Key transmission and di gital signature method
A digital signature and key technology, applied in the field of cryptography, can solve the problems of slow encryption and decryption, large amount of calculation, long key, etc., to achieve the effect of easy hardware implementation, small calculation amount and simple structure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0030] The content of the present invention will be described in detail below.
[0031] First select a function f, such as MD5 transformation or SHA-1 transformation.
[0032] The function y=f(a, b, c, d) is an open one-way hash function, which satisfies: If the definition of the ensemble Id={(y, a, b, c)|y=f(a, b, c, d), a∈Z, b∈Z, c∈Z} Then when d is unknown, f is known, and any subset Qd of Id is known, d is difficult to solve, and the complement set of Qd Any one element is also difficult to solve.
[0033] The characteristic of the above function is that when d is unknown, no matter how many sets of data y, a, b, c are known, and each set of data satisfies the equation y=f(a, b, c, d), but in the unknown Among y, a, b, c, it is known that any three of them cannot solve the fourth number. Key transfer and digital signature are realized by using this feature of the function. The function with this feature is not unique, and the amount of calculation is very small when im...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More