CN106850212A - Key generation system and method based on rsa cryptosystem algorithm - Google Patents

Key generation system and method based on rsa cryptosystem algorithm Download PDF

Info

Publication number
CN106850212A
CN106850212A CN201710129114.XA CN201710129114A CN106850212A CN 106850212 A CN106850212 A CN 106850212A CN 201710129114 A CN201710129114 A CN 201710129114A CN 106850212 A CN106850212 A CN 106850212A
Authority
CN
China
Prior art keywords
rsa
module
modulus value
factor
integer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710129114.XA
Other languages
Chinese (zh)
Inventor
董庆宽
吴克强
樊凯
薄星
李军辉
陶雅欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201710129114.XA priority Critical patent/CN106850212A/en
Publication of CN106850212A publication Critical patent/CN106850212A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of key generation system based on rsa cryptosystem algorithm and method, present system includes:Multiplication module, random number module, pretreatment module, judging module, modulus value generation module, mould are against module, output module.The inventive method realizes step:(1) factor I of RSA modulus value is generated;(2) factor Ⅱ of RSA modulus value is generated;(3) RSA modulus value is generated;(4) RSA private key indexes are calculated;(5) RSA key is exported.The present invention effectively reduces the computation burden of RSA key generating process, improves RSA key generating rate, it is ensured that the security of rsa cryptosystem algorithm.

