CN107222305A - The method and apparatus for protecting the private key safety of RSA cryptographic algorithms - Google Patents

The method and apparatus for protecting the private key safety of RSA cryptographic algorithms Download PDF

Info

Publication number
CN107222305A
CN107222305A CN201710419536.0A CN201710419536A CN107222305A CN 107222305 A CN107222305 A CN 107222305A CN 201710419536 A CN201710419536 A CN 201710419536A CN 107222305 A CN107222305 A CN 107222305A
Authority
CN
China
Prior art keywords
encryption
message
packet
prime number
rsa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710419536.0A
Other languages
Chinese (zh)
Inventor
阚志刚
陈彪
方宁
卢佐华
彭建芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YANGPUWEIYE TECHNOLOGY Ltd
Original Assignee
YANGPUWEIYE TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YANGPUWEIYE TECHNOLOGY Ltd filed Critical YANGPUWEIYE TECHNOLOGY Ltd
Priority to CN201710419536.0A priority Critical patent/CN107222305A/en
Publication of CN107222305A publication Critical patent/CN107222305A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application discloses a kind of method and apparatus of the private key safety of protection RSA cryptographic algorithms.Methods described includes:Receive encryption message and message serial number from message sender;The mark of message receiver, the encryption message received and message serial number are sent to encryption center;If it is determined that the mark of message receiver passes through checking in encryption center, receive message after the decryption from encryption center, wherein, encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet, carry out RSA decryption to encryption message accordingly when the encryption center finds encryption according to the message serial number.The present invention improves the private key safety of RSA cryptographic algorithms.

