Font Size: a A A

Research And Application Of RSA Algorithm In Two-dimensional Code Anti-counterfeiting Technology

Posted on:2018-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:N Q QiFull Text:PDF
GTID:2348330536479936Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Many criminals use the anti-counterfeiting technology vulnerabilities and cryptosystem security vulnerabilities in anti-counterfeiting system to make counterfeit commodities and steal the keys in the process of verifying authenticity.That seriously damages the interests of manufacturers and consumers.At present,high cost,technology easy to imitate,detection inconvenience and other shortcomings is commomly exit in the current anti-counterfeiting technology.The traditional cryptosystem has the disadvantage that the module is easy to be decomposed to obtain the private key and the prime number is too long.In view of the above problems,the RSA algorithm is studied and improved and a two-dimensional code anti-counterfeiting system based on asymmetric encryption algorithm is designed.Based on the deep learning and security analysis of the traditional RSA encryption system,an improved RSA algorithm is proposed.The improved RSA algorithm uses X to replace n in the public key,so attacker can not decompose n into factors p and q by factorization and obtain the private key.Three-factor improved RSA algorithm refers to the selection of three prime factors a1,a2,a3,their product is n,that is n=a1×a2×a3.Based on the deep study of the existing anti-counterfeiting technology and detailed analysis of the anti-counterfeiting system,a two-dimensional code anti-counterfeiting system based on the asymmetric encryption algorithm is designed and implemented.The system combines with the two-dimensional code technology,cryptography and information technology.It uses the local two-dimensional code encryption and generation software to generate the encrypted two-dimensional code graphics.Consumers download the scaning and decoding software to decode and verify the authenticity.The software has a built-in blacklist on the mobile device.The introduced three prime factors increase the number of prime factors but reduce the figure of prime factors,effectively reducing the selection time of large prime number.It can not obtain the private key by factorization beacause it eliminates the n in private key and public key.Therefore,the improved RSA algorithm can solve the problem that the modulus is easily decomposed to obtain the private key and the large prime selection time is too long.The security of the RSA algorithm is improved effectively.The system solve the high cost,technology easy to imitate,detection inconvenience and other shortcomings...
Keywords/Search Tags:Two-dimension code, Anti-counterfeiting technology, Asymmetric encryption algorithm, RSA
PDF Full Text Request
Related items