摘要 |
The method for negotiating the key, encrypting and decrypting the information, signing and authenticating the information includes the following steps, Step 1, the shared A(x) of one user group is pre-set, and the use group includes at least two users, the A(x) is the nonlinear function group, in which the vector X of n variables is transformed to the vector Y of n variables, y=(y1,..., yn)=A(x)=(A1(x1,..., xn),...,An(x1,..., xn)), where n>1. As to A(x), the number of the coefficients of x which is not equal to 0 in the s-layered iteration A(s)(x) is unchanged, where the s is the integer. When B(x)=A(A(x)), then A(b(x))=B(A(x)). Step 2, the users of the user group interchange the middle results of the iteration of the A(x). Step 3, the users calculate the shared key K according to the middle results. So the complexity of cryptography and performance of anti-attack are improved. |