Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method for safety protocol first message

一种安全协议、消息的技术,应用在安全装置、安全通信装置、密钥分发,能够解决不考虑第一条消息安全性、攻击安全协议、资源浪费等问题,达到减少计算规模、防止伪造攻击、节省计算资源的效果

Inactive Publication Date: 2009-05-27
CHINA IWNCOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, researchers usually do not consider the security of the first message when designing security protocols, so that attackers can arbitrarily forge and replay the first message to achieve the purpose of attacking the security protocol.
In fact, in most communication network environments, ignoring the security of the first message will not have much impact, at most it will cause some waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Concrete implementation method of the present invention is as follows:

[0024] 1) Initialization steps

[0025] The initiator and the responder pre-share a private information pre-shared master key PSMK and both have the same master key identifier MKID; the initiator and the responder support the same message integrity code MIC or message authentication code MAC calculation function; for example: The calculation function of message integrity code MIC or message authentication code MAC can be: one-way extension function f(x, y∥str), where x is the key value used for extension, y is the security parameter used for extension, str is the padding string used for expansion, ‖ means string concatenation;

[0026] 2) The initiator sends the first message

[0027] The initiator first uses the message integrity code MIC or message authentication code MAC calculation function to calculate the pre-shared master key PSMK and the security parameters to be sent in the first message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for protecting a first message of a security protocol. The method comprises: firstly, initialization is performed; secondly, the first message is transmitted by an initiator; and thirdly, the first message is received by a responder. The method for protecting the first message of the security protocol has the advantages that: firstly, the method uses a computing function of a message integrity code MIC or a message authentification code MAC to bind a preshared master key PSMK of the starter and the responder and a security parameter in the first message, so as to effectively prevent forgery attack of the first message in the security protocol; and secondly, when the message integrity code MIC or the message authentification code MAC of the first message is calculated, the method only selects the preshared master key PSMK and the security parameter in the first message, so as to effectively reduce the computing scale of the starter and the responder, thereby saving computing resources.

Description

technical field [0001] The invention relates to a method for protecting the first message of a security protocol. Background technique [0002] With the rapid development of communication networks, security protocols have become ubiquitous. However, researchers usually do not consider the security of the first message when designing security protocols, so that attackers can arbitrarily forge and replay the first message to achieve the purpose of attacking the security protocol. In fact, in most communication network environments, disregarding the security of the first message will not have much impact, at most it will cause some waste of resources. However, for some special communication network environments, such as: Ultra Wideband UWB (Ultra Wideband) communication network. Ultra-wideband UWB is a carrier-free communication technology that uses nanosecond to microsecond sine wave narrow pulses to transmit data. Most of the devices in the ultra-wideband UWB communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L2209/80H04L63/12H04L9/0838H04L63/123H04L9/3271H04L9/3242H04L9/3273H04L9/08H04L63/00H04W12/10H04L9/3244H04W12/106
Inventor 赖晓龙曹军肖跃雷铁满霞黄振海张变玲胡亚楠
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products