Description

The method and apparatus for protecting the private key safety of RSA cryptographic algorithms
Technical field
The disclosure relates generally to field of computer technology, and in particular to filed of network information security, more particularly to a kind of guarantor The method for protecting the private key safety of RSA cryptographic algorithms.
Background technology
RSA public key encryption algorithms are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs What (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together.RSA is exactly that their three people's surnames are opened The alphabetical composition that is stitched together of head.RSA is current most influential public key encryption algorithm, and up to the present it can resist The most cryptographic attacks known, are recommended as public key data encryption standard by ISO.
It is true that RSA Algorithm is based on a foolproof number theory:Two big prime number is multiplied very easy, but is intended to pair It is extremely difficult that its product carries out factorization, therefore can disclose product and be used as encryption key.
At present, only short RSA private keys are only possible to be broken by brute force approach solution.Untill 2008, do not appoint also in the world What reliably cracks the mode of RSA private keys.But the today reached its maturity in Distributed Calculation and quantum computer theory, RSA is private Key security is challenged.
Accordingly, it would be desirable to a kind of scheme for the private key safety that can improve RSA cryptographic algorithms.
The content of the invention
In view of drawbacks described above of the prior art or deficiency, the private key of RSA cryptographic algorithms can be improved by it is expected that offer is a kind of The technology of safety.
In a first aspect, the embodiment of the present application provides a kind of method for the private key safety for protecting RSA cryptographic algorithms, the side Method includes:Encryption message and message serial number from message sender are received, wherein, need to encrypt message in message sender In the case of, encryption packet proposal request is sent to encryption center, encryption center is received after encryption packet proposal request, specified Encryption for message to be grouped is grouped scheme and message serial number corresponding with encryption packet scheme, for each packet, The first prime number and the second prime number are specified, RSA Algorithm public key pair and RSA Algorithm private key are determined based on the first prime number and the second prime number It is right, and specified encryption packet scheme and corresponding message serial number are sent to message sender, message sender is according to finger Fixed encryption packet scheme and for each packet RSA Algorithm public key to carrying out rsa encryption to message, and send encryption Message;The mark of message receiver, the encryption message received and message serial number are sent to encryption center;If really Determine the mark of message receiver in encryption center by checking, receive message after the decryption from encryption center, wherein, it is described plus Close center finds encryption packet scheme corresponding with the message serial number and for each point according to the message serial number The RSA Algorithm private key pair of group, based on finding encryption packet scheme and for each point corresponding with the message serial number The RSA Algorithm private key pair of group, carries out RSA decryption to encryption message, obtains message after the decryption.
Second aspect, the embodiment of the present application provides a kind of device for the private key safety for protecting RSA cryptographic algorithms, the dress Put including:First receiving unit, for receiving encryption message and message serial number from message sender, wherein, in message In the case that sender needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption It is grouped after proposal request, specifies the encryption for message to be grouped to be grouped scheme and message corresponding with encryption packet scheme Serial number, for each packet, specifies the first prime number and the second prime number, RSA Algorithm is determined based on the first prime number and the second prime number Public key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to message transmission Side, message sender according to the encryption packet scheme specified and for each packet RSA Algorithm public key to being carried out to message Rsa encryption, and send encryption message;First transmitting element, for by the mark of message receiver, the encryption message received, And message serial number is sent to encryption center;Second receiving unit, for if it is determined that the mark of message receiver is in encryption Centrally through checking, message after the decryption from encryption center is received, wherein, the encryption center is according to the message serial number The encryption packet scheme and RSA Algorithm private key pair for each packet corresponding with the message serial number is found, based on looking into The encryption packet scheme corresponding with the message serial number found and the RSA Algorithm private key pair for each packet, to encryption Message carries out RSA decryption, obtains message after the decryption.
The third aspect, the embodiment of the present application provides a kind of equipment, including processor, memory and display;It is described to deposit Reservoir is included can be caused the computing device by the instruction of the computing device:Receive the encryption from message sender Message and message serial number, wherein, in the case where message sender needs encryption message, encryption packet is sent to encryption center Proposal request, encryption center is received after encryption packet proposal request, specify the encryption for message to be grouped be grouped scheme, with And message serial number corresponding with encryption packet scheme, for each packet, the first prime number and the second prime number are specified, based on first Prime number and the second prime number determine RSA Algorithm public key pair and RSA Algorithm private key pair, and by specified encryption packet scheme and correspondingly Message serial number be sent to message sender, message sender is grouped scheme and for each point according to the encryption specified The RSA Algorithm public key of group sends encryption message to carrying out rsa encryption to message;By the mark of message receiver, receive Encryption message and message serial number are sent to encryption center;If it is determined that the mark of message receiver passes through in encryption center Checking, receive the decryption from encryption center after message, wherein, the encryption center according to the message serial number find with The corresponding encryption packet scheme and RSA Algorithm private key pair for each packet of the message serial number, based on find with The corresponding encryption packet scheme of the message serial number and the RSA Algorithm private key pair for each packet, are carried out to encryption message RSA is decrypted, and obtains message after the decryption.
Fourth aspect, the embodiment of the present application provides a kind of machine readable media, comprising computer program, the computer Program includes being used to perform following program code:Receive the encryption message and message flowing water of the message sender in car networking Number, wherein it is described encryption message be with key corresponding with message serial number encrypt vehicle message, the message serial number and Key corresponding with message serial number asks granting when needing to send vehicle message from message sender to encryption center;It will disappear The message serial number for ceasing the mark of recipient and receiving is sent to encryption center;If the mark of message receiver is in encryption The heart is received from encryption center key corresponding with the message serial number by certification;And with the secret key decryption received The encryption message, to obtain the vehicle message.
