Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating multiple variable commom key password system

A multivariable public key and cryptosystem technology, which is applied in the field of generating new multivariate public key cryptosystems and can solve problems such as insecurity

Active Publication Date: 2006-11-29
南京合十软件科技有限公司
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Later, Ding and Schmidt [DS1] [DS2] found that virtually all existing implementations share a common flaw that makes them insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating multiple variable commom key password system
  • Method for generating multiple variable commom key password system
  • Method for generating multiple variable commom key password system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] 1. Internal Perturbation-Plus Method (IPP)

[0021] 1.1 Basic idea of ​​IPP

[0022] Internal perturbation-plus is the name given to the first class of methods among the methods invented in the present application. The basic idea of ​​IPP is now described, and subsequent subsections will show some specific examples of IPP applications, such as applied to the Matsumoto-Imai cryptosystem to generate the so-called internally perturbed Matsumoto-Imai-Plus cryptosystem (PMI+).

[0023] The reason why the word "disturbance" is used here is very similar to the physical meaning of disturbance, which means to intentionally "change" or add a small-scale "noise" to the system to see how the system changes, and thus derive new information about the system itself . The key point is that the perturbation must be done in a controlled manner so that the system itself is not fundamentally changed. Our method is indeed to "add" random "small" "noise" to the cryptographic system, so th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Multivariate public key cipher system (MPKC) is such a public key cipher system that its public key is a set of multivariate polynomial of finite field (or ring). The MPKC can be used in encryption, identification and signature. The invention putting forward three methods that can be used in one multivariate public key cipher system to get multivariate new public key cipher system, and that the get new cryptography is better than the former system on efficiency and security. The three methods are separately intituled inner perturbation-plus (IPP), enhanced inner perturbation (EIP) and multi oil-vinegar construction. We can also apply two or all of the three methods for one multivariate public key cipher system to get new multivariate public key cipher system.

Description

technical field [0001] This published document applies for the priority claim in the U.S. Provisional Patent Application (Title: Multivariate Public Key Cryptography System, Serial No. 60 / 642,838) filed January 11, 2005, which includes complete references, and applies to all Purpose. Background technique [0002] The present invention relates to asymmetric cryptographic communication processing, in particular multivariate public key cryptography (MPKC), for providing secure communication and secure authentication or signatures. [0003] Public key cryptography has fundamentally changed modern communication systems. This revolutionary idea was first proposed by Diffie and Hellman, but the first practically available cryptographic system that realized this idea was the famous RSA system proposed by Rivest, Shamir and Adleman (US Patent: 4,405,829, 1983). [0004] Multivariate public-key cryptosystems are a class of public-key cryptosystems whose building blocks are multivari...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 丁津泰
Owner 南京合十软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products