Public key cryptography algorithm based on problem of classical decomposition of matrix over integral ring

A technology of public key cryptography and cryptographic algorithms, applied in the field of fast public key cryptography algorithms, can solve the problems of unfavorable information security systems and high prices, and achieve the effects of improving decryption efficiency, low cost, and high information security strength

Inactive Publication Date: 2004-11-17
郑建德
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are imported products available in the market, their prices are relatively high, whic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key cryptography algorithm based on problem of classical decomposition of matrix over integral ring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The specific implementation method of the present invention will be further described below in conjunction with the accompanying drawings.

[0021] (1) System key generation and public modulus production. This module generates the secret primes p and q, and computes the public modulus n=pq. Operation of this module should be carried out under close supervision. The system key is kept by the key escrow center.

[0022] (2) User key creation. First, a random number generator is used to generate a secret random number λ 1 ,λ 2,r , and calculate the user public key σ according to the following formula 1 , σ 2,r ,

[0023] σ 1 =(λ 1 +λ 2 +...+λ r )(mod n), (7)

[0024] σ 2 =(λ 1 lambda 2 +λ 1 lambda 3 +..... 1 lambda r lambda 2 lambda 3 +..... 2 lambda r +..... r-1 lambda r )(mod n), (8)

[0025] σ 3 =(λ 1 lambda 2 lambda 3 +λ 1 lambda 3 lambda 4 +..... 1 lambda r-1 lambda r +λ 2 lambda 3 lambda 4 +..... 2 lambda r-1 lambda r +..... ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a new public key code algorithm, the character lies in: (a) it has a simple and quick deciphering algorithm, which can be realized with domestic CPU which calculation ability is weak and the chip with low integration scale; (b) it has self-managing function, which can reduce the cost of the key tube. The deciphering algorithm logic can be sealed in the hardware coder with the RSA ciphering algorithm logic. The character of the hardware coder is that the operation ability of the microprocessor or the integration scale of the chip is not high, but it can be used as the independent client terminal in the client-server application system, carries on bidirectional indemnification testimony and the bidirectional data ciphering communication, which applicable to the reality incrimination system such as residents' card.

Description

1. Technical field [0001] The invention belongs to the field of information encryption, in particular to a fast public key encryption algorithm suitable for small electronic equipment. 2. Background technology [0002] Cryptographic algorithms are the core technology of information security, and important cryptographic algorithms have been granted patents. At present, the public-key cryptographic algorithms that are widely used in the world mainly include RSA and Rabin public-key cryptographic algorithms based on factorization problems, ElGamal public-key cryptographic algorithms based on discrete logarithm problems, and public-key cryptographic algorithms based on elliptic curve discrete logarithm problems. . [0003] How to prevent the leakage of the private key is a crucial issue in the popularization and application of public key cryptography. Using portable small hardware such as IC-card and USB-card to store the private key and avoiding putting i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30
Inventor 郑建德
Owner 郑建德
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products