Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Big data information security processing method and system of variable-length key RSA encryption algorithm

An encryption algorithm and information security technology, applied in the direction of digital transmission system, transmission system, secure communication device, etc., can solve the problem of unguaranteed security, and achieve the effect of simple means of security encoding and decoding and key distribution.

Inactive Publication Date: 2019-01-18
CHANGSHU INSTITUTE OF TECHNOLOGY +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a large data information security processing method and system of a variable-length key RSA encryption algorithm to solve the problems in the prior art proposed in the above-mentioned background technology. Since the symmetric encryption algorithm uses the same key, both parties to the transaction use the same key. Keys, the problem that security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data information security processing method and system of variable-length key RSA encryption algorithm
  • Big data information security processing method and system of variable-length key RSA encryption algorithm
  • Big data information security processing method and system of variable-length key RSA encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0093] This embodiment: as figure 1 As shown, a large data information security processing method of the variable-length key RSA encryption algorithm, including:

[0094] Key generation: prime number p and prime number q, obtain the public element NS101 through the public element function;

[0095] The public element function is

[0096] Calculate the intermediate variable rS102 according to the Euler function;

[0097] The Euler function is r=(p-1)x(q-1);

[0098] Select an integer e smaller than r, and calculate the modulus element dS103 through the modulus function;

[0099] The modulo inverse function is

[0100] Determine public key (N, e) and private key (N, d) S104.

[0101] like figure 2 As shown, message encryption: if a message m is sent and the public key (N, e) S201 is determined, then the message m is converted into a positive integer nS202 smaller than N through the modulo inverse function;

[0102] Then calculate the encrypted message cS203 through t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data information security, in particular to a big data information security processing method of a variable length key RSA encryption algorithm, the invention also provides a large data information security processing system of variable length key RSA encryption algorithm. The method comprise generating a key: prime number p and prime number q, obtaining a common element N by a common element function, calculating an intermediate variable r according to an Euler function, selecting an integer e that is less than r, calculating the modulo-inverseelement d by the modulo-inverse function, and determining a public key (N, e) and a private key (N, d). The invention solves the problem that both parties of a transaction use the same key because thesymmetrical encryption algorithm uses the same key in the prior art, and the security is not guaranteed. The invention has the effects of high system security, simplicity and practicality, variable length transmission and signature security.

Description

technical field [0001] The invention belongs to the technical field of data information security, and in particular relates to a large data information security processing method using a variable-length key RSA encryption algorithm. The invention also provides a large data information security processing system using a variable-length key RSA encryption algorithm. Background technique [0002] The RSA encryption algorithm is an asymmetric encryption algorithm. RSA is widely used in public key encryption and electronic commerce. RSA was proposed in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman. All three were working at MIT at the time. RSA is composed of the initial letters of their three surnames. The existing technology has the problem that because the symmetric encryption algorithm uses the same key, both parties to the transaction use the same key, and the security cannot be guaranteed. Contents of the invention [0003] The present invention provides a lar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/302H04L9/3033
Inventor 张方舟阚志刚张璐陈彪钱文
Owner CHANGSHU INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products