CN106211108A - A kind of message encryption method based on RSA PKI - Google Patents

A kind of message encryption method based on RSA PKI Download PDF

Info

Publication number
CN106211108A
CN106211108A CN201610550887.0A CN201610550887A CN106211108A CN 106211108 A CN106211108 A CN 106211108A CN 201610550887 A CN201610550887 A CN 201610550887A CN 106211108 A CN106211108 A CN 106211108A
Authority
CN
China
Prior art keywords
certificate
peer
note
private key
rsa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610550887.0A
Other languages
Chinese (zh)
Inventor
郑东
宋新龙
张悦
敖章衡
张应辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201610550887.0A priority Critical patent/CN106211108A/en
Publication of CN106211108A publication Critical patent/CN106211108A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Abstract

The invention discloses a kind of message encryption method based on RSA PKI, including: communication entity obtains the digital certificate of individual and corresponding private key by third party CA;Communication entity carries out bindings to the identity of oneself with public key certificate and private key, it is intended that the root of trust of certificate;Communication entity is linked up with peer-to-peer communications entity, specify the public key certificate of peer-to-peer communications entity, public key information and identity information to peer-to-peer communications entity carry out one_to_one corresponding, peer-to-peer communications entity can return public key certificate information to former communication entity, after taking this certificate, peer-to-peer communications entity information is mapped one by one with certificate;The certificate of communication entity peer-to-peer communications entity carries out RSA public key encryption to note, and by classical channel, the note after encryption is sent to communication entity;After peer-to-peer communications entity receives information, input RSA private key protection password, recovers the plaintext that sender sends.