Description

Key generation system and method based on rsa cryptosystem algorithm
Technical field
The invention belongs to communication technical field, a kind of public key cryptography body in field of information security technology is further related to Key generation system and method based on rsa cryptosystem algorithm in system.The present invention is pre-processed by Big prime, with reference to Miller-Rabin is detected, is that, using improved Euclidean algorithm, effectively prevent division problem, generation symbol private key is calculated Close the key of RSA Algorithm requirement.
Background technology
With communication and the development of information security technology, public-key cryptosystem is increasingly valued by people.Numerous Public key cryptography algorithm in, rsa cryptosystem algorithm is most ripe, is also a kind of most popular cryptographic algorithm.It is not only With traditional information cryptographic capabilities, and can be used in the authenticity of checking information, completeness and efficiency, so as to receive The favor of users, and have become the international standard of public key cryptography.But actually rsa cryptosystem algorithm also has it originally The inevitable shortcoming of body, produces key pretty troublesome, is limited by prime number generation technology, it is difficult to accomplish one-time pad;Speed Too slow, because the block length of RSA is too big, to ensure security, n is at least also wanted more than 600 bits, makes computing cost very high, Especially speed is slower, compared with the slow several orders of magnitude of symmetric cryptographic algorithm.Therefore a large amount of RSA that meet how are produced to calculate in a short time The key of method requirement turns into current study hotspot.
Paper " Improvement of generation of large prime method in public key algorithm " (the Yunnan University master that Long Jianchao is delivered at it Academic dissertation, 2014) in propose a kind of generation method of Big prime in improved public key algorithm.The method is in Big prime tradition On the basis of generation method, searched for using random increase, with reference to the characteristic of quasi- Mersenne Prime, pre-filtering is increased after generation random number Process, then carry out test for primality and obtain Big prime, reduce the generation time of Big prime.The method exist weak point be, Test for primality result is that the probability of prime number is not big enough, causes rsa cryptosystem algorithm dangerous.
Patent document " a kind of improved method for quickly generating Big prime " (patent Shen that Nanjing Univ. of Posts and Telecommunications applies at it Please number:201510814574.1, application publication number:CN1015770A a kind of improved Big prime that quickly generates is disclosed in) Method.The method can quickly generate Big prime, be to be based on Miller-Rabin test for primality algorithms, and use Montgomery Algorithm is optimized to former Miller-Rabin algorithms detection prime number.Montgomery algorithm uses mould and adds the side for moving to right Method, efficiently avoid in modulus computing than relatively time-consuming division arithmetic, reduce the number of times of Montgomery Algorithm in former algorithm, so that Improve the detection speed to prime number.But, the weak point that the method is still present is to calculate the mould inverse time, it is necessary to circulate Cause for 1024 times to calculate practical application that is complicated and influenceing rsa cryptosystem.
" RSA key is generated the patent document that Shenzhen National Engineering Lab. for DTV Co., Ltd. applies at it Method and device " (number of patent application:201410092851.3, application publication number:CN103812648A a kind of RSA is disclosed in) Key generation method and device.Be transferred to outside credible platform for the calculating of the operand high needed for generating key by the device, subtracts The light computation burden of credible platform module.But, the weak point that the device is still present is, when RSA key parameter is created, The module not pre-processed to Big prime, causes system amount of calculation when prime number examination is carried out too big and influences that RSA's is close Key formation speed.
The content of the invention
It is an object of the invention to overcome the shortcomings of above-mentioned prior art, a kind of key based on rsa cryptosystem algorithm is proposed Generation method.The present invention is pre-processed by Big prime, with reference to Miller-Rabin detections, is used when private key is obtained and changed The Euclid's method entered, effectively prevent division problem, further increase RSA key formation efficiency.
To achieve the above object, system of the invention includes multiplication module, random number module, pretreatment module, judgement Module, modulus value generation module, mould against module, output module, wherein:
Described multiplication module, the product for calculating all prime numbers within 500;
Described random number module, for the integer of random generation one 512;
Described pretreatment module, for calculating the product of all prime numbers and the greatest common divisor for generating integer within 500;
Described judging module, for generated with 500 within all prime numbers the coprime integer of product carry out Miller- Rabin's Miller-Rabin test for primality;
Described modulus value generation module, the modulus value for calculating RSA;
Described mould is against module, the private key index for calculating RSA;
Described output module, for exporting modulus value, factor I, factor Ⅱ, private key index.
The method of the present invention to implement step as follows:
(1) factor I of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard The factor I p of A Deman RSA modulus value;
(2) factor Ⅱ of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard The factor Ⅱ q of A Deman RSA modulus value;
(3) modulus value is generated:
With factor Ⅱ q be multiplied factor I p by modulus value generation module, obtains Peter Lonard Lee Vista, A Disa More, the modulus value of Leonard A Deman RSA;
(4) the private key index of RSA is calculated:
After divide operations in traditional Euclidean algorithm are changed into shifting function by (4a), obtain improved Europe it is several in Obtain algorithm;
(4b) utilizes improved Euclidean algorithm, and mould inverse operation is carried out to public exponent, and resulting mould reciprocal value is made It is private key index;
(5) RSA key is exported:
Output module exports modulus value, factor I, factor Ⅱ, private key index respectively.
The present invention has advantages below compared with prior art:
3rd, due to using pretreatment module in system of the invention, before test for primality is carried out, calculate within 500 The product of all prime numbers with generate the greatest common divisor of integer, overcome prior art is due to lacking caused by pretreatment module The amount of calculation when prime number examination is carried out of uniting influences greatly very much the key formation speed of RSA so that system of the invention has efficient Quick advantage.
