Encryption key agreement method
A technology of key agreement and agreement, which is applied in the field of information security, can solve problems such as complex operation, poor practicability, and difficult security risks, and achieve the effect of simple operation, low calculation overhead and space requirements, and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] Implementation on finite multiplicative groups:
[0020] System parameters: Randomly select a large prime number p, and the generator g is a positive integer smaller than p. private keySK A and SK B is a random positive integer less than p-1. Then the public key PK A and PK B Get it as follows:
[0021] Key agreement process:
[0022] a) A randomly selects a positive integer k smaller than p-1 A , and obtain B's public key PK from the certification authority CA B , and then calculate S A = ( P K B ) k A mod p , and put S A send to B.
[0023] b) B randomly selects a positive integer k smaller than p-1 B , and obtain A's public key PK from the certification authority CA A , and then calculate S ...
Embodiment 2
[0026] Implementation on finite groups of elliptic curves:
[0027] System parameters: Randomly select a large prime number p, elliptic curve E(GF(p):y 2 =x 3 +ax+b(mod p) is a secure elliptic curve defined on the finite field GF(p), on which the base point randomly selected is G, let n=#E(GF(p) be the order of the elliptic curve E, r is a large prime factor of n. The private key SK A and SK B is a random positive integer less than r-1. Then the public key PK A and PK B Get it as follows:
[0028] The key agreement process is as follows:
[0029] a) A randomly selects a positive integer k A ∈[1, r-1], and obtain B's public key PK from the certification authority CA B , calculate S A =k A PK B , and put S A send to B.
[0030] b) B randomly selects a positive integer k B ∈[1, r-1], and obtain the public key PK of A from the certification authority CA A , and then calculate S B =k B PK A , and put S B Send to A.
[0031] c) A receives S from B B , with yo...
Embodiment 3
[0035] Implementation on finite groups of hyperelliptic curves:
[0036]System parameters: Randomly select a large prime number p, hyperelliptic curve C: y 2 +h(x)y=f(x)modp is a safe hyperelliptic curve whose genus is g defined on the finite field GF(p), where f(x) is the first polynomial whose degree is 2g+1, h(x) is a polynomial of degree at most g. Assuming that the order #J(C; GF(p)) of the Jacobian group J(C; GF(p)) of the hyperelliptic curve C is n, r is a large factor of n. Randomly select a base point D∈J(C; GF(p)) on the hyperelliptic curve C. private keySK A and SK B is a random positive integer less than r-1. Then the public key PK A and PK B Get it as follows:
[0037] Then the key agreement process is as follows:
[0038] a) A randomly selects a positive integer k A ∈[1, r-1], and obtain B's public key PK from the certification authority CA B , calculate S A =k A PK B , and put S A send to B.
[0039] b) B randomly selects a positive integer k ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 