Encryption and decryption method based on RSA algorithm

An RSA algorithm, encryption and decryption technology, applied in the field of information security, which can solve the problems of inability to guarantee security, leakage of authorization information, etc.

Pending Publication Date: 2022-08-02
山东华软金盾软件股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] No matter which party in the above method disperses or spreads the key, the authorization...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method based on RSA algorithm

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0033] A specific example is as follows: A business system is deployed to a customer site and requires authorization from the manufacturer. The manufacturer first generates an RSA public-private key pair, puts the public key into the business system, and stores the private key in the manufacturer's own hands. After the business system is deployed, authorization is required for the business system to run normally. At this time, the manufacturer signs and encrypts the authorization information according to its own private key, writes the ciphertext to the authorization file, and sends the authorization file to the customer. After the customer gets the authorization file, upload the authorization file to the business system, and the business system gets the ciphertext in the authorization file, and performs verification and decryption according to the public key in the business system to obtain the authorization information. Afterwards, the business system finds that it is in co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption and decryption method based on an RSA algorithm, and the method comprises the steps: 1, enabling an authorization party to generate a public key and a private key, enabling the authorization party to store the private key, and enabling the public key to be placed in a business system; 2, the authorization party encrypts the authorization information through a private key; 3, generating an authorization file from the encrypted ciphertext; 4, uploading the authorization file to a service system; 5, verifying and decrypting the authorization file through a public key in the service system; step 6, obtaining authorization information in the authorization file; and step 7, performing service logic control according to the authorization information. According to the invention, an asymmetric encryption mode is adopted, the security and non-tampering property of the authorization file are improved, the risk of secret leakage is reduced through a public and private key mode, and the requirements of security and uniqueness of the authorization file are met.

Description

technical field [0001] The invention relates to an encryption and decryption method based on an RSA algorithm, belonging to the technical field of information security. Background technique [0002] At present, symmetric encryption algorithms such as DES and AES are used for encryption and decryption of authorized files. However, as the risk of information leakage gradually increases, the traditional symmetric encryption algorithm encrypts the authorization file. If the key is leaked at either end, the authorization file becomes no longer secure. The prior art implementation is as follows: [0003] Authorizer Encryption: Obtain a symmetric encryption key such as AES. Encrypt the authorization information to obtain the ciphertext, write the ciphertext to the authorization file, and generate the authorization file. [0004] Decryption on the business system side: The application system obtains the authorization file, decrypts the ciphertext through the key, obtains the decr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/302H04L9/3249
Inventor 程磊孙超
Owner 山东华软金盾软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products