Authenticated encryption method and encryption system based on symmetric encryption

A technology for authentication encryption and authentication information, applied in user identity/authority verification and key distribution, which can solve the problems of inability to publicly verify signatures by third parties, inability to resist forgery attacks by message receivers, and low security, so as to ensure reliability and reliability. Integrity, small amount of computation, improved effect of transmission cost

Inactive Publication Date: 2010-03-10
CHONGQING UNIV OF POSTS & TELECOMM
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of this scheme is not high, and it cannot resist the forgery attack of the message receiver, and after a dispute occurs, the third party cannot publicly verify the signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticated encryption method and encryption system based on symmetric encryption
  • Authenticated encryption method and encryption system based on symmetric encryption
  • Authenticated encryption method and encryption system based on symmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The invention proposes an authentication encryption method and system based on symmetric encryption and message recoverable signature technology. Specifically include the following steps.

[0020] Step A: The sending end and the receiving end automatically generate public and private keys, and send the public key and their corresponding identities to the server;

[0021] Step B: The sending end receives the public key of the receiving end through the server, the key generation unit of the sending end generates the session key of the sending end according to the public key of the receiving end and the selected random number, and the encryption unit uses the session key of the sending end to pair the message to be sent Encrypt, and use the selected random number, the message to be sent and its own private key to generate authentication information, and the sending unit sends the encrypted message and authentication information to the receiving end through the server;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authenticated encryption method and a system, relating to the field of communication security. The restorable signature of a message and the symmetric encryption technologyare combined; a commitment value which only can be calculated by a designated message receiving end is used as a session key encryption message; and the message receiving end validates the validity ofthe message by the restorable signature, thus realizing encryption and authentication in one logical step. A key generation unit of a sending end generates a session key of the sending end; an encryption unit encrypts a message to be sent; the receiving end generates a session key of the receiving end; a decryption unit utilizes the session key of the receiving end to decrypts the encrypted message; and the authentication and confirmation message is generated according to the decrypted message, thus validating the validity of the message. When disputes occur, the message receiving end transforms the authenticated and encrypted message signature into a common signature so as to lead a third party to validate the validity of the signature. The invention has the advantages of high security,low calculated amount and transmission cost, and the like.

Description

technical field [0001] The invention relates to the field of communication security, in particular to an authentication and encryption method in the communication process. Background technique [0002] With the development of computer and communication technology, more and more people use the network to transmit secret information, and the transmission of these secret messages often requires both confidentiality and authentication. The traditional way to realize authentication and confidentiality at the same time is to combine encryption and signature, and adopt the method of "sign first and then encrypt". The calculation and transmission costs of this combination are the sum of signature and encryption, and this traditional method uses public key encryption, the calculation speed is slow and the cost is high. The use of message recoverable signature technology can realize authentication and encryption at the same time at a lower transmission cost. Many scholars at home and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 李方伟孙逊张鑫张海波
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products