First, due to being carried out to Big prime using Miller-Rabin Miller-Rabin detection methods in the method for the present invention Detection, overcome prior art due to test for primality result be prime number probability it is not big enough, cause the dangerous of rsa cryptosystem algorithm Problem so that key of the invention has the advantages that safe.
Second, the inverse behaviour of mould is carried out to public exponent due to employing improved Euclidean algorithm in the method for the present invention Make, overcome and calculate challenge caused by the mould inverse time is calculated, it is necessary to circulate 1024 times in the prior art, improve private key Formation speed so that the present invention has the advantages that practicality is high.
Brief description of the drawings
Fig. 1 is the structured flowchart of present system;
Fig. 2 is the flow chart of the inventive method;
Fig. 3 is the flow chart of the private key index that step 4 of the present invention calculates RSA;
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.
Referring to the drawings 1, system of the invention include multiplication module, random number module, pretreatment module, judging module, Modulus value generation module, mould are against module, output module.
Described multiplication module, the product for calculating all prime numbers within 500.
Described random number module, for the integer of random generation one 512.
Described pretreatment module, for calculating the product of all prime numbers and the greatest common divisor for generating integer within 500.
Described judging module, for carrying out Miller-Rabin's Miller-Rabin test for primality to coprime integer.
Described modulus value generation module, the modulus value for calculating RSA.
Described mould is against module, the private key index for calculating RSA.
Described output module, for exporting modulus value, factor I, factor Ⅱ, private key index.
Referring to the drawings 2, implementation method of the invention is described further.
Step 1, generates the factor I of RSA modulus value.
(1) factor I of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard The factor I p of A Deman RSA modulus value.
The generation method of RSA modulus value factor Is is comprised the following steps that:
1st step, multiplication module calculates the product of all prime numbers within 500;
2nd step, random number module generates the integer of 512 at random;
3rd step, pretreatment module calculates the product of all prime numbers and the greatest common divisor for generating integer within 500;
4th step, judges whether greatest common divisor is 1, if so, within the integer for then being generated and 500 all prime numbers product It is coprime, the 5th step is performed, otherwise, the product of all prime numbers is not coprime within the integer for being generated and 500, gives up this not coprime whole Number, performs the 2nd step;
5th step, judging module to generated with 500 within the coprime integer of product of all prime numbers carry out Miller-Rabin Miller-Rabin test for primality, if testing result is to close number, gives up the coprime integer, performs the 2nd step, otherwise, performs 6th step;
6th step, using the integer after test for primality as Peter Lonard Lee Vista, A Di Shamirs, Leonard Ah The factor of the graceful RSA modulus value of moral.
Step 2, generates the factor Ⅱ of RSA modulus value.
(2) factor Ⅱ of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard The factor Ⅱ q of A Deman RSA modulus value.
The generation method of RSA modulus value factor Ⅱs is comprised the following steps that:
1st step, multiplication module calculates the product of all prime numbers within 500;
2nd step, random number module generates the integer of 512 at random;
3rd step, pretreatment module calculates the product of all prime numbers and the greatest common divisor for generating integer within 500;
4th step, judges whether greatest common divisor is 1, if so, within the integer for then being generated and 500 all prime numbers product It is coprime, the 5th step is performed, otherwise, the product of all prime numbers is not coprime within the integer for being generated and 500, gives up this not coprime whole Number, performs the 2nd step;
5th step, judging module to generated with 500 within the coprime integer of product of all prime numbers carry out Miller-Rabin Miller-Rabin test for primality, if testing result is to close number, gives up the coprime integer, performs the 2nd step, otherwise, performs 6th step;
6th step, using the integer after test for primality as Peter Lonard Lee Vista, A Di Shamirs, Leonard Ah The factor of the graceful RSA modulus value of moral.
Step 3, generates modulus value.
(3) modulus value is generated:
With factor Ⅱ q be multiplied factor I p by modulus value generation module, obtains Peter Lonard Lee Vista, A Disa More, the modulus value of Leonard A Deman RSA.
Step 4, calculates the private key index of RSA.
(4) the private key index of RSA is calculated:
After divide operations in traditional Euclidean algorithm are changed into shifting function by (4a), obtain improved Europe it is several in Obtain algorithm;
(4b) utilizes improved Euclidean algorithm, and mould inverse operation is carried out to public exponent, and resulting mould reciprocal value is made It is private key index.
Step 5, exports RSA key.
(5) RSA key is exported:
Output module exports modulus value, factor I, factor Ⅱ, private key index respectively.
Referring to the drawings 3, the specific steps to improved Euclidean algorithm are further described.
1st step, makes (X1,X2,X3)=(1,0, e), (Y1,Y2,Y3)=(0,1, Φ (n)), wherein Φ (n) represents RSA moulds The Euler's function of value n;
2nd step, judges X3Whether it is even number, if so, then performing the 3rd step, otherwise, performs the 6th step;
3rd step, judges X1And X2Whether be all even number, if so, then perform the 4th step, otherwise, perform the 5th step;
4th step, by X3The number at end 0 is designated as t, order Perform the 6th step;
5th step, makes (X1,X2,X3)=(X1+Φ(n),X2-e,X3), perform the 3rd step;
6th step, judges Y3Whether it is even number, if so, then performing the 7th step, otherwise, performs the 10th step;
7th step, judges Y1And Y2Whether all it is even number, if so, then performing the 8th step, otherwise, performs the 9th step;
8th step, by Y3The number at end 0 is designated as s, order Perform the 10th step;
9th step, makes (Y1,Y2,Y3)=(Y1+Φ(n),Y2-e,Y3), perform the 7th step;
10th step, compares X3With Y3Size, if X3>Y3, then the 11st step is performed, otherwise, perform the 12nd step;
11st step, makes (X1,X2,X3)=(X1-Y1,X2-Y2,X3-Y3), perform the 13rd step;
12nd step, makes (Y1,Y2,Y3)=(Y1-X1,Y2-X2,Y3-X3);
13rd step, judges X3And Y3Value whether be equal to 1.If X3=1, then now X1It is exactly private key index d;If Y3= 1, then now Y1It is exactly private key index d;If X3And Y3Value be all not equal to 1, then perform the 2nd step.

