A Method of Multiple Combination Keys

A combination key and key technology, which is applied in the field of network information security, can solve problems such as unfavorable applications, and achieve the effect of reporting loss and avoiding collusion attacks

Inactive Publication Date: 2011-12-28
北京聚宝网络科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, the CPK key is directly related to the identification ID. Once the key is lost and needs to be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] 1. Choose a 12-digit decimal number as the user ID, which can be divided into 4 groups with 3 numbers in each group. The condition is that the 3 numbers cannot be exactly the same. There are 990 ways to choose them. The value space of all IDs is 990^4, which is approximately equal to 1 trillion types.

[0021] 2. Correspondingly, each group takes a 32*32 public and private key matrix, and its rank is 32*31=992, which is greater than 990, which meets the condition of being undecipherable. The values ​​in the same position of the public and private key matrices correspond to a set of discrete logarithms on a given elliptic curve (ECC), that is, a public-private key pair. There is no correlation between the key matrices generated by each group, and there are 4 groups in total, and the sequence numbers I, II, III, and IV are respectively given. Among them, the public key matrix sequence is announced to the public, and the private key matrix sequence can be divided accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of network information security, and the invention discloses a method of multiple combined keys based on the CPK authentication system: by grouping user IDs, a key matrix for each group of IDs is generated at the same time, and rules are formulated to make each group of IDs The value range is smaller than the rank of the combined key mapping matrix, so as to avoid the risk of collusion to crack, and at the same time, the group keys of multiple groups of IDs are compounded again to obtain the user's key, so that the available key space reaches a sufficient number; according to the key The principle of segmentation is to combine and store the private key matrix of the group ID, so as to resist external and internal attacks on the private key matrix; to add the version number of the ID, so that the ID certificate and key can be updated without changing the user ID.

Description

technical field [0001] The invention belongs to the field of network information security, and relates to a key combination method, which is applied in a combined public key system (CPK) so that a user's private key is effectively protected. Background technique [0002] Public Key Infrastructure (PKI), as the greatest project of cryptography application today, has penetrated into every aspect of the network world. PKI refers to a universal security infrastructure that uses the concept and technology of public keys to implement and provide security services. Any security infrastructure based on public key technology is PKI. The core of the public key technology is an asymmetric encryption algorithm, the common ones are RSA and ECC algorithms. Among them, the key in the ECC algorithm has the characteristic of compounding. Using this characteristic, a combined public key system is derived on the basis of PKI: CPK system. [0003] The CPK system realizes authentication, digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 石丰段再超
Owner 北京聚宝网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products