Unlock instant, AI-driven research and patent intelligence for your innovation.

Key transmission and di gital signature method

A digital signature and key technology, applied in the field of cryptography, can solve the problems of slow encryption and decryption, large amount of calculation, long key, etc., to achieve the effect of easy hardware implementation, small calculation amount and simple structure

Inactive Publication Date: 2003-01-22
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, based on the signature, the sender cannot deny
[0004] Among the existing cryptographic systems, the RSA system is a mature public key cryptosystem, and its security is based on Euler's theorem in number theory and the following assertion in computational complexity theory: finding the product of two large prime numbers is easy However, it is very difficult to decompose the product of two large prime numbers and find their prime factors
Using the RSA system can solve the problem of key transfer and digital signature in communication, but this system has a relatively large amount of computation, a relatively long key, slow encryption and decryption speeds, and high requirements for the hardware to implement this method. Therefore, in practical applications There are certain limitations in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The content of the present invention will be described in detail below.

[0031] First select a function f, such as MD5 transformation or SHA-1 transformation.

[0032] The function y=f(a, b, c, d) is an open one-way hash function, which satisfies: If the definition of the ensemble Id={(y, a, b, c)|y=f(a, b, c, d), a∈Z, b∈Z, c∈Z} Then when d is unknown, f is known, and any subset Qd of Id is known, d is difficult to solve, and the complement set of Qd Any one element is also difficult to solve.

[0033] The characteristic of the above function is that when d is unknown, no matter how many sets of data y, a, b, c are known, and each set of data satisfies the equation y=f(a, b, c, d), but in the unknown Among y, a, b, c, it is known that any three of them cannot solve the fourth number. Key transfer and digital signature are realized by using this feature of the function. The function with this feature is not unique, and the amount of calculation is very small when im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key transmission and digital signature method is disclosed. The key transmission method includes selecting a function f, creating a black box for each of both parties of communication, selecting a data R by transmitting party A, inputting R and the black box numbe of receiving party B to the black box of transmitting party, and outputting Y from the black box to obtain the key Y. The digital signature method features that A inputs data R and own black box number to own black box and the black box outputs Y that is the digital signature to data R. Its advantages are simple structure of cipher system, less operations and short key.

Description

technical field [0001] The invention relates to a key transfer and digital signature method, which belongs to the technical field of encryption. Background technique [0002] In data communication, it is often necessary to meet the following security requirements: ① Make it impossible for others except the sender and receiver to know the content of the communication; ② The content of the communication is not easily tampered with; ③ The receiver can be sure that the sender is not fake, The sender cannot deny what he sent. This is what is commonly referred to as key delivery and digital signatures in current cryptography. [0003] The original text to be sent by the sender is called plain text, and the plain text becomes cipher text after being encrypted. The sender sends the ciphertext, and the third party can only see the ciphertext, but cannot obtain the communication content. After receiving the ciphertext, the receiver needs the key to restore the plaintext. Key trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
Inventor 张杰
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD