[go: up one dir, main page]

CN1245695C - Type II public pin and code system based on level function - Google Patents

Type II public pin and code system based on level function Download PDF

Info

Publication number
CN1245695C
CN1245695C CN 03156920 CN03156920A CN1245695C CN 1245695 C CN1245695 C CN 1245695C CN 03156920 CN03156920 CN 03156920 CN 03156920 A CN03156920 A CN 03156920A CN 1245695 C CN1245695 C CN 1245695C
Authority
CN
China
Prior art keywords
key
mod
ciphertext
take over
over party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 03156920
Other languages
Chinese (zh)
Other versions
CN1490739A (en
Inventor
苏盛辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 03156920 priority Critical patent/CN1245695C/en
Publication of CN1490739A publication Critical patent/CN1490739A/en
Application granted granted Critical
Publication of CN1245695C publication Critical patent/CN1245695C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a public key code system designed by a lever function and a super increasing sequence, which belongs to the fields of a cryptography and a computer science. The public key code system comprises a key generation module, a coding module and a decoding module. A user obtains two code keys from the third party authority mechanism, one key is only private, the other is public, and a public key can not push out a private key; the public key is used for converting plain text into coding text, and the private key is used for reducing the coding text back to the plain text; the system can resist minimal point attack of Shamir and L<3> reduced basis attack of LOB effectively, and the present invention is used for coding and decoding any files and data in a computer network and a communication network.

