Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Weak authentication and key agreement method based on symmetrical password

A symmetric cryptography and key negotiation technology, applied in key distribution, can solve problems such as unaffordable special networks, large computing and communication resources, and limited capabilities, and achieve fast encryption and decryption, low energy consumption for computing and communication, and high efficiency Improved effect

Active Publication Date: 2012-08-22
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional network authentication technologies include digital signature technology, challenge response technology, etc., but these technologies need to consume large computing and communication resources
These consumptions are nothing for resource-rich network elements, but may be unaffordable for special networks, such as resource-constrained wireless sensor network nodes with very limited computing resources and communication capabilities
Therefore, it is not suitable to use the traditional AKA technology in the resource-constrained communication environment, and a more efficient AKA method is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak authentication and key agreement method based on symmetrical password
  • Weak authentication and key agreement method based on symmetrical password
  • Weak authentication and key agreement method based on symmetrical password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1: One-way authentication using the symmetric key encryption algorithm DES

[0037] As mentioned above, the present invention is based on symmetric cryptography, a shared key has been established between any two nodes, and the identity authentication and session key are established under the premise that the clocks are almost synchronized. The specific steps are as follows:

[0038] 1) Preset a long-term shared key k between any two network node devices A and B.

[0039] In the key pre-distribution stage, first generate a large key pool G and key identification; then randomly extract several keys that are not repeated to form a key chain; finally load different key chains to different sensor nodes. Each node has to discover the surrounding nodes with which it has a shared key, and only nodes with a shared key are considered to be connected. In the case where any two nodes have a shared key, if user A wants to initiate authentication to user B and establish ...

Embodiment 2

[0047] Example 2: Two-way authentication using the symmetric key encryption algorithm AES

[0048] 1) Preset a long-term shared key k between any two network node devices A and B. The long-term shared key k is generated by a server, and the key length is 128 bits.

[0049] With the development of symmetric cryptography, the DES data encryption standard algorithm has been unable to meet the requirements of today's distributed open network for data encryption security due to the small key length (56 bits). Therefore, in 1997, NIST publicly solicited new data encryption standards. , namely AES. AES is a block key, the algorithm inputs 128 bits of data, and the key length is also 128 bits. Each round requires the participation of an Expandedkey of the same length as the input packet. Since the length of the externally input encryption key K is limited, a key expansion program (Keyexpansion) is used in the algorithm to expand the external key K into a longer bit string to genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a weak authentication and key agreement method based on a symmetrical password, comprising the following steps: 1) presetting a long-term shared secret key k between any two network node equipment A and B; 2) respectively arranging a clock on a node A and a node B, wherein, the error between each clock and standard time does not exceed T0 second; 3) internally installing an encryption algorithm E between the node A and the node B; and 4) building an authentication and session key between the node A and the node B by utilizing the encryption algorithm E and the long-term shared secret key k. The method of the invention has low energy-consumption computation and communication, rapid execution speed and high authentication efficiency, and is suitable for resource-restricted communication environments. As the invention uses a symmetric cryptographic algorithm DES or AES, the difficult degree that opponents capture authentication message to obtain the long-term shared key or a ciphertext is relative to the difficult degree of decoding the DES or AES algorithm, thus ensuring the safety of the ciphertext and the key.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a weak identity authentication and key agreement method based on symmetric cipher, which is suitable for fast authentication between nodes and establishment of a shared key in a resource-limited network environment. technical background [0002] In the network environment, communication is a necessary condition for connecting network nodes, and the communication process is the most dangerous way to cause information leakage. Therefore, it is an important research content to communicate in the network through certain protocol rules and to regulate the network behavior of users to protect the security of information. [0003] The basic technical means to protect data from being stolen is to use encryption measures, and before implementing encryption measures, the identities of the communication parties must be authenticated by some identity authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 武传坤滕济凯
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products