Description

A kind of message encryption method based on RSA PKI
Technical field
The invention belongs to cyberspace security technology area, particularly relate to a kind of message encryption method based on RSA PKI.
Background technology
Due to popularizing rapidly of network, the fast development of digitizing technique, cyberspace safety problem, gradually enter into people The visual field, paid attention to by people.Facing network environment complicated and changeable, potential Cyberthreat and attack, computer data is pacified Entirely with encryption, increasingly paid close attention to by people.How to ensure data safety in transmitting procedure so that information is not Stolen by illegal third party, it appears particularly important;Data encryption is as safe practice most basic in network, little with its cost, Defence the most effectively enjoys the favor of people.RSA Algorithm is current the most influential public key encryption algorithm, is to write most Name, most widely used public key cryptosyst.As far back as 1978, just by Rivest, the Shamir by Massachusetts Institute Technology (MIT) Propose in entitled " obtain digital signature and the method for public key cryptosystem " paper with Adleman, be one based on number theory Asymmetric (open key) cipher system, be a kind of block cipher system;Its title comes from the name lead-in of three inventors Female;It is recommended as public key cryptography standards by ISO;If the length long enough of its key, by the information of rsa encryption the most not Can be broken by solution;At present, RSA can be divided into 1024 bits and 2048 bits two kinds according to key length.RSA Algorithm is based on several points Solve: two Big prime are multiplied very easy, but it is extremely difficult to be intended to carry out its product factorization, therefore can be by Product is open as encryption key;The advantage of RSA Algorithm has: 1. can be simultaneously used for the algorithm of encrypted and digitally signed;2. it is prone to Understand and operation;3. encryption key and the AES of this algorithm separates so that encryption key distribution is more convenient;4. it is particularly well-suited to Network environment, for a large number of users on network, can be given encryption key in the way of PKI catalogue.In recent years, intelligence The every aspect of people's life has been taken in mobile terminal, and people utilize the equipment such as mobile phone, panel computer to entertain, social, shopping etc. Movable.Based on the short message sending of one of function become the important component part of daily life especially.According to statistics, only 2013 Whole world short message sending has just reached 10.3 trillion.Although in recent years, some MSNs occupy the half of mobile phone market Wall rivers and mountains, but undeniable, and MSN still has a lot of drawback: 1. be overly dependent upon network, if having left number According to network, MSN just can not use;2. MSN needs to pre-install client, if having one in communicating pair Side is fitted without client, then communication just cannot proceed;3. MSN present stage still gives people a kind of non-official Side, the most rigorous sensation;People notify important thing, are the most also intended to utilize the means of communication such as note, phone.
But, people's note used in everyday, but it is faced with the threat from aspects such as Malwares, world-renowned safety Symantec of manufacturer has delivered a report, claims in all Androids are applied, and having percent 17 is all malicious application, often less than 6 Existing for a Malware in individual Android App, its degree of spreading unchecked has some idea of.Statistics also claims, in 2013 1 year, and Android There are about 700,000 malice App on platform;And by 2014, Android malice App quantity rose to 1,000,000.These Malware can steal user privacy information, lures that user opens paid service etc. into.One of them of Malware is important Target is exactly to steal the short message content of user.
Summary of the invention
It is an object of the invention to provide a kind of message encryption method based on RSA PKI, it is intended to solve the most daily making Note there is Malware and can steal user privacy information, the problem that privacy of user is leaked.
The present invention is achieved in that a kind of message encryption method based on RSA PKI, described based on RSA PKI short Letter encryption method comprises the following steps:
Step one, communication entity submits to personally identifiable information application documents to lead to registration body's examination & verification, registration body's examination & verification After crossing, application documents being submitted to CA center, CA Central Radical application documents accordingly sign and issue personal digital certificate and corresponding private key. Personal digital certificate and the corresponding private key of generation are given communication entity centrally through storage devices such as USB flash disks by CA.Utilize authority's machine The personal digital certificate that structure is issued, communication entity with valid certificates own identification, thus can realize the encryption of self private data Protection.
Step 2, communication entity carries out bindings to the identity of oneself with public key certificate and private key, it is intended that the letter of certificate Ren Gen;
Step 3, communication entity is linked up with peer-to-peer communications entity, it is intended that the public key certificate of peer-to-peer communications entity, to right Carrying out one_to_one corresponding Deng public key information and the identity information of communication entity, peer-to-peer communications entity can return PKI to former communication entity Certificate information, after taking this certificate, maps with certificate one by one by peer-to-peer communications entity information;
Step 4, the certificate of communication entity peer-to-peer communications entity carries out RSA public key encryption to note, will encryption after short Believe and be sent to communication entity by classical channel;
Step 5, after peer-to-peer communications entity receives information, input RSA private key protection password, sender is sent Recover in plain text.
Further, the content of described binding includes: personally identifiable information and certificate, private key one_to_one corresponding;Personal identification is believed Breath includes telephone number, unit and name.
Further, the root of trust of described appointment certificate, the public key certificate file to cer entitled with suffix, entitled with suffix The private key file of pfx browses and specifies.
Further, during mapping, call the api function that the primary system of Android provides, obtain address list name And correspondence phone, utilize Shareparefence that each attribute field is carried out key-value pair operation associated simultaneously.