Description

A kind of key encrypt method based on lever function and super increasing sequence
(1) technical field
Public key encryption method (abbreviation key encrypt method) belongs to cryptography and computer science and technology field.The public key encryption method comprises two keys, and one is public-key cryptography, is called for short PKI, and one is private cipher key, is called for short private key.
(2) background technology
1976, American scholar Whitfield Diffie and Martin Hellman proposed the thought of " public key cryptosystem " first.Based on this thought, more existing at present concrete realization technology mainly comprise: (1) MH knapsack public key cryptosyst; (2) RSA public key cryptosyst; (3) Pohlig-Hellman public key cryptosyst; (4) Rabin public key cryptosyst; (5) ElGamal public key cryptosyst, the ECC public key cryptosyst also is in its realization on elliptic curve; (6) McEliece public key cryptosyst; (7) LUC public key cryptosyst; (8) finte-state machine common key cryptosystem (said system can be referring to " applied cryptography ", and U.S. BruceSchneier is outstanding, and Wu Shizhong, Zhu Shixiong etc. translates, China Machine Press, in January, 2000).
In the said system, first kind to the 7th kind is that the foreigner invents, most of patent applied for, and wherein, the ElGamal system on RSA system and the elliptic curve is widely used.At last a kind of is that Chinese scholar professor Tao Renji proposes.
(3) summary of the invention
The present invention can be used for the encryption and decryption of various files such as character, literal, figure, pictures and sounds and data in computer network and the communication network, to guarantee the privacy of file and data storage and transmission.Wish that our country can have the core technology of oneself in the public key cryptography field, with information security and the economic security of guaranteeing China.
3.1 two key concepts
3.1.1 super increasing sequence
If A 1, A 2..., A nBe n mutually different positive integer, and satisfy
A i>∑A j(i=2,3,…,n;j=1,2,…,i-1)
Claim that then such positive integer sequence is a super increasing sequence, be designated as { A 1, A 2..., A n) or { A i).
Super increasing sequence has following character: (1≤m≤n) is from super increasing sequence { A for positive integer m arbitrarily i) in optional m, this m add up and (be subclass with) then: E S = A i 1 + A i 2 + &CenterDot; &CenterDot; &CenterDot; + A i m Be well-determined.
3.1.2 lever function
If f (i) is by the injective function of integer to integer, i ∈ 1,2 ..., n}.
Its functional value f (1), f (2) ..., f (n) is n different positive integer.In this encryption method, when from PKI derivation private key or ciphertext, need to consider f (i) full number of permutations n! But when private key is untied ciphertext, only need consider f (i) add up and.Therefore, as if being fulcrum with the ciphertext, then f (i) is that an end calculated amount is big, and other end calculated amount is little.The f (i) that we claim to satisfy this character is a lever function.
3.2 technical scheme
The present invention is a kind of public key encryption method based on lever function and super increasing sequence, be called for short the REESSE2 key encrypt method, the password product of producing according to it can be the deciphering chip that pure DLC (digital logic circuit) is made, perhaps add the deciphering chip that the curing program is made, perhaps cipher machine of forming by computer hardware and software etc. by DLC (digital logic circuit).Therefore, the present invention is a kind of exploitation cryptographic system or product mandatory ultimate principle of institute and technical scheme, rather than physical product itself.
This key encrypt method is made up of three parts such as key generation, encryption and decryption.
3.2.1 encrypt and decrypt pattern of the present invention
Suppose that user V desire sends a file or data by network to user U, and carry out in the mode of maintaining secrecy.Encrypting file before or data, encrypt file afterwards or data herein, ciphertext expressly.User V and user U desire realize so secret communication process, and its pattern is as follows:
Key generates: at first, user U should go to the 3rd side authoritative institution (ca authentication center or digital certificate center) to get a pair of private key (Private Key) and PKI (Public Key) that is generated parts output by key, private key must must not be divulged a secret by user U oneself keeping; PKI then allows openly to provide to the external world with the form of public key certificate, so that use.
Cryptographic operation: user V obtains the public key certificate of user U from the ca authentication center, the plaintext that on the machine of operation encryption unit desire is sent is encrypted, and obtains ciphertext, and by network ciphertext is sent to user U.
Decryption oprerations: after user U receives the ciphertext that user V sends, on the machine of operation deciphering parts, ciphertext is decrypted, recovers plaintext with own private key.
In key encrypt method, in order to improve the efficient of encryption, adopt the mixed cipher technology usually, promptly come encrypting plaintext with DSE arithmetic, come encrypted session key with public-key cryptosystem again.Employed encryption key of DSE arithmetic and decruption key are same key in essence, are called as session key.
3.2.2 key generating portion
The key generating portion is used for the ca authentication center, is used for producing a pair of private key and PKI.Its implementation is:
(1) produces the super increasing sequence { A that item number is n at random 1, A 2..., A n}
(2) find a positive prime number M, it satisfies M > ( &Sigma; i = 1 n A 1 ) , And (n/log 2M)>0.645