In the embodiment of the present application, it is not, integrally with a RSA public key encryption, and to be decrypted message with a RSA private key, But message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, with corresponding RSA Algorithm private key To decryption, and packet scheme is stored in encryption center, and terminal user can not be known, therefore, for terminal user, even if A whole RSA Algorithm public key has been obtained, in addition to the difficulty of factorization is carried out to the product of prime number, and it is many not Know the resistance that encryption packet scheme is caused, reduce the difficulty that private key is cracked, improve private key security.In addition, this In inventive embodiments, RSA Algorithm private key is to be grouped by encryption center according to the encryption of storage to being stored in encryption center, during decryption Scheme and RSA Algorithm private key are to being decrypted, and terminal user can not obtain the control to this process, also greatly reduce private key The difficulty divulged a secret, improves RSA private key securities.In addition, being sent to encryption center solution by message is encrypted in message receiver When close, the mark of message receiver is also sent simultaneously, if the mark of message receiver passes through checking, encryption in encryption center Center is just decrypted, it is therefore prevented that some disabled users, which obtain, issues encryption center progress after encryption message and message serial number Decryption, further increases RSA private key securities.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is shown in which that the exemplary system architecture of the embodiment of the present application can be applied;
Fig. 2 shows the private key of the protection RSA cryptographic algorithms in message receiver side according to the application one embodiment The exemplary process diagram of the method for safety;
Fig. 3 shows the private key of the protection RSA cryptographic algorithms in message receiver side according to the application one embodiment The exemplary block diagram of the device of safety;
Fig. 4 shows the structural representation of the computer system suitable for being used for the message receiver for realizing the embodiment of the present application Figure.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that, in order to It is easy to illustrate only the part related to invention in description, accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is refer to, it illustrates the exemplary system architecture that can apply the embodiment of the present application.
As shown in figure 1, system architecture can include message sender 102, encryption center 101, message receiver 103.Disappear Breath sender 102, which refers to, will send the terminal of encryption message.Message receiver 103, which refers to, will receive the terminal of encryption message.Here Terminal can be the various forms of terminals such as computer, mobile phone, PDA, board units on vehicle.In the embodiment of the present invention In, encryption center is to specify encryption packet scheme, RSA Algorithm public key pair and RSA for each packet to calculate for one-time pad encryption Method private key pair, the encryption specified is sent to message sender 102 and is grouped scheme so that message is sent out along rich 102 encryption message, and Receive and the encryption packet scheme and RSA stored when encrypting is utilized after the encryption message for the message receiver 103 for having passed through checking Algorithm private key is to the platform that is decrypted.It can be server or cloud server of a LAN etc..
As mentioned in the background art, RSA Algorithm is based on a foolproof number theory fact:Two big prime number is multiplied Very easily, but be intended to its product carry out factorization it is extremely difficult, therefore product can be disclosed as encrypt it is close Key.But the today reached its maturity in Distributed Calculation and quantum computer theory, RSA private key securities are challenged.Therefore, Need a kind of scheme for the private key safety that can improve RSA cryptographic algorithms.
In the embodiment of the present application, it is not, integrally with a RSA public key encryption, and to be decrypted message with a RSA private key, But message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, with corresponding RSA Algorithm private key To decryption, and packet scheme is stored in encryption center, and terminal user can not be known, therefore, for terminal user, even if A whole RSA Algorithm public key has been obtained, in addition to the difficulty of factorization is carried out to the product of prime number, and it is many not Know the resistance that encryption packet scheme is caused, reduce the difficulty that private key is cracked, improve private key security.In addition, this In inventive embodiments, RSA Algorithm private key is to be grouped by encryption center according to the encryption of storage to being stored in encryption center, during decryption Scheme and RSA Algorithm private key are to being decrypted, and terminal user can not obtain the control to this process, also greatly reduce private key The difficulty divulged a secret, improves RSA private key securities.In addition, being sent to encryption center solution by message is encrypted in message receiver When close, the mark of message receiver is also sent simultaneously, if the mark of message receiver passes through checking, encryption in encryption center Center is just decrypted, it is therefore prevented that some disabled users, which obtain, issues encryption center progress after encryption message and message serial number Decryption, further increases RSA private key securities.
With reference to Fig. 2, it illustrates the method for the private key safety of the protection RSA cryptographic algorithms according to the application one embodiment Exemplary process diagram.Method shown in Fig. 2 can be in Fig. 1 message receiver 103 perform.
As shown in Fig. 2 in step 210, encryption message and message serial number from message sender are received, wherein, In the case where message sender needs encryption message, encryption packet proposal request is sent to encryption center, encryption center is received To after encryption packet proposal request, the encryption for message to be grouped is specified to be grouped scheme and corresponding with encryption packet scheme Message serial number, for each packet, specify the first prime number and the second prime number, determined based on the first prime number and the second prime number RSA Algorithm public key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to Message sender, message sender according to specify encryption packet scheme and for each packet RSA Algorithm public key to right Message carries out rsa encryption, and sends encryption message.
In one embodiment, message sender 102 desires to message receiver 103 and sends a message, in order to prevent Third party obtains the message, it is necessary to by the message encryption.So, even if third party has intercepted the encryption message, it can not also know Content therein.In the case where message sender 102 wants encryption message, sending encryption packet scheme to encryption center please Ask, for asking encryption packet scheme.Encryption packet scheme is the scheme of the packet for providing to be divided into message in encryption. It is not integrally with a RSA public key encryption, and with a RSA private key solution by message as described above, in the embodiment of the present application It is close, but message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, use corresponding RSA Algorithm Private key is to decryption.So, once third party obtains encryption message, the side of factorization is carried out with the product simply to prime number Method, which cracks private key, does not have effect, because message is packet, third party does not know that what packet scheme is.
Encryption center is received after encryption packet proposal request, specifies the encryption for message to be grouped to be grouped scheme. In one embodiment, specifying the specific practice of the encryption packet scheme for message to be grouped can be:Regulation one adds in advance The set of close packet scheme.After encryption packet proposal request is received, an encryption packet scheme is randomly selected from set Set.
For example, there is four kinds of encryption packet schemes in set:
Scheme 1:According to data volume 1:1:1:The data to be encrypted of 1 decile;
Scheme 2:According to data volume 1:2:1:2 data to be encrypted of segmentation;
