Unlock instant, AI-driven research and patent intelligence for your innovation.

Symmetric key generation method and system based on public key and private key

A symmetric key, public key and private key technology, applied in the field of key generation management, can solve the problems of reducing the efficiency of symmetric key generation, time-consuming and labor costs, and complicated transfer of symmetric keys, so as to save multiple interactions Effect

Active Publication Date: 2022-07-08
慧之安信息技术股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the transmission of symmetric keys is very complicated. It first needs to generate random numbers as the symmetric key VEK, and at the same time match a corresponding version number VKEK_version, and encrypt the symmetric key VEK to obtain the private key VKEK. Then, the private key VKEK and The version number VKEK_version is passed together
The generation and transmission of the above-mentioned symmetric key requires multiple interactions between the encryption end and the decryption end to complete the complete generation and transmission of the symmetric key, which not only consumes a lot of time and labor costs, but also reduces the generation efficiency of the symmetric key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric key generation method and system based on public key and private key
  • Symmetric key generation method and system based on public key and private key
  • Symmetric key generation method and system based on public key and private key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0055] see figure 1 , is a schematic flowchart of a method for generating a symmetric key based on a public key and a private key provided by an embodiment of the present invention. The method for generating a symmetric key based on a public key and a private key includes the following steps:

[0056] Step S1, generate a string of random numbers, and directly transmit the random number to the encryption terminal; instruct the encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a symmetric key generation method and system based on a public key and a private key, and the method comprises the steps: generating a string of random numbers, directly employing an encryption end to carry out the encryption of the random numbers for a plurality of times, obtaining symmetric keys, and enabling the symmetric keys to be distinguished and stored in a value block chain; according to the data type and the data structure of the to-be-encrypted information, selecting a proper symmetric key to convert the to-be-encrypted information into encrypted information; and finally, after the private key from the user terminal is verified, the verified private key is matched with the symmetric key of the encrypted information, a corresponding information decryption result is fed back to the user terminal according to the matching result, the symmetric key generated after the random number is encrypted for multiple times is used as a public key, and then the public key is matched with the private key of the user terminal, so that the information decryption efficiency is improved. In this way, multiple times of interaction between the encryption end and the decryption end can be omitted, the complexity of key transmission is reduced, and the efficiency and reliability of information encryption are improved.

Description

technical field [0001] The present invention relates to the technical field of key generation and management, in particular to a method and system for generating a symmetric key based on a public key and a private key. Background technique [0002] At present, the transmission of symmetric keys is very complicated. It first needs to generate a random number as the symmetric key VEK, match a corresponding version number VKEK_version, encrypt the symmetric key VEK to obtain the private key VKEK, and then combine the private key VKEK and The version number VKEK_version is transmitted together. The above method of generating and transmitting the symmetric key requires multiple interactions between the encryption end and the decryption end to complete the complete generation and transmission of the symmetric key, which not only consumes a lot of time and labor costs, but also reduces the generation efficiency of the symmetric key. SUMMARY OF THE INVENTION [0003] In view of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/22H04L9/08H04L9/30
CPCH04L9/0662H04L9/0822H04L9/0869H04L9/30
Inventor 兰雨晴黄永琢余丹王丹星唐霆岳
Owner 慧之安信息技术股份有限公司