(3) produce at random different in twos functional value f (1), f (2) ..., f (n), 5≤f (i)≤(n+4), i=1,2 ..., n
(4) choose suitable positive integer W, Z, it satisfies W<M and Z<M
(5) calculate non-super increasing sequence C i=((A i+ Z*f (i)) mod M * W), i=1,2 ..., n
(6) from (Z+ (Z)) mod M=0 obtains-Z, from (W*W -1) mod M=1 obtains W -1
At last, with ({ A iW -1,-Z, M) as private key, with ({ C i, M) as PKI.
Attention: in this article, " * " in the expression formula represents multiplication.{ C 1Representative { C 1, C 2..., C n.
3.2.3 encryption section
Encryption section uses for transmit leg, is used for to expressly encrypting.Transmit leg is take over party's PKI for obtaining encryption key, must obtain take over party's public key certificate from the ca authentication center.
In encryption section and decryption portion, symbol " Hash " is represented one-way hash function.
If ({ C i, M) be PKI, EF is expressly, packet count h≤32.Then the implementation method of encryption section is:
(1) produces the grouping b of h n bit long at random 11b 12B 1n, b 21b 22B 2n..., b H1b H2B Hn
(2) with Hash (b 11b 12B 1nb 21b 22B 2nB H1b H2B Hn) n bit output as session key K
(3) with session key K plaintext EF is carried out symmetric cryptography, obtain ciphertext CF
(4) make i=1
(5) make E 1=0, j=1
(6) if b Ij=1, E then i=(E i+ C j) mod M
(7) put j=j+1, if j≤n then goes to (6)
(8) put i=i+1, if i≤h then goes to (5), otherwise, finish
At last, obtain ciphertext CF and the subclass and the sequence { E that can send safely 1, E 2..., E h.
3.2.4 decryption portion
Decryption portion is used for the take over party, is used for ciphertext is decrypted.The take over party with oneself private key as decruption key.
If ({ A i, W -1,-Z, M) be private key, CF is a ciphertext, { E 1, E 2..., E hBe subclass and sequence.Then the implementation method of decryption portion is:
(1) makes i=1
(2) calculate E i=(E i* W -1) mod M
(3) calculate E i=(E i+ (Z)) mod M
(4) make b I1b I2B InEverybody is all 0, E s=E i, j=n
(5) if E s〉=A j, b then Ij=1 and E s=E s-A j
(6) put j=j-1, if j 〉=1 and E s≠ 0, then go to (5)
(7) if E s≠ 0, then go to (3)
(8) put i=i+1, if i≤h then goes to (2)
(9) with Hash (b 11b 12B 1nb 21b 22B 2nB H1b H2B Hn) n bit output as session key K
(10) with session key K ciphertext CF is carried out the symmetry deciphering, obtain expressly EF
At last, the take over party to recover the plaintext of transmit leg be source document EF.
3.3 advantage and good effect
3.3.1 security meets the demands
Owing to fully utilized lever function and one-way hash function, so this encryption method can effectively be resisted the minimal point attack of Shamir and the L of Lagarias-Odlyzko-Brickell 3The reduction base is attacked.
3.3.2 fast operation
In this encryption method, encrypt, decryption oprerations only uses addition and subtraction basically, and maximum integer (being modulus) can be controlled within 192 bit range, so, with popular RSA, ECC algorithm by comparison, encrypt, deciphering speed will go up manyfold soon.
3.3.3 technology can disclose
Realization technology of the present invention can disclose fully, and PKI (Public Key) also can be provided to the external world fully.As long as private key (Private Key) is not divulged a secret, just can guarantee the safety of ciphertext fully.
3.3.4 the information security to country is favourable
At present, positive develop actively E-Government of China and ecommerce, information security is related to national security and economic security.But the information security of a vast big country can not be based upon on the encryption technology basis of foreign country fully, and does not have autonomous core technology, so, the public key cryptography of studying us seem imperative be significant.
(4) embodiment
Key encrypt method based on lever function and super increasing sequence can allow each user obtain two keys (obtaining from the ca authentication center), a key can disclose, a key can only the individual have, and like this, has not divulged a secret in granting and communication process with regard to not worrying key.When transmitting information on the net, the sender uses recipient's PKI to expressly encrypting, and the recipient uses the private key of oneself that ciphertext is decrypted.
When this key encrypt method is used for development, can adds the curing program or add software with DLC (digital logic circuit) or by DLC (digital logic circuit) and wait and realize by computer hardware.The present invention is a kind of production password product mandatory ultimate principle of institute and technical scheme, rather than physical product itself.
Below, illustrate key encrypt method based on lever function and super increasing sequence:
If sequence item number n=6, packet count h=6 (in the practical application, n should be 96 at least, and h should be 16 at least).
If one-way hash function, promptly the Hash function is as follows:
H 0=101100 (" 101100 " are binary number, down together)
H i=(H I-1 T i) 2Mod 1000000 (" 1000000 " are binary number, down together)
Wherein, represents binary XOR, T iExpression length is the binary block of n.
If symmetric encryption scheme (that is decrypt scheme) is:
Y i=~(X iK)
Wherein ,~represent binary inverse, X iBe the integrated data of n bit, K is the session key of n bit.
Notice that in the practical application, Hash function and symmetric encryption scheme want complicated more than top hypothesis.
(1) generation of key
Implementation method according to 3.2.2 key generating portion:
If produce a super increasing sequence { A at random iBe 3,5,9,20,39,79}.
Find M = 163 > &Sigma; i = 1 6 A 1 = ( 3 + 5 + 9 + 20 + 39 + 79 ) = 155 , Can verify that 163 is prime number, and (n/log 2M)=6/log 2163>0.645.
