Unlock instant, AI-driven research and patent intelligence for your innovation.

Key agreement method

A key agreement and key pair technology, applied in the field of information security, can solve the problems of consuming storage and processor resources, and achieve the effect of high speed, less resources and high security

Active Publication Date: 2014-12-10
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This series of verification operations requires a lot of storage and processor resources, especially for the limited processing power of mobile terminals and the limited transmission speed of mobile networks, resource consumption is even more prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key agreement method
  • Key agreement method
  • Key agreement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] A key agreement method provided by this embodiment includes the following steps:

[0057] 1. Waiting to receive the instruction of key negotiation;

[0058] 2. Check the instruction type of said instruction received;

[0059] 3. Perform a key negotiation operation according to the instruction and return a corresponding response;

[0060] 4. Return to step 1.

[0061] Step 2 is specifically:

[0062] Step 201: Check whether the received instruction is complete. If it is complete, continue; otherwise, return the pre-agreed error code to the upper computer;

[0063] Step 202: Determine the instruction type according to the second byte of the instruction;

[0064] Specifically, in this embodiment, the judgment method is (in no particular order):

[0065] Step 202-1: If the second byte of the instruction is a pre-agreed 0x82, the instruction is a negotiated key parameter command.

[0066] Step 202-2: If the second byte of the instruction is a pre-agreed 0x85, the inst...

Embodiment 2

[0087] A key agreement method described in this embodiment, such as figure 1 shown, including the following steps:

[0088] Step 1: The smart key device receives the command sent by the host computer;

[0089] Step 2: parse the command to determine the predetermined length data of the header, the length value of the data field and the data field;

[0090] In this embodiment, specifically, the parsing of the command in step 2 further includes a process of verifying whether the command is complete, and the process of verifying whether the command is complete will be described in detail in Embodiments 3 and 4.

[0091] Step 3: Judging whether the predetermined length data of the header is consistent with the first preset character string, if so, execute step 4, otherwise judge whether the predetermined length data of the header is consistent with the second preset character string, then execute step 7, Otherwise, it is judged whether the predetermined length data of the header ...

Embodiment 3

[0115] On the basis of Embodiment 2, when the predetermined length data of the header matches the first preset character string, the process of generating the key negotiation parameters by the initiator smart key device is as follows: figure 2 As shown, the initiator is represented by the host computer, and the process includes the following steps:

[0116] Step 101: the initiator intelligent key device receives the command to generate key negotiation parameters sent by the upper computer;

[0117] This step also includes the initiator smart key device judging whether the command is an ECC generation key negotiation parameter command according to a pre-agreed format, and the judging method is specifically:

[0118] If the data of the predetermined length in the header of the generate key agreement parameter command matches the first characteristic string, the generate key agreement parameter command is the ECC generate key agreement parameter command; if it does not match the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key agreement method, which belongs to the information safety field. The method comprises the steps of judging an order type according to a received order, acquiring parameters needed by an agreement key from the order according to different order types, and generating a session key according to the key exchange algorithm when both communication parties have all parameters needed by the session key such as an error correction code (ECC) public key of an opposite side, a temporary ECC public key of the opposite side, an identification (ID) of the opposite side, a self ECC private key pair, a self temporary ECC key pair and a self ID. The method provided by the invention is a key agreement method with high safety, the two communication parties can negotiate the session key under the situation that no secrete is shared. The method has characteristics of fast speed, fewer resources, high safety and the like.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for performing key negotiation in the communication process between an initiator and a responder. Background technique [0002] Key agreement is a key establishment technology in which two or more parties in the system jointly provide information, and each derives a shared key whose result cannot be predetermined by either party, especially as the communication environment becomes increasingly complex, With the continuous development of information technology, the continuous improvement of computing power, and the continuous development of attack methods in the communication environment, many key agreement methods have different degrees of security risks. [0003] The traditional key negotiation method is the RSA method, which is a certificate-based key negotiation method. This method binds the user's identity and the public key by issuing a cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES