CN107222305A - The method and apparatus for protecting the private key safety of RSA cryptographic algorithms - Google Patents
The method and apparatus for protecting the private key safety of RSA cryptographic algorithms Download PDFInfo
- Publication number
- CN107222305A CN107222305A CN201710419536.0A CN201710419536A CN107222305A CN 107222305 A CN107222305 A CN 107222305A CN 201710419536 A CN201710419536 A CN 201710419536A CN 107222305 A CN107222305 A CN 107222305A
- Authority
- CN
- China
- Prior art keywords
- encryption
- message
- packet
- prime number
- rsa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application discloses a kind of method and apparatus of the private key safety of protection RSA cryptographic algorithms.Methods described includes:Receive encryption message and message serial number from message sender;The mark of message receiver, the encryption message received and message serial number are sent to encryption center;If it is determined that the mark of message receiver passes through checking in encryption center, receive message after the decryption from encryption center, wherein, encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet, carry out RSA decryption to encryption message accordingly when the encryption center finds encryption according to the message serial number.The present invention improves the private key safety of RSA cryptographic algorithms.
Description
Technical field
The disclosure relates generally to field of computer technology, and in particular to filed of network information security, more particularly to a kind of guarantor
The method for protecting the private key safety of RSA cryptographic algorithms.
Background technology
RSA public key encryption algorithms are 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamirs
What (Adi Shamir) and Leonard A Deman (Leonard Adleman) were proposed together.RSA is exactly that their three people's surnames are opened
The alphabetical composition that is stitched together of head.RSA is current most influential public key encryption algorithm, and up to the present it can resist
The most cryptographic attacks known, are recommended as public key data encryption standard by ISO.
It is true that RSA Algorithm is based on a foolproof number theory:Two big prime number is multiplied very easy, but is intended to pair
It is extremely difficult that its product carries out factorization, therefore can disclose product and be used as encryption key.
At present, only short RSA private keys are only possible to be broken by brute force approach solution.Untill 2008, do not appoint also in the world
What reliably cracks the mode of RSA private keys.But the today reached its maturity in Distributed Calculation and quantum computer theory, RSA is private
Key security is challenged.
Accordingly, it would be desirable to a kind of scheme for the private key safety that can improve RSA cryptographic algorithms.
The content of the invention
In view of drawbacks described above of the prior art or deficiency, the private key of RSA cryptographic algorithms can be improved by it is expected that offer is a kind of
The technology of safety.
In a first aspect, the embodiment of the present application provides a kind of method for the private key safety for protecting RSA cryptographic algorithms, the side
Method includes:Encryption message and message serial number from message sender are received, wherein, need to encrypt message in message sender
In the case of, encryption packet proposal request is sent to encryption center, encryption center is received after encryption packet proposal request, specified
Encryption for message to be grouped is grouped scheme and message serial number corresponding with encryption packet scheme, for each packet,
The first prime number and the second prime number are specified, RSA Algorithm public key pair and RSA Algorithm private key are determined based on the first prime number and the second prime number
It is right, and specified encryption packet scheme and corresponding message serial number are sent to message sender, message sender is according to finger
Fixed encryption packet scheme and for each packet RSA Algorithm public key to carrying out rsa encryption to message, and send encryption
Message;The mark of message receiver, the encryption message received and message serial number are sent to encryption center;If really
Determine the mark of message receiver in encryption center by checking, receive message after the decryption from encryption center, wherein, it is described plus
Close center finds encryption packet scheme corresponding with the message serial number and for each point according to the message serial number
The RSA Algorithm private key pair of group, based on finding encryption packet scheme and for each point corresponding with the message serial number
The RSA Algorithm private key pair of group, carries out RSA decryption to encryption message, obtains message after the decryption.
Second aspect, the embodiment of the present application provides a kind of device for the private key safety for protecting RSA cryptographic algorithms, the dress
Put including:First receiving unit, for receiving encryption message and message serial number from message sender, wherein, in message
In the case that sender needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption
It is grouped after proposal request, specifies the encryption for message to be grouped to be grouped scheme and message corresponding with encryption packet scheme
Serial number, for each packet, specifies the first prime number and the second prime number, RSA Algorithm is determined based on the first prime number and the second prime number
Public key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to message transmission
Side, message sender according to the encryption packet scheme specified and for each packet RSA Algorithm public key to being carried out to message
Rsa encryption, and send encryption message;First transmitting element, for by the mark of message receiver, the encryption message received,
And message serial number is sent to encryption center;Second receiving unit, for if it is determined that the mark of message receiver is in encryption
Centrally through checking, message after the decryption from encryption center is received, wherein, the encryption center is according to the message serial number
The encryption packet scheme and RSA Algorithm private key pair for each packet corresponding with the message serial number is found, based on looking into
The encryption packet scheme corresponding with the message serial number found and the RSA Algorithm private key pair for each packet, to encryption
Message carries out RSA decryption, obtains message after the decryption.
The third aspect, the embodiment of the present application provides a kind of equipment, including processor, memory and display;It is described to deposit
Reservoir is included can be caused the computing device by the instruction of the computing device:Receive the encryption from message sender
Message and message serial number, wherein, in the case where message sender needs encryption message, encryption packet is sent to encryption center
Proposal request, encryption center is received after encryption packet proposal request, specify the encryption for message to be grouped be grouped scheme, with
And message serial number corresponding with encryption packet scheme, for each packet, the first prime number and the second prime number are specified, based on first
Prime number and the second prime number determine RSA Algorithm public key pair and RSA Algorithm private key pair, and by specified encryption packet scheme and correspondingly
Message serial number be sent to message sender, message sender is grouped scheme and for each point according to the encryption specified
The RSA Algorithm public key of group sends encryption message to carrying out rsa encryption to message;By the mark of message receiver, receive
Encryption message and message serial number are sent to encryption center;If it is determined that the mark of message receiver passes through in encryption center
Checking, receive the decryption from encryption center after message, wherein, the encryption center according to the message serial number find with
The corresponding encryption packet scheme and RSA Algorithm private key pair for each packet of the message serial number, based on find with
The corresponding encryption packet scheme of the message serial number and the RSA Algorithm private key pair for each packet, are carried out to encryption message
RSA is decrypted, and obtains message after the decryption.
Fourth aspect, the embodiment of the present application provides a kind of machine readable media, comprising computer program, the computer
Program includes being used to perform following program code:Receive the encryption message and message flowing water of the message sender in car networking
Number, wherein it is described encryption message be with key corresponding with message serial number encrypt vehicle message, the message serial number and
Key corresponding with message serial number asks granting when needing to send vehicle message from message sender to encryption center;It will disappear
The message serial number for ceasing the mark of recipient and receiving is sent to encryption center;If the mark of message receiver is in encryption
The heart is received from encryption center key corresponding with the message serial number by certification;And with the secret key decryption received
The encryption message, to obtain the vehicle message.
In the embodiment of the present application, it is not, integrally with a RSA public key encryption, and to be decrypted message with a RSA private key,
But message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, with corresponding RSA Algorithm private key
To decryption, and packet scheme is stored in encryption center, and terminal user can not be known, therefore, for terminal user, even if
A whole RSA Algorithm public key has been obtained, in addition to the difficulty of factorization is carried out to the product of prime number, and it is many not
Know the resistance that encryption packet scheme is caused, reduce the difficulty that private key is cracked, improve private key security.In addition, this
In inventive embodiments, RSA Algorithm private key is to be grouped by encryption center according to the encryption of storage to being stored in encryption center, during decryption
Scheme and RSA Algorithm private key are to being decrypted, and terminal user can not obtain the control to this process, also greatly reduce private key
The difficulty divulged a secret, improves RSA private key securities.In addition, being sent to encryption center solution by message is encrypted in message receiver
When close, the mark of message receiver is also sent simultaneously, if the mark of message receiver passes through checking, encryption in encryption center
Center is just decrypted, it is therefore prevented that some disabled users, which obtain, issues encryption center progress after encryption message and message serial number
Decryption, further increases RSA private key securities.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is shown in which that the exemplary system architecture of the embodiment of the present application can be applied;
Fig. 2 shows the private key of the protection RSA cryptographic algorithms in message receiver side according to the application one embodiment
The exemplary process diagram of the method for safety;
Fig. 3 shows the private key of the protection RSA cryptographic algorithms in message receiver side according to the application one embodiment
The exemplary block diagram of the device of safety;
Fig. 4 shows the structural representation of the computer system suitable for being used for the message receiver for realizing the embodiment of the present application
Figure.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that, in order to
It is easy to illustrate only the part related to invention in description, accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is refer to, it illustrates the exemplary system architecture that can apply the embodiment of the present application.
As shown in figure 1, system architecture can include message sender 102, encryption center 101, message receiver 103.Disappear
Breath sender 102, which refers to, will send the terminal of encryption message.Message receiver 103, which refers to, will receive the terminal of encryption message.Here
Terminal can be the various forms of terminals such as computer, mobile phone, PDA, board units on vehicle.In the embodiment of the present invention
In, encryption center is to specify encryption packet scheme, RSA Algorithm public key pair and RSA for each packet to calculate for one-time pad encryption
Method private key pair, the encryption specified is sent to message sender 102 and is grouped scheme so that message is sent out along rich 102 encryption message, and
Receive and the encryption packet scheme and RSA stored when encrypting is utilized after the encryption message for the message receiver 103 for having passed through checking
Algorithm private key is to the platform that is decrypted.It can be server or cloud server of a LAN etc..
As mentioned in the background art, RSA Algorithm is based on a foolproof number theory fact:Two big prime number is multiplied
Very easily, but be intended to its product carry out factorization it is extremely difficult, therefore product can be disclosed as encrypt it is close
Key.But the today reached its maturity in Distributed Calculation and quantum computer theory, RSA private key securities are challenged.Therefore,
Need a kind of scheme for the private key safety that can improve RSA cryptographic algorithms.
In the embodiment of the present application, it is not, integrally with a RSA public key encryption, and to be decrypted message with a RSA private key,
But message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, with corresponding RSA Algorithm private key
To decryption, and packet scheme is stored in encryption center, and terminal user can not be known, therefore, for terminal user, even if
A whole RSA Algorithm public key has been obtained, in addition to the difficulty of factorization is carried out to the product of prime number, and it is many not
Know the resistance that encryption packet scheme is caused, reduce the difficulty that private key is cracked, improve private key security.In addition, this
In inventive embodiments, RSA Algorithm private key is to be grouped by encryption center according to the encryption of storage to being stored in encryption center, during decryption
Scheme and RSA Algorithm private key are to being decrypted, and terminal user can not obtain the control to this process, also greatly reduce private key
The difficulty divulged a secret, improves RSA private key securities.In addition, being sent to encryption center solution by message is encrypted in message receiver
When close, the mark of message receiver is also sent simultaneously, if the mark of message receiver passes through checking, encryption in encryption center
Center is just decrypted, it is therefore prevented that some disabled users, which obtain, issues encryption center progress after encryption message and message serial number
Decryption, further increases RSA private key securities.
With reference to Fig. 2, it illustrates the method for the private key safety of the protection RSA cryptographic algorithms according to the application one embodiment
Exemplary process diagram.Method shown in Fig. 2 can be in Fig. 1 message receiver 103 perform.
As shown in Fig. 2 in step 210, encryption message and message serial number from message sender are received, wherein,
In the case where message sender needs encryption message, encryption packet proposal request is sent to encryption center, encryption center is received
To after encryption packet proposal request, the encryption for message to be grouped is specified to be grouped scheme and corresponding with encryption packet scheme
Message serial number, for each packet, specify the first prime number and the second prime number, determined based on the first prime number and the second prime number
RSA Algorithm public key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to
Message sender, message sender according to specify encryption packet scheme and for each packet RSA Algorithm public key to right
Message carries out rsa encryption, and sends encryption message.
In one embodiment, message sender 102 desires to message receiver 103 and sends a message, in order to prevent
Third party obtains the message, it is necessary to by the message encryption.So, even if third party has intercepted the encryption message, it can not also know
Content therein.In the case where message sender 102 wants encryption message, sending encryption packet scheme to encryption center please
Ask, for asking encryption packet scheme.Encryption packet scheme is the scheme of the packet for providing to be divided into message in encryption.
It is not integrally with a RSA public key encryption, and with a RSA private key solution by message as described above, in the embodiment of the present application
It is close, but message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, use corresponding RSA Algorithm
Private key is to decryption.So, once third party obtains encryption message, the side of factorization is carried out with the product simply to prime number
Method, which cracks private key, does not have effect, because message is packet, third party does not know that what packet scheme is.
Encryption center is received after encryption packet proposal request, specifies the encryption for message to be grouped to be grouped scheme.
In one embodiment, specifying the specific practice of the encryption packet scheme for message to be grouped can be:Regulation one adds in advance
The set of close packet scheme.After encryption packet proposal request is received, an encryption packet scheme is randomly selected from set
Set.
For example, there is four kinds of encryption packet schemes in set:
Scheme 1:According to data volume 1:1:1:The data to be encrypted of 1 decile;
Scheme 2:According to data volume 1:2:1:2 data to be encrypted of segmentation;
Scheme 3:According to data volume 1:3:1:3 data to be encrypted of segmentation;
Scheme 4:According to data volume 1:2:3:4 data to be encrypted of segmentation.
After encryption packet proposal request is received, encryption packet scheme 4 is randomly selected out from set.I.e. encrypting
Data according to data volume 1:2:3:4 are divided into four parts.
Then, encryption center specifies message serial number corresponding with encryption packet scheme.Preferably, encryption center every time should
The message serial number that the encryption packet proposal request of message sender is specified is different.The effect of message serial number is:In solution
When close, encryption when encryption center will find the message encryption according to message serial number is grouped scheme, for each point
The RSA Algorithm private key pair of group.Therefore, the message serial number for allowing the encryption packet proposal request for answering message sender every time to be specified is mutual
Differ so that encrypt packet scheme, the RSA for each packet when the message encryption is searched in decrypting process are calculated
Unique encryption packet scheme, RSA Algorithm private key pair can be found during method private key pair, the effect for improving decryption efficiency is played.If
Be not it is different it is necessary to by encryption times, message sender mark etc. factor further recognize that effect can be reduced.
Encryption center is specified after encryption packet scheme and message serial number, for each packet, specified first prime number p and the
Two prime number q.In one embodiment, it can be concentrated from default prime number and choose the first prime number p and the second prime number q.Default matter
Manifold includes multiple prime numbers.It can therefrom appoint when needing and specifying prime number every time and take two prime numbers.If the prime number that prime number is concentrated
If enough, the first prime number p, the second prime number q permutation and combination are a lot, the possible RSA Algorithm private key pair finally obtained can
Can property it is also a lot, reduce RSA Algorithm private key to according to the private key that has cracked to the possibility that is guessed.
In addition, in one embodiment, the first prime number p, the second prime number q can be determined by message sender.For the matter
Each prime number distribution prime number numbering in manifold, the encryption that message sender is sent to encryption center is grouped in proposal request with finger
Fixed the first prime number numbering and the second prime number numbering.The first prime number of selection and the second prime number is concentrated to include from default prime number:Root
The first prime number and the second prime number are chosen according to the first prime number numbering and the second prime number numbering that are carried in encryption packet proposal request.
That is, concentrating each prime number to distribute a unique numbering for prime number, the numbering is different.Message is sent
Mono- prime number number abstract of Fang Yongyou.When message sender is to encryption center transmission encryption packet proposal request, appoint in the request
Two numberings that meaning is added in inventory.Encryption center is chosen pair according to the two numberings added in encryption packet proposal request
The first prime number and the second prime number answered.So so that the selection center not encrypted of the first prime number, the second prime number is controlled, increased
Plus the randomness that first prime number, the second prime number are chosen, so that increasing RSA private keys cracks difficulty.
