Protection method for safety protocol first message
一种安全协议、消息的技术,应用在安全装置、安全通信装置、密钥分发,能够解决不考虑第一条消息安全性、攻击安全协议、资源浪费等问题,达到减少计算规模、防止伪造攻击、节省计算资源的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0023] Concrete implementation method of the present invention is as follows:
[0024] 1) Initialization steps
[0025] The initiator and the responder pre-share a private information pre-shared master key PSMK and both have the same master key identifier MKID; the initiator and the responder support the same message integrity code MIC or message authentication code MAC calculation function; for example: The calculation function of message integrity code MIC or message authentication code MAC can be: one-way extension function f(x, y∥str), where x is the key value used for extension, y is the security parameter used for extension, str is the padding string used for expansion, ‖ means string concatenation;
[0026] 2) The initiator sends the first message
[0027] The initiator first uses the message integrity code MIC or message authentication code MAC calculation function to calculate the pre-shared master key PSMK and the security parameters to be sent in the first message...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com