Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for implementing coexistence of various cryptographic algorithm in wireless LAN

A technology of wireless local area network and encryption algorithm, which is applied in the field of realizing the coexistence of multiple encryption algorithms of wireless local area network, which can solve the problems of the wide application limitation of wireless local area network devices and the inability of wireless local area network devices to communicate with each other, and achieve the effect of fast encryption and good versatility

Inactive Publication Date: 2009-06-24
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This situation restricts the wide application of WLAN devices, that is, WLAN devices using different security protocol standards cannot communicate with each other.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing coexistence of various cryptographic algorithm in wireless LAN
  • Method for implementing coexistence of various cryptographic algorithm in wireless LAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be described in detail below in conjunction with the accompanying drawings. In order to better illustrate the intent of the present invention, the specific implementation of the present invention takes security protocols wapi and 802.11i as examples. The algorithm for data encryption and integrity verification in the wapi security protocol is wpi, the algorithm for data encryption and integrity verification in the 802.11 protocol is the wep encryption algorithm, and the algorithm for data encryption and integrity verification in 802.11i is tkip (an upgraded version based on wep) and ccmp.

[0012] The invention provides a method for realizing the coexistence of multiple encryption algorithms in the wireless local area network, in order to realize the dual-mode of the wireless local area network equipment and improve its versatility. The invention includes a structure for realizing the coexistence of multiple encryption algorithms and a method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing coexistence of multiple encryption algorithms in WLAN. In WLAN, communication security is very important. Currently, a plurality of encryption algorithms are used for realizing safety communication in WLAN, such as wpi (wapi protocol), tkip, ccmp(802.11i protocol) and the like. In concrete application, a WLAN device is used for realizing a plurality of hardware encryptions simultaneously, so the generality of WLAN device is limited in specific occasions. The invention combines the characteristics of a plurality of encryption algorithms and adopts the same structure to realize the coexistence of encryption algorithms in hardware. Parallel processing is adopted for the verification of data encryption and integrality of each encryption algorithm, so the operational speed is improved. The WLAN device in the invention is adopted to realize the switching in different encryption modes, so the generality of WLAN device is improved.

Description

technical field [0001] The invention relates to a hardware encryption implementation method for secure communication in the wireless local area network field, in particular to a method for coexistence of multiple encryption algorithms in hardware implementation and a parallel processing method for data encryption and integrity verification when the encryption algorithm is implemented. Background technique [0002] In WLAN, communication security is a very important issue. The wep encryption algorithm given in the 802.11 protocol does not really solve the security problem of the wireless local area network, so the subsequent security protocols wapi and 802.11i appear. The algorithm for data encryption and integrity verification in the wapi security protocol is wpi, and the algorithm for data encryption and integrity verification in 802.11i is tkip (an upgraded version based on wep) and ccmp. [0003] At present, most wireless LAN devices adopt a security protocol standard, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/12H04L29/06
Inventor 赵彦光
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More