Then, encryption center determines RSA Algorithm public key pair and RSA Algorithm private key based on the first prime number p and the second prime number q
It is right.
In one embodiment, determine RSA Algorithm public key pair and RSA Algorithm private key to including:
Take e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
If n=pq, it is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair.
RSA Algorithm public key is what disclosure came out to (n, e1), for example, regularly publish, or is issued on special webpage.RSA
Algorithm private key is stored in encryption center to (n, e2).Because it is stored in encryption center rather than each terminal, reduces private key and let out
The risk of dew.
Then, specified encryption is grouped scheme by encryption center and corresponding message serial number is sent to message sender.
Then, message sender is according to the encryption packet scheme specified and the RSA Algorithm public key pair for each packet
Rsa encryption is carried out to message.Specifically, message is grouped by message sender according to encryption packet scheme, for each packet, is gone
Corresponding RSA Algorithm public key is searched to carrying out rsa encryption.Because RSA Algorithm public key is to being to announce out, therefore it can be disappeared
Breath sender finds.In one embodiment, for a packet, (n, e1) is encrypted using RSA Algorithm public key
Process includes:B=A^e1mod n are made, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.
After each block encryption, the result after each block encryption is synthesized together, encryption message is used as.
Then message sender is sent to message receiver by message is encrypted.
In step S220, the mark of message receiver, the encryption message received and message serial number are sent to
Encryption center.
Message receiver is received after encryption message and message serial number, and they are issued together with the mark of oneself and added
Close center.The meaning for sending the mark of oneself is, allows encryption center to be verified.Only encryption center is verified, encryption
Center can just be decrypted, thus prevent third party intercept encryption message and message serial number after can also allow encryption center decryption from
And cause it is dangerous.
In step S230, if it is determined that the mark of message receiver, by checking, is received from encryption in encryption center
Message after the decryption at center, wherein, the encryption center finds corresponding with the message serial number according to the message serial number
The encryption packet scheme and RSA Algorithm private key pair for each packet, it is corresponding with the message serial number based on finding
The encryption packet scheme and RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, obtains described
Message after decryption.
In one embodiment, determine the mark of message receiver is included in encryption center by checking:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that disappear
The mark for ceasing recipient passes through checking.
Default legal identification list be exactly it is set in advance by be considered as legal terminal mark all include into
The list come.If the mark for the terminal that hair encryption message is decrypted to encryption center is just verified in this list.Instead
It, then authentication failed, without decryption.
In embodiments of the present invention, if the mark of message receiver in encryption center by checking, encryption center just enters
Row decryption, it is therefore prevented that some disabled users issue encryption center and be decrypted after obtaining encryption message and message serial number, enter
One step improves RSA private key securities.
The mark of message receiver is after encryption center is by checking, and encryption center is found according to the message serial number
Encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet.In step S210
In, encryption center answer an encryption packet proposal request specify encryption packet scheme, the RSA Algorithm public key for each packet and
After private key and message serial number corresponding with encryption packet scheme, their correspondences are stored.So, when encryption center is from disappearing
Breath recipient is received after encryption message and message serial number, can just be found according to message serial number and the message serial number
Corresponding encryption packet scheme and the RSA Algorithm private key pair for each packet.
Encryption center according to the message serial number find it is corresponding with the message serial number encryption packet scheme and
For each packet RSA Algorithm private key to rear, based on find encryption packet scheme corresponding with the message serial number, with
And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message.
Specifically, in one embodiment, encryption center is grouped according to encryption packet scheme by message is encrypted, for
One of packet, makes A=B^e2mod n, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.So
Afterwards, it will be synthesized together for the result after each packet deciphering, as message after decryption.
Then, message after decryption is sent to message receiver by encryption center.
It should be noted that although the operation of the inventive method is described with particular order in the accompanying drawings, this is not required that
Or imply that these must be performed according to the particular order operates, or the operation having to carry out shown in whole could realize the phase
The result of prestige.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, it is convenient to omit some
Multiple steps are merged into a step execution, and/or a step is decomposed into execution of multiple steps by step.
With further reference to Fig. 3, it illustrates the protection rsa encryption in message receiver according to the application one embodiment
The exemplary block diagram of the device 300 of the private key safety of algorithm.
As shown in figure 3, protection RSA cryptographic algorithms private key safety device 300 can include the first receiving unit 310,
Second transmitting element 320, the second receiving unit 330.
First receiving unit 310 receives encryption message and message serial number from message sender, wherein, in message hair
In the case that the side of sending needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption point
After group proposal request, the encryption for message to be grouped is specified to be grouped scheme and message flow corresponding with encryption packet scheme
Water number, for each packet, specifies the first prime number and the second prime number, determines that RSA Algorithm is public based on the first prime number and the second prime number
Key pair and RSA Algorithm private key pair, and specified encryption packet scheme and corresponding message serial number are sent to message transmission
Side, message sender according to the encryption packet scheme specified and for each packet RSA Algorithm public key to being carried out to message
Rsa encryption, and send encryption message.
In one embodiment, message sender 102 desires to message receiver 103 and sends a message, in order to prevent
Third party obtains the message, it is necessary to by the message encryption.So, even if third party has intercepted the encryption message, it can not also know
Content therein.In the case where message sender 102 wants encryption message, sending encryption packet scheme to encryption center please
Ask, for asking encryption packet scheme.Encryption packet scheme is the scheme of the packet for providing to be divided into message in encryption.
