Probability type asymmetric encipherment method based on public key certificate on ellipse curve

An asymmetric encryption and elliptic curve technology, which can be used in public keys for secure communication, activation of coded identification cards or credit cards, special data processing applications, etc. It can solve problems such as large number decomposition and discrete logarithm difficulties. Achieve the effect of fast calculation speed, high security and high security

Inactive Publication Date: 2003-09-24
ZHEJIANG UNIV
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the popular public key encryption system in the world is based ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] When the present invention is used in network and information confidential communication, it is assumed that sender A wants to send a confidential message to receiver B. The information that this fruit wants to send is exactly the plaintext m, and in the present invention, sender and recipient share an elliptic curve, provide the example that implements on following elliptic curve here:

[0024] E: y 2 =x 3 +ax+b mod n

[0025] in

[0026] p=6277101735386680763835789423207666416083908700390324961279;

[0027] seedE = 0x3045ae6fc8422f64ed579528d38120eae12196d5;

[0028] r = 0x3099d2bbbfcb2538542dcd5fb078b6ed5f3d6fe2c745de65;

[0029] a=-3;

[0030] b=0x64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1;

[0031] h=1

[0032] The order of the elliptic curve is:

[0033] n=6277101735386680763835789423176059013767194773182842284081;

[0034] It is a prime number.

[0035] The selection of the base point P with order n is:

[0036] P = (xG, yG) where

[0037] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a probability type asymmetrical encryption method based on public key certificate on the elliptic curve. It is a public key cryptographic system by proceeding from Diffie-Hellman decision problem on the elliptic curve and utilizing anti-collision miscollaneous function and public key certificate to make encryption and decryption. The system is made up on the elliptic curve, so that its calculation speed is quick, safety is high, it can use smaller key length to ensure higher safety. It can be extensively used in the fields of file encryption and computer network safety technology.

Description

technical field [0001] The invention relates to an asymmetric public key encryption method for confidential or safe communication, in particular to a probabilistic asymmetric encryption method based on public key certificates on an elliptic curve. Background technique [0002] Before the issue of data security and confidentiality was widely recognized, the security and confidentiality of computers referred to the physical security of hardware in the impression of most people. However, today's new technologies such as computer remote terminal access, communication and network have made great progress. In addition to protecting the security of hardware devices, purely physical protection measures have less and less significance for the protection of information and services. Security and confidentiality have become the subject of computer security and confidentiality. [0003] Cryptographic algorithms and communication protocols with provable securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G07F7/10H04L9/30
Inventor 朱华飞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products