Highly secure ellipse curve encryption and decryption method and device

An elliptic curve encryption and elliptic curve technology, applied in the field of data encryption and decryption, can solve the problem of not reaching the security of IND_CCA2

Active Publication Date: 2007-11-28
BEIJING HUADA INFOSEC TECH
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the MV encryption method solves the plaintext embedding problem in ECC, all public research results show that ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Highly secure ellipse curve encryption and decryption method and device
  • Highly secure ellipse curve encryption and decryption method and device
  • Highly secure ellipse curve encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] Fig. 1 shows a flowchart of the encryption method of the present invention.

[0101] In step 101, elliptic curve encryption and decryption parameters E, G, n, H(), F(), Enc(,), Dec(,) are acquired or generated. The selection of parameters for elliptic curve encryption and decryption can be performed by both encryption and decryption parties or a third party trusted by both parties. in:

[0102] 1.1. Select the elliptic curve E on the finite field and a point G on it, so that the point group generated by G The elliptic curve discrete logarithm problem on is computationally unsolvable, let The order of is n, and E, G and n are disclosed;

[0103] 1.2. Select a safe message authentication code (MAC) generation function H(), select a key derivation function F(), select encryption function Enc(,) and decryption function Dec(,), so that for any plaintext m and encryption The key Key satisfies: m=Dec(Enc(m, Key), Key);

[0104] 1.3. Description of the selected f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a coding and decoding method and device of elliptical curve, which comprises the following steps: a. obtaining or generating coding and decoding parameter E, G, n, H (), F (), Enc (), Dec (); selecting elliptical curve E and G as one point on the curve with limit area.

Description

technical field [0001] The invention relates to data encryption and decryption, in particular to an encryption and decryption method and device using elliptic curve discrete logarithm problems. Background technique [0002] Cryptographic systems are divided into symmetric cryptosystems and asymmetric cryptosystems. Symmetric cipher is also called traditional cipher algorithm, the encryption key of symmetric cipher can be deduced from the decryption key, and vice versa. In most algorithms, the same key is used for encryption and decryption. This type of cryptographic algorithm is sometimes called a secret key algorithm or a single key algorithm, which requires the sender and receiver to agree on a key before secure communication. The security of symmetric ciphers depends on the secrecy of the key. Leaking the key means that anyone who has the key can encrypt and decrypt the message. Generally, the operation speed of symmetric cryptography is very fast, but how to securely ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30
Inventor 陈建华汪朝晖胡进胡志金孙金龙张家宏阳凌怡张丽娜
Owner BEIJING HUADA INFOSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products