It is not integrally with a RSA public key encryption, and with a RSA private key solution by message as described above, in the embodiment of the present application
It is close, but message is grouped, for each packet being divided into, with a RSA Algorithm public key to encryption, use corresponding RSA Algorithm
Private key is to decryption.So, once third party obtains encryption message, the side of factorization is carried out with the product simply to prime number
Method, which cracks private key, does not have effect, because message is packet, third party does not know that what packet scheme is.
Encryption center is received after encryption packet proposal request, specifies the encryption for message to be grouped to be grouped scheme.
In one embodiment, specifying the specific practice of the encryption packet scheme for message to be grouped can be:Regulation one adds in advance
The set of close packet scheme.After encryption packet proposal request is received, an encryption packet scheme is randomly selected from set
Set.
For example, there is four kinds of encryption packet schemes in set:
Scheme 1:According to data volume 1:1:1:The data to be encrypted of 1 decile;
Scheme 2:According to data volume 1:2:1:2 data to be encrypted of segmentation;
Scheme 3:According to data volume 1:3:1:3 data to be encrypted of segmentation;
Scheme 4:According to data volume 1:2:3:4 data to be encrypted of segmentation.
After encryption packet proposal request is received, encryption packet scheme 4 is randomly selected out from set.I.e. encrypting
Data according to data volume 1:2:3:4 are divided into four parts.
Then, encryption center specifies message serial number corresponding with encryption packet scheme.Preferably, encryption center every time should
The message serial number that the encryption packet proposal request of message sender is specified is different.The effect of message serial number is:In solution
When close, encryption when encryption center will find the message encryption according to message serial number is grouped scheme, for each point
The RSA Algorithm private key pair of group.Therefore, the message serial number for allowing the encryption packet proposal request for answering message sender every time to be specified is mutual
Differ so that encrypt packet scheme, the RSA for each packet when the message encryption is searched in decrypting process are calculated
Unique encryption packet scheme, RSA Algorithm private key pair can be found during method private key pair, the effect for improving decryption efficiency is played.If
Be not it is different it is necessary to by encryption times, message sender mark etc. factor further recognize that effect can be reduced.
Encryption center is specified after encryption packet scheme and message serial number, for each packet, specified first prime number p and the
Two prime number q.In one embodiment, it can be concentrated from default prime number and choose the first prime number p and the second prime number q.Default matter
Manifold includes multiple prime numbers.It can therefrom appoint when needing and specifying prime number every time and take two prime numbers.If the prime number that prime number is concentrated
If enough, the first prime number p, the second prime number q permutation and combination are a lot, the possible RSA Algorithm private key pair finally obtained can
Can property it is also a lot, reduce RSA Algorithm private key to according to the private key that has cracked to the possibility that is guessed.
In addition, in one embodiment, the first prime number p, the second prime number q can be determined by message sender.For the matter
Each prime number distribution prime number numbering in manifold, the encryption that message sender is sent to encryption center is grouped in proposal request with finger
Fixed the first prime number numbering and the second prime number numbering.The first prime number of selection and the second prime number is concentrated to include from default prime number:Root
The first prime number and the second prime number are chosen according to the first prime number numbering and the second prime number numbering that are carried in encryption packet proposal request.
That is, concentrating each prime number to distribute a unique numbering for prime number, the numbering is different.Message is sent
Mono- prime number number abstract of Fang Yongyou.When message sender is to encryption center transmission encryption packet proposal request, appoint in the request
Two numberings that meaning is added in inventory.Encryption center is chosen pair according to the two numberings added in encryption packet proposal request
The first prime number and the second prime number answered.So so that the selection center not encrypted of the first prime number, the second prime number is controlled, increased
Plus the randomness that first prime number, the second prime number are chosen, so that increasing RSA private keys cracks difficulty.
Then, encryption center determines RSA Algorithm public key pair and RSA Algorithm private key based on the first prime number p and the second prime number q
It is right.
In one embodiment, determine RSA Algorithm public key pair and RSA Algorithm private key to including:
Take e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
If n=pq, it is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair.
RSA Algorithm public key is what disclosure came out to (n, e1), for example, regularly publish, or is issued on special webpage.RSA
Algorithm private key is stored in encryption center to (n, e2).Because it is stored in encryption center rather than each terminal, reduces private key and let out
The risk of dew.
Then, specified encryption is grouped scheme by encryption center and corresponding message serial number is sent to message sender.
Then, message sender is according to the encryption packet scheme specified and the RSA Algorithm public key pair for each packet
Rsa encryption is carried out to message.Specifically, message is grouped by message sender according to encryption packet scheme, for each packet, is gone
Corresponding RSA Algorithm public key is searched to carrying out rsa encryption.Because RSA Algorithm public key is to being to announce out, therefore it can be disappeared
Breath sender finds.In one embodiment, for a packet, (n, e1) is encrypted using RSA Algorithm public key
Process includes:B=A^e1mod n are made, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.
After each block encryption, the result after each block encryption is synthesized together, encryption message is used as.
Then message sender is sent to message receiver by message is encrypted.
First transmitting element 320 sends the mark of message receiver, the encryption message received and message serial number
To encryption center.
