Method for distributing key using public key cryptographic technique and on-line updating of the public key

A technology of key distribution and public key cryptography, which is applied in the field of key distribution and online public key update, and can solve the problems of forward secrecy without key perfection, large security risks, and threats to system security.

Active Publication Date: 2008-10-15
CHINA IWNCOMM
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Due to the participation of the key distribution center or key transfer center, each pair of entities can use a new communication key each time they communicate, but each user needs to save a shared key with the key distribution center or key transfer center. The secret management key is used for a long time, and for the key distribution center and the key transfer center, it not only needs to store a huge number of secret management keys, but also bears a large security risk, because once there is a problem, it will directly Threat to the security of the entire system, and none of the above key distribution methods has the perfect forward secrecy PFS (Perfect Forward Secrecy) of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for distributing key using public key cryptographic technique and on-line updating of the public key
  • Method for distributing key using public key cryptographic technique and on-line updating of the public key
  • Method for distributing key using public key cryptographic technique and on-line updating of the public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The key distribution center has a pair of public-private key pair x and Px, and the communication entity should obtain the public key Px of the key distribution center before communication and store it locally. When the first entity A and the second entity B need to conduct secure communication, the communication session key is obtained through a key distribution protocol.

[0038] see Figure 5 , the steps of the key distribution method utilizing public key cryptography of the present invention are as follows:

[0039] 1) The first entity A generates a pair of temporary public-private key pair a and Pa, and sends a key request message to the key distribution center, and the key request message contains the temporary public key Pa of the first entity A;

[0040] 2) After the key distribution center receives the key request message sent by the first entity A, it generates the communication session key k between the first entity A and the second entity B, and the key dist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for the distribution of an encryption key and the online innovation of a public key, which comprises the steps that: (1) a first entity produces a temporary public and private key pair; (2) a communication conversation encryption key exists between the first entity and a second entity; (3) an encryption key distribution center locally stored is utilized to carry out the signature verification of the public key; (4) the second entity produces a temporary public and private key pair; (5) a encryption key response message is formed and returned to the second entity; (6) the encryption key distribution center locally stored is utilized to carry out the signature verification of the public key; (7) the communication conversation encryption key is utilized by the first entity and the second entity to serve as a conversation encryption key to carry out secret communication. The method proposes a method that safely distributes communication encryption key to each pair of entity, causes the encryption key to have PFS property and lowers the complexity of the encryption key management of the system, and also supports the online innovation function of a public key of the encryption key distribution center which is the trusted third party.

Description

technical field [0001] The invention relates to a key distribution using public key encryption technology and a public key online updating method. Background technique [0002] When secure communication is required between communication network entities, key management is one of the key technologies. Sharing a key per pair of users is possible in small networks, but is not feasible in larger networks. In a system with N users, in order to realize secure communication between any two users, N(N-1) / 2 keys need to be generated and distributed to ensure secure communication between any two users in the network. As the scale of the system increases, the complexity increases dramatically. For a network where N is 1000, about 500,000 keys are needed for distribution, storage, etc. In order to reduce complexity, a centralized key management method is usually adopted, which is implemented by a trusted online server as the key distribution center KDC (Key Distribution Center) or key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L63/062H04L9/0825H04L9/083H04L9/0861H04L9/0891H04L9/3247
Inventor 铁满霞曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products