Encryption and decryption method, device and system

A technology of encryption, decryption and ciphertext, applied in the field of communication, which can solve the problem of inability to complete the verification of the initiator device and the responder device.

Active Publication Date: 2018-03-13
HONOR DEVICE CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide encryption and decryption methods, devices, and systems to at least solve the problem that under the existing AES-SIV mechanism, the initiating device and the response cannot be completed if the initiating device does not know the MAC address of the responding device in advance. The problem of authentication between end devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, device and system
  • Encryption and decryption method, device and system
  • Encryption and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the description of the following embodiments clear and concise, a brief introduction to the relevant background is first given:

[0096] 1. Wireless fidelity (English: wireless-fidelity, abbreviation: Wi-Fi) technology:

[0097] Wi-Fi technology is a short-range wireless communication technology. The basic standard of Wi-Fi technology is the 802.11 protocol formulated by the Institute of Electrical and Electronics Engineers (English: Institute of Electrical and Electronics Engineers, abbreviation: IEEE). The common structure of Wi-Fi technology is to have a central node called access point (English: accesspoint, abbreviation: AP), which periodically sends beacon (English: beacon) frames to announce the existence of the network to the outside world, and other nodes It is called a station (English: station, abbreviation: STA). It knows the existence of the AP by actively sending a probe request (English: probe request) and then receiving a probe response (Eng...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an encryption and decryption method, device and system, aiming to at least solve the problem that the verification between initiating end equipment and response end equipment cannot be performed under an existing AES-SIV mechanism in the case that the initiating end equipment does not know an MAC address of the response end equipment in advance. The methodincludes the following steps: enabling first equipment to acquire a first public key of second equipment; generating a first key and a first public key hash value at least according to the first public key of the second equipment; generating a first vector at least according to a preset MAC address and an MAC address of the first equipment; encrypting a first plaintext at least according to the first key and the first vector to generate a first ciphertext; sending a first message to the second equipment, or sending a second message to third equipment, and enabling the third equipment to send athird message to the second equipment, wherein the first message or the second message or the third message at least includes the first ciphertext, the first public key hash value and a first publickey of the first equipment; or, the scheme of the invention is applicable to the field of communication.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to encryption and decryption methods, devices and devices. Background technique [0002] The device provisioning protocol (English: device provisioning protocol, abbreviation: DPP) is usually used for authentication between the initiator device and the responder device. Among them, in the process of performing verification, it is necessary to use an advanced encryption standard-synthetic initialization vector (English: advanced encryption standard-synthetic initialization vector, abbreviation: AES-SIV) mechanism. [0003] Under the AES-SIV mechanism, the initiator device at least uses the shared key of the responder device and the vector (English: vector) generated by the initiator device to encrypt the plaintext to obtain the ciphertext; the responder device uses at least the initiator device The shared key of the device and the vector generated by the responding device decrypt the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06H04L9/32H04L9/06
CPCH04L9/3236H04L63/0876H04W12/06H04L9/0631
Inventor 庞高昆方平
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products