Message receiver is received after encryption message and message serial number, and they are issued together with the mark of oneself and added
Close center.The meaning for sending the mark of oneself is, allows encryption center to be verified.Only encryption center is verified, encryption
Center can just be decrypted, thus prevent third party intercept encryption message and message serial number after can also allow encryption center decryption from
And cause it is dangerous.
If it is determined that the mark of message receiver encryption center by checking, the second receiving unit 330 receive from plus
Message after the decryption at close center, wherein, the encryption center is found and the message serial number pair according to the message serial number
The encryption packet scheme and RSA Algorithm private key pair for each packet answered, based on finding and the message serial number pair
The encryption packet scheme answered and the RSA Algorithm private key pair for each packet, carry out RSA decryption to encryption message, obtain institute
State message after decryption.
In one embodiment, determine the mark of message receiver is included in encryption center by checking:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that disappear
The mark for ceasing recipient passes through checking.
Default legal identification list be exactly it is set in advance by be considered as legal terminal mark all include into
The list come.If the mark for the terminal that hair encryption message is decrypted to encryption center is just verified in this list.Instead
It, then authentication failed, without decryption.
In embodiments of the present invention, if the mark of message receiver in encryption center by checking, encryption center just enters
Row decryption, it is therefore prevented that some disabled users issue encryption center and be decrypted after obtaining encryption message and message serial number, enter
One step improves RSA private key securities.
The mark of message receiver is after encryption center is by checking, and encryption center is found according to the message serial number
Encryption packet scheme corresponding with the message serial number and the RSA Algorithm private key pair for each packet.In encryption, plus
Close center answer an encryption packet proposal request specify encryption packet scheme, RSA Algorithm public key and private key for each packet,
And after message serial number corresponding with encryption packet scheme, their correspondences are stored.So, when encryption center is from message sink
Side is received after encryption message and message serial number, can just be found according to message serial number corresponding with the message serial number
Encrypt packet scheme and the RSA Algorithm private key pair for each packet.
Encryption center according to the message serial number find it is corresponding with the message serial number encryption packet scheme and
For each packet RSA Algorithm private key to rear, based on find encryption packet scheme corresponding with the message serial number, with
And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message.
Specifically, in one embodiment, encryption center is grouped according to encryption packet scheme by message is encrypted, for
One of packet, makes A=B^e2mod n, wherein, A is in plain text, B is ciphertext, and ^ is XOR, and mod is modular arithmetic.So
Afterwards, it will be synthesized together for the result after each packet deciphering, as message after decryption.
Then, message after decryption is sent to message receiver by encryption center.
Below with reference to Fig. 4, it illustrates suitable for for the computer system for the message receiver for realizing the embodiment of the present application
400 structural representation.
As shown in figure 4, computer system 400 includes CPU (CPU) 401, it can be read-only according to being stored in
Program in memory (ROM) 402 or be loaded into program in random access storage device (RAM) 403 from storage part 408 and
Perform various appropriate actions and processing.In RAM 403, the system that is also stored with 400 operates required various programs and data.
CPU 401, ROM 402 and RAM 403 are connected with each other by bus 404.Input/output (I/O) interface 405 is also connected to always
Line 404.
I/O interfaces 405 are connected to lower component:Importation 406 including keyboard, mouse etc.;Penetrated including such as negative electrode
The output par, c 407 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 408 including hard disk etc.;
And the communications portion 409 of the NIC including LAN card, modem etc..Communications portion 409 via such as because
The network of spy's net performs communication process.Driver 410 is also according to needing to be connected to I/O interfaces 405.Detachable media 411, such as
Disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 410, in order to read from it as needed
Computer program be mounted into as needed storage part 408.
Especially, in accordance with an embodiment of the present disclosure, it may be implemented as computer software above with reference to Fig. 2 processes described
Program.For example, embodiment of the disclosure includes a kind of computer program product, it includes being tangibly embodied in machine readable media
On computer program, the computer program include be used for perform Fig. 2 method program code.
In such embodiments, the computer program can be downloaded and installed by communications portion 409 from network,
And/or be mounted from detachable media 411.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation
The part of one module of table, program segment or code, a part for the module, program segment or code is comprising one or more
Executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, institute in square frame
The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual
On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also
It is noted that the combination of each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart, Ke Yiyong
Perform the special hardware based system of defined function or operation to realize, or can be referred to specialized hardware with computer
The combination of order is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also
Realized by way of hardware.Described unit or module can also be set within a processor.These units or module
Title does not constitute the restriction to the unit or module in itself under certain conditions.
As on the other hand, present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium
Matter can be the computer-readable recording medium included in device described in above-described embodiment;Can also be individualism, not
It is fitted into the computer-readable recording medium in equipment.Computer-readable recording medium storage has one or more than one journey
Sequence, described program is used for performing the formula input method for being described in the application by one or more than one processor.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the application, however it is not limited to the technology of the particular combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the inventive concept, is carried out by above-mentioned technical characteristic or its equivalent feature
Other technical schemes formed by any combination.Such as features described above has similar work(with (but not limited to) disclosed herein
The technical characteristic of energy carries out technical scheme formed by replacement mutually.