Scheme 3:According to data volume 1:3:1:3 data to be encrypted of segmentation;
Scheme 4:According to data volume 1:2:3:4 data to be encrypted of segmentation.
After encryption packet proposal request is received, encryption packet scheme 4 is randomly selected out from set.I.e. encrypting Data according to data volume 1:2:3:4 are divided into four parts.
Then, encryption center specifies message serial number corresponding with encryption packet scheme.Preferably, encryption center every time should The message serial number that the encryption packet proposal request of message sender is specified is different.The effect of message serial number is:In solution When close, encryption when encryption center will find the message encryption according to message serial number is grouped scheme, for each point The RSA Algorithm private key pair of group.Therefore, the message serial number for allowing the encryption packet proposal request for answering message sender every time to be specified is mutual Differ so that encrypt packet scheme, the RSA for each packet when the message encryption is searched in decrypting process are calculated Unique encryption packet scheme, RSA Algorithm private key pair can be found during method private key pair, the effect for improving decryption efficiency is played.If Be not it is different it is necessary to by encryption times, message sender mark etc. factor further recognize that effect can be reduced.
Encryption center is specified after encryption packet scheme and message serial number, for each packet, specified first prime number p and the Two prime number q.In one embodiment, it can be concentrated from default prime number and choose the first prime number p and the second prime number q.Default matter Manifold includes multiple prime numbers.It can therefrom appoint when needing and specifying prime number every time and take two prime numbers.If the prime number that prime number is concentrated If enough, the first prime number p, the second prime number q permutation and combination are a lot, the possible RSA Algorithm private key pair finally obtained can Can property it is also a lot, reduce RSA Algorithm private key to according to the private key that has cracked to the possibility that is guessed.
In addition, in one embodiment, the first prime number p, the second prime number q can be determined by message sender.For the matter Each prime number distribution prime number numbering in manifold, the encryption that message sender is sent to encryption center is grouped in proposal request with finger Fixed the first prime number numbering and the second prime number numbering.The first prime number of selection and the second prime number is concentrated to include from default prime number:Root The first prime number and the second prime number are chosen according to the first prime number numbering and the second prime number numbering that are carried in encryption packet proposal request.
That is, concentrating each prime number to distribute a unique numbering for prime number, the numbering is different.Message is sent Mono- prime number number abstract of Fang Yongyou.When message sender is to encryption center transmission encryption packet proposal request, appoint in the request Two numberings that meaning is added in inventory.Encryption center is chosen pair according to the two numberings added in encryption packet proposal request The first prime number and the second prime number answered.So so that the selection center not encrypted of the first prime number, the second prime number is controlled, increased Plus the randomness that first prime number, the second prime number are chosen, so that increasing RSA private keys cracks difficulty.
Then, encryption center determines RSA Algorithm public key pair and RSA Algorithm private key based on the first prime number p and the second prime number q It is right.
In one embodiment, determine RSA Algorithm public key pair and RSA Algorithm private key to including:
Take e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
If n=pq, it is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair.
RSA Algorithm public key is what disclosure came out to (n, e1), for example, regularly publish, or is issued on special webpage.RSA Algorithm private key is stored in encryption center to (n, e2).Because it is stored in encryption center rather than each terminal, reduces private key and let out The risk of dew.
Then, specified encryption is grouped scheme by encryption center and corresponding message serial number is sent to message sender.
Then, message sender is according to the encryption packet scheme specified and the RSA Algorithm public key pair for each packet Rsa encryption is carried out to message.Specifically, message is grouped by message sender according to encryption packet scheme, for each packet, is gone Corresponding RSA Algorithm public key is searched to carrying out rsa encryption.Because RSA Algorithm public key is to being to announce out, therefore it can be disappeared Breath sender finds.In one embodiment, for a packet, (n, e1) is encrypted using RSA Algorithm public key Process includes:B=A^e1mod n are made, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.
After each block encryption, the result after each block encryption is synthesized together, encryption message is used as.
Then message sender is sent to message receiver by message is encrypted.
In step S220, the mark of message receiver, the encryption message received and message serial number are sent to Encryption center.
Message receiver is received after encryption message and message serial number, and they are issued together with the mark of oneself and added Close center.The meaning for sending the mark of oneself is, allows encryption center to be verified.Only encryption center is verified, encryption Center can just be decrypted, thus prevent third party intercept encryption message and message serial number after can also allow encryption center decryption from And cause it is dangerous.
In step S230, if it is determined that the mark of message receiver, by checking, is received from encryption in encryption center Message after the decryption at center, wherein, the encryption center finds corresponding with the message serial number according to the message serial number The encryption packet scheme and RSA Algorithm private key pair for each packet, it is corresponding with the message serial number based on finding The encryption packet scheme and RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, obtains described Message after decryption.
In one embodiment, determine the mark of message receiver is included in encryption center by checking:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that disappear The mark for ceasing recipient passes through checking.
Default legal identification list be exactly it is set in advance by be considered as legal terminal mark all include into The list come.If the mark for the terminal that hair encryption message is decrypted to encryption center is just verified in this list.Instead It, then authentication failed, without decryption.
In embodiments of the present invention, if the mark of message receiver in encryption center by checking, encryption center just enters Row decryption, it is therefore prevented that some disabled users issue encryption center and be decrypted after obtaining encryption message and message serial number, enter One step improves RSA private key securities.
The mark of message receiver is after encryption center is by checking, and encryption center is found according to the message serial number Encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet.In step S210 In, encryption center answer an encryption packet proposal request specify encryption packet scheme, the RSA Algorithm public key for each packet and After private key and message serial number corresponding with encryption packet scheme, their correspondences are stored.So, when encryption center is from disappearing Breath recipient is received after encryption message and message serial number, can just be found according to message serial number and the message serial number Corresponding encryption packet scheme and the RSA Algorithm private key pair for each packet.
Encryption center according to the message serial number find it is corresponding with the message serial number encryption packet scheme and For each packet RSA Algorithm private key to rear, based on find encryption packet scheme corresponding with the message serial number, with And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message.
