Computer Science ›› 2017, Vol. 44 ›› Issue (1): 176-182.doi: 10.11896/j.issn.1002-137X.2017.01.034

Previous Articles     Next Articles

Optimization of RSA Encryption Algorithm for Android Mobile Phone and Design of QR Code Encryption Security System

FANG Wen-he, LI Guo-he, WU Wei-jiang, HONG Yun-feng and ZHOU Xiao-ming   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Based on the Android intelligent mobile terminal,the mobile two-dimensional code encryption security system was designed.The encryption module is based on RSA algorithm.To improve the running efficiency of RSA algorithm in the mobile terminal,the Monte Carb probabilistic algorithm is combined with Miller-Rabin prime test optimization strategies to get rapid random strong prime algorithm to improve the RSA algorithm efficiency of initialization and encryption,and MMRC decryption algorithm was used to optimize RSA decryption process.In addition,the M-ary algorithm was introduced to optimize the modular exponentiation carried out during the RSA algorithm.By realizing the above three aspects of optimazation,the 200 comparison test results show the improved RSA algorithm has improved significantly in the Android cryptographic security module than the original RSA algorithm.

Key words: QR code,RSA,Android,M-ary algorithm,Smart security

[1] MA Chang-sha,HU Ai-qun.Research on improving the speed of RSA algorithm [J].Information Security and Communications Privacy,2010(10):80-82.(in Chinese) 麻常莎,胡爱群.关于提高RSA算法速度的研究[J].信息安全与通信保密,2010(10):80-82.
[2] RIVEST R L,SHAMIR A,ADLEMAN M.A Method for Obtaining Digital Signnature and Public-key Cryptosystems[J].Communication of the ACM,1978,1(2):120-126.
[3] DIFFIE W,HELLMAN M E.New Direction in Cryptography[J].IEEE Transaction on Information Theory,1976,IT-22(6):644-654.
[4] HE Yi-chao,LIU Jian-qin,HEN Wei-hai.The Chinese remainder theorem in the application of the RSA decryption[J].Journal of Hebei Academy of Sciences,2003(3):138-143.(in Chinese) 贺毅朝,刘建芹,陈维海.中国剩余定理在RSA解密中的应用[J].河北省科学院学报,2003(3):138-143.
[5] XIAO Ping,LI Xi.Based on RSA digital envelopes technologyAndroid data security mechanism[J].Information Network Security,2013(3):37-39.(in Chinese) 肖萍,李茜.基于RSA数字信封技术的Android数据安全机制[J].信息网络安全,2013(3):37-39.
[6] KNUTH D E.The Art of Computer Programmings:Seminu-merical Algorithms[M].Stanford University,2004
[7] FENG Deng-guo,FEI Ding-yi.Cryptography guidance[M].Beijing:Science press,2001.(in Chinese) 冯登国,裴定一.密码学导引[M].北京:科学出版社,2001.
[8] 密码编码学与网络安全-原理与实践[M].刘玉珍,等译.北京:电子工业出版社,2004.
[9] WANG Ying.RSA algorithm quickly generate method of large prime Numbers[J].Journal of Hunan Institute of Science and Technology,2005(5):14-16.(in Chinese) 王英.RSA算法中大素数的快速生成方法[J].湖南科技学院学报,2005(5):14-16.
[10] HE Yi-chao,LIU Kun-qi.Rapid Realization of Rabin cipher[J].Application Research of Computers,2006,3(9):51-53.(in Chinese) 贺毅朝,刘坤起.Rabin密码算法的快速实现研究[J].计算机应用研究,2006,3(9):51-53.
[11] FANG Yuan,FU Hua-ming.Two-dimensional bar code encryption algorithm research[J].Electronic-technique,2009(1):50-51.(in Chinese) 方媛,傅华明.二维条码加密算法的研究[J].电子技术,2009(1):50-51.
[12] ROSE K H.Elementary Number Theory and Its Application[M].Addison-Wesley,1984.
[13] KOC C K,Hung C Y.Adaptive M-ary Segmentation and Canonical Recoding Algorithms for Multiplication of Large Binary Numbers[J].Computers and Mathematics with Applications,1992,4(3):3-12.