Produce lever function value f (1)=4 at random, f (2)=5, f (3)=2, f (4)=6, f (5)=7, f (6)=3.
Choose W=101, Z=158, obviously, W<M, Z<M.
Be C i=((A i+ Z*f (i)) mod M * W), then
C 1=((3+158*4)*101)mod?163=76 C 2=((5+158*5)*101)mod?163=99
C 3=((9+158*2)*101)mod?163=62 C 4=((20+158*6)*101)mod?163=131
C 5=((39+158*7)*101)mod?163=78 C 6=((79+158*3)*101)mod?163=107
Therefore, obtain non-super increasing sequence { C i}={ 76,99,62,131,78,107}.
From (Z+ (Z)) mod M=0 obtains (Z)=5, from (W*W -1) mod M=1 and according to the expansion Euclidean algorithm obtain W -1=92.
With (76,99,62,131,78,107}, 163) as PKI, with (3,5,9,20,39,79}, 92,5,163) as private key.
(2) encrypt
Known take over party's PKI is ({ 76,99,62,131,78,107}, 163).
If expressly EF is a text, its content is " Peking " (not containing quotation marks, totally 6 characters), and then its ASCII character binary mode is: 01,010,000 01,100,101 01,101,011 01,101,001 01,101,110 01100111.
Implementation method according to the 3.2.3 encryption section:
Produce the grouping b of 66 bit long at random 11b 12B 16, b 21b 22B 26..., b 61b 62B 66For:
011010、100101、001100、111110、010011、100111。
Being output as of Hash (011010100101001100111110010011100111) then:
H 1=(H 0T 1) 2mod?1000000=(101100011010) 2mod?1000000=100100
H 2=(H 1T 2) 2mod?1000000=(100100100101) 2mod?1000000=000001
H 3=(H 2T 3) 2mod?1000000=(000001001100) 2mod?1000000=101001
H 4=(H 3T 4) 2mod?1000000=(101001111110) 2mod?1000000=010001
H 5=(H 4T 5) 2mod?1000000=(010001010011) 2mod?1000000=000100
H 6=(H 5T 6) 2mod?1000000=(000100100111) 2mod?1000000=001001
So, obtain session key K=H 6=001001.
Below, plaintext EF is carried out symmetric cryptography, divide into groups by 6 bits, with " Peking " promptly 010,100 000,110,010,101 101,011 011,010 010,110 111,001 100111 as the input, its ciphering process is as follows:
Y 1=~(X 1K)=~(010100001001)=100010;Y 2=~(X 2K)=~(000110001001)=110000
Y 3=~(X 3K)=~(010101001001)=100011;Y 4=~(X 4K)=~(101011001001)=011101
Y 5=~(X 5K)=~(011010001001)=101100;Y 6=~(X 6K)=~(010110001001)=100000
Y 7=~(X 7K)=~(111001001001)=001111:Y 8=~(X 8K)=~(100111001001)=010001
To export Y 1, Y 2, Y 3, Y 4, Y 5, Y 6, Y 7, Y 8Connect, obtain ciphertext CF, its binary content is 100010110000100011011101101100100000001111010001.
Root pick 3.2.3 encryption method obtains subclass and sequence is from 6 groupings 011,010 100,101 001,100 111,110 010,011 100111:
E 1=(b 11C 1+b 12C 2+b 13C 3+b 14C 4+b 15C 5+b 16C 6)mod?M=(99+62+78)mod?163=76
E 2=(b 21C 1+b 22C 2+b 23C 3+b 24C 4+b 25C 5+b 26C 6)mod?M=(76+131+107)mod?163=151
E 3=(b 31C 1+b 32C 2+b 33C 3+b 34C 4+b 35C 5+b 36C 6)mod?M=(62+131)mod?163=30
E 4=(b 41C 1+b 42C 2+b 43C 3+b 44C 4+b 45C 5+b 46C 6)mod?M=(76+99+62+131+78)mod?163=120
E 5=(b 51C 1+b 52C 2+b 53C 3+b 54C 4+b 55C 5+b 56C 6)mod?M=(99+78+107)mod?163=121
E 6=(b 61C 1+b 62C 2+b 63C 3+b 64C 4+b 65C 5+b 66C 6)mod?M=(76+131+78+107)mod?163=66
At last, transmit leg is with ciphertext CF and subclass and sequence E 1, E 2, E 3, E 4, E 5, E 6Give the take over party by Network Transmission.
(3) deciphering
From the 3.2.4 decryption method as can be seen, the deciphering subclass and process be to verify that while search for every number of times of taking turns search can not surpass &Sigma; i = 1 6 f ( i ) = 27 , Relevant with item number n polynomial time complexity, be feasible so find the solution.Notice that decrypting process is not used lever function f (i).
The known private key of take over party is ({ 3,5,9,20,39,79}, 92,5,163);
The binary content of ciphertext CF is 100010110000100011011101101100100000001111010001;
Subclass and sequence E 1, E 2..., E mBe 76,151,30,120,121,66.
The implementation method of root pick 3.2.4 decryption portion:
E 1=(E 1*W -1)mod?M=76*92?mod?163=146
And by E 1=(E 1+ (Z)) mod M cyclic search is to E S=E 1=53, get b after the checking 11b 12B 16=011010
E 2=(E 2*W -1)mod?M=151*92?mod?163=37
And by E 2=(E 2+ (Z)) mod M cyclic search is to E s=E 2=102, get b after the checking 21b 22B 26=100101
E 3=(E 3*W -1)mod?M=30*92mod?163=152
And by E 3=(E 3+ (Z)) mod M cyclic search is to E s=E 3=29, get b after the checking 31b 32B 36=001100
E 4=(E 4*W -1)mod?M=120*92mod?163=119
And by E 4=(E 4+ (Z)) mod M cyclic search is to E s=E 4=76, get b after the checking 41b 42B 46=111110
E 5=(E 5*W -1)mod?M=121*92?mod?163=48
And by E 5=(E 5+ (Z)) mod M cyclic search is to E s=E 5=123, get b after the checking 51b 52B 56=010011
E 6=(E 6*W -1)mod?M=66*92?mod?163=41
And by E 6=(E 6+ (Z)) mod M cyclic search is to E s=E 6=141, get b after the checking 61b 62B 66=100111
Like this, we obtain the grouping 011010,100101,001100,111110,010011,100111 of 66 bit long.
Being output as of Hash (011,010 100,101 001,100 111,110 010,011 100111) then:
H 1=(H 0T 1) 2mod?1000000=(101100011010) 2mod?1000000=100100
……
H 6=(H 5T 6) 2mod?1000000=(000100100111) 2mod?1000000=001001
So, obtain session key K=H 6=001001.Note, ask the K process identical with encryption section.
Below, ciphertext CF is carried out symmetry deciphering, divide into groups by 6 bits, as importing, its decrypting process is as follows with the binary content 100010110000100011011101101100100000001111010001 of ciphertext CF:
Y 1=~(X 1K)=~(100010001001)=010100;Y 2=~(X 2K)=~(110000001001)=000110
Y 3=~(X 3K)=~(100011001001)=010101;Y 4=~(X 4K)=~(011101001001)=101011
Y 5=~(X 5K)=~(101100001001)=011010;Y 6=~(X 6K)=~(100000001001)=010110
Y 7=~(X 7K)=~(001111001001)=111001;Y 8=~(X 8K)=~(010001001001)=100111
To export Y 1, Y 2, Y 3, Y 4, Y 5, Y 6, Y 7, Y 8Connect, obtain expressly EF, its binary content is 010100000110010101101011011010010110111001100111, and textual form is " Peking ".
Obviously, the plaintext that the take over party has recovered transmit leg is source document EF, and knows that its content is " Peking ".
Finish for example.