Further, note being carried out RSA public key encryption, encryption function can read PKI from certificate file, will disappear in plain text Breath Base64 performs the encoding operation, then is encrypted the clear-text message after coding in plain text with PKI, after encryption Encoded note is adjusted back to the interactive interface sending note by the ecosystem interface that Android provides.
Another object of the present invention is to provide the SMS encryption system of a kind of described message encryption method based on RSA PKI System, described SMS encryption system includes:
Sign and issue personal digital certificate CA center, be that new user signs and issues for the individual digital application documents submitted to according to user This people's digital certificate and corresponding private key file;
Certificate private key binding module, for specifying personal digital certificate and private key file path and the cell-phone number using user Binding, generates identity attribute file;
Deciphering SMS module, is used for receiving note, according to identity attribute file, it is thus achieved that private key file path, and according to defeated The decryption password entered obtains private key, thus deciphers note;
Read SMS module, for calling system note data storehouse, short message is presented to user;
Encrypted short message module, is used for sending note, according to the personal digital certificate of recipient, Encrypted short message;
Send SMS module, send note for calling system SMS transmission module;
Signature short message module, for calling the identity attribute file of binding, it is thus achieved that private key file, for the note label sent Name, verifies the integrity of note for recipient.
Another object of the present invention is to provide message encryption method based on RSA PKI described in a kind of application Android mobile platform.
Another object of the present invention is to provide a kind of and apply the key of described message encryption method based on RSA PKI altogether Enjoy method.
Another object of the present invention is to provide a kind of numeral label applying described message encryption method based on RSA PKI Name method.
Another object of the present invention is to provide a kind of electronics postal applying described message encryption method based on RSA PKI Part encryption method.
The message encryption method based on RSA PKI that the present invention provides, compared with prior art, has following useful effect Really:
(1) present invention does not has to realize secret communication by the ancillary hardware in any external world, practical, development cost Low, less energy consumption: specifically, the development cost low Android of showing application have employed the Java language of SUN company exploitation, Java language is a high-level language, owing to not having pointer, need not deliberately remove managing internal memory, so introduction is the fastest.Its two, Android itself has abundant API Calls interface, meets most exploitation demand, additionally, also have number on the internet Measure huge functional storehouse of increasing income.: and less energy consumption show the APK file of generation be independent operating in android system, only Needing the virtual machine by Android ecosystem, the most any auxiliary equipment just can realize encrypting and decrypting, not to system Itself cause the change on any source code, the function sent short messages do not carried out the amendment on any source code, it is achieved be simple, And need not ROOT authority.
(2) present invention is during using, delivery information by channel be classical channels, rely on network not too much.
(3) present invention employs RSA cryptographic algorithms, the safety of algorithm is high, and efficiency is of a relatively high.Such as, 1999, one Platform Cray super computer has used the key having decomposed 512 bit lengths 5 months, and decomposes 768 RSA key required times Being thousands of times of 512,1024 required times are then more than 1,000 times of 768, the most commonly used 1024 The safest, and use 2048 to be perfectly safe;Be applicable to actual environment, one-to-many, many-to-one address list Formula communication environment: specifically, by the characteristic of public encryption system, multiple PKIs can be corresponded to multiple users by user, Then according to PKI, the entity of each communication is encrypted, the most also may select same PKI corresponding to a communication Group, is satisfied with in many people communication and controls for the access in the content of user between group.
(4) present invention efficiently solves the distribution problem of key in double-card dual-standby, in double card environment, user is the most permissible By on the number bundling of two card correspondences to a pair public and private key, corresponding number bundling can be blocked in two to public and private by two again On.Depend entirely on user's demand for safety;User need not cryptography background really up to the mark just skillfully can be made software With, Consumer's Experience is relatively good.
(5) present invention is truly realized correspondence and bindings technically, and major part interface is all Android with function The function of system ecosystem, such as short message sending, address list etc., thus compact, installation kit is less than 2M;RSA is a kind of current The most influential public key encryption algorithm, is recommended as public key data encryption standard by ISO.RSA is except being used for encrypting, it may also be used for Authentication theory, the field of cryptography such as digital signature.E-mail enciphered system is then can apply to based on RSA public key cryptography The fields such as system, enterprises private file protection.
Accompanying drawing explanation
Fig. 1 is the message encryption method flow chart based on RSA PKI that the present invention realizes being provided.
Fig. 2 is the SMS encryption system structure schematic diagram based on RSA PKI that the present invention realizes being provided.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with embodiment, to the present invention It is further elaborated.Should be appreciated that and described herein be embodied as only in order to explain the present invention, be not used to limit Determine the present invention.
The certificate that the present invention issues by third party's trust authority CA, it is ensured that between communication entity A and communication entity B Secure communication.The information that communication entity A sends to B, only communication entity B can be deciphered, the eavesdropping that any centre is artificial, dislike Stealing of meaning software, all can not spy upon the content of short message itself.
Below in conjunction with the accompanying drawings the application principle of the present invention is explained in detail.
As it is shown in figure 1, the message encryption method based on RSA PKI that the present invention realizes being provided comprises the following steps:
