Identification authentication method for communication entity based on combined public key

A communication entity and identity authentication technology, which is applied in the field of communication entity identity authentication based on combined public keys, can solve a large number of user parameters and other problems, and achieve low implementation cost, less resource occupation, and less impact

Active Publication Date: 2009-05-27
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The other is IBE, which is an identification authentication system that does not require a third-party CA, but requires a large number of user parameters, and still needs the support of an online parameter library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method for communication entity based on combined public key
  • Identification authentication method for communication entity based on combined public key
  • Identification authentication method for communication entity based on combined public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] refer to Figure 1 to Figure 3 , the present invention comprises steps as follows:

[0023] ① According to the "ECDSA and ECDH Cryptographic Algorithm Elliptic Curves and Parameters Adopted by Wireless Local Area Network Products" issued by the National Commercial Cryptography Management Office, determine the security elliptic curve parameters for communication entity identification authentication.

[0024] Embodiment The ECDSA that the present invention adopts and the ECDH cryptographic algorithm elliptic curve and parameter are as shown in the table below:

[0025]

[0026] In the above table, p, a, b are safe elliptic curve y 2 =x 3 The parameter of +ax+bmod p, G=(x G ,y G ) is a point of order n on the elliptic curve, called the base point.

[0027] ② According to the recommendations of the International Institute of Electrical and Electronics Engineers IEEE 1363-2000 and IEEE1363a, construct the elliptic curve ECIES public key encryption system between comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication entity identification and authentication method based on a combined public key, and relates to the information security authentication technology between communication entities in the field of communication. The invention adopts the identification and authentication technology based on the combined public key to realize authentication of the communication entities; the invention adopts an AES algorithm to encipher and decipher information data, so as to realize information privacy; and the invention adopts the Ethernet encapsulation and IP encapsulation technology to realize transparent access of an authentication device. The communication entity identification and authentication method has the characteristics of standard interface/protocol, simple access, unnecessary change of the prior communication entities, convenient use and so on, and is particularly suitable for authenticating communication terminals and communication equipment under the condition that the communication entities are not changed.

Description

technical field [0001] The invention relates to a combined public key-based communication entity identification authentication method and equipment for information security and authentication between communication entities in the field of communication and cryptography. It is especially suitable for the application environment where the communication entity accesses the network and local area network through a wireless link. Background technique [0002] There are two main types of authentication at present: one is the authentication system implemented by PKI technology, which is not based on ID authentication. Identity determination requires the certificate of a third-party CA, and authentication requires the support of an online database. The other is IBE, which is an identification authentication system that does not require a third-party CA, but requires a large number of user parameters, and still needs the support of an online parameter library. Contents of the inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/32
Inventor 骆连合卢华斌牛增新赵海强窦军杨国瑞罗春雷吕霆于红增李大艳王彦敏
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products