Encryption and decryption method and apparatus

作者: Terence Edward Sumner

DOI:

关键词:

摘要: A method for efficient encryption and decryption (100) comprises the steps of encrypting a message (104) at sending unit which is to be sent receiving using mesage key (106) appending encrypted (108 109) receiver's public (110). Subsequently, sender's certificate (116) appended first server (302) extracted second (310). The then decrypted private (140) provide key. Subsequently (142 143) authenticated by comparing pair digest (152 156).

参考文章(11)
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Stefan A. Brands, Secret-key certificates Department of Computer Science [CS]. pp. 1- 16 ,(1995)
Thomas Vincent Hartrick, Nicholas James Sabia, Jeffrey Noel Stevens, Data processing system and method to enforce payment of royalties when copying softcopy books ,(1993)
Jr. Robert C. Ross, Cryptographic communication system ,(1997)
M.K.E. Lai, N.F. Parker, A mobile subscriber proxy preserving writer-to-reader message security Proceedings of MILCOM '96 IEEE Military Communications Conference. ,vol. 2, pp. 461- 467 ,(1996) , 10.1109/MILCOM.1996.569199
M.J. Beller, Li-Fung Chang, Y. Yacobi, Security for personal communications services: public-key vs. private key approaches personal indoor and mobile radio communications. pp. 26- 31 ,(1992) , 10.1109/PIMRC.1992.279969