Method, system and device for verifying relation between data link layer address and sending side
A technology of data link layer and link layer address, applied in the system and its device, a method of verifying the relationship between the address of the data link layer and its sender, can solve the problems of attacker counterfeiting, fixed address authentication, etc., to achieve The effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0045] see figure 2 , a flow chart of an example of generating a data link layer address provided by an embodiment of the present invention, including:
[0046] 201: The network node generates a 256-bit random modification value;
[0047] 202: Use the chaotic algorithm SHA-256, add 1 byte of zero to the modified value, and then attach the public key and extended parameters to form an input sequence, perform a chaotic operation on the input sequence, and then take the highest result of the chaotic operation N bits on the left, where the N bits are at least (16*safety level number) bits. Normally, 112 bits can be directly taken as the chaotic value 2;
[0048] 203: Detect whether the leftmost (16*safety level) bits of the confusion value 2 are all zeros, and enter the next step with all 0s, otherwise, add 1 to the randomly modified value, and return to step 202;
[0049] Wherein, 16*security level is a variable, and the value range of the security level is 0 to 7.
[0050] ...
example 2
[0066] see Figure 4 , a flow chart of Example 2 for generating a data link layer address provided by an embodiment of the present invention, including:
[0067] 401: The network node generates a 128-bit random modification value;
[0068] 402: Use the chaotic algorithm SHA-384, add 4 bytes of zero to the modified value, and then perform chaotic operations on the sequence of public keys and extended parameters in order from left to right, and then take the leftmost N bits of the chaotic operation results , the N bits are at least (8*safety level number) bits. Normally, the leftmost 64 bits can be directly taken as the confusion value 2;
[0069] 403: Detect whether the leftmost (8*safety level) bit of the chaotic value 2 is all zeros, the security level ranges from 0 to 7, all 0s enter the next step, otherwise, add 1 to the random modification value, and return to the step 402;
[0070] Wherein, 8*security level is a variable, and the value range of the security level is 0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 