Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Contract text protection method based on RSA encryption sha-256 digital signature

A sha-256 and digital signature technology, applied in digital data protection, electronic digital data processing, instruments, etc., can solve the problems of small SHA1 hash value and high possibility of collision, and achieve more secure data encryption

Inactive Publication Date: 2020-04-03
ZHEJIANG UNIV OF TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the continuous advancement of technology makes SHA1 more likely to be cracked due to its small hash value and high possibility of collision.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Contract text protection method based on RSA encryption sha-256 digital signature
  • Contract text protection method based on RSA encryption sha-256 digital signature
  • Contract text protection method based on RSA encryption sha-256 digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with specific examples.

[0032] refer to Figure 1 to Figure 4 , a contract text protection method based on RSA encrypted sha-256 digital signature, comprising the following steps:

[0033] 1) Obtain the original data of the contract text to be sent;

[0034] 2) Encrypt the contract text to be sent for the first time, that is, use the sha-256 algorithm to encrypt the original contract text data to generate a signature file;

[0035] 3) Add a time stamp to the signature file that has been encrypted for the first time, and encrypt it again with the sender's own RSA private key to generate a digital signature;

[0036] 4) The generated digital signature is stored in the data header for network transmission;

[0037] 5) Use the sender's RSA public key to decrypt, and the receiver obtains the data and performs user identity authentication combined with the timestamp, and gets the sha-256 digital signatu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a contract text protection method based on RSA encrypted sha-256 digital signature. The method comprises the following steps: 1) obtaining to-be-sent contract text original data; 2) encrypting the original contract text data by using a sha-256 algorithm to generate a signature file; 3) adding a timestamp to the signature file which is encrypted for the first time, and performing encrypting again in combination with the RSA private key of the sender to generate a digital signature; 4) storing the generated digital signature in a data head for network transmission; 5) performing decrypting by using the RSA public key of the sender, acquiring data by the receiver, performing user identity authentication in combination with a timestamp, and obtaining a sha-256 digital signature abstract; 6) carrying out sha-256 signature on the original contract text to calculate an abstract; (7) comparing and verifying whether the calculated abstract is consistent with a decryptedsignature abstract or not, and (8) reading original contract text data. The method improves the system security and prevents harm caused by malicious data tampering.

Description

technical field [0001] The invention relates to the field of computer network transmission security, in particular to a contract text protection method based on RSA encryption SHA-256 digital signature. Background technique [0002] With the advent of the era of big data, more and more companies use online automated office software, so that many traditional paper-based office methods gradually become online electronic methods, including the formulation of contract texts, which greatly improves Improve the work efficiency of office staff. However, along with it comes the issue of information security. For example, people now like to use mobile devices to send private information such as account passwords, and some criminals will use malicious attacks and other means to intercept personal information to make huge profits. [0003] RSA encryption algorithm: RSA is an asymmetric encryption algorithm, that is, it has two different public keys and private keys, that is, it has t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/602G06F21/64
Inventor 郭淑琴郭守文
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products