Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

53 results about "SHA-1" patented technology

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard.

Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms

The invention discloses a communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm-) encryption algorithms. The communication data encryption and decryption method based on DES, RSA and SHA-1 encryption algorithms comprises the following steps: 1, generating data to be encrypted for sending; 2, encrypting the data to be sent for the first time, namely performing block DES encryption; 3, performing SHA-1 encryption algorithm to the data which has been encrypted for the first time to generate abstract content; 4, encrypting the data encrypted by SHA-1 and the abstract by a RSA encryption public key received by a receiving end; 5, sending cryptograph; 6, receiving the cryptograph by the receiving end and decrypting the cryptograph by an own private key for the first time; 7, authenticating the received data; 8, performing DES decryption to the data which has been authenticated, and reading the data content. The communication data encryption and decryption method based on DES, RSA and SHA-1 encryption algorithms utilizes different characteristics of the three encryption algorithms, and respectively encrypts a message to be sent by DES, RSA and SHA-1 encryption algorithms, so that the encrypted message for communication is much safer, and a digital signature is achieved for ensuring that the received message is the original message sent by a sending end without tampering.
Owner:SOUTH CHINA UNIV OF TECH

Image encryption and decryption method based on probability interval division and dynamic probability events

The invention provides an image encryption and decryption method based on probability interval division and dynamic probability events. The method comprises steps of during encryption, firstly mapping secret key parameters and SHA-1 values of to-be-encrypted images to different probability encryption sections; carrying out random screening on to-be-encrypted pixels based on the secret key parameters and the SHA-1 values; and executing and writing different probability encryption events into corresponding pixel positions according to the probability sections where the probability encryption events fall. In order to improve safety, an SHA-1 value remapping process is added for dividing the probability sections, screening the to-be-encrypted pixels and carrying out stochastic disturbance on encryption; and by adding an overall situation encryption process related to SHA-1 update values and user secret keys, performance of an image encryption algorithm is enhanced. The method also comprises steps of during decryption, firstly recovering encrypted parameters; then finishing overall decryption; and at last executing inverse decryption operation on randomly screened pixels. Compared with the prior art, different pixels and secret keys correspond to different encryption processes, so the method is highly safe.
Owner:SHAANXI NORMAL UNIV

A sliding block repeating data deleting method based on edge calculation

InactiveCN109684284AGood delete effectDelete has little effectDigital data information retrievalSpecial data processing applicationsSlide windowGranularity
The invention belongs to the technical field of data deduplication, and particularly relates to a sliding block duplication data deletion method based on edge calculation, which comprises the following steps: calculating the summation of each overlapped block of a file object according to an Rsync summation check function and a sliding window to obtain the value of a check sum; Comparing, for eachblock, the value of the checksum to a previously stored value; If the value of the checksum is matched with the value stored in advance, comparing the calculated hash value of the SHA-1 with a previously stored value so as to carry out redundancy detection, and deleting a data block represented by the same data if the same data is detected; According to the sliding block repeated data deleting technology based on edge computing, the problems that traditional data de-duplication is poor in granularity and high in cost are solved, the defect that inserting and deleting of data are sensitive isovercome. A check method, a weak check detection method and a thought of manually setting the size of a window are added on the basis of an SHA algorithm 1, so that a better duplicate removal effect is achieved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm

The invention discloses a communication data encryption and decryption method based on BBS, RSA and an SHA-1 encryption algorithm. The communication data encryption and decryption method comprises the steps that 1) data to be encrypted and sent are generated; 2) the data to be sent are encrypted for the first time, that is, BBS encryption is carried out on the data to be sent; 3) the data encrypted for the first time generate abstract contents through the SHA-1 encryption algorithm; 4) the data encrypted through the SHA-1 and an abstract are encrypted through an RSA encryption public key provided by a receiving end; 5) cryptograph is sent; 6) the cryptograph is received by the receiving end and is decrypted for the first time through the private key of the receiving end; 7) identity authentication is carried out on the received data; 8) BSS decryption is carried out on the data after the identity authentication, and the content of the data is read. The different characteristics of the three encryption algorithms are utilized, messages to be sent are encrypted through the BBS, the SHA-1 and the RSA algorithm, the encrypted messages for communication are safer, digital signatures are achieved, and it is guaranteed that the received messages are initial messages sent by a sending end and are not tampered.
Owner:SOUTH CHINA UNIV OF TECH

Ssh-based data security protection method and device

The invention belongs to the technical field of data security and encryption, relates to an ssh-based data security protection method and device. The method comprises the following steps: establishingan encryption channel using a one-time password, storing a used six-bit short password in a remote host in advance in the form of a configuration file to generate a secret key, configuring the one-time six-bit short password, and using SHA-1 value of the short password to encrypt an encrypted channel by using an ECC algorithm, encrypting a secret key, transmitting the secret key to a client through the encrypted channel, transmitting the secret key, deploying a plurality of one-time passwords, completing the deployment of the secret key, and setting password-based ssh remote login protection; using the encryption channel to protect key exchange, so that the risk of man-in-the-middle attacks is blocked to a great extent. The encryption channel is established based on the Linux upper portforwarding function, establishment is easy and the reliability is high, the one-time key can defend password attacks based on password blasting and password guessing, and the safety of the encryptionchannel is improved.
Owner:HONGQIN (BEIJING) TECHNOLOGY CO LTD

Image encryption method for decryption area limitation using directed area and poker mapping

The invention provides an image encryption method for decryption area limitation using a directed area and poker mapping. The method is characterized in that firstly, a stable point of the minimum epiboly is obtained through the minimum epiboly of a decryption position, a random triangle is generated through the stable point, an MD5 value and an SHA-1 value of an image to be encrypted, and a userkey, and intermediate encryption parameters are generated through the direction area of the triangle; an initial value and parameter values of chaotic mapping are generated through the intermediate encryption parameters, and the chaotic mapping is driven to generate a random image with the same size as the image to be encrypted; and poker mapping scrambling and overall xor encryption are carried out on randomly selected lines and rows of the image to be encrypted through the chaotic mapping and the random image, so that an encrypted image is generated. Compared with the conventional method, the method provided by the invention has the advantages that the decryption area is limited, so that the encrypted image can only be decrypted within a specific range; and plain text attributes and therandom image are introduced, so that encryption steps for the different encrypted images are different, and the safety is further improved.
Owner:SHAANXI NORMAL UNIV

H<2>-MAC (Hash-based Message Authentication Code) message authentication IP (intellectual property) core hardware device based on bus

The invention discloses an H<2>-MAC (Hash-based Message Authentication Code) message authentication IP (intellectual property) core hardware device based on a bus, and belongs to the field of network data security. The message authentication device comprises an analyzing module, an MD5 secret key module, a padding module, an SHA-1 secret key module, an initial digest register, an intermediate digest register, an H<2>-MAC control module, an MD5 (Message-Digest Algorithm5) computation module, an SHA-1 (Secure Hash Algorithm) computation module and a post packaging module. According to the device, message authentication is realized in a hardware mode; compared with a software mode, the hardware mode is faster in authentication speed; moreover, IP core authentication is carried out based on the bus; multiple IP cores are mounted on the bus; the authentication speed is further improved; through adoption of an H<2>-MAC authentication mechanism, compared with HMAC (Hash-based Message Authentication Code), the H<2>-MAC authentication mechanism has the advantages that when the authentication is carried out, one time of inquiring the authentication secret key is omitted, and the hardware design and inquiring processes are simplified.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products