Claims (3)

1. a kind of key generation system based on rsa cryptosystem algorithm, including multiplication module, random number module, pretreatment module, Judging module, modulus value generation module, mould against module, output module, wherein:
Described multiplication module, the product for calculating all prime numbers within 500;
Described random number module, for the integer of random generation one 512;
Described pretreatment module, for calculating the product of all prime numbers and the greatest common divisor for generating integer within 500;
Described judging module, for generated with 500 within the coprime integer of product of all prime numbers carry out Miller-Rabin Miller-Rabin test for primality;
Described modulus value generation module, the modulus value for calculating RSA;
Described mould is against module, the private key index for calculating RSA;
Described output module, for exporting modulus value, factor I, factor Ⅱ, private key index.
2. a kind of key generation method based on rsa cryptosystem algorithm, comprises the following steps that:
(1) factor I of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard A De The factor I p of graceful RSA modulus value;
(2) factor Ⅱ of RSA modulus value is generated:
Using the generation method of the RSA modulus value factors, generation Peter Lonard Lee Vista, A Di Shamirs, Leonard A De The factor Ⅱ q of graceful RSA modulus value;
(3) modulus value is generated:
With factor Ⅱ q be multiplied factor I p by modulus value generation module, obtain Peter Lonard Lee Vista, A Di Shamirs, The modulus value of Leonard A Deman RSA;
(4) the private key index of RSA is calculated:
After divide operations in traditional Euclidean algorithm are changed into shifting function by (4a), obtain improved Euclid and calculate Method;
(4b) utilizes improved Euclidean algorithm, mould inverse operation is carried out to public exponent, using resulting mould reciprocal value as private Key index;
(5) RSA key is exported:
Output module exports modulus value, factor I, factor Ⅱ, private key index respectively.
3. it is according to claim 2 based on rsa cryptosystem algorithm generate key method, it is characterised in that step (1), step Suddenly RSA modulus value factor generation method described in (2) is comprised the following steps that:
The first step, multiplication module calculates the product of all prime numbers within 500;
Second step, random number module generates the integer of 512 at random;
3rd step, pretreatment module calculates the product of all prime numbers and the greatest common divisor for generating integer within 500;
4th step, judges whether greatest common divisor is 1, if so, the product of all prime numbers is mutual within the integer for then being generated and 500 Element, performs the 5th step, and otherwise, the product of all prime numbers is not coprime within the integer for being generated and 500, gives up this not coprime whole Number, performs second step;
5th step, judging module to generated with 500 within the coprime integer of product of all prime numbers carry out Miller-Rabin Miller-Rabin test for primality, if testing result is to close number, gives up the coprime integer, performs second step, otherwise, performs 6th step;
6th step, using the integer after test for primality as Peter Lonard Lee Vista, A Di Shamirs, Leonard A Deman The factor of RSA modulus value.
CN201710129114.XA 2017-03-06 2017-03-06 Key generation system and method based on rsa cryptosystem algorithm Pending CN106850212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710129114.XA CN106850212A (en) 2017-03-06 2017-03-06 Key generation system and method based on rsa cryptosystem algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710129114.XA CN106850212A (en) 2017-03-06 2017-03-06 Key generation system and method based on rsa cryptosystem algorithm

Publications (1)

Publication Number Publication Date
CN106850212A true CN106850212A (en) 2017-06-13

Family

ID=59137461

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710129114.XA Pending CN106850212A (en) 2017-03-06 2017-03-06 Key generation system and method based on rsa cryptosystem algorithm

Country Status (1)

Country Link
CN (1) CN106850212A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306730A (en) * 2018-03-05 2018-07-20 飞天诚信科技股份有限公司 A kind of implementation method and device generating key pair in embedded systems
CN112202562A (en) * 2017-12-27 2021-01-08 数安时代科技股份有限公司 RSA key generation method, computer device and medium
CN113077568A (en) * 2021-04-16 2021-07-06 南京国电南自电网自动化有限公司 Anti-misoperation locking method and system
CN114513306A (en) * 2022-03-28 2022-05-17 北京石油化工学院 Data encryption transmission method and system
CN114760055A (en) * 2022-06-15 2022-07-15 山东区块链研究院 Secret sharing method, system, storage medium and device based on Messen prime number

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060251248A1 (en) * 2005-05-03 2006-11-09 Jesse Lipson Public key cryptographic methods and systems with preprocessing
CN101682507A (en) * 2007-06-15 2010-03-24 索尼爱立信移动通讯有限公司 Generation of device dependant rsa key
CN101902331A (en) * 2009-05-28 2010-12-01 质子世界国际公司 Protection of a generation of prime numbers for the RSA algorithm
CN102023962A (en) * 2009-09-10 2011-04-20 上海华虹集成电路有限责任公司 Prime number generating method applied to cryptology application
CN103336680A (en) * 2013-06-27 2013-10-02 清华大学 Improved binary-system left-shifting modular inversion algorithm
CN103389965A (en) * 2013-07-05 2013-11-13 福建升腾资讯有限公司 Big integer inverse operation of multiplying method for realizing SM2 cryptosystem
CN105988771A (en) * 2015-03-04 2016-10-05 上海复旦微电子集团股份有限公司 Modular inverse operation unit

