Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption key exchange method based on public key centificate on elliptic curve

An elliptic curve and public key certificate technology, which is applied to the usage of multiple keys/algorithms, digital transmission systems, electrical components, etc., can solve problems such as limiting the scope of communication, and achieve the effect of fast computing speed

Inactive Publication Date: 2003-11-12
ZHEJIANG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the EKE protocol has a serious flaw, it requires both parties to know a shared password P, which greatly limits the scope of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] When the present invention is used for key exchange, it is assumed that user A wants to conduct confidential communication with user B, and needs to transmit the secret session key on an insecure channel. In this method, user A and user B share an elliptic curve, and an elliptic curve is given here as follows:

[0013] E: y 2 =x 3 +ax+b mod n

[0014] in

[0015] p=6277101735386680763835789423207666416083908700390324961279;

[0016] seedE = 0x3045ae6fc8422f64ed579528d38120eae12196d5;

[0017] r = 0x3099d2bbbfcb2538542dcd5fb078b6ed5f3d6fe2c745de65;

[0018] a=-3;

[0019] b=0x64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1;

[0020] h=1

[0021] The order of the elliptic curve is:

[0022] n=6277101735386680763835789423176059013767194773182842284081;

[0023] It is a prime number.

[0024] The selection of the base point P with order n is:

[0025] P = (xG, yG) where

[0026] xG=0x188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012;

[0027] yG=0x07192b95ffc8...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The exchange method is based on discrete-logarithm issue and Diffie-Hellman cipher key exchange protocol on the elliptical curve and assisted with anti-impact odds and ends function, session key exchange method of public key certificate and digital signature. The method is good at security which can be certified and it has quick operation speed.

Description

technical field [0001] The invention relates to a secret or safe communication key exchange method, in particular to a key exchange method based on a public key certificate on an elliptic curve. Background technique [0002] Cryptographic algorithms and communication protocols with provable security are an important and difficult research topic in cryptography. The research on communication security and confidentiality revolves around finding stronger and better cryptosystems. Because the traditional cryptographic system uses a single key for encryption and decryption, once the encryption key is leaked, the entire cryptographic system will lose its function. Therefore, more and more defects have been exposed in practical applications, but because the encryption speed of the symmetric key system is much faster than that of the public key encryption, it has advantages in encrypting a large amount of data. Therefore, a hybrid encryption method is produ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/14
Inventor 朱华飞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products