Method of authenticating identification based common key cryptosystem and encryption address in network

A technology of public key cryptography and identity, applied in the field of Internet technology mobile IPV6 communication

Inactive Publication Date: 2008-04-16
柏建敏
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, CGA itself cannot solve the trust problem, that is, it cannot confirm the problem 3) The owner of this CGA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of authenticating identification based common key cryptosystem and encryption address in network
  • Method of authenticating identification based common key cryptosystem and encryption address in network
  • Method of authenticating identification based common key cryptosystem and encryption address in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Figure 1 details the architecture of the identity-based public key cryptography system IBC, which includes the following parts:

[0028] Key Distribution Center (KDC), responsible for producing, issuing, backing up and managing the system parameters necessary for IBC system initialization and operation, as shown in Figure 1 at 102;

[0029] ●End entities, that is, users, applications or devices using system security functions, such as 101 and 103 in Figure 1;

[0030] ●The process of registration and key distribution between the terminal entity and the key distribution center, as shown in Figure 1 104, 105, 106, 107;

[0031] ●The message signature authentication process between terminal entities, as shown in 108 in Figure 1;

[0032] Fig. 2 is a schematic diagram of the module structure of the mobile terminal. In Fig. 2, 201 is a wireless network interface, 202 is a signature encryption module of the identity-based public key cryptosystem, 203 is a module that uses t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity-based public-key cryptography system (IBC) and the authentication method of CGA (Cryptographically Generated Addresses) in a mobile IPv6 network. In the method, a mobile node obtains owned public and private keys via an identity identifier registered on the identity-based public-key cryptography system (IBC) and configures an IPv6 address via the owned public key. Only by knowing the identifier of a communication peer, the mobile node can use the public parameters of the system to calculate the public key of the communication peer in order to carry out message encryption or signature authentication, whereas the private key of the mobile node can be obtained only by the center of the IBC cryptography system and the mobile node. The method resolves three problems at the same time, the first problem is the ownership of IPv6 addresses, the second problem is the authentication property of message sources, that is, messages come from the owers of addresses, and the third problem is the trust property which is resolved by the IBC, that is, a message source is an authentic entity.

Description

technical field [0001] An identity-based public key cryptography (IBC) and CGA authentication method in a mobile IPv6 network belongs to the technical field of Internet technology mobile IPv6 communication. Background technique [0002] Mobile IPv6 is a simple and scalable global Internet mobile IPv6 solution, which enables nodes to maintain ongoing communication when changing access networks. The security mechanism in the mobile IPv6 network is a hot topic in current research. In the process of neighbor discovery, route optimization and network handover, the mobile node (MN) is vulnerable to various attacks such as forged IPv6 addresses and data redirection. It is very easy to cause network paralysis and leakage of private data. A large number of researches are aimed at improving the security characteristics of mobile IPv6 networks. RFC3972 (non-patent literature 1) proposes a Cryptographically Generated Address (CGA) method to ensure the confidentiality of data exchange i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32
Inventor 柏建敏
Owner 柏建敏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products