[14] DOWNEYP,LEONYB,SETHIR.Computing Sequence with Ad-dition Chains[J].SIAM Journal of Computing,1981,0(3):638-646.
[15] RAO jin-ping,FENG Deng-guo.Research and implementation of high speed RSA processing chip[J].Computer Engineering and Applications,2003(5):139-141.(in Chinese) 饶进平,冯登国.高速RSA处理芯片的研究与实现[J].计算机工程与应用,2003(5):139-141.
[16] WANG Hao,OU Yan-ming.2D-Bar codes reading:solutions for camera phones[J].International Journal of Signal Processing,2006,3(3):164-170.
[17] State Bureau of Quality Supervision.GB /T 18284-2000,quickresponse code[S].Beijing:Beijing Standard Press,2001.(in Chinese) 国家质量监督局.GB/T 18284-2000,快速响应矩阵码[S].北京:北京标准出版社,2001.
[18] ALSUWAIYEL M H.Algorithm Design Techniques and Analysis(English Version)[M].Beijing:Electronic Industry Press,2003.
[19] LIU Jian,SUN Ke-qin,WANG Sun-lv.Control flow analysisbased on the Android system code vulnerability mining[J].Journal of Tsinghua University (Natural Science Edition),2012(10):1335-1339.(in Chinese) 刘剑,孙可钦,汪孙律.基于控制流挖掘的Android系统代码漏洞分析[J].清华大学学报(自然科学版),2012(10):1335-1339.
[20] SUN Run-kang,ZHANG Xian,SHAO Yu-ru,et al.Androidphone security detection and forensic analysis system[J].Information Network Security,2013(3):71-74.(in Chinese) 孙润康,展娴,邵玉如,等.Android手机安全检测与取证分析系统[J].信息网络安全,2013(3):71-74.
[21] LIU Xiao-ming.Construction of two dimensional code anti fake system with asymmetric encryption[J].Software Guide,2015(3):145-151.(in Chinese) 刘小铭.非对称加密二维码防伪系统构建[J].软件导刊,2015(3):145-151.
[22] ZHOU Ze-yun,XIANG Yang-xia,ZOU Yu.Application of Android system in equipment support information system [J].Sichuan ordnance Journal,2015(4):77-80.(in Chinese) 周泽云,向阳霞,邹渝.Android系统在装备保障信息系统中的应用[J].四川兵工学报,2015(4):77-80.
[23] ZHOU Xiao-qing,LU Tao,JIAO Qiang.Anti counterfeiting system based on QR code [J].Computer and Modern,2015(1):122-126.(in Chinese) 周晓庆,陆涛,焦强.基于QR码的药品防伪系统[J].计算机与现代化,2015(1):122-126.
[24] LIN Yong,LU Jiang-hai,YAO Jun.Construction of two dimensional code inspection report anti fake platform based on RSA digital signature[J].Quality and Technical Supervision Research,2015(4):55-57.(in Chinese) 林涌,卢江海,姚军.基于RSA数字签名的二维码检验报告防伪平台构建[J].质量技术监督研究,2015(4):55-57.
[25] WU Kai.The design and implementation of bar code scanning software based on Android platform[J].Information Safety,2013(10):223-231.(in Chinese) 吴凯.基于Android平台的条码扫描软件的设计与实现[J].信息安全,2013(10):223-231.
[26] XU Jie-min,XIAO Yun.The present situation and development prospect of two dimensional bar code technology [J].Computer and Modernization,2004(12):141-142.(in Chinese) 徐杰民,肖云.二维条码技术现状及发展前景[J].计算机与现代化,2004(12):141-142.
[27] ZHANG Xiao.Research and implementation of software protection strategy based on Android platform[D].Beijing:Beijing University of Posts and Telecommunications,2015.(in Chinese) 张晓.基于Android平台的软件保护策略的研究与实现[D].北京:北京邮电大学,2015.
[28] LIU Zhi.Application of three weight DES,RSA,SHA-1 algorithm design data encryption system[J].Software Guide,2015(5):165-167.(in Chinese) 刘志.应用三重DES、RSA、SHA-1算法设计数据加密系统[J].软件导刊,2015(5):165-167.
[29] CHENG Xiao-rong,MA Li,HE Zhuang-zhuang.Analysis andimprovement of public key RSA encryption algorithm[J].Network Security,2015(8):44-45.(in Chinese) 程晓荣,马力,何壮壮.公钥RSA加密算法的分析与改进[J].网络安全,2015(8):44-45.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .