Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data Encryption Method Based on Double Difficulty

A data encryption and encryption algorithm technology, applied in key distribution, can solve the problems of slow encryption and decryption speed, and achieve the effect of ensuring correctness and integrity, good security and practical application value

Active Publication Date: 2018-04-20
ZHEJIANG GONGSHANG UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this technology is that it is safer than symmetric encryption technology, but the disadvantage is that the encryption and decryption speed is slower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data Encryption Method Based on Double Difficulty
  • Data Encryption Method Based on Double Difficulty
  • Data Encryption Method Based on Double Difficulty

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Below with reference to accompanying drawing, further illustrate the present invention.

[0043] The data encryption method based on double difficulty of the present invention, comprises the steps:

[0044] Step 1, initialization; first select a security parameter L, and input the L-bit parameter into the generating function F(·) generating function F(1 L ) to generate Enc and Dec two algorithms, which are the encryption algorithm and the decryption algorithm respectively, and the parameters used are generated in the following way:

[0045]Step11 Let n be a Williams integer, n=p×q, where p=3 mod 8, q=7 mod 8, and p=2p'+1, q=2q'+1, the length is Among them, p, q, p' and q' are all large prime numbers, and |n|=k represents the bit length of n;

[0046] Step12 Let G= be the multiplicative group The largest cyclic subgroup, g is the generator of the cyclic subgroup, the rank λ(n)=lcm(p-1,q-1)=2p'q' of G is the Carmichael's function, is defined as follows;

[0047] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a verifiable public key encryption method. The encryption method includes steps: initialization, encryption, and decryption. In terms of security, the method has a mathematics hypothesis with dual difficulties referring to factorization and Diffie-Hellman problem. In other words, an attacker has to simultaneously solve the mathematical problem of the two calculations if he wants to crack the encryption method. The encryption method is designed by partly employing the concept of the trapdoor one-way function, the method has semantic security and can resist chosen plaintext attack and chosen ciphertext attack, and good practical values are provided.

Description

technical field [0001] The invention relates to the technical field of data encryption protection, in particular to a verifiable encryption method based on double difficulties. It is especially suitable for real-time encryption of data during mobile payment transactions. technical background [0002] The security problem of mobile payment is a fatal problem faced by mobile e-commerce. The mobile payment process contains sensitive data such as information sent by mobile users to merchants and passwords sent by mobile users to banks. These data are related to the vital interests of users. , requiring higher confidentiality. However, there are many insecure factors in the mobile network, such as some people will use fake information or monitor personal information, so we need to establish a security mechanism to protect our secret information, and this mechanism is called cryptography technology, which mainly allows data to be stored on the network When uploading, it can ensu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 刘东升郭飞鹏
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products