Specifically, in one embodiment, encryption center is grouped according to encryption packet scheme by message is encrypted, for One of packet, makes A=B^e2mod n, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.So Afterwards, it will be synthesized together for the result after each packet deciphering, as message after decryption.
Then, message after decryption is sent to message receiver by encryption center.
It should be noted that although the operation of the inventive method is described with particular order in the accompanying drawings, this is not required that Or imply that these must be performed according to the particular order operates, or the operation having to carry out shown in whole could realize the phase The result of prestige.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some Multiple steps are merged into a step execution, and/or a step is decomposed into execution of multiple steps by step.
With further reference to Fig. 3, it illustrates the protection rsa encryption in message receiver according to the application one embodiment The exemplary block diagram of the device 300 of the private key safety of algorithm.
As shown in figure 3, protection RSA cryptographic algorithms private key safety device 300 can include the first receiving unit 310, Second transmitting element 320, the second receiving unit 330.
First receiving unit 310 receives encryption message and message serial number from message sender, wherein, in message hair In the case that the side of sending needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption point After group proposal request, the encryption for message to be grouped is specified to be grouped scheme and message flow corresponding with encryption packet scheme Water number, for each packet, specifies the first prime number and the second prime number, determines that RSA Algorithm is public based on the first prime number and the second prime number Key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to message transmission Side, message sender according to the encryption packet scheme specified and for each packet RSA Algorithm public key to being carried out to message Rsa encryption, and send encryption message.
In one embodiment, message sender 102 desires to message receiver 103 and sends a message, in order to prevent Third party obtains the message, it is necessary to by the message encryption.So, even if third party has intercepted the encryption message, it can not also know Content therein.In the case where message sender 102 wants encryption message, sending encryption packet scheme to encryption center please Ask, for asking encryption packet scheme.Encryption packet scheme is the scheme of the packet for providing to be divided into message in encryption. It is not integrally with a RSA public key encryption, and with a RSA private key solution by message as described above, in the embodiment of the present application It is close, but message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, use corresponding RSA Algorithm Private key is to decryption.So, once third party obtains encryption message, the side of factorization is carried out with the product simply to prime number Method, which cracks private key, does not have effect, because message is packet, third party does not know that what packet scheme is.
Encryption center is received after encryption packet proposal request, specifies the encryption for message to be grouped to be grouped scheme. In one embodiment, specifying the specific practice of the encryption packet scheme for message to be grouped can be:Regulation one adds in advance The set of close packet scheme.After encryption packet proposal request is received, an encryption packet scheme is randomly selected from set Set.
For example, there is four kinds of encryption packet schemes in set:
Scheme 1:According to data volume 1:1:1:The data to be encrypted of 1 decile;
Scheme 2:According to data volume 1:2:1:2 data to be encrypted of segmentation;
Scheme 3:According to data volume 1:3:1:3 data to be encrypted of segmentation;
Scheme 4:According to data volume 1:2:3:4 data to be encrypted of segmentation.
After encryption packet proposal request is received, encryption packet scheme 4 is randomly selected out from set.I.e. encrypting Data according to data volume 1:2:3:4 are divided into four parts.
Then, encryption center specifies message serial number corresponding with encryption packet scheme.Preferably, encryption center every time should The message serial number that the encryption packet proposal request of message sender is specified is different.The effect of message serial number is:In solution When close, encryption when encryption center will find the message encryption according to message serial number is grouped scheme, for each point The RSA Algorithm private key pair of group.Therefore, the message serial number for allowing the encryption packet proposal request for answering message sender every time to be specified is mutual Differ so that encrypt packet scheme, the RSA for each packet when the message encryption is searched in decrypting process are calculated Unique encryption packet scheme, RSA Algorithm private key pair can be found during method private key pair, the effect for improving decryption efficiency is played.If Be not it is different it is necessary to by encryption times, message sender mark etc. factor further recognize that effect can be reduced.
Encryption center is specified after encryption packet scheme and message serial number, for each packet, specified first prime number p and the Two prime number q.In one embodiment, it can be concentrated from default prime number and choose the first prime number p and the second prime number q.Default matter Manifold includes multiple prime numbers.It can therefrom appoint when needing and specifying prime number every time and take two prime numbers.If the prime number that prime number is concentrated If enough, the first prime number p, the second prime number q permutation and combination are a lot, the possible RSA Algorithm private key pair finally obtained can Can property it is also a lot, reduce RSA Algorithm private key to according to the private key that has cracked to the possibility that is guessed.
In addition, in one embodiment, the first prime number p, the second prime number q can be determined by message sender.For the matter Each prime number distribution prime number numbering in manifold, the encryption that message sender is sent to encryption center is grouped in proposal request with finger Fixed the first prime number numbering and the second prime number numbering.The first prime number of selection and the second prime number is concentrated to include from default prime number:Root The first prime number and the second prime number are chosen according to the first prime number numbering and the second prime number numbering that are carried in encryption packet proposal request.
That is, concentrating each prime number to distribute a unique numbering for prime number, the numbering is different.Message is sent Mono- prime number number abstract of Fang Yongyou.When message sender is to encryption center transmission encryption packet proposal request, appoint in the request Two numberings that meaning is added in inventory.Encryption center is chosen pair according to the two numberings added in encryption packet proposal request The first prime number and the second prime number answered.So so that the selection center not encrypted of the first prime number, the second prime number is controlled, increased Plus the randomness that first prime number, the second prime number are chosen, so that increasing RSA private keys cracks difficulty.
Then, encryption center determines RSA Algorithm public key pair and RSA Algorithm private key based on the first prime number p and the second prime number q It is right.
In one embodiment, determine RSA Algorithm public key pair and RSA Algorithm private key to including:
Take e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
If n=pq, it is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair.
RSA Algorithm public key is what disclosure came out to (n, e1), for example, regularly publish, or is issued on special webpage.RSA Algorithm private key is stored in encryption center to (n, e2).Because it is stored in encryption center rather than each terminal, reduces private key and let out The risk of dew.
