Key exchanging method based on public key certificate
A key exchange and public key certificate technology, which is applied in the usage of multiple keys/algorithms, user identity/authority verification, digital transmission systems, etc., can solve problems such as limiting the scope of communication, and achieve the effect of fast computing speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] When the present invention is used for network communication to exchange session keys, it is assumed that user A and user B exchange session keys. In this method, user A and user B share a system parameter (Z p , G, q, H, sig), Z Here are examples where P is 512 bits and 1024 bits:
[0013] 512: P=QxED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7;
[0014] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53;
[0015] where Z p is a finite group generated modulo primes, G= is Z p The subgroup whose order is q (p=2q+1, p, q are large prime numbers), H is G 3 →G's anti-collision hash function, sig is a digital signature method against forgery and tampering.
[0016]...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com