Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2011.686.690LiuChaoqun ZhouYang XiaoYunhua SunGuang 32011103According to the characteristics of hash function, the one-way hash encryption algorithm based on high diophantine equation (RSH) is proposed. RSH not only can be used for password encryption, but also can be used for Data integrity check and the digital signature of message digest. These algorithms hash the arbitrary length message into 128 bits, then make the multi-iterations by high diophantine equation, finally produce the numeral string of 128 bits. In the conversion process, because we do not know the high indefinite equation iterative power law, so the resulting string of numbers is very reliable and safe.]]>Mironov, I.,20052005Black, J.R.,20002000Nikooghadam, M., M.R. Bonyadi, E. Malekian and A. Zakerolhosseini,2008819191925Shen, J.J., C.Y. Lin and H.W. Yang,2006et al. OSPA Protocol.]]>6639643Rabah, K., 20054299306Rabah, K.,20054204221Chen, T.H., G. Horng and S.H. Wang,20032213230Khan, A., X. Niu and Z. Yong,200872431Hwang, M.S. and W.P. Yangz,20022553557Rabah, K.,2005516921712Hwang, M.S., C.C. Lee and E.J. Lu,20011287288Rabah, K.,20066482510Toorani, M. and A.A. Beheshti Shirazi,2009910251035Khalique, A., K. Singh and S. Sood,201022127Benson, T.A., L. Gong and T.M.A. Lomas,19941994Katz, J. and C.Y. Koo,20082008Barak, B.,20082008Simon, D.R.,19981403334345Rivest, R.L.,20052005Meneze, A.J., P.C. van Oorschot and S.A. Vanstone,1997pp: 321-383pp: 321-383Bakhtiari, S., R. Safavi-Naini and J. Pieprzyk,19951995Stallings, W.,20033rd Edn.,Sun, G. and X. Sun,20109949955