Identity authentication system based on elliptic curve

An identity authentication and elliptic curve technology, applied in the field of identity authentication systems, can solve the problems of inability to guarantee the legality of authentication equipment, complicated two-way authentication, time-consuming and resource-consuming, etc.

Inactive Publication Date: 2008-10-29
SICHUAN PANOVASIC TECH
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The one-way authentication system can only guarantee the legitimacy of the authenticated device, but cannot guarantee the legitimacy of the authenticated device; only two-way authentication can ensure that both parties are legitimate devices, but the two-way authentication is more complicated and consumes more time and resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system based on elliptic curve
  • Identity authentication system based on elliptic curve
  • Identity authentication system based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] When the specific operation is implemented, all parameters of the algorithm are determined by a trusted third-party authority. Part of the parameters are made public, while the other part of the parameters are strictly kept secret, and the corresponding parameters are set in device A and device B. For simplicity, this embodiment selects the P-192 elliptic curve on the prime number field recommended by NIST and some simple parameters.

[0022] First, the elliptic curve parameters (p, a, b, G, n, h) etc. are selected by the authoritative trust agency:

[0023] The parameters that need to be disclosed are:

[0024] Elliptic curve equation y 2 =x 3 -ax-b

[0025] P=2 192 -2 64 -1

[0026] a=-3(mod p)=p-3=2 192 -2 64 -2 2

[0027] b=0x 64210519 E59C80E7 0FA7E9AB 72243049 FEB8DEEC C146B9B1

[0028] The parameters that need to be kept strictly confidential are:

[0029] G x =0x 188DA80E B03090F6 7CBF20EB 43A18800 F4FF0AFD 82FF1012

[0030] G y =0x 07192B95 FFC8...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system based on an elliptic curve. A public key and private key pair, a DH cipher code exchange protocol and hashing functions preset in equipment are used for realizing fast identity authentication, thus preventing the identity authentication by using complicated arithmetic in a public key certificate system, such as a certificate chain and digital signature. The public and private key pair of equipment A are x and xG, and the public and private key pair of equipment B are y and yG; when carrying out the identity authentication, the equipment A and the equipment B exchange x and y (or xG and yG), then both calculate scalar multiplication xyG. The equipment A and the equipment B utilize hashing function H to operate each scalar multiplication result xyF so as to obtain hash value h1 and h1'; if h1=h1', both equipment are legal. The system can be used in software and hardware environments, such as digital content protection interface, e-business, banking system, smart card, and identity authentication, etc.

Description

technical field [0001] The present invention is an identity authentication system, specifically a method for authenticating the legality of identities of both communication parties based on the elliptic curve cryptosystem and the DH key exchange protocol. Background technique [0002] In various information transmission systems, in order to ensure that the entities participating in the information exchange are legal and valid, the identities of the participating entities need to be authenticated. For example, in military communications, it is necessary to confirm the identity of the other party to prevent the leakage of military intelligence information; in Internet environments such as e-commerce, it is necessary to identify the identity of the other party; in application environments such as smart cards, it is necessary to verify the legal validity of access devices In the field of intellectual property, it is necessary to encrypt and sign the intellectual property content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 王志辉刘律宏
Owner SICHUAN PANOVASIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products