Supercharge Your Innovation With Domain-Expert AI Agents!

Conversation cryptographic key generation method, system and communication equipment

A technology of session key and communication equipment, which is applied in the field of network communication, can solve the problems of insufficient security and no change of shared key for a long time, and achieve the effect of improving practicability and security and avoiding trust and dependence

Inactive Publication Date: 2013-01-23
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In order to solve the problem of insufficient security caused by the calculated shared key not changing for a long time in the existing identity-based combined key management system, the embodiment of the present invention provides a session key generation method, system and communication device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Conversation cryptographic key generation method, system and communication equipment
  • Conversation cryptographic key generation method, system and communication equipment
  • Conversation cryptographic key generation method, system and communication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] see figure 1 , is a flowchart of a method for generating a session key. This embodiment is based on the cryptographic system of discrete logarithm, system parameter T={g, p}, wherein p is a prime number, and g is a finite field F p Generator, and g is less than p;

[0045] The method for generating the session key between communication parties A and B specifically includes:

[0046] Step 101: The key management center generates A's long-term private key a, B's long-term private key b, and A's long-term public key: P A =g a mod p, B's long-term public key: P B =g b mod p; and send a and b to A and B respectively in a secure manner.

[0047] Step 102: A randomly selects a temporary private key x and keeps it secret.

[0048] Step 103: B randomly selects a temporary private key y and keeps it secret.

[0049] Step 104: A calculates M AB =(P B ) ax mod p=g abx mod p, send message M to B AB .

[0050] Step 105: B calculates M BA =(P A ) by mod p=g aby ...

Embodiment 2

[0058] see figure 2 , is a flowchart of a method for generating a session key. This embodiment is based on the elliptic curve cryptosystem, and the system parameter is T: (u, v, G, n, p), wherein p is a positive integer, Fp is a finite field, u, v are positive integers on Fp, and G is an elliptic curve The base point on E(Fp), n is a prime number, which is the order of the base point G;

[0059] The method for generating the session key between communication parties A and B specifically includes:

[0060] Step 201: The key management center generates A's long-term private key a, B's long-term private key b, and A's long-term public key: P A =a*G mod p, B's long-term public key: P B =b*G mod p. And send a and b to A and B respectively in a safe way.

[0061] Step 202: A randomly selects a temporary private key x and keeps it secret.

[0062] Step 203: B randomly selects the temporary private key y, and keeps it secretly.

[0063] Step 204: A calculates M AB =a*x*(P B ...

Embodiment 3

[0072] see image 3 , is a flowchart of a method for generating a session key. This embodiment is based on the cryptographic system of discrete logarithm, system parameter T={g, p}, wherein p is a prime number, and g is a finite field F p Generator, and g is less than p;

[0073] The method for generating the session key between communication parties A and B specifically includes:

[0074] Step 301: The key management center generates A's long-term private key a, B's long-term private key b, and A's long-term public key: P A =g a mod p, B's long-term public key P B =g b mod p, and send a and b to A and B respectively in a secure manner.

[0075] Step 302: A randomly selects a temporary private key x and keeps it secret.

[0076] Step 303: B randomly selects the temporary private key y, and keeps it secretly.

[0077] Step 304: A calculates M AB =g x mod p, s=(P B ) a mod p=g ab mod p, use s to generate message M AB Message Authentication Code (MAC, Message A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for generating a session key, a system, and a communication device are disclosed. The method includes: selecting, by a communication party, a temporary private key, and operating at least the temporary private key according to the parameters of the cryptosystem to generate a first message, and sending the first message to the opposite party; and after receiving the second message, operating, by the communication party, at least the second message and the temporary private key according to the parameters of the cryptosystem to generate a session key. The system includes a key management center and a communication device. The communication device includes: a temporary private key selecting unit, a message generating and sending unit, and a session key generating unit. In the disclosure, the session key generated after the communication party selects a temporary private key is variable, thus avoiding too much dependence on the key management center and improving the practicability and security of the key.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method, system and communication device for generating a session key. Background technique [0002] In order to effectively manage the public key and prove the ownership relationship between the public key and the owner of the public-private key pair, a digital certificate mechanism can be used. In current network security, the PKI (Public Key Infrastructure, Public Key Infrastructure) system uses the digital certificate mechanism for public key management. In the PKI system, there is an authority called CA (Certification Authority, Certification Center), which is responsible for Issuance of public key certificates. The operation of the PKI system requires the support of hierarchical CAs and online operating certificate stores. The online operation of the certificate store occupies network bandwidth. Large-scale key management will make the performance of the system relati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/36
CPCH04L9/0838H04L9/08
Inventor 李春强
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More