Unlock instant, AI-driven research and patent intelligence for your innovation.

A Key Exchange Protocol Based on Location and Password

A technology of key exchange protocol and password, applied in the field of key exchange protocol

Active Publication Date: 2020-12-11
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the password-based key exchange form needs to face the challenge of generating high-entropy session keys from low-entropy (low-entropy) keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Key Exchange Protocol Based on Location and Password
  • A Key Exchange Protocol Based on Location and Password
  • A Key Exchange Protocol Based on Location and Password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention needs to solve the problem that the four verifiers verify the location information and password information of the new entrant synchronously, negotiate to generate a high-entropy session key, and provide a security key for the next step of confidential communication. Specifically, the following issues need to be addressed:

[0024] 1) How do the four verifiers determine the location information of the joining party and verify their location information synchronously;

[0025] 2) How does the new joiner verify the password information of the four verifiers and generate a high-entropy session key at the same time;

[0026] 3) How four verifiers can generate the same high-entropy session key while verifying the joining party's location and password information.

[0027] The invention provides a security protocol for generating a session key by combining a password and a location to authenticate a joiner in wireless communication. Specifically, in wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a position and password based secret key exchange protocol. In a first phase, a main verification party sends ElGamal encryption of a password, and four verification parties carry out calculation and send positioning verification information so as to reach the position of a joining party simultaneously; in a second phase, the joining party calculates password information and position examination information; in a third phase, the four verification parties verify password and position information of the joining part, calculate a session key and return authentication information, and the main verification party sends first block information of a Hash value to the joining party; and in the