of SHA-1 and encryption algorithm, which is applied to the public key of secure communication, user identity/authority verification, etc. It can solve the problems of deriving original data and differences in hash results, and achieve harm prevention and high security. Effect

Active Publication Date: 2014-04-16
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the hash algorithm of SHA-1 is irreversible and has a good avalanche effect, it is impossible to derive any original data from the hash result, and any change in the original data, even one bit, will cause a difference in the hash result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
  • Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with specific examples.

[0026] The communication data encryption and decryption method based on BSS, RSA, SHA-1 encryption algorithm described in the present embodiment, its specific situation is as follows:

[0027] 1) Obtain the data to be encrypted and sent;

[0028] 2) Encrypt the data to be sent for the first time, that is, BSS encryption;

[0029] 3) Use the SHA-1 encryption algorithm to generate summary content for the data that has been encrypted for the first time;

[0030] 4) Use the RSA encryption public key provided by the receiving end to encrypt the SHA-1 encrypted data and digest;

[0031] 5) Send ciphertext;

[0032] 6) The receiving end receives the ciphertext and uses its own private key to decrypt the ciphertext for the first time;

[0033] 7) Perform identity authentication on the received data;

[0034] 8) BSS decrypts the data that has completed identity authentication, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication data encryption and decryption method based on BBS, RSA and an SHA-1 encryption algorithm. The communication data encryption and decryption method comprises the steps that 1) data to be encrypted and sent are generated; 2) the data to be sent are encrypted for the first time, that is, BBS encryption is carried out on the data to be sent; 3) the data encrypted for the first time generate abstract contents through the SHA-1 encryption algorithm; 4) the data encrypted through the SHA-1 and an abstract are encrypted through an RSA encryption public key provided by a receiving end; 5) cryptograph is sent; 6) the cryptograph is received by the receiving end and is decrypted for the first time through the private key of the receiving end; 7) identity authentication is carried out on the received data; 8) BSS decryption is carried out on the data after the identity authentication, and the content of the data is read. The different characteristics of the three encryption algorithms are utilized, messages to be sent are encrypted through the BBS, the SHA-1 and the RSA algorithm, the encrypted messages for communication are safer, digital signatures are achieved, and it is guaranteed that the received messages are initial messages sent by a sending end and are not tampered.

Description

technical field [0001] The present invention relates to the technical field of the encryption and decryption process of sending and receiving data by a mobile terminal, in particular to a communication data encryption and decryption method based on BSS, RSA, and SHA-1 encryption algorithms. Background technique [0002] With the development of society, the functions of mobile terminals are becoming more and more powerful, and the services provided by various companies and enterprises are also becoming more and more diverse, which greatly facilitates people's lives. However, it is accompanied by the issue of information security. For example, people now transmit information such as account passwords through mobile terminals, and many criminals will use malicious attacks and other means to intercept useful information of users for profit. The encryption process of the mobile terminal proposed by the present invention is based on the following three technologies. [0003] BSS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 谢宗伯蔡琳琳冯久超
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products