Magic square signature method for true or false identification

A magic square and identity technology, applied in the field of magic square signature, can solve the problems of unfavorable data format standardization, easy to be exchanged, public key complex authentication system, etc.

Inactive Publication Date: 2010-11-03
谢道裕
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the RSA public key cryptosystem has the following disadvantages: 1) It is very troublesome to generate the key, and it is difficult to achieve one-time encryption due to the limitation of the prime number generation technology; 2) The block length is too large. In order to ensure security, the block length must be at least More than 600bits, the calculation cost is too high, especially the speed is slow, several orders of magnitude slower than the symmetric encryption algorithm; and with the development of large number decomposition technology, this length is still increasing, the encryption efficiency will decrease, and it is not conducive to the data format 3) There are chosen ciphertext attack methods and public modulus attack methods for RSA; 4) Although the public key can be disclosed, it is easy to be exchanged, and the confirmation of the public key requires a complex authentication system
The magic square digital anti-counterfeiting method has the advantages of open coding algorithm, open anti-counterfeiting database, independent anti-counterfeiting code, two-way anti-counterfeiting, and easy implementation. The anti-counterfeiting code of the magic square signature can be generated privately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Magic square signature method for true or false identification
  • Magic square signature method for true or false identification
  • Magic square signature method for true or false identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] The principle of defect magic square filling: a randomly constructed magic square is evenly and randomly divided into two complementary defect magic squares. At present, there is no effective unified calculation method in theory, so that the other half can be restored from the defect magic square containing only half of the numbers. Position the numbers so that they still form a magic square, and vice versa. We call this problem the defect magic square filling problem, which is an open mathematical problem, such as figure 1 shown. Generally, if any one of the flawed magic squares is used as a lock, the other one can be used as the corresponding key, and the two are mutually a lock and a key. The corresponding "key" cannot be deduced from the "lock", and the corresponding "lock" cannot be deduced from the "key", and the "lock" can be made public. 7-order magic square can construct 10 34 Lock the magic square number, when the "lock" is known, the exhaustive times of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of using magic square signature to identify true or false of status includes generating a magic square for each article, adding elements of generated magic square on elements of signature magic square to achieve model for obtaining a signature matrix and using this matrix as identification data of article status, sending signature matrix to identifying device with signature magic square for calculating model difference of said matrix to signature magic square and verifying whether matrix is magic square or not, confirming that status having signature matrix is true or otherwise it isfalse if matrix is magic square.

Description

technical field [0001] The present invention relates to a magic square signature method for identity authenticity identification, in particular to a two-way dynamic authentication method of identity which is composed of magic square signature, encryption and card shuffling methods, and the registration information can be made public, and an encoding algorithm The magic square digital anti-counterfeiting method that can be made public with the database. technical background [0002] Identity authentication is the primary link in the network information security system and the basis of e-commerce and e-government. The general principle of identity authentication is to compare some special information or computing ability provided by the authenticated party with the corresponding information or ability held by the verifier. There are many methods of network identity authentication, the most commonly used one is to combine the user account and password, first use the account to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 谢涛
Owner 谢道裕
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products