Steganography-based key transmission and key updating method
A technology of key update and steganography, which is applied in the field of information security, can solve the problems that the symmetric cryptosystem cannot realize the signature and cannot prevent repudiation, and achieves enhanced scalability and flexibility, improved authentication strength, good compatibility and safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0069] The method of key transmission and key update based on steganography provided by the present invention, on the one hand, can realize the secure transmission of the session key of both communication parties; on the other hand, in order to ensure the security of the system, when the key In case of danger, the transfer key can be updated as needed during the transfer process.
[0070] For the convenience of explanation, A and B are used to represent the two parties of communication;
[0071] Further, use Indicates that the symmetric encryption algorithm T is used for encryption, Indicates that the symmetric encryption algorithm T is used for decryption, and k is the key used by the encryption algorithm; Indicates that the steganography algorithm U is used for steganography, Indicates that the steganographic algorithm U is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com