Title | A Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Luo, Zhiyong, Wang, Bo |
Conference Name | 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC) |
Date Published | mar |
Keywords | codes, coding, Dictionaries, encoding, Encryption, human factors, identification analysis, Information security, Mechatronics, Metrics, policy-based governance, pubcrawl, Public key, Resiliency, Safe Coding, Secret key, security |
Abstract | With the development of Industrial Internet identification analysis, various encryption methods have been widely used in identification analysis to ensure the security of identification encoding and data. However, the past encryption methods failed to consider the problem of encryption efficiency in the case of high concurrency, so it will reduce the identification resolution efficiency and increase the computational pressure of secondary nodes when applying these methods to the identification analysis. In this paper, in order to improve the efficiency of identification analysis under the premise of ensuring information security, a safe and efficient analytical encryption method for industrial Internet identification based on Secure Hash Algorithm 256 (SHA-256), and Rivest-Shamir-Adleman (RSA) is presented. Firstly, by replacing the secret key in the identification encoding encryption with the SHA-256 function, the number of secret keys is reduced, which is beneficial to improve the efficiency of identification analysis. Secondly, by replacing the large prime number of the RSA encryption algorithm with multiple small prime numbers, the generation speed of RSA key pair is improved, which is conducive to reduce the computation of secondary nodes. Finally, by assigning a unique RSA private key to the identification code during the identification registration phase, SHA-256 and RSA are associated, the number of key exchanges is reduced during the encryption process, which is conducive to improve the security of encryption. The experiment verifies that the proposed method can improve security of encryption and efficiency of identification analysis, by comparing the complexity of ciphertext cracking and the identification security analysis time between the traditional encryption method and this method. |
DOI | 10.1109/ITOEC53115.2022.9734640 |
Citation Key | luo_secure_2022 |