Encryption and decryption method, device and system

A technology of encryption, decryption and ciphertext, applied in the field of communication, which can solve the problem of inability to complete the verification of the initiator device and the responder device.

Active Publication Date: 2021-02-02
HONOR DEVICE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide encryption and decryption methods, devices, and systems to at least solve the problem that under the existing AES-SIV mechanism, the initiating device and the response cannot be completed if the initiating device does not know the MAC address of the responding device in advance. The problem of authentication between end devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, device and system
  • Encryption and decryption method, device and system
  • Encryption and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the description of the following embodiments clear and concise, a brief introduction of the relevant background is first given:

[0096] 1. Wireless Fidelity (English: wireless-fidelity, abbreviation: Wi-Fi) technology:

[0097]Wi-Fi technology is a short-range wireless communication technology. The basic standard of the Wi-Fi technology is the 802.11 protocol formulated by the Institute of Electrical and Electronics Engineers (English: institute of electrical and electronics engineers, abbreviation: IEEE). The common structure of Wi-Fi technology is that there is a central node called access point (English: accesspoint, abbreviation: AP), which periodically sends beacon (English: beacon) frames to announce the existence of the network to the outside world, and other nodes It is called a station (English: station, abbreviation: STA). It knows the existence of AP by actively sending a probe request (English: probe request) and then receiving a probe res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide an encryption and decryption method, device, and system to at least solve the problem that under the existing AES-SIV mechanism, in the case that the initiator device does not know the MAC address of the responder device in advance, it is impossible to complete the communication between the initiator device and the responder device. Issues with authentication between devices. The method includes: the first device acquires the first public key of the second device; at least according to the first public key of the second device, generating the first key and the hash value of the first public key; at least according to the preset MAC address, and the second A device's MAC address generates a first vector; encrypts the first plaintext at least according to the first key and the first vector to generate a first ciphertext; sends the first message to the second device, or sends the second message to the third a device, the third device sends a third message to the second device, the first message or the second message and the third message at least include the first ciphertext, the hash value of the first public key and the first public key of the first device; or, The invention is applicable to the communication field.

Description

technical field [0001] The present invention relates to the communication field, in particular to an encryption and decryption method, device and device. Background technique [0002] A device provisioning protocol (English: device provisioning protocol, abbreviation: DPP) is generally used for authentication between an initiator device and a responder device. Wherein, during the verification process, an advanced encryption standard-synthetic initialization vector (English: advanced encryption standard-synthetic initialization vector, abbreviation: AES-SIV) mechanism needs to be used. [0003] Under the AES-SIV mechanism, the initiating device at least uses the shared key with the responding device and the vector (English: vector) generated by the initiating device to encrypt the plaintext to obtain the ciphertext; the responding device at least uses the The shared key of the device and the vector generated by the responding device decrypt the ciphertext to obtain the plain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L29/06H04L9/32H04L9/06
CPCH04L9/3236H04L63/0876H04W12/06H04L9/0631
Inventor 庞高昆方平
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products