Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for establishing tls channel based on national secret algorithm

A national secret algorithm and channel technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as security needs to be improved, and achieve the effect of improving security

Active Publication Date: 2016-12-28
CHINA FINANCIAL CERTIFICATION AUTHORITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of this method needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing tls channel based on national secret algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] In one embodiment of the present invention, a method for establishing a TLS channel by using the SM2KEPE key exchange algorithm is provided. Such as figure 1 As shown, the method comprises the steps of:

[0032] Handshake request phase: the client initiates a client hello message (Client_hello); the server sends a server hello message (Server_hello) as a response after receiving the client hello message;

[0033]Server-side authentication phase: the server sends the server-side SM2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, and provides a method for establishing a TLS (Transport Layer Security) channel based on a state secret algorithm. The method comprises the following stages: a handshake request stage, a server side authentication stage, a client side authentication stage and a handshake completion stage. According to the method, the state secret algorithm is integrated in a TLS protocol to perform security communication, and a data security method of which the signature speed is obviously superior to that of an RSA (Rivest, Shamir and Adleman) algorithm and is equivalent to 2048 bit security level of the RSA algorithm is realized at a shorter key length; in addition, a preliminary master key can be calculated by using an SM2KEPE key exchange algorithm under the condition that temporary key pairs are generated by both the client side and the server side, so that the situation that the content which is transmitted in an encryption manner is decrypted through the private key by an attacker when the server side private key is stolen or revealed is avoided, and the security of TLS channel is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for establishing a TLS (Transport Layer Security, secure transport layer) channel based on a national secret algorithm. Background technique [0002] Cryptographic algorithms are mathematical functions used for encryption and decryption, and are the basis of cryptographic protocols. Current cryptographic algorithms mainly include sequence ciphers, block ciphers, public key ciphers, hash functions, etc., which are mainly used to ensure information security and provide authentication , integrity, non-repudiation and other services. Commercial encryption refers to the encryption technology and encryption products used for encryption protection or security authentication of non-classified information, and is mainly used in general industrial and commercial fields that do not involve state secrets. Due to the emergence of many different cryptographic algorithms base...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 林峰张行任新海杨晓宇
Owner CHINA FINANCIAL CERTIFICATION AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products