Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher key generation system and method based on RSA cryptographic algorithm

A cryptographic algorithm and key generation technology, which is applied in the field of key generation system based on RSA cryptographic algorithm, can solve the problems of large amount of calculation, affecting the speed of key generation, and insufficient probability, etc., to achieve high security and high practicability , the effect of increasing the generation speed

Inactive Publication Date: 2017-06-13
XIDIAN UNIV
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the probability of the primality test result being a prime number is not high enough, which makes the RSA encryption algorithm unsafe.
However, the disadvantage of this method is that when calculating the modular inverse, it needs to loop 1024 times, which leads to complex calculations and affects the practical application of RSA ciphers
However, the disadvantage of this device is that when the RSA key parameters are created, there is no preprocessing module for large prime numbers, which leads to too much calculation when the system performs prime number detection and affects the key generation speed of RSA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key generation system and method based on RSA cryptographic algorithm
  • Cipher key generation system and method based on RSA cryptographic algorithm
  • Cipher key generation system and method based on RSA cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings.

[0035] Refer to attached figure 1 , The system of the present invention includes a multiplier module, a random number module, a preprocessing module, a decision module, a modulus value generation module, a modulus inversion module, and an output module.

[0036] The multiplier module is used to calculate the product of all prime numbers within 500.

[0037] The random number module is used to randomly generate a 512-bit integer.

[0038] The preprocessing module is used to calculate the product of all prime numbers within 500 and the greatest common divisor of the generated integers.

[0039] The judging module is used to perform Miller-Rabin primality test on mutually prime integers.

[0040] The modulus generation module is used to calculate the modulus of RSA.

[0041] The modular inverse module is used to calculate the RSA private key index.

[0042] The outpu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cipher key generation system and method based on an RSA cryptographic algorithm. The cipher key generation system comprises a multiplier module, a random number module, a preprocessing module, a decision module, a module value generation module, a modular inversion module and an output module. The method comprises the following implementation steps: (1) generating a first factor of the RSA module value; (2) generating a second factor of the RSA module value; (3) generating the RSA module value; (4) calculating an RSA private key index; and (5) outputting an RSA cipher key. According to the cipher key generation system and method disclosed by the invention, the calculation burden of the RSA cipher key generation process can be effectively reduced, the generation speed of the RSA cipher key can be increased, and the security of the RSA cryptographic algorithm can be ensured.

Description

technical field [0001] The invention belongs to the technical field of communication, and further relates to a key generation system and method based on an RSA cryptographic algorithm in a public key cryptosystem in the technical field of information security. The present invention preprocesses large prime numbers, combines Miller-Rabin detection, and adopts an improved Euclidean algorithm to calculate private keys, effectively avoiding division problems and generating keys that meet the requirements of the RSA algorithm. Background technique [0002] With the development of communication and information security technology, the public key cryptosystem has been paid more and more attention by people. Among the many public key cryptographic algorithms, the RSA cryptographic algorithm is the most mature and widely used cryptographic algorithm. It not only has traditional information encryption capabilities, but also can be used to verify the authenticity, integrity and validi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/302H04L9/0861H04L9/3249
Inventor 董庆宽吴克强樊凯薄星李军辉陶雅欣
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products