Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Entity authentication method and device based on pre-shared key

A pre-shared key and entity technology, applied in the field of network security, can solve problems such as the inability to determine who the other party is, security risks, etc.

Active Publication Date: 2019-04-23
CHINA IWNCOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in authentication schemes based on cryptographic algorithms, especially those based on symmetric cryptographic algorithms, the identities of both parties are usually not confirmed during the authentication process, so even if the identity authentication passes, it can only be determined that the other party has a shared secret , but in fact it is still impossible to determine who the other party is, and there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity authentication method and device based on pre-shared key
  • Entity authentication method and device based on pre-shared key
  • Entity authentication method and device based on pre-shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] See figure 1 , the present invention provides an entity authentication method based on a pre-shared key. When the method is implemented, entity A and entity B have shared a pre-shared key (Pre-Shared key, PSK) and know each other's identity , the identity of entity A is ID A , the identity of entity B is ID B , the method includes the following steps:

[0046] Step 1. Entity A generates random number N A , and send to Entity B.

[0047] Step 2. Entity B receives N A After that, generate a random number N B and the random number ZSEED used to seed the key B , calculate the key MKA||KEIA=KDF1(N A ,N B ,PSK,ID A ,ID B ), calculate the first encrypted authentication data AuthEncData B =EncData B ||MAC B =AuthEnc KEIA (AAD,IV,N B ||N A ||ID B ||ID A ||ZSEED B ), Entity B sends N B ||N A ||AuthEncData B to entity A, where AuthEncData B Include EncData B and MAC B , generate by KEIA calculation; MKA is an authentication key, KEIA is a message encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of network security. Provided are an entity authentication method and device based on a pre-shared key. The method comprises: an entity A generates and sends a random number NA to an entity B; the entity B generates random numbers NB and ZSEEDB, computes a key MKAˆ¥KEIA and first encrypted authentication data AuthEncDataB, and sends the NBˆ¥NAˆ¥AuthEncDataB to the entity A for verification; the entity A generates a random number ZSEEDA, computes second encrypted authentication data AuthEncDataA, a shared key seed Z, a master key MK and a first message authentication identifier MacTagA, and sends the NAˆ¥NBˆ¥AuthEncDataAˆ¥MacTagA to the entity B for verification; the entity B computes Z, MK and MacTagA, compares the MacTagAwith the received MacTagA, and if the two are equal, considers that the entity A is valid; the entity B computes and sends a second message authentication identifier MacTagB to the entity A; and the entity A computes MacTagB, compares the MacTagB with the received MacTagB, and if the two are equal, considers that the entity B is valid. The device of the present invention is corresponding to the entity A and the entity B in the method. The present invention can achieve bidirectional authentication between network entities and determine the identity of the other party, and greatly improves the efficiency and reduces the consumption of hardware computing resources.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an entity authentication method and device based on a pre-shared key. Background technique [0002] For communication networks, such as local area network WLAN, wireless sensor network WSN, near field communication NFC, radio frequency identification RFID, personal area network WPAN, etc., they are vulnerable to forgery, eavesdropping, replay and other attacks during communication, so it must be solved before communication Identity authentication between the two parties in communication to ensure the legitimacy of the identities of the two parties in communication. At present, in authentication schemes based on cryptographic algorithms, especially those based on symmetric cryptographic algorithms, the identities of both parties are usually not confirmed during the authentication process, so even if the identity authentication passes, it can only be determined that the ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/3273H04W12/041H04W12/0433H04L9/085H04L9/0869H04L9/3226H04L9/0656H04L9/0816H04L63/0435H04L63/06H04L63/08H04L63/0869
Inventor 胡亚楠杜志强张国强李琴
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products