Then, specified encryption is grouped scheme by encryption center and corresponding message serial number is sent to message sender.
Then, message sender is according to the encryption packet scheme specified and the RSA Algorithm public key pair for each packet Rsa encryption is carried out to message.Specifically, message is grouped by message sender according to encryption packet scheme, for each packet, is gone Corresponding RSA Algorithm public key is searched to carrying out rsa encryption.Because RSA Algorithm public key is to being to announce out, therefore it can be disappeared Breath sender finds.In one embodiment, for a packet, (n, e1) is encrypted using RSA Algorithm public key Process includes:B=A^e1mod n are made, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.
After each block encryption, the result after each block encryption is synthesized together, encryption message is used as.
Then message sender is sent to message receiver by message is encrypted.
First transmitting element 320 sends the mark of message receiver, the encryption message received and message serial number To encryption center.
Message receiver is received after encryption message and message serial number, and they are issued together with the mark of oneself and added Close center.The meaning for sending the mark of oneself is, allows encryption center to be verified.Only encryption center is verified, encryption Center can just be decrypted, thus prevent third party intercept encryption message and message serial number after can also allow encryption center decryption from And cause it is dangerous.
If it is determined that the mark of message receiver encryption center by checking, the second receiving unit 330 receive from plus Message after the decryption at close center, wherein, the encryption center is found and the message serial number pair according to the message serial number The encryption packet scheme and RSA Algorithm private key pair for each packet answered, based on finding and the message serial number pair The encryption packet scheme answered and the RSA Algorithm private key pair for each packet, carry out RSA decryption to encryption message, obtain institute State message after decryption.
In one embodiment, determine the mark of message receiver is included in encryption center by checking:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that disappear The mark for ceasing recipient passes through checking.
Default legal identification list be exactly it is set in advance by be considered as legal terminal mark all include into The list come.If the mark for the terminal that hair encryption message is decrypted to encryption center is just verified in this list.Instead It, then authentication failed, without decryption.
In embodiments of the present invention, if the mark of message receiver in encryption center by checking, encryption center just enters Row decryption, it is therefore prevented that some disabled users issue encryption center and be decrypted after obtaining encryption message and message serial number, enter One step improves RSA private key securities.
The mark of message receiver is after encryption center is by checking, and encryption center is found according to the message serial number Encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet.In encryption, plus Close center answer an encryption packet proposal request specify encryption packet scheme, RSA Algorithm public key and private key for each packet, And after message serial number corresponding with encryption packet scheme, their correspondences are stored.So, when encryption center is from message sink Side is received after encryption message and message serial number, can just be found according to message serial number corresponding with the message serial number Encrypt packet scheme and the RSA Algorithm private key pair for each packet.
Encryption center according to the message serial number find it is corresponding with the message serial number encryption packet scheme and For each packet RSA Algorithm private key to rear, based on find encryption packet scheme corresponding with the message serial number, with And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message.
Specifically, in one embodiment, encryption center is grouped according to encryption packet scheme by message is encrypted, for One of packet, makes A=B^e2mod n, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.So Afterwards, it will be synthesized together for the result after each packet deciphering, as message after decryption.
Then, message after decryption is sent to message receiver by encryption center.
Below with reference to Fig. 4, it illustrates suitable for for the computer system for the message receiver for realizing the embodiment of the present application 400 structural representation.
As shown in figure 4, computer system 400 includes CPU (CPU) 401, it can be read-only according to being stored in Program in memory (ROM) 402 or be loaded into program in random access storage device (RAM) 403 from storage part 408 and Perform various appropriate actions and processing.In RAM 403, the system that is also stored with 400 operates required various programs and data. CPU 401, ROM 402 and RAM 403 are connected with each other by bus 404.Input/output (I/O) interface 405 is also connected to always Line 404.
I/O interfaces 405 are connected to lower component:Importation 406 including keyboard, mouse etc.;Penetrated including such as negative electrode The output par, c 407 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 408 including hard disk etc.; And the communications portion 409 of the NIC including LAN card, modem etc..Communications portion 409 via such as because The network of spy's net performs communication process.Driver 410 is also according to needing to be connected to I/O interfaces 405.Detachable media 411, such as Disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 410, in order to read from it as needed Computer program be mounted into as needed storage part 408.
Especially, in accordance with an embodiment of the present disclosure, it may be implemented as computer software above with reference to Fig. 2 processes described Program.For example, embodiment of the disclosure includes a kind of computer program product, it includes being tangibly embodied in machine readable media On computer program, the computer program include be used for perform Fig. 2 method program code.
In such embodiments, the computer program can be downloaded and installed by communications portion 409 from network, And/or be mounted from detachable media 411.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation The part of one module of table, program segment or code, a part for the module, program segment or code is comprising one or more Executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, institute in square frame The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also It is noted that the combination of each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart, Ke Yiyong Perform the special hardware based system of defined function or operation to realize, or can be referred to specialized hardware with computer The combination of order is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also Realized by way of hardware.Described unit or module can also be set within a processor.These units or module Title does not constitute the restriction to the unit or module in itself under certain conditions.
As on the other hand, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium Matter can be the computer-readable recording medium included in device described in above-described embodiment;Can also be individualism, not It is fitted into the computer-readable recording medium in equipment.Computer-readable recording medium storage has one or more than one journey Sequence, described program is used for performing the formula input method for being described in the application by one or more than one processor.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to the technology of the particular combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the inventive concept, is carried out by above-mentioned technical characteristic or its equivalent feature Other technical schemes formed by any combination.Such as features described above has similar work(with (but not limited to) disclosed herein The technical characteristic of energy carries out technical scheme formed by replacement mutually.

