Visible to the public A Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA

TitleA Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA
Publication TypeConference Paper
Year of Publication2022
AuthorsLuo, Zhiyong, Wang, Bo
Conference Name2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC)
Date Publishedmar
Keywordscodes, coding, Dictionaries, encoding, Encryption, human factors, identification analysis, Information security, Mechatronics, Metrics, policy-based governance, pubcrawl, Public key, Resiliency, Safe Coding, Secret key, security
AbstractWith the development of Industrial Internet identification analysis, various encryption methods have been widely used in identification analysis to ensure the security of identification encoding and data. However, the past encryption methods failed to consider the problem of encryption efficiency in the case of high concurrency, so it will reduce the identification resolution efficiency and increase the computational pressure of secondary nodes when applying these methods to the identification analysis. In this paper, in order to improve the efficiency of identification analysis under the premise of ensuring information security, a safe and efficient analytical encryption method for industrial Internet identification based on Secure Hash Algorithm 256 (SHA-256), and Rivest-Shamir-Adleman (RSA) is presented. Firstly, by replacing the secret key in the identification encoding encryption with the SHA-256 function, the number of secret keys is reduced, which is beneficial to improve the efficiency of identification analysis. Secondly, by replacing the large prime number of the RSA encryption algorithm with multiple small prime numbers, the generation speed of RSA key pair is improved, which is conducive to reduce the computation of secondary nodes. Finally, by assigning a unique RSA private key to the identification code during the identification registration phase, SHA-256 and RSA are associated, the number of key exchanges is reduced during the encryption process, which is conducive to improve the security of encryption. The experiment verifies that the proposed method can improve security of encryption and efficiency of identification analysis, by comparing the complexity of ciphertext cracking and the identification security analysis time between the traditional encryption method and this method.
DOI10.1109/ITOEC53115.2022.9734640
Citation Keyluo_secure_2022