Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Entity authentication method and device

A technology for identifying entities and messages, applied in the field of network security, can solve problems such as the inability to determine who the other party is and potential safety hazards

Active Publication Date: 2019-09-27
CHINA IWNCOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in authentication schemes based on cryptographic algorithms, especially those based on symmetric cryptographic algorithms, the identities of both parties are usually not confirmed during the authentication process, so even if the identity authentication passes, it can only be determined that the other party has a shared secret , but in fact it is still impossible to determine who the other party is, and there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity authentication method and device
  • Entity authentication method and device
  • Entity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] See figure 1 , the present invention provides an entity authentication method. When the method is implemented, entity A and entity B have shared a pre-shared key (Pre-Shared key, PSK) and know each other's identity, and entity A's identity as ID A , the identity of entity B is ID B , the method includes the following steps:

[0049] Step 1. Entity A generates random number N A , and send to Entity B.

[0050] Step 2. Entity B receives N A After that, generate a random number N B and the random number ZSEED used to seed the key B , calculate the key MKA||KEA||KIA=KDF1(N A ,N B ,PSK,ID A ,ID B ), calculate the ciphertext EncData B =ENC(KEA,N B ||N A ||ID B ||ID A ||ZSEED B ), calculate the message authentication code MAC B =MAC1(KIA,N B ||N A ||EncData B ), Entity B sends N B ||N A ||EncData B ||MAC B For entity A, MKA is an authentication key, KEA is a message encryption key, KIA is a message integrity key, KDF1 is a key derivation algorithm, ENC ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an entity identification method and device. The method comprises the steps that an entity A generates a random number N and transmits the random number N to an entity B; the entity B generates random numbers N and ZSEED, a secret key MKA||KEA||KIA, a cryptograph EncData and a message identification code MAC are calculated, and N||N||EncData||MAC is transmitted to the entity A to be identified; the entity A generates a random number ZSEED, a cryptograph EncData, a message identification code MAC, a shared secret Z, a main secrete key MK and a message identifier MacTag are calculated, and N||N||EncData||MAC||MAC|| MacTag is transmitted to the entity B to be identified; the entity B calculates Z and MK and calculates MacTag and the MacTag is compared with the received MacTag, and the entity A is considered to be legal if the MacTag and the received MacTag are equal; the entity B calculates a message identifier MacTag and transmits the MacTag to the entity A; and the entity A calculates MacTag and the MacTag is compared with the received MacTag, and the entity B is considered to be legal if the MacTag and the received MacTag are equal. Identification between network entities can be realized and the main secret key is established, and identity of the opposite side can be confirmed simultaneously.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an entity authentication method and device. Background technique [0002] For communication networks, such as local area network WLAN, wireless sensor network WSN, near field communication NFC, radio frequency identification RFID, personal area network WPAN, etc., they are vulnerable to forgery, eavesdropping, replay and other attacks during communication, so it must be solved before communication Identity authentication between the two parties in communication to ensure the legitimacy of the identities of the two parties in communication. At present, in authentication schemes based on cryptographic algorithms, especially those based on symmetric cryptographic algorithms, the identities of both parties are usually not confirmed during the authentication process, so even if the identity authentication passes, it can only be determined that the other party has a shared sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 杜志强胡亚楠李琴王月辉
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products