Claims (10)

1. a kind of method of the private key safety of protection RSA cryptographic algorithms, it is characterised in that methods described includes:
Encryption message and message serial number from message sender are received, wherein, need to encrypt message in message sender In the case of, encryption packet proposal request is sent to encryption center, encryption center receives after encryption packet proposal request, specifies and use In the encryption packet scheme and message serial number corresponding with encryption packet scheme that are grouped message, for each packet, refer to Fixed first prime number and the second prime number, RSA Algorithm public key pair and RSA Algorithm private key pair are determined based on the first prime number and the second prime number, And specified encryption packet scheme and corresponding message serial number are sent to message sender, message sender is according to specified Encryption packet scheme and for each packet RSA Algorithm public key to carrying out rsa encryption to message, and send encryption and disappear Breath;
The mark of message receiver, the encryption message received and message serial number are sent to encryption center;
If it is determined that the mark of message receiver encryption center by checking, receive the decryption from encryption center after message, Wherein, the encryption center according to the message serial number find encryption packet scheme corresponding with the message serial number, with And for the RSA Algorithm private key pair of each packet, based on find encryption packet scheme corresponding with the message serial number, with And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message, message after the decryption is obtained.
2. according to the method described in claim 1, it is characterised in that determine that RSA Algorithm is public based on the first prime number and the second prime number Key pair and RSA Algorithm private key to including:
If the first prime number is p, the second prime number is q, takes e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
It is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair, wherein n=pq.
3. method according to claim 2, it is characterised in that scheme is grouped and for each according to specified encryption The RSA Algorithm public key of packet includes to carrying out rsa encryption to message:
For the packet in encryption packet scheme, B=A^e1mod n are made, wherein, A is plaintext, and B is ciphertext, and ^ is XOR, Mod is modular arithmetic.
4. method according to claim 3, it is characterised in that based on finding encryption corresponding with the message serial number Packet scheme and the RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, including:
For the packet in encryption packet scheme, A=B^e2mod n are made, wherein, A is plaintext, and B is ciphertext, and ^ is XOR, Mod is modular arithmetic.
5. the first prime number and the second prime number according to the method described in claim 1, it is characterised in that for each packet, are specified, Including:
Concentrated from default prime number and choose the first prime number and the second prime number.
6. method according to claim 5, it is characterised in that concentrate each prime number distribution prime number numbering for the prime number, With the first prime number numbering specified and the second prime number in the encryption packet proposal request that message sender is sent to encryption center Numbering,
The first prime number of selection and the second prime number is concentrated to include from default prime number:According to the carried in encryption packet proposal request One prime number is numbered and the second prime number numbering chooses the first prime number and the second prime number.
7. according to according to the method described in claim 1, it is characterised in that the RSA Algorithm public key pair for each packet Published by encryption center, so as to be obtained by message sender.
8. according to the method described in claim 1, it is characterised in that encryption center answers the encryption packet side of message sender every time The message serial number that case request is specified is different.
9. according to the method described in claim 1, it is characterised in that determine the mark of message receiver in encryption center by testing Card includes:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that message connects The mark of debit passes through checking.
10. a kind of device of the private key safety of protection RSA cryptographic algorithms, it is characterised in that described device includes:
First receiving unit, for receiving encryption message and message serial number from message sender, wherein, sent in message In the case that side needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption packet After proposal request, the encryption for message to be grouped is specified to be grouped scheme and message flowing water corresponding with encryption packet scheme Number, for each packet, the first prime number and the second prime number are specified, RSA Algorithm public key is determined based on the first prime number and the second prime number Pair and RSA Algorithm private key pair, and specified encryption is grouped scheme and corresponding message serial number is sent to message sender, Message sender according to specify encryption packet scheme and for each packet RSA Algorithm public key to message carry out RSA Encryption, and send encryption message;
First transmitting element, for the mark of message receiver, the encryption message received and message serial number to be sent to Encryption center;
Second receiving unit, for if it is determined that message receiver mark encryption center by checking, receive from encryption Message after the decryption at center, wherein, the encryption center finds corresponding with the message serial number according to the message serial number The encryption packet scheme and RSA Algorithm private key pair for each packet, it is corresponding with the message serial number based on finding The encryption packet scheme and RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, obtains described Message after decryption.
CN201710419536.0A 2017-06-06 2017-06-06 The method and apparatus for protecting the private key safety of RSA cryptographic algorithms Pending CN107222305A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710419536.0A CN107222305A (en) 2017-06-06 2017-06-06 The method and apparatus for protecting the private key safety of RSA cryptographic algorithms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710419536.0A CN107222305A (en) 2017-06-06 2017-06-06 The method and apparatus for protecting the private key safety of RSA cryptographic algorithms