S101: communication entity, obtains the digital certificate of individual and corresponding private key by third party CA;
S102: communication entity (sender) carries out bindings to the identity of oneself with public key certificate and private key;Binding Content includes: personally identifiable information (including telephone number, unit, name) and certificate, private key one_to_one corresponding, such as the card of A binding A Book, private key;Simultaneously, it is intended that the root of trust of certificate;
S103: communication entity (sender) is linked up with peer-to-peer communications entity (recipient), it is intended that peer-to-peer communications entity Public key certificate, the public key information of peer-to-peer communications entity and identity information are carried out one_to_one corresponding, peer-to-peer communications entity (receives Side) a public key certificate information can be returned to former communication entity (sender), after sender takes this certificate, by recipient's information (telephone number, name, unit) maps one by one with certificate;
S104: sender carries out RSA public key encryption with the certificate of recipient to note, by the note after encryption by classics Channel is sent to recipient;
S105: after recipient receives information, input RSA private key protection password, the plaintext that sender sends is carried out Recover.
As in figure 2 it is shown, the SMS encryption system based on RSA PKI that the present invention realizes being provided includes:
Sign and issue personal digital certificate CA center: this CA center is the personal digital certificate label realized according to the design of X509 standard The system of sending out.CA center is that new user signs and issues this people's digital certificate and corresponding private according to the individual digital application documents that user submits to Key file.
Certificate private key binding module: specify personal digital certificate and private key file path to tie up with the cell-phone number using user Fixed, generate identity attribute file.
Deciphering SMS module: be used for receiving note, according to identity attribute file, it is thus achieved that private key file path, and according to defeated The decryption password entered obtains private key, thus deciphers note.
Reading SMS module: calling system note data storehouse, presents to user by short message.
Encrypted short message module: be used for sending note, according to the personal digital certificate of recipient, Encrypted short message.
Send SMS module: calling system SMS transmission module sends note.
Signature short message module: call the identity attribute file of binding, it is thus achieved that private key file, for the note signature sent, uses The integrity of note is verified in recipient.Below in conjunction with specific embodiment, the application principle of the present invention is further described.
The message encryption method based on RSA PKI that the present invention realizes being provided comprises the following steps:
Step one, communication entity A and B, obtain the digital certificate of individual and corresponding private key by third party CA, specifically obtain The process of obtaining is that registration body audits by afterwards, by Shen by submitting to personally identifiable information application documents to audit to registration body Please submit to CA center by file, CA Central Radical application documents accordingly sign and issue personal digital certificate and corresponding private key.CA is centrally through U Personal digital certificate and the corresponding private key of generation are given user by the storage devices such as dish, and then user obtains the digital certificate of individual With corresponding private key.
Step 2, communication entity A carries out bindings to the identity of oneself with public key certificate and private key;The content bag of binding Include: personally identifiable information (including telephone number, unit and name) and certificate, private key one_to_one corresponding.Such as the certificate of A binding A, private Key;Simultaneously, it is intended that the root of trust of certificate, during specifying, software built-in browsing file function, can be to entitled with suffix The public key certificate file of cer, the private key file of pfx entitled with suffix browses and specifies;This software of remaining paper can be to it Carry out ignoring process;In binding procedure, we utilize Shareparefence pair that the primary system of Android provides for developer It is operation associated that each attribute field carries out key-value pair;The technology such as code synchronisation and inner classes constructor is utilized to ensure operation associated Thread safety.
Step 3, communication entity (sender A) links up with peer-to-peer communications entity (recipient B), and sender A specifies and connects The public key certificate of debit B, public key information and identity information to peer-to-peer communications entity carry out one_to_one corresponding;Specifically, equity Communication entity (recipient) can return a public key certificate information to former communication entity (sender), and sender takes this certificate After, recipient's information (telephone number, name, unit) is mapped one by one with certificate;During mapping, call The api function that the primary system of Android provides, obtains address list name and corresponding phone, utilizes the primary system of Android simultaneously That each attribute field is carried out key-value pair is operation associated for the Shareparefence provided for developer;Utilize code synchronisation and The technology such as inner classes constructor ensure operation associated Thread safety.
Step 4, sender carries out RSA public key encryption with the certificate of recipient to note, and encryption function can be from certificate file Middle reading PKI, performs the encoding operation clear-text message Base64 simultaneously, then with PKI to the clear-text message after coding in plain text It is encrypted, the encoded note after encryption is adjusted back to sending note by the ecosystem interface that Android provides Interactive interface, then it is sent to recipient by classical channel;Select the reason using interactive interface and non-immediate backstage to send be by Relatively big to the change of primary system in a lot of android system, add the constraint application such as API hook and directly transmit connecing of note Mouthful, directly transmit and be likely to result in software malloc failure malloc during sending.
Step 5, after recipient receives information, input RSA private key protection password, enters the plaintext that sender sends Row recovers.After reply, then encode with Base64, finally recover cleartext information.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Any amendment, equivalent and the improvement etc. made within god and principle, should be included within the scope of the present invention.

