Steganography-based key transmission and key updating method

A technology of key update and steganography, which is applied in the field of information security, can solve the problems that the symmetric cryptosystem cannot realize the signature and cannot prevent repudiation, and achieves enhanced scalability and flexibility, improved authentication strength, good compatibility and safety effect

Active Publication Date: 2012-10-10
BEIHANG UNIV
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Authentication problem: the symmetric cryptosystem cannot realize the signature, and cannot prevent the sender of the message from denying the message;
However, it is required that the central server must be online at any time, which means that the central server is the key to the success of the entire communication and the focus of attacks, and will also become the "bottleneck" of communication services in a huge organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Steganography-based key transmission and key updating method
  • Steganography-based key transmission and key updating method
  • Steganography-based key transmission and key updating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0069] The method of key transmission and key update based on steganography provided by the present invention, on the one hand, can realize the secure transmission of the session key of both communication parties; on the other hand, in order to ensure the security of the system, when the key In case of danger, the transfer key can be updated as needed during the transfer process.

[0070] For the convenience of explanation, A and B are used to represent the two parties of communication;

[0071] Further, use Indicates that the symmetric encryption algorithm T is used for encryption, Indicates that the symmetric encryption algorithm T is used for decryption, and k is the key used by the encryption algorithm; Indicates that the steganography algorithm U is used for steganography, Indicates that the steganographic algorithm U is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.

Description

technical field [0001] The present invention relates to key management technology and steganography, and belongs to the field of information security. Specifically, a steganography-based key transmission and key update method is proposed, and steganography is used for key transmission and key update. in the key management process. Background technique [0002] As a resource, information is of special significance to human beings due to its universality, sharing, value-added, processability and multi-utility. With the rapid development of science and technology, the number of Internet users is increasing day by day, and the transmission information is more and more sensitive at the same time. The possibility of threat, interference and destruction of information resources will be greatly increased; in addition to network security issues, personal computer data storage, The healthy development of e-government systems (involving state secrets) and e-commerce construction of va...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
Inventor 郑志明张尧姚丹丹王成启高玉娟李莹伍彦飞王思韬王钊张筱邱望洁
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products