Unlock instant, AI-driven research and patent intelligence for your innovation.

A communication data encryption and decryption method based on bss, rsa, and sha‑1 encryption algorithms

An encryption algorithm and communication data technology, which is applied in the direction of public keys for secure communication, user identity/authority verification, etc., can solve the problems of deriving original data and differences in hash results, and achieve the effects of hazard prevention and high security

Active Publication Date: 2017-02-08
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the hash algorithm of SHA-1 is irreversible and has a good avalanche effect, it is impossible to derive any original data from the hash result, and any change in the original data, even one bit, will cause a difference in the hash result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A communication data encryption and decryption method based on bss, rsa, and sha‑1 encryption algorithms
  • A communication data encryption and decryption method based on bss, rsa, and sha‑1 encryption algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with specific embodiments.

[0026] The details of the method for encrypting and decrypting communication data based on BSS, RSA, and SHA-1 encryption algorithms described in this embodiment are as follows:

[0027] 1) Obtain the data to be sent encrypted;

[0028] 2) Encrypt the data to be sent for the first time, that is, perform BSS encryption;

[0029] 3) Use the SHA-1 encryption algorithm to generate digest content for the data that has been encrypted for the first time;

[0030] 4) Use the RSA encryption public key provided by the receiving end to encrypt the data encrypted by BSS and the digest generated by the SHA-1 encryption algorithm;

[0031] 5) Send ciphertext;

[0032] 6) The receiving end receives the ciphertext and uses its own private key to decrypt the ciphertext for the first time;

[0033] 7) Perform identity authentication on the received data;

[0034] 8) Perform BSS decryption on the data afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication data encryption and decryption method based on BBS, RSA and an SHA-1 encryption algorithm. The communication data encryption and decryption method comprises the steps that 1) data to be encrypted and sent are generated; 2) the data to be sent are encrypted for the first time, that is, BBS encryption is carried out on the data to be sent; 3) the data encrypted for the first time generate abstract contents through the SHA-1 encryption algorithm; 4) the data encrypted through the SHA-1 and an abstract are encrypted through an RSA encryption public key provided by a receiving end; 5) cryptograph is sent; 6) the cryptograph is received by the receiving end and is decrypted for the first time through the private key of the receiving end; 7) identity authentication is carried out on the received data; 8) BSS decryption is carried out on the data after the identity authentication, and the content of the data is read. The different characteristics of the three encryption algorithms are utilized, messages to be sent are encrypted through the BBS, the SHA-1 and the RSA algorithm, the encrypted messages for communication are safer, digital signatures are achieved, and it is guaranteed that the received messages are initial messages sent by a sending end and are not tampered.

Description

Technical field [0001] The present invention relates to the technical field of the encryption and decryption process of data sent and received by a mobile terminal, in particular to a communication data encryption and decryption method based on BSS, RSA, and SHA-1 encryption algorithms. Background technique [0002] With the development of society, the functions of mobile terminals are becoming more and more powerful, and the services provided by various companies and enterprises are becoming more and more diverse, which greatly facilitates people's lives. However, with it comes the issue of information security. For example, people now use mobile terminals to transmit information such as account numbers and passwords, and many criminals will use malicious attacks and other means to intercept useful information from users for profit. The encryption process of the mobile terminal proposed by the present invention is based on the following three technologies. [0003] BSS encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 谢宗伯蔡琳琳冯久超
Owner SOUTH CHINA UNIV OF TECH