public key encryption and decryption method of a finite field multiplication group with a Meisen prime number

A technology of public key encryption and Mersenne prime number, which is applied to the public key of secure communication, electrical components, transmission system, etc., and can solve the problem that the decryption private key cannot be obtained

Active Publication Date: 2019-05-14
江宝安
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If only the encryption algorithm and the public key are known, the decryption private key cannot be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • public key encryption and decryption method of a finite field multiplication group with a Meisen prime number
  • public key encryption and decryption method of a finite field multiplication group with a Meisen prime number
  • public key encryption and decryption method of a finite field multiplication group with a Meisen prime number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Take p=5, primitive irreducible polynomial ,

[0016] array form .

[0017] random selection .

[0018] ;

[0019] in the same way

[0020]

[0021]

[0022]

[0023] Pick .

[0024] random private key .

[0025] but

[0026] .

[0027] Pick

[0028]

[0029] random pick .

[0030]

[0031]

[0032]

[0033]

[0034] Pick

[0035]

[0036] take plaintext

[0037] ,

[0038] encryption .

[0039] decrypt ,

[0040] ,

[0041]

[0042]

[0043] That is, d=m.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a public key encryption method based on a finite field (shown in the formula in the specification) multiplication group, in particular to a public key encryption method basedon the finite field ( shown in the formula in the specification) multiplication group. wherein p is a prime number, and the formula (1) is shown in the specification, and p is a prime number and is made to be a Mesene number. Finite field isomorphism and polynomial field (img field RE-482803DEST _ PATH _ IMAGE001. TIF) isomorphism and polynomial field (img field RE-637709DEST _ PATH _ IM wherein the structural formula of the polynomial is as shown in the specification, the structural formula of the polynomial is as shown in the specification, and the structural formula of the polynomial is asshown in the specification, wherein the structural formula of the polynomial is as shown in the specification, and the structural formula of the polynomial is as shown in the specification. In the Finite field multiplication group wherein the order of the formula (I) is shown in the specification, the order of the formula (I) is shown in the specification, and the order of the formula (I) is shownin the specification. The order of the formula (II) is shown in the specification. Therefore, the order of the element a of any non-unit element is shown in the specification, wherein the order of the element a of any non-unit element is shown in the specification; the order of the element b of any non-unit element is shown in the specification; The invention discloses a public key cryptosystem.the receiver B discloses a random element a; the primitive polynomial q is used as a system parameter; the k1 is seen as a private key by the random number; A public key g (shown in the specification)is disclosed. An encryption party A generates a random number k2, and the random number k2 is smaller than or equal to 1 and smaller than or equal to 1. carrying out a modular exponentiation operation (shown in the formula in the specification), carrying out a modular exponentiation operation (shown in the formula in the specification), and carrying out a modular exponentiation operation (shown in the formula in the specification), carrying out modular multiplication on the encrypted plaintext m (shown in the formula in the specification), and carrying out modular multiplication on the encrypted plaintext m, The method comprises the following steps that: a decryption party receives a ciphertext, generates a ciphertext according to the ciphertext, and generates the ciphertext according tothe ciphertext. The decryption party receives the ciphertext and generates the ciphertext according to the ciphertext. and decrypting by using the private key k1 to obtain a plaintext m. The method disclosed by the invention can be applied to the aspects of symmetric passwords, public key passwords, digital signatures and the like. The method disclosed by the invention can be applied to the fieldsof the symmetric passwords, the public key passwords, the digital signatures and the like.

Description

technical field [0001] The technology of the present invention about public key encryption and decryption is a public key encryption and decryption method using a finite field multiplicative group whose order is a Mersenne prime number. Background technique [0002] Throughout the history of cryptography, the key exchange or DH key exchange method invented by Whitfield Diffie and Martin Hellman in 1976 laid the foundation of the public key cryptosystem, and its proposal is considered a milestone in cryptography. The characteristic of public key cryptography is that two keys are used in its encryption and decryption algorithm, one is the private key for decryption; the other is the public key for encryption. Public and private keys are different but related. If only the encryption algorithm and the public key are known, the private key for decryption cannot be obtained. [0003] The basic steps of the public key encryption and decryption system are as follows. [0004] The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L29/06
Inventor 江宝安
Owner 江宝安
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products