Category:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0
1
2
3
4
5
6
7
8
9
Position:IcFull.com » IC Electronic information » Category: R

IC Electronic information

RSA certificate-based signature system design and implementation

In Electronic Infomation Category: R | on April 22,2011

Office Automation OA (Office AutomatizatiON) from the initial large-scale use of copiers and CXA1065M datasheet and other office equipment as a symbol of the initial stage, the development of today to use the network and CXA1065M price and the computer as a symbol of this stage, changes in the way of enterprise and CXA1065M suppliers and efficiency of office improvement played a great role in promoting. The system uses the RSA algorithm independent office to ensure that the process of document authenticity and validity of the transfer.

1 RSA algorithm and digital certificates

1.1 RSA Algorithm Introduction

(1) key generation

Key generation process:

Select two large prime numbers p, q, (p, q as prime numbers differ, the need for confidentiality);

calculate n = p q, (n) = (p-1) (q-1);

Select integer e so that ( (n), e) = 1, 1

calculate d, so d = e-1mod (n), are: the public key KU = {e, n}; private key KR = {d, n}.

(2) encryption using (e, n) encrypted with the (e, n): plaintext: M

(3) decryption (d, n) decryption (d, n): the ciphertext C, specifically M = Cd (mod n).

1.2 Digital Certificates

Digital certificate is a certificate authority signed by the owner that contains the public key and public key files. The simplest certificate contains a public key, name and signature of the certificate authority. Under normal circumstances the certificate also contains the effective time of the key, the issuing authority, the certificates serial number and other information.

2 System Analysis and Design

2.1 system works

(1) signature process

Document to be signed on the first hash operation (SHA1 or MD5) get document summary, get autographs from the certificates private key, and then get to the hash value to sign.

(2) verification process

The signature verification process is the inverse of the process. When the acceptance of those who receive the signature file, the first hash function with the specified hash of the original file, then import the signers RSA public key to decrypt the signature value, the final value of the decrypted hash value for comparison.

2.2 module design

Software system a certificate generation module, abstract processing module, the signature verification module and the module.

Certificate generation module: responsible for providing the necessary key signature, with two txt file, one for saving the public key and a private key to save; Abstract processing module: the signature on the document to generate the hash of the summary, the system provides 16-byte MD5 generated algorithms, and generate 20 bytes of the SHA1 algorithm; signature block: The RSA algorithm to sign the document summary, the results will be signed to save txt document; authentication modules: signed with the RSA algorithm in the txt document verification, and returns the verification results.

2.3 System Flow

System specific processes shown in Figure 1.


Figure 1 System Flow

3 system to achieve

Software function modules according to design, the system defines three public class: MDE5 hash algorithm class (MD5_CTX), hash class (CHash), RSA algorithm class (CRsa). Some

system main functions are: Encrypt (char * OutFile, char * InFile, char * RsaKeySTr, char * RsaModStr): signature generated according to the abstract; Decrypt (char * InFile, char * RsaKeyStr, char * RsaModStr): According to a summary of the signature reduction; OnSHA1Hash (): file of SHA1 algorithm selected; OnMD5Hash (): MD5 file on the selected operation.

4 Security Analysis

RSA algorithm is used to generate the key from the certificate, when applicants fill in relevant information, generate two txt files, each containing the private key, a stored public key. Private key is encrypted with a password which

, and to ensure the security of the private key. Public documents, a self-signed, thus ensuring its integrity. Key management is also more convenient.

5 Conclusion

This system after the test system has good efficiency, the introduction of a certificate to hold the relevant key information. To solve some of the previous key signature system management issues, and meet the basic requirements for system security. Easy to use and has a certain security level to effectively prevent the file transfer process of destruction and tampering.

CXA1065M datasheetCXA1065M suppliersCXA1065M Price

All right reserved:icfull.com © 2010-2016 Certificate