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060251248A1 (en) * 2005-05-03 2006-11-09 Jesse Lipson Public key cryptographic methods and systems with preprocessing
CN101682507A (en) * 2007-06-15 2010-03-24 索尼爱立信移动通讯有限公司 Generation of device dependant rsa key
CN101902331A (en) * 2009-05-28 2010-12-01 质子世界国际公司 Protection of a generation of prime numbers for the RSA algorithm
CN102023962A (en) * 2009-09-10 2011-04-20 上海华虹集成电路有限责任公司 Prime number generating method applied to cryptology application
CN103336680A (en) * 2013-06-27 2013-10-02 清华大学 Improved binary-system left-shifting modular inversion algorithm
CN103389965A (en) * 2013-07-05 2013-11-13 福建升腾资讯有限公司 Big integer inverse operation of multiplying method for realizing SM2 cryptosystem
CN105988771A (en) * 2015-03-04 2016-10-05 上海复旦微电子集团股份有限公司 Modular inverse operation unit

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202562A (en) * 2017-12-27 2021-01-08 数安时代科技股份有限公司 RSA key generation method, computer device and medium
CN112202562B (en) * 2017-12-27 2024-02-27 数安时代科技股份有限公司 RSA key generation method, computer device and medium
CN108306730A (en) * 2018-03-05 2018-07-20 飞天诚信科技股份有限公司 A kind of implementation method and device generating key pair in embedded systems
CN108306730B (en) * 2018-03-05 2020-10-13 飞天诚信科技股份有限公司 Method and device for generating key pair in embedded system
CN113077568A (en) * 2021-04-16 2021-07-06 南京国电南自电网自动化有限公司 Anti-misoperation locking method and system
CN114513306A (en) * 2022-03-28 2022-05-17 北京石油化工学院 Data encryption transmission method and system
CN114513306B (en) * 2022-03-28 2024-06-04 北京石油化工学院 Data encryption transmission method and system
CN114760055A (en) * 2022-06-15 2022-07-15 山东区块链研究院 Secret sharing method, system, storage medium and device based on Messen prime number
CN114760055B (en) * 2022-06-15 2022-09-09 山东区块链研究院 Secret sharing method, system, storage medium and device based on Messen prime number

Similar Documents

Publication Publication Date Title
CN106850212A (en) Key generation system and method based on rsa cryptosystem algorithm
CN112202568B (en) Software and hardware collaborative design SM9 digital signature communication method and system
CN103427997A (en) Method and device for generating digital signature
JP4682852B2 (en) Cryptographic processing apparatus, cryptographic processing method, and computer program
CN103259662A (en) Novel procuration signature and verification method based on integer factorization problems
CN104811298A (en) Method and device for realizing encryption
CN114640454A (en) Cryptosystem of post-quantum cryptography Kyber protocol
CN102109974A (en) Random point generation method suitable for elliptic curve cryptography (ECC) safety protection
CN109067526A (en) Level public private key pair generation method and device
Dawahdeh et al. Modified ElGamal elliptic curve cryptosystem using hexadecimal representation
Srikanth et al. The enhancement of security measures in advanced encryption standard using double precision floating point multiplication model
Vijayakumar et al. Comparative study of hyperelliptic curve cryptosystem over prime field and its survey
CN112737785B (en) Attribute-based encryption method, system and equipment for complex access policy
CN108512665A (en) Elliptic curve point is generated in elliptic curve cipher system
CN102291240B (en) Method and system for authenticating SM2 (Smart Media 2) signature
CZ304974B6 (en) Method of and device for generating pseudo-random sequence
CN104468100A (en) Improved sliding window modular exponentiation computing method
CN111797907B (en) Safe and efficient SVM privacy protection training and classification method for medical Internet of things
FR2814619A1 (en) METHOD OF ENCODING LONG MESSAGES SCHEMES OF ELECTRONIC SIGNATURE BASED ON RSA
CN112988235A (en) Hardware implementation circuit and method of high-efficiency third-generation secure hash algorithm
CN104407837B (en) A kind of device and its application process for realizing Galois Field multiplication
Borges et al. Small private keys for systems of multivariate quadratic equations using symmetric cryptography
Devika et al. Efficient hardware prototype of ECDSA modules for blockchain applications
CN109947393A (en) Operation method and device based on complementation device
CN113839779B (en) Private key amplification processing method, device, equipment and storage medium based on FHT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170613