Identity authentication method based on Hash table

The invention discloses an identity authentication method based on a Hash table. The method comprises the following steps: firstly, cyclically filling a character string to be encrypted into a fixed length character string, and then cutting the character string into a batch of sub-character strings...

Full description

Saved in:
Bibliographic Details
Main Authors ZHU QUANYIN, FENG WANLI, ZHUANG JUN, YU SHIMIN, WANG XIAO, PAN SHUXIN, YANG MAOCAN, LIU TAO
Format Patent
LanguageChinese
English
Published 01.09.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention discloses an identity authentication method based on a Hash table. The method comprises the following steps: firstly, cyclically filling a character string to be encrypted into a fixed length character string, and then cutting the character string into a batch of sub-character strings with an equal length, separately encrypting the batch of sub-character strings by calling an HYHashA method, further processing to obtain initial encrypted data, and performing secondary encryption on the initial encrypted data by using an HYHashB method to obtain an encrypted value. Thereby, the cost of data encryption can be effectively reduced, and the security of the system can be improved. 本发明公开了种基于Hash散列表的身份认证方法,本发明首先将待加密字符串循环填充为定长字符串,再将该字符串切割为批等长的子字符串,调用HYHashA方法对这批字符串分别进行加密,经过进步处理得到初步的加密数据,再使用HYHashB方法对初步的加密数据进行二次加密,得到加密后的数值,有效地降低了数据加密的成本,提高了系统的安全性。
Bibliography:Application Number: CN20171295725