Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for network security communication

A technology of network security and communication unit, which is applied in the field of realizing network security communication and can solve the problems of vulnerability to key attack and lack of mutual authentication.

Inactive Publication Date: 2010-06-16
NEUSOFT CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028] The technical problem to be solved by the present invention is to provide a method and system for realizing network security communication, so as to solve the problems of lack of mutual authentication and vulnerability to key attacks in the above-mentioned key agreement process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for network security communication
  • A method and system for network security communication
  • A method and system for network security communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0072] In view of the lack of mutual authentication and vulnerability to key attacks in the IBC-based key agreement process, the embodiment of the present invention provides an improved solution, which adds a mutual authentication link in the key agreement process and improves the key agreement. security, and solve the key attack problem, thereby ensuring the security of network communication.

[0073] refer to figure 2 , is a flow chart of the key agreement process in the embodiment of the present invention. The embodiment of the present invention is also based on the technology, and the introduction of the technology is as described above. Compared figure 1 , the preparation steps before the key agreement are the same, as fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for realizing network secure communication, solving the problem that the key agreement process based on identity-based cryptography lacks mutual authentication and is liable to key attack during network communication. The method has a mutual authentication process based on the prior key agreement process and includes that B makes Hash calculation on KBand T to obtain h<1>, and A makes Hash calculation on K and T to obtain h<1>'; A compares h<1>' with h h<1>, and if equal, the authentication of B by A passes; A makes Hash calculation on K and T to obtain h<2>, and B makes Hash calculation on K and T to obtain h<2>'; B compares h<2>' with h<2>, and if equal, the authentication of A by B passes. According to the method, bothcommunication parties can confirm that, via the mutual authentication, the received message is the message delivered by the expected deliver; if T and T are modified, the both communication parties can be aware in time and thereby determine that the agreed key is an unexpected key, realizing to prevent key attack.

Description

technical field [0001] The invention relates to information security technology, in particular to a method and system for realizing network security communication. Background technique [0002] The demand for secure communication is becoming more and more important in the communication network. The use of encryption technology is the core of realizing secure communication. The current schemes mainly include certificate-based methods and identity-based cryptosystem (IBC, Identity-Based Cryptosystem) methods. The certificate-based method has problems in certificate storage, transmission and management overhead, but the IBC-based method can effectively solve these problems. [0003] In an IBC-based communication network, the communication key is generated through negotiation between the communication parties, and various algorithms can be used in the negotiation process. refer to figure 1 Shown is one of the key agreement process, this IBC-based key agreement protocol can sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 赵宏闻英友罗铭孙锦山李大鹏
Owner NEUSOFT CORP