Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Key Dispersion Method for Enhancing the Security of Symmetric Key System

A key dispersion and symmetric key technology, which is applied in the field of information security cryptography, can solve the problems that the security of the decentralized derivative algorithm cannot be guaranteed, the operability of the key dispersion is unfavorable, and the key dispersion technology is complicated. The effect of high safety and wide adaptability

Active Publication Date: 2016-05-11
中电科网络安全科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key dispersion technology is relatively complex and cumbersome, and the security of the decentralized derivation algorithm implemented by itself cannot be guaranteed; the number of dispersion factors participating in the dispersion process is large, which is not conducive to the operability of key dispersion
In addition, through the above-mentioned key dispersion technology, different keys may be derived from the same key and dispersion factor, or the same key may be derived from different keys and dispersion factors, so there is a greater security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Key Dispersion Method for Enhancing the Security of Symmetric Key System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0027] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0028] Step (1), in the distribution factor management of the first-level key management system, the user injects multiple different second-level distribution factors respectively by means of a code sheet or an IC card;

[0029] Step (2), directly input the secondary dispersion factor in the form of code sheet, and input the PIN code of the IC card and read the secondary dispersion factor in the IC card mode, and complete the injection of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key dispersion method for enhancing the security of a symmetric key system, and relates to the technical field of information security encryption, comprising the following steps: step (1), respectively injecting a secondary dispersion factor into a primary key management system; In step (2), the first-level key management system uses the national standard algorithm to perform distributed operations on the second-level dispersion factor with the designated key, and obtains the key data of the second-level key management system. The beneficial effect of the present invention is that: adopting the present invention, different dispersive factors can be distributed and calculated by specifying a key to obtain several pieces of different key data. This method avoids the single derivation and transformation method in which the random number is directly used as a key, provides multiple key derivation transformation methods, and enhances the security of the key derivation transformation process.

Description

technical field [0001] The invention relates to the technical field of information security encryption, in particular to a key distribution method for enhancing the security of a symmetric key system. Background technique [0002] Cryptography technology is the basic technology of information security, and the key is the basis of secure application of cryptography technology and the core element of information security. With the rapid and comprehensive development of my country's information industry, the key management system based on the symmetric key system has also entered a comprehensive construction stage, and the key derivation process in the symmetric key system is facing more and more stringent technical requirements. [0003] The keys used in the current traditional symmetric key system mainly use cryptographic equipment to generate several pieces of key data, and use the several pieces of key data as the key data used in the system. In the above process, the key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 李元正廖成军帅军军
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products