CN104348615A - Encryption method based on server hardware information and RAS algorithm - Google Patents
Encryption method based on server hardware information and RAS algorithm Download PDFInfo
- Publication number
- CN104348615A CN104348615A CN201310317871.1A CN201310317871A CN104348615A CN 104348615 A CN104348615 A CN 104348615A CN 201310317871 A CN201310317871 A CN 201310317871A CN 104348615 A CN104348615 A CN 104348615A
- Authority
- CN
- China
- Prior art keywords
- server
- hardware information
- algorithm
- software
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention relates to an encryption method based on server hardware information and an RAS algorithm. The server hardware information is added into an encryption algorithm, thus the uniqueness and safety of encryption information are improved. When a user logs on software, server hardware information (such as CPU serial number, hard disk serial number) is obtained, thus the decryption is carried out through the RAS algorithm, and the login is available when the decryption is successful. If hardware equipment is replaced, the decryption can not be carried out. On one hand, the security of login and software is ensured, on the other hand, the hook with the server hardware is achieved, and one key is ensured to be only used in one server. If one server generates a key for one time, once the hardware is replaced or damaged, the decryption can be not carried out in login and the user can not log on the software, and the loss, leakage and manipulation of data are avoided.
Description
Technical field
The present invention relates to a kind of encryption method to realize, especially based on the encryption method of server hardware information and RAS algorithm realization.The invention belongs to field of computer technology.
Background technology
At present, the encryption technology kind used in worldwide is very many, and the cryptographic algorithm of main flow has: MD5, DSA, RSA, SHA-1, DES, HAVAL-128 and RIPEMD.These have quite high fail safe when being encrypted in algorithm design, and to teach and team has carried out after she reports the achievement in research of the bump test of the several Hash function of MD4, MD5, HAVAL-128 and RIPEMD, having caused the great disturbance of password educational circles in the international cryptography conference that California, USA St Babara is held at China Wang little Yun in 2004.Can be collided out in a short period of time because her research is the cipher modes such as MD5.And in 2005 afterwards year, professor Wang little Yun is flat has again cracked SHA-1, make can forge electronic signature in theory.These inventions all make a lot of algorithm lose now fail safe in the past.And RSA Algorithm wherein remains good fail safe always, the method effectively attacking RSA Algorithm is not also had to occur so far.So utilize RSA Algorithm to be encrypted computer software etc., there is higher fail safe.
Summary of the invention
Goal of the invention:
Multiplely to be cracked owing to having in the cryptographic means that used in the past, security performance reduces greatly.And the encryption that RSA Algorithm realizes has good fail safe, so invention describes a kind of method of carrying out being encrypted computer software based on server hardware information in conjunction with RSA Algorithm always.Ensure that fail safe on the one hand, link up with again on the one hand with server hardware, once hardware occurs with changing or damaging, software also can be simultaneously out of service, avoids the loss of data, reveals and distort.
Concrete steps are as follows:
Step 1: the information (as CPU sequence number, hard disk serial number) obtaining multiple hardware of server, after "-" is wherein removed, English alphabet is changed into ASC code, the carrying out not doing any mathematical operation is spliced, connect into a very large numeral like this, like this as the parameter e of in RAS algorithm.
Step 2: according to RAS algorithm, and the server parameter e obtained before, setting p, q parameter, ensures that private key and (p-1) (q-1) are relatively prime, then using p, q product as the n in key, finally obtain PKI and private key.Thus be encrypted according to each parameter and the private key that gets.
Step 3: add in software systems and obtain the program that server hardware formulates parameter, get parms when making to log in, thus transform acquisition private key, be decrypted.If hardware device has change or damages, then obtain less than correct parameter, thus also cannot be decrypted.Ensure that the fail safe of software data.
Embodiment
Embodiment one
1. use Myeclips 8.6 development platform to develop design, use expert data library software MySql to carry out data management.
2. this adopts CPU sequence number and hard disk serial number as the hardware information of server.Carry out by JNI the program calling the acquisition CPU sequence number that C language is write, platform shows, then obtains hard disk serial number.Remove after "-", English alphabet is converted into ASC code and splices, and obtains a very large digital e.
3. find two very large prime number p, q, n be p, q product, (q-1) (p-1) must be relatively prime with e, and e and n is as PKI (KU), and d is (mod((q-1) (p-1)) value of/e, n is with originally identical.D and n is as private key (KR).E the factorial of m obtains encrypting C to n delivery.D the factorial of c obtains deciphering c to n delivery.
4. when software brings into operation, when user logs in, meeting Automatically invoked obtains the program of hardware information, thus acquisition e is decrypted, if hardware information is consistent, that can log in.When generating a key mistake on a station server, if hardware device is changed or change server, because hardware information is all uniqueness, the parameter got must be deciphered, thus stops login, well protects the fail safe of software and data.
In addition to the implementation, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of application claims.
Claims (3)
1. obtain server hardware information, remove the symbol in its result and ASCII character conversion is carried out to English alphabet, be spliced into a very large numeral as encryption parameter.
2., for the hardware information parameter got, calculated by RSA Algorithm and generate PKI and private key is encrypted and decryption oprerations.
3. during logging in system by user, blocker carries out work, get the specific hardware information of active user's server, be decrypted after conversion, after generated key on a station server, when changing hardware or change server, cannot be decrypted thus cannot software be logged in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310317871.1A CN104348615A (en) | 2013-07-26 | 2013-07-26 | Encryption method based on server hardware information and RAS algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310317871.1A CN104348615A (en) | 2013-07-26 | 2013-07-26 | Encryption method based on server hardware information and RAS algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104348615A true CN104348615A (en) | 2015-02-11 |
Family
ID=52503499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310317871.1A Pending CN104348615A (en) | 2013-07-26 | 2013-07-26 | Encryption method based on server hardware information and RAS algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104348615A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812125A (en) * | 2016-03-28 | 2016-07-27 | 北京信安世纪科技有限公司 | Private key generation method and device |
CN109086089A (en) * | 2018-08-27 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of method, system and equipment that hardware configuration limits |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149775A (en) * | 2006-09-20 | 2008-03-26 | 展讯通信(上海)有限公司 | Encryption and decryption method for realizing hardware and software binding |
US20090300362A1 (en) * | 2008-05-29 | 2009-12-03 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
CN101789866A (en) * | 2010-02-03 | 2010-07-28 | 国家保密科学技术研究所 | High-reliability safety isolation and information exchange method |
CN101873331A (en) * | 2010-07-07 | 2010-10-27 | 中国工商银行股份有限公司 | Safety authentication method and system |
-
2013
- 2013-07-26 CN CN201310317871.1A patent/CN104348615A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149775A (en) * | 2006-09-20 | 2008-03-26 | 展讯通信(上海)有限公司 | Encryption and decryption method for realizing hardware and software binding |
US20090300362A1 (en) * | 2008-05-29 | 2009-12-03 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
CN101789866A (en) * | 2010-02-03 | 2010-07-28 | 国家保密科学技术研究所 | High-reliability safety isolation and information exchange method |
CN101873331A (en) * | 2010-07-07 | 2010-10-27 | 中国工商银行股份有限公司 | Safety authentication method and system |
Non-Patent Citations (1)
Title |
---|
范涛,毛继曙,王国中: "《基于硬件信息的软件加密系统在数字电视中的应用》", 《电视技术》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105812125A (en) * | 2016-03-28 | 2016-07-27 | 北京信安世纪科技有限公司 | Private key generation method and device |
CN105812125B (en) * | 2016-03-28 | 2019-01-11 | 北京信安世纪科技股份有限公司 | The generation method and device of private key |
CN109086089A (en) * | 2018-08-27 | 2018-12-25 | 郑州云海信息技术有限公司 | A kind of method, system and equipment that hardware configuration limits |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105939191B (en) | The client secure De-weight method of ciphertext data in a kind of cloud storage | |
Vorobiev et al. | Organization of the entrusted calculations in crucial objects of informatization under uncertainty | |
US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
US9774591B2 (en) | Password manipulation for secure account creation and verification through third-party servers | |
CN105450620A (en) | Information processing method and device | |
CN104917617B (en) | A kind of encryption group ranking obscures method | |
CN104657630A (en) | Integrated circuit provisioning using physical unclonable function | |
CN103179129B (en) | A kind of remote certification method based on cloud computing IaaS environment | |
US20150215117A1 (en) | White box encryption apparatus and method | |
CN102986161B (en) | For carrying out the method and system of cryptoguard to application | |
CN101950347A (en) | Method and system for encrypting data | |
CN105306194A (en) | Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol | |
CN104268447A (en) | Encryption method of embedded software | |
CN104168116A (en) | Database identity authentication method and system | |
CN105468940A (en) | Software protection method and apparatus | |
CN105812146A (en) | MD5-based two-way encryption data protection method | |
CN104866784A (en) | BIOS encryption-based safety hard disk, and data encryption and decryption method | |
CN105141631A (en) | Terminal, server and account security login method, device and system | |
CN104348615A (en) | Encryption method based on server hardware information and RAS algorithm | |
CN106452754B (en) | Multi-user online dynamic encryption method and device | |
CN106257859A (en) | A kind of password using method | |
US20230239144A1 (en) | Deterministic chaos-based quantum computer resistant data encryption for large scale wide area network solutions | |
CN104868994A (en) | Collaboration secret key management method, device and system | |
CN105681027A (en) | HSM encrypted information synchronization method, device and system | |
CN114553566A (en) | Data encryption method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150211 |
|
WD01 | Invention patent application deemed withdrawn after publication |