Publications (1)

Publication Number Publication Date
CN107222305A true CN107222305A (en) 2017-09-29

Family

ID=59948352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710419536.0A Pending CN107222305A (en) 2017-06-06 2017-06-06 The method and apparatus for protecting the private key safety of RSA cryptographic algorithms

Country Status (1)

Country Link
CN (1) CN107222305A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055128A (en) * 2017-12-18 2018-05-18 数安时代科技股份有限公司 Generation method, device, storage medium and the computer equipment of RSA key
CN109040111A (en) * 2018-09-03 2018-12-18 平安普惠企业管理有限公司 Data ciphering method, device, computer equipment and storage medium
CN112702712A (en) * 2020-12-25 2021-04-23 江苏鸣实纯钧科技有限公司 Method and system for encrypted data transmission of vehicle-mounted terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035042A (en) * 1997-12-10 2000-03-07 Allegheny Teledyne Inc. High speed and method of providing high speed table generation for block encryption
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN101064595B (en) * 2006-04-27 2011-07-27 联想(北京)有限公司 Computer network safe input authentication system and method
CN102074240B (en) * 2010-12-24 2012-03-14 中国科学院声学研究所 Digital audio watermarking algorithm for copyright management
CN103107885A (en) * 2013-01-16 2013-05-15 深圳市怡化电脑有限公司 Detecting method and system of information security of automatic teller machine (ATM)
CN106487512A (en) * 2015-08-31 2017-03-08 北京同方微电子有限公司 A kind of RSA key is to quick-speed generation system and method
CN106649587A (en) * 2016-11-17 2017-05-10 国家电网公司 High-security desensitization method based on big data information system
CN106789963A (en) * 2016-12-02 2017-05-31 北京洋浦伟业科技发展有限公司 Asymmetric whitepack cipher encrypting method and device and equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035042A (en) * 1997-12-10 2000-03-07 Allegheny Teledyne Inc. High speed and method of providing high speed table generation for block encryption
CN101064595B (en) * 2006-04-27 2011-07-27 联想(北京)有限公司 Computer network safe input authentication system and method
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN102074240B (en) * 2010-12-24 2012-03-14 中国科学院声学研究所 Digital audio watermarking algorithm for copyright management
CN103107885A (en) * 2013-01-16 2013-05-15 深圳市怡化电脑有限公司 Detecting method and system of information security of automatic teller machine (ATM)
CN106487512A (en) * 2015-08-31 2017-03-08 北京同方微电子有限公司 A kind of RSA key is to quick-speed generation system and method
CN106649587A (en) * 2016-11-17 2017-05-10 国家电网公司 High-security desensitization method based on big data information system
CN106789963A (en) * 2016-12-02 2017-05-31 北京洋浦伟业科技发展有限公司 Asymmetric whitepack cipher encrypting method and device and equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055128A (en) * 2017-12-18 2018-05-18 数安时代科技股份有限公司 Generation method, device, storage medium and the computer equipment of RSA key
CN108055128B (en) * 2017-12-18 2021-11-19 数安时代科技股份有限公司 RSA key generation method, RSA key generation device, storage medium and computer equipment
CN109040111A (en) * 2018-09-03 2018-12-18 平安普惠企业管理有限公司 Data ciphering method, device, computer equipment and storage medium
CN112702712A (en) * 2020-12-25 2021-04-23 江苏鸣实纯钧科技有限公司 Method and system for encrypted data transmission of vehicle-mounted terminal

Similar Documents

Publication Publication Date Title
Bos et al. Elliptic curve cryptography in practice
EP3091690B1 (en) Rsa decryption using multiplicative secret sharing
EP3552338B1 (en) Method of rsa signature or decryption protected using a homomorphic encryption
EP2304636B1 (en) Mobile device assisted secure computer network communications
CN109728906B (en) Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
EP2228942A1 (en) Securing communications sent by a first user to a second user
CN107483212A (en) A kind of method of both sides' cooperation generation digital signature
CN108347419A (en) Data transmission method and device
CN110224812A (en) A kind of method and equipment that the electronic signature mobile client calculated based on Secure is communicated with Collaboration Server
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
CN105656634B (en) Secret protection batch authentication method without pairing operation in vehicular ad hoc network
CN109921905B (en) Anti-quantum computation key negotiation method and system based on private key pool
Hsieh et al. Exploiting hash functions to intensify the remote user authentication scheme
EP3729713B1 (en) Homomorphic encryption for password authentication
CN109905229B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool
CN107222305A (en) The method and apparatus for protecting the private key safety of RSA cryptographic algorithms
Jamaludin et al. Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security
CN109495244A (en) Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys
CN111639345A (en) Secure multi-party cloud computing method and system based on homomorphic encryption
Diffie et al. New Directions in cryptography (1976)
CN112765667B (en) Privacy protection method, device and system based on block chain
CN106789963A (en) Asymmetric whitepack cipher encrypting method and device and equipment
US20040120519A1 (en) Method for enhancing security of public key encryption schemas
CN104253692B (en) Key management method and device based on SE
Shinde et al. Faster RSA algorithm for decryption using Chinese remainder theorem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor

Applicant after: Beijing Bang Bang Safety Technology Co. Ltd.

Address before: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor

Applicant before: Yangpuweiye Technology Limited

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170929

RJ01 Rejection of invention patent application after publication