A communication data encryption and decryption method based on bss, rsa, and sha‑1 encryption algorithms
An encryption algorithm and communication data technology, which is applied in the direction of public keys for secure communication, user identity/authority verification, etc., can solve the problems of deriving original data and differences in hash results, and achieve the effects of hazard prevention and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described below in conjunction with specific embodiments.
[0026] The details of the method for encrypting and decrypting communication data based on BSS, RSA, and SHA-1 encryption algorithms described in this embodiment are as follows:
[0027] 1) Obtain the data to be sent encrypted;
[0028] 2) Encrypt the data to be sent for the first time, that is, perform BSS encryption;
[0029] 3) Use the SHA-1 encryption algorithm to generate digest content for the data that has been encrypted for the first time;
[0030] 4) Use the RSA encryption public key provided by the receiving end to encrypt the data encrypted by BSS and the digest generated by the SHA-1 encryption algorithm;
[0031] 5) Send ciphertext;
[0032] 6) The receiving end receives the ciphertext and uses its own private key to decrypt the ciphertext for the first time;
[0033] 7) Perform identity authentication on the received data;
[0034] 8) Perform BSS decryption on the data afte...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

