Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for network security communication

A network security and communication unit technology, which is applied in the field of network security communication, can solve the problems of lack of mutual authentication and vulnerability to key attacks, and achieve the effect of ensuring communication security, preventing key attacks, and ensuring security

Inactive Publication Date: 2008-03-19
NEUSOFT CORP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0029] The technical problem to be solved by the present invention is to provide a method and system for realizing network security communication, so as to solve the problems of lack of mutual authentication and vulnerability to key attacks in the above-mentioned key agreement process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for network security communication
  • A method and system for network security communication
  • A method and system for network security communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072]In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0073] In view of the lack of mutual authentication and vulnerability to key attacks in the IBC-based key agreement process, the embodiment of the present invention provides an improved solution, which adds a mutual authentication link in the key agreement process and improves the key agreement. security, and solve the key attack problem, thereby ensuring the security of network communication.

[0074] Referring to FIG. 2 , it is a flow chart of the key agreement process according to the embodiment of the present invention. The embodiment of the present invention is also based on the technology, and the introduction of the technology is as described above. Compared with Figure 1, the preparation steps before key negotiation are th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing network secure communication, solving the problem that the key agreement process based on identity-based cryptography lacks mutual authentication and is liable to key attack during network communication. The method has a mutual authentication process based on the prior key agreement process and includes that B makes Hash calculation on KB and T to obtain h<1>, and A makes Hash calculation on K and T to obtain h<1>'; A compares h<1>' with h h<1>, and if equal, the authentication of B by A passes; A makes Hash calculation on K and T to obtain h<2>, and B makes Hash calculation on K and T to obtain h<2>'; B compares h<2>' with h<2>, and if equal, the authentication of A by B passes. According to the method, both communication parties can confirm that, via the mutual authentication, the received message is the message delivered by the expected deliver; if T and T are modified, the both communication parties can be aware in time and thereby determine that the agreed key is an unexpected key, realizing to prevent key attack.

Description

technical field [0001] The invention relates to information security technology, in particular to a method and system for realizing network security communication. Background technique [0002] The demand for secure communication is becoming more and more important in the communication network. The use of encryption technology is the core of realizing secure communication. The current schemes mainly include certificate-based methods and identity-based cryptosystem (IBC, Identity-Based Cryptosystem) methods. The certificate-based method has problems in certificate storage, transmission and management overhead, but the IBC-based method can effectively solve these problems. [0003] In an IBC-based communication network, the communication key is generated through negotiation between the communication parties, and various algorithms can be used in the negotiation process. Referring to FIG. 1 , it is one of the key agreement processes, and this IBC-based key agreement protocol c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 赵宏闻英友罗铭孙锦山李大鹏
Owner NEUSOFT CORP