Claims (10)

1. a message encryption method based on RSA PKI, it is characterised in that described message encryption method based on RSA PKI Comprise the following steps:
Step one, communication entity obtains the digital certificate of individual and corresponding private key by third party CA;
Step 2, communication entity carries out bindings to the identity of oneself with public key certificate and private key, it is intended that the root of trust of certificate;
Step 3, communication entity is linked up with peer-to-peer communications entity, it is intended that the public key certificate of peer-to-peer communications entity, leads to equity The public key information of reliable body and identity information carry out one_to_one corresponding, and peer-to-peer communications entity can return public key certificate to former communication entity Information, after taking this certificate, maps with certificate one by one by peer-to-peer communications entity information;
Step 4, the certificate of communication entity peer-to-peer communications entity carries out RSA public key encryption to note, the note after encryption is led to Cross classical channel and be sent to communication entity;
Step 5, after peer-to-peer communications entity receives information, input RSA private key protection password, the plaintext that sender is sent Recover.
2. message encryption method based on RSA PKI as claimed in claim 1, it is characterised in that the content bag of described binding Include: personally identifiable information and certificate, private key one_to_one corresponding;Personally identifiable information includes telephone number, unit, name.
3. message encryption method based on RSA PKI as claimed in claim 1, it is characterised in that the letter of described appointment certificate Ren Gen, the public key certificate file to cer entitled with suffix, the private key file of pfx entitled with suffix browses and specifies.
4. message encryption method based on RSA PKI as claimed in claim 1, it is characterised in that during mapping, adjust The api function provided by the primary system of Android, obtains address list name and corresponding phone, utilizes simultaneously It is operation associated that Shareparefence carries out key-value pair to each attribute field.
5. message encryption method based on RSA PKI as claimed in claim 1, it is characterised in that note is carried out RSA PKI Encryption, encryption function can read PKI from certificate file, clear-text message Base64 be performed the encoding operation, then with PKI pair Clear-text message after coding is encrypted in plain text, the ecosystem encoded note after encryption provided by Android Interface is adjusted back to the interactive interface sending note.
6. the SMS encryption system of a message encryption method based on RSA PKI as claimed in claim 1, it is characterised in that Described SMS encryption system includes:
Digital certificate CA center, is that new user signs and issues personal digital certificate for the individual digital application documents submitted to according to user With corresponding private key file;
Certificate private key binding module, for specifying personal digital certificate and private key file path to tie up with the cell-phone number using user Fixed, generate identity attribute file;
Deciphering SMS module, is used for receiving note, according to identity attribute file, it is thus achieved that private key file path, and according to input Decryption password obtains private key, thus deciphers note;
Read SMS module, for calling system note data storehouse, short message is presented to user;
Encrypted short message module, is used for sending note, according to the personal digital certificate of recipient, Encrypted short message;
Send SMS module, send note for calling system SMS transmission module;
Signature short message module, for calling the identity attribute file of binding, it is thus achieved that private key file, for the note signature sent, uses The integrity of note is verified in recipient.
7. apply the Android of message encryption method based on RSA PKI described in claim 1-5 any one to move flat for one kind Platform.
8. apply the key sharing method of message encryption method based on RSA PKI described in claim 1-5 any one for one kind.
9. apply the digital signature method of message encryption method based on RSA PKI described in claim 1-5 any one for one kind.
10. apply the E-mail enciphered of message encryption method based on RSA PKI described in claim 1-5 any one for one kind Method.
CN201610550887.0A 2016-07-13 2016-07-13 A kind of message encryption method based on RSA PKI Pending CN106211108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610550887.0A CN106211108A (en) 2016-07-13 2016-07-13 A kind of message encryption method based on RSA PKI

