Supercharge Your Innovation With Domain-Expert AI Agents!

Weak signature algorithm

An algorithm and hash algorithm technology, applied in electrical components, transmission systems, etc., can solve the problem of low success rate of digital signature communication, and achieve the effect of improving the success rate of communication and simplifying the public and private key signature algorithm.

Inactive Publication Date: 2015-12-23
JIANGXI NORMAL UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a weak signature algorithm, which solves the problem that financial institutions such as online banks generally use digital signatures for identity authentication, but in some cases where the transmission environment is limited, the communication success rate of digital signatures is low. As a result, users cannot conduct transactions on the Internet very well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak signature algorithm
  • Weak signature algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The beneficial effects of the present invention will be described in detail below in conjunction with the embodiments of the accompanying drawings, aiming at helping readers better understand the essence of the present invention, but not limiting the implementation and protection scope of the present invention.

[0019] refer to figure 1 , the concrete steps of the present invention are as follows:

[0020] 1. The server generates a 128-bit random number R, and performs a sha1 hash operation on R to obtain a 20-byte H;

[0021] 2. The server uses the RSA public key K1 of the client to encrypt R and H to generate ciphertext S. The encryption algorithm is the RSA algorithm, and the key length is 1024 bits;

[0022] 3. The server transmits the ciphertext S to the client;

[0023] 4. The client decrypts S with its own private key K2, decrypts R1 and H1, and calculates the sha1 hash operation value H2 of R1, and compares H1 and H2. If they are different, the ciphertext S i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a weak signature algorithm. The weak signature algorithm comprises the following steps that: a server generates a random number R and performs hash operation on the R to obtain H; the server encrypts the R and the H by using the public key K1 of a client to generate a ciphertext S; and the server transmits the ciphertext to the client. According to the weak signature algorithm, a public / private key signature algorithm is simplified; the server generates a random number and encrypts the random number by using the public key of the client before sending to the client; the client decrypts the random number and generates an abstract value from the random number together with a signature cleartext by using a hash algorithm, and the abstract value is taken as signature data; compared with direct signature with a private key, the abstract result generated by the hash algorithm is much shorter, and therefore, the communication success ratio of digital signature is greatly increased.

Description

technical field [0001] The invention relates to an Internet identity authentication, in particular to a weak signature algorithm. Background technique [0002] With the continuous development of e-commerce in our country, more and more people conduct transactions on the Internet. Existing financial institutions such as online banks generally use digital signatures for identity authentication. However, in some cases where the transmission environment is limited, digital signatures The communication success rate is low, which makes it difficult for users to conduct transactions on the Internet. Contents of the invention [0003] The purpose of the present invention is to provide a weak signature algorithm, which solves the problem that financial institutions such as online banks generally use digital signatures for identity authentication, but in some cases where the transmission environment is limited, the communication success rate of digital signatures is low. As a resul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 李小云
Owner JIANGXI NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More