Secret key generation method

A technology for generating method and key, applied in public key and key distribution of secure communication

Active Publication Date: 2008-03-26
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the currently widely used USB Key, such an operation takes about 300ms. Therefore, in some occasions where authentication is frequently performed, both RSA and ECC have problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method
  • Secret key generation method
  • Secret key generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The implementation of this program is as follows:

[0032] The key distribution center first generates an n×n symmetric matrix M, and protects this matrix as a secret, which must not be leaked;

[0033] The key distribution center assigns a vector to each application object α → = α 1 α 2 . . . α n 1 × n , as the public key or ID of the object;

[0034] The key distribution center will Operate with the secret matrix M to generate the private key of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to cryptology, information security technology, and provides a simple operation and reliable method for generating ciphered keys, which is applied to identity authentication or key agreement among equipments, and can distributes one pair of public/private key. The technical proposal of the method includes the following steps: a, generating an n-dimension symmetrical matrix M, b, distributing an n-dimension vector alpha to an application object as a public key of the object, c, multiplying the n-dimension vector alpha with the matrix M to get n-dimension vector beta to be taken as the private key of the object, in which, any pair of public/private keys generated by this method can meet that multiplication of the transposed matrix of the public key of any object A and the private key of another one B is the same. By adopting the chip of the method, the development difficulty and the chip scale can be reduced, the operating rate can be improved, and the chip cost is reduced.

Description

technical field [0001] The invention relates to cryptography and information security technology. Background technique [0002] In cryptography, authentication, key exchange, key agreement, and key sharing are very important technologies. In all security systems, the first step is to establish a trustworthy environment. The first thing it does is to authenticate the communication parties, usually using the public key and key in the device to authenticate the identity of the other party. Generally, the public key and secret key in the device are distributed by the key distribution center; there are also cases where the device itself generates it, such as in some IC cards. [0003] At present, the PKI technology based on digital certificates is the most used for authentication, and the Kerberos authentication mechanism is also widely used on the Internet. In terms of key exchange, the DH key exchange mechanism is currently used the most. All of the above mechanisms have ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 刘贤洪
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products