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610550887.0A CN106211108A (en) 2016-07-13 2016-07-13 A kind of message encryption method based on RSA PKI

Publications (1)

Publication Number Publication Date
CN106211108A true CN106211108A (en) 2016-12-07

Family

ID=57477911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610550887.0A Pending CN106211108A (en) 2016-07-13 2016-07-13 A kind of message encryption method based on RSA PKI

Country Status (1)

Country Link
CN (1) CN106211108A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110390207A (en) * 2019-06-26 2019-10-29 江苏大学 A kind of shopping online personal information method for secret protection and send method with charge free
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040050742A (en) * 2002-12-09 2004-06-17 한국전자통신연구원 Apparatus for public key cryptography on the prime field
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040050742A (en) * 2002-12-09 2004-06-17 한국전자통신연구원 Apparatus for public key cryptography on the prime field
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王继林,苏万力: "密钥管理", 《信息安全导论》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787369A (en) * 2019-04-03 2020-10-16 深圳Tcl数字技术有限公司 Root authority control method and system for smart television and storage medium
CN110390207A (en) * 2019-06-26 2019-10-29 江苏大学 A kind of shopping online personal information method for secret protection and send method with charge free

Similar Documents

Publication Publication Date Title
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
US11880831B2 (en) Encryption system, encryption key wallet and method
CN101789865B (en) Dedicated server used for encryption and encryption method
CN102082790B (en) Method and device for encryption/decryption of digital signature
CN103138938B (en) Based on SM2 certificate request and the application process of CSP
CN111314089A (en) SM 2-based two-party collaborative signature method and decryption method
CN109951453A (en) A kind of safe encryption method based on block chain
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN106254342A (en) The secure cloud storage method of file encryption is supported under Android platform
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN103457932A (en) Data safety storage method and system under cloud computing environment
CN108650080A (en) A kind of key management method and system
CN107612680A (en) A kind of national secret algorithm in mobile network's payment
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
CN103186720A (en) Digital rights management method, equipment and system
CN113055376A (en) Block chain data protection system
Zhou et al. Implementation of cryptographic algorithm in dynamic QR code payment system and its performance
CN106713349A (en) Inter-group proxy re-encryption method capable of resisting selected ciphertext attack
Gimenez-Aguilar et al. Zephyrus: An information hiding mechanism leveraging Ethereum data fields
CN109831305A (en) Anti- quantum calculation label decryption method and system based on unsymmetrical key pond
CN106211108A (en) A kind of message encryption method based on RSA PKI
CN110519040B (en) Anti-quantum computation digital signature method and system based on identity
Wang et al. Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
Awadh et al. Using steganography for secure data storage in cloud computing
CN107689867B (en) Key protection method and system under open environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207

RJ01 Rejection of invention patent application after publication