Claims (10)
1. a kind of method of the private key safety of protection RSA cryptographic algorithms, it is characterised in that methods described includes:
Encryption message and message serial number from message sender are received, wherein, need to encrypt message in message sender
In the case of, encryption packet proposal request is sent to encryption center, encryption center receives after encryption packet proposal request, specifies and use
In the encryption packet scheme and message serial number corresponding with encryption packet scheme that are grouped message, for each packet, refer to
Fixed first prime number and the second prime number, RSA Algorithm public key pair and RSA Algorithm private key pair are determined based on the first prime number and the second prime number,
And specified encryption packet scheme and corresponding message serial number are sent to message sender, message sender is according to specified
Encryption packet scheme and for each packet RSA Algorithm public key to carrying out rsa encryption to message, and send encryption and disappear
Breath;
The mark of message receiver, the encryption message received and message serial number are sent to encryption center;
If it is determined that the mark of message receiver encryption center by checking, receive the decryption from encryption center after message,
Wherein, the encryption center according to the message serial number find encryption packet scheme corresponding with the message serial number, with
And for the RSA Algorithm private key pair of each packet, based on find encryption packet scheme corresponding with the message serial number, with
And for the RSA Algorithm private key pair of each packet, RSA decryption is carried out to encryption message, message after the decryption is obtained.
2. according to the method described in claim 1, it is characterised in that determine that RSA Algorithm is public based on the first prime number and the second prime number
Key pair and RSA Algorithm private key to including:
If the first prime number is p, the second prime number is q, takes e1 so that e1 and (p-1) (q-1) are relatively prime;
Take e2 so that (e2e1) mod ((p-1) (q-1))=1, mod is modular arithmetic;
It is determined that (n, e1) is RSA Algorithm public key pair, (n, e2) is RSA Algorithm private key pair, wherein n=pq.
3. method according to claim 2, it is characterised in that scheme is grouped and for each according to specified encryption
The RSA Algorithm public key of packet includes to carrying out rsa encryption to message:
For the packet in encryption packet scheme, B=A^e1mod n are made, wherein, A is plaintext, and B is ciphertext, and ^ is XOR,
Mod is modular arithmetic.
4. method according to claim 3, it is characterised in that based on finding encryption corresponding with the message serial number
Packet scheme and the RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, including:
For the packet in encryption packet scheme, A=B^e2mod n are made, wherein, A is plaintext, and B is ciphertext, and ^ is XOR,
Mod is modular arithmetic.
5. the first prime number and the second prime number according to the method described in claim 1, it is characterised in that for each packet, are specified,
Including:
Concentrated from default prime number and choose the first prime number and the second prime number.
6. method according to claim 5, it is characterised in that concentrate each prime number distribution prime number numbering for the prime number,
With the first prime number numbering specified and the second prime number in the encryption packet proposal request that message sender is sent to encryption center
Numbering,
The first prime number of selection and the second prime number is concentrated to include from default prime number:According to the carried in encryption packet proposal request
One prime number is numbered and the second prime number numbering chooses the first prime number and the second prime number.
7. according to according to the method described in claim 1, it is characterised in that the RSA Algorithm public key pair for each packet
Published by encryption center, so as to be obtained by message sender.
8. according to the method described in claim 1, it is characterised in that encryption center answers the encryption packet side of message sender every time
The message serial number that case request is specified is different.
9. according to the method described in claim 1, it is characterised in that determine the mark of message receiver in encryption center by testing
Card includes:
The mark of message receiver is compared with default legal identification list;
If the mark of message receiver is consistent with one of the legal mark in default legal identification list, it is determined that message connects
The mark of debit passes through checking.
10. a kind of device of the private key safety of protection RSA cryptographic algorithms, it is characterised in that described device includes:
First receiving unit, for receiving encryption message and message serial number from message sender, wherein, sent in message
In the case that side needs encryption message, encryption packet proposal request is sent to encryption center, encryption center receives encryption packet
After proposal request, the encryption for message to be grouped is specified to be grouped scheme and message flowing water corresponding with encryption packet scheme
Number, for each packet, the first prime number and the second prime number are specified, RSA Algorithm public key is determined based on the first prime number and the second prime number
Pair and RSA Algorithm private key pair, and specified encryption is grouped scheme and corresponding message serial number is sent to message sender,
Message sender according to specify encryption packet scheme and for each packet RSA Algorithm public key to message carry out RSA
Encryption, and send encryption message;
First transmitting element, for the mark of message receiver, the encryption message received and message serial number to be sent to
Encryption center;
Second receiving unit, for if it is determined that message receiver mark encryption center by checking, receive from encryption
Message after the decryption at center, wherein, the encryption center finds corresponding with the message serial number according to the message serial number
The encryption packet scheme and RSA Algorithm private key pair for each packet, it is corresponding with the message serial number based on finding
The encryption packet scheme and RSA Algorithm private key pair for each packet, RSA decryption is carried out to encryption message, obtains described
Message after decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419536.0A CN107222305A (en) | 2017-06-06 | 2017-06-06 | The method and apparatus for protecting the private key safety of RSA cryptographic algorithms |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710419536.0A CN107222305A (en) | 2017-06-06 | 2017-06-06 | The method and apparatus for protecting the private key safety of RSA cryptographic algorithms |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107222305A true CN107222305A (en) | 2017-09-29 |
Family
ID=59948352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710419536.0A Pending CN107222305A (en) | 2017-06-06 | 2017-06-06 | The method and apparatus for protecting the private key safety of RSA cryptographic algorithms |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107222305A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055128A (en) * | 2017-12-18 | 2018-05-18 | 数安时代科技股份有限公司 | Generation method, device, storage medium and the computer equipment of RSA key |
CN109040111A (en) * | 2018-09-03 | 2018-12-18 | 平安普惠企业管理有限公司 | Data ciphering method, device, computer equipment and storage medium |
CN112702712A (en) * | 2020-12-25 | 2021-04-23 | 江苏鸣实纯钧科技有限公司 | Method and system for encrypted data transmission of vehicle-mounted terminal |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6035042A (en) * | 1997-12-10 | 2000-03-07 | Allegheny Teledyne Inc. | High speed and method of providing high speed table generation for block encryption |
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN101064595B (en) * | 2006-04-27 | 2011-07-27 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN102074240B (en) * | 2010-12-24 | 2012-03-14 | 中国科学院声学研究所 | Digital audio watermarking algorithm for copyright management |
CN103107885A (en) * | 2013-01-16 | 2013-05-15 | 深圳市怡化电脑有限公司 | Detecting method and system of information security of automatic teller machine (ATM) |
CN106487512A (en) * | 2015-08-31 | 2017-03-08 | 北京同方微电子有限公司 | A kind of RSA key is to quick-speed generation system and method |
CN106649587A (en) * | 2016-11-17 | 2017-05-10 | 国家电网公司 | High-security desensitization method based on big data information system |
CN106789963A (en) * | 2016-12-02 | 2017-05-31 | 北京洋浦伟业科技发展有限公司 | Asymmetric whitepack cipher encrypting method and device and equipment |
-
2017
- 2017-06-06 CN CN201710419536.0A patent/CN107222305A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6035042A (en) * | 1997-12-10 | 2000-03-07 | Allegheny Teledyne Inc. | High speed and method of providing high speed table generation for block encryption |
CN101064595B (en) * | 2006-04-27 | 2011-07-27 | 联想(北京)有限公司 | Computer network safe input authentication system and method |
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN102074240B (en) * | 2010-12-24 | 2012-03-14 | 中国科学院声学研究所 | Digital audio watermarking algorithm for copyright management |
CN103107885A (en) * | 2013-01-16 | 2013-05-15 | 深圳市怡化电脑有限公司 | Detecting method and system of information security of automatic teller machine (ATM) |
CN106487512A (en) * | 2015-08-31 | 2017-03-08 | 北京同方微电子有限公司 | A kind of RSA key is to quick-speed generation system and method |
CN106649587A (en) * | 2016-11-17 | 2017-05-10 | 国家电网公司 | High-security desensitization method based on big data information system |
CN106789963A (en) * | 2016-12-02 | 2017-05-31 | 北京洋浦伟业科技发展有限公司 | Asymmetric whitepack cipher encrypting method and device and equipment |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055128A (en) * | 2017-12-18 | 2018-05-18 | 数安时代科技股份有限公司 | Generation method, device, storage medium and the computer equipment of RSA key |
CN108055128B (en) * | 2017-12-18 | 2021-11-19 | 数安时代科技股份有限公司 | RSA key generation method, RSA key generation device, storage medium and computer equipment |
CN109040111A (en) * | 2018-09-03 | 2018-12-18 | 平安普惠企业管理有限公司 | Data ciphering method, device, computer equipment and storage medium |
CN112702712A (en) * | 2020-12-25 | 2021-04-23 | 江苏鸣实纯钧科技有限公司 | Method and system for encrypted data transmission of vehicle-mounted terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bos et al. | Elliptic curve cryptography in practice | |
EP3091690B1 (en) | Rsa decryption using multiplicative secret sharing | |
EP3552338B1 (en) | Method of rsa signature or decryption protected using a homomorphic encryption | |
EP2304636B1 (en) | Mobile device assisted secure computer network communications | |
CN109728906B (en) | Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool | |
EP2228942A1 (en) | Securing communications sent by a first user to a second user | |
CN107483212A (en) | A kind of method of both sides' cooperation generation digital signature | |
CN108347419A (en) | Data transmission method and device | |
CN110224812A (en) | A kind of method and equipment that the electronic signature mobile client calculated based on Secure is communicated with Collaboration Server | |
CN107918731A (en) | Method and apparatus for controlling the authority to access to open interface | |
CN105656634B (en) | Secret protection batch authentication method without pairing operation in vehicular ad hoc network | |
CN109921905B (en) | Anti-quantum computation key negotiation method and system based on private key pool | |
Hsieh et al. | Exploiting hash functions to intensify the remote user authentication scheme | |
EP3729713B1 (en) | Homomorphic encryption for password authentication | |
CN109905229B (en) | Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool | |
CN107222305A (en) | The method and apparatus for protecting the private key safety of RSA cryptographic algorithms | |
Jamaludin et al. | Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security | |
CN109495244A (en) | Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys | |
CN111639345A (en) | Secure multi-party cloud computing method and system based on homomorphic encryption | |
Diffie et al. | New Directions in cryptography (1976) | |
CN112765667B (en) | Privacy protection method, device and system based on block chain | |
CN106789963A (en) | Asymmetric whitepack cipher encrypting method and device and equipment | |
US20040120519A1 (en) | Method for enhancing security of public key encryption schemas | |
CN104253692B (en) | Key management method and device based on SE | |
Shinde et al. | Faster RSA algorithm for decryption using Chinese remainder theorem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant after: Beijing Bang Bang Safety Technology Co. Ltd. Address before: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant before: Yangpuweiye Technology Limited |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |
|
RJ01 | Rejection of invention patent application after publication |