Claims (1)

1, a kind of key encrypt method based on lever function and super increasing sequence, form by key generation, three parts of encryption and decryption, the key generating portion produces user's a pair of private key and PKI for the 3rd side authoritative institution, encryption section utilizes take over party's PKI expressly being converted to ciphertext for transmit leg, decryption portion utilizes the private key of oneself that ciphertext is reduced into expressly for the take over party, it is characterized in that
● the key generating portion has adopted the following step:
(1) produces the super increasing sequence { A that item number is n at random 1, A 2, A n}
(2) find a positive prime number M, it satisfies M > ( &Sigma; l = 1 n A i ) , And (n/log 2M)>0.645
(3) produce at random different in twos functional value f (1), f (2) ..., f (n), 5≤f (i)≤(n+4), i=1,2 ..., n
(4) choose suitable positive integer W, Z, it satisfies W<M and Z<M
(5) calculate non-super increasing sequence Ci=((Ai+Z*f (i)) * W) mod M, i=1,2 ..., n
(6) from (Z+ (Z)) mod M=0 obtains-Z, from (W*W -1) mod M=1 obtains W -1
At last, with ({ A i, W -1,-Z, M) as private key, with ({ C i, M) as PKI, wherein, private key can only be had privately by the ciphertext take over party;
● encryption section has adopted the following step:
The PKI of supposing the take over party is ({ C i, M), be EF expressly, packet count h≤32, transmit leg carries out
(1) produces the grouping b of h n bit long at random 11b 12B 1n, b 21b 22B 2n..., b H1b H2B Hn
(2) with Hash (b 11b 12B 1nb 21b 22B 2nB H1b H2B Hn) n bit output as session key K
(3) with session key K plaintext EF is carried out symmetric cryptography, obtain ciphertext CF
(4) make i=1
(5) make E i=0, j=1
(6) if b Ij=1, E then 1=(E1+C j) mod M
(7) put j=j+1, if j≤n then goes to (6)
(8) put i=i+1, if i≤h then goes to (5), otherwise, finish
At last, obtain ciphertext CF and subclass and sequence { E 1, E 2..., E h, they will be sent to the take over party;
● decryption portion has adopted the following step:
The take over party utilizes the private key ((A of oneself i, W -1,-Z, M), to subclass and sequence { E 1, E 2..., E hCarry out with ciphertext CF
(1) makes i=1
(2) calculate E i=(E i* W -1) mod M
(3) calculate E 1=(E 1+ (Z)) mod M
(4) make b I1b I2B InEverybody is all 0, E S=E i, j=n
(5) if E S〉=A j, b then Ij=1 and E S=E S-A j
(6) put j=j-1, if j 〉=1 and E S≠ 0, then go to (5)
(7) if E S≠ 0, then go to (3)
(8) put i=i+1, if i≤h then goes to (2)
(9) with Hash (b 11b 12B 1nb 21b 22B 2nB H1b H2B Hn) n bit output as session key K
(10) with session key K ciphertext CF is carried out the symmetry deciphering, obtain expressly EF
At last, the take over party to recover the plaintext of transmit leg be source document EF.
CN 03156920 2003-09-15 2003-09-15 Type II public pin and code system based on level function Expired - Fee Related CN1245695C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03156920 CN1245695C (en) 2003-09-15 2003-09-15 Type II public pin and code system based on level function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03156920 CN1245695C (en) 2003-09-15 2003-09-15 Type II public pin and code system based on level function

