Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Session key negotiation method, apparatus and system

A technology for session keys and system parameters, applied in security devices, transmission systems, digital transmission systems, etc., can solve problems such as large communication volume and computational cost

Active Publication Date: 2017-08-11
宁波巨博信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The present invention provides a session key negotiation method, device and system to overcome the problems of high communication traffic and calculation costs in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session key negotiation method, apparatus and system
  • Session key negotiation method, apparatus and system
  • Session key negotiation method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0112] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0113] figure 1 It is a schematic diagram of the network architecture based on the session key agreement method of the present invention, such as figure 1 As shown, the network architecture mainly includes: a first user equipment 11 and a second user equipment 12 . Wherein, the session key negotiation between the first user equipment 11 an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a session key negotiation method, apparatus and system. The session key negotiation method comprises the following steps: obtaining a vector rho B by first user equipment according to a long-term private key sB and a temporary private key yB corresponding to the first user equipment and a long-term public key PA and a temporary public key xA corresponding to second user equipment that performing session negotiation with the first user equipment; obtaining a signal vector vB by adopting a formula (the formula is as shown in the specification) according to (the formula is as shown in the specification); calculating a session key V by adopting a formula (the formula is as shown in the specification), wherein q is an even number and is not equal to 2.

Description

technical field [0001] The present invention relates to information security and communication technology, in particular to a method, device and system for session key negotiation. Background technique [0002] The key exchange protocol in the prior art can ensure that two or more users establish a shared session key by exchanging information in an open network environment, and the users participating in the communication encrypt the communication data through the shared session key to ensure the security of the network. Security of communications. Among them, the authenticated key exchange protocol is a key agreement with an authentication function, which can authenticate the identities of both parties participating in the key agreement, thus effectively resisting third-party attacks. [0003] At present, the working principle of the authenticated key exchange protocol is mainly as follows: for a randomly selected a∈R q , the parties A and B who want to negotiate the auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0844H04L9/3093H04W12/04H04L9/08H04L9/0838H04L9/3263H04L63/067H04L63/0823
Inventor 雷浩马文平
Owner 宁波巨博信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products