Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher key negotiation method, system, customer terminal and server for cipher key negotiation

A key negotiation and client-side technology, applied in the key negotiation system, client and server fields, can solve the problems of low system security, difficult to implement, consuming storage and processor resources, etc., to save system resources, application The effect of a broad, streamlined process

Inactive Publication Date: 2009-06-17
HUAWEI TECH CO LTD
View PDF0 Cites 77 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This series of verification operations requires a lot of storage and processor resources, especially for the limited processing power of mobile terminals and the limited transmission speed of mobile networks, resource consumption is even more prominent
[0045] 2. Using the DH algorithm for key negotiation cannot authenticate the two parties in the communication. If a malicious middleman pretends to be a client or server to attack the other party, it will not be recognized. Therefore, using the DH algorithm for key negotiation is vulnerable to attacks by the middleman, and the system security is relatively low. Low
[0046] 3. To use the shared key method for key negotiation, it is necessary to have the conditions for deploying a key known to both parties in advance. This requires different methods depending on the specific environment. In some environments, it is difficult to achieve, especially in the network more difficult to achieve in
When the shared key method is used at the same time, because both parties in the communication know the shared key in advance, it is impossible to prevent one party from denying that it has done a certain action, that is, there is a problem of non-repudiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
  • Cipher key negotiation method, system, customer terminal and server for cipher key negotiation
  • Cipher key negotiation method, system, customer terminal and server for cipher key negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] Embodiments of the present invention provide a key negotiation method applicable to the TLS protocol, a system for key negotiation, a client and a server, so that the key negotiation process is more convenient, has a wide application range, and is safe.

[0083] In the embodiment of the key agreement method provided in the embodiment of the present invention, an asymmetric key mechanism that can be called an identity-based cryptographic mechanism (IBC, Identity-Based Cryptograph) is used to negotiate the key. The user public key used in this method can be the user ID or the hash value of the user ID after hashing, and the private key can be further derived by using the public key through a certain algorithm.

[0084] Since the hash formula used for hashing is a public parameter that can be obtained by any terminal, calling the hash value of the user ID a public key has the same meaning as directly calling the user ID a public key , so it is usually collectively referred...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a key agreement method, which comprises sending a client calling message to a server, receiving information returned by the server, including key agreement mode of a code mechanism based on user's identity, receiving a server key exchange message sent by the server, obtaining a master key, and sending a client key exchange message to the server. The embodiment of the invention further discloses an another key agreement method, which comprises receiving a client calling message sent by a client terminal, selecting ciphertex family using the key agreement mode of the code mechanism based on user's identity from a ciphertext family list, and then sending to a client, sending a server key exchange message to the client, receiving a client key exchange message sent by the client, and obtaining a master key according to information carried in the client key exchange message. The invention further discloses a system used for the key agreement, and a relative client and a server, which can make the process of the key agreement more rapid, safer and more highly-effective.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a key agreement method suitable for Transport Layer Security Protocol (TLS, Transport Layer Security Protocol), a system for key agreement, a client and a server. Background technique [0002] TLS is a widely used protocol in the field of communication technology. It provides authentication, data confidentiality and integrity protection for the application layer. Protect the algorithm and key. Since the key is non-public information, the two parties need to negotiate the key when establishing communication, so that the two parties can obtain the same safe and accurate key. [0003] At present, there are mainly five key negotiation methods used in the handshake protocol: RSA (Rirest A SllalnlrL Adleman, Rongse A) method, anonymous Diffie-Hellman method (Anonymous Diffie-Hellman, DH_anon), fixed DH method (Diffie-Hellman, DH_anon). -Hellman with signature, DH), ephem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L12/56
CPCH04L63/166H04L9/0847H04L63/061H04L9/0841
Inventor 高洪涛
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products