Publications (2)

Publication Number Publication Date
CN1490739A CN1490739A (en) 2004-04-21
CN1245695C true CN1245695C (en) 2006-03-15

Family

ID=34156971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03156920 Expired - Fee Related CN1245695C (en) 2003-09-15 2003-09-15 Type II public pin and code system based on level function

Country Status (1)

Country Link
CN (1) CN1245695C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102973833B (en) * 2012-12-25 2014-08-13 丁金荣 Pharmaceutical composition for treating bronchitis

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5249053B2 (en) * 2006-03-10 2013-07-31 イルデト・コーポレート・ビー・ヴイ Data processing system integrity
CN101072099B (en) * 2007-06-22 2010-06-16 苏盛辉 Public key encryption method based on nonuniform super-increasing sequence
CN101447870B (en) * 2008-12-25 2010-11-17 中国电子科技集团公司第五十四研究所 A private key secure storage method based on distributed password technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102973833B (en) * 2012-12-25 2014-08-13 丁金荣 Pharmaceutical composition for treating bronchitis

Also Published As

Publication number Publication date
CN1490739A (en) 2004-04-21

Similar Documents

Publication Publication Date Title
CN1054245C (en) A repertoire of mappings for a cryptosystem
CN1104118C (en) Process for computer-controlled exchange of cryptographic keys between first and second computer unit
CN1633774A (en) Identity-based Hierarchical Encryption and Signature Scheme
CN101061661A (en) Enciphering method
CN1282325C (en) Cryptographic system and method with fast decryption
CN1185821C (en) Cipher communication method
CN1251715A (en) The Circular Cut Polynomial Structure of Finite Field Discrete Logarithm Cryptosystem
CN1211363A (en) A method of accomplishing communication using a public key
CN1177245A (en) Enciphering method, deciphering method and certifying method
CN1682479A (en) Efficient encryption and authentication for data processing systems
CN1146184C (en) Cluster password management method between first computer unit and cluster computer unit
CN1402920A (en) Generation of mathematically constrained key using one-way function
CN1820448A (en) System and method for encrypting and verifying messages using three-phase encryption
CN1543118A (en) Public key generation device, shared key generation device, key exchange device and key exchange method
CN1178619A (en) Asymmetrical cryptographic communication method and portable object therefor
CN1801693A (en) Short block processing method in block encryption algorithm
CN1870499A (en) Method for generating multiple variable commom key password system
CN101051902A (en) Agent signcryption method and system
CN1859090A (en) Encipher method and system based identity
CN1505306A (en) Elliptic curve encryption and decryption method and apparatus
CN101079701A (en) Highly secure ellipse curve encryption and decryption method and device
CN1245695C (en) Type II public pin and code system based on level function
CN1697374A (en) Method for sanding and receiving cipher data, device for distributing and receiving cipher data
CN1425987A (en) Encrypting method for reinforcing disordered block cipher
CN1771687A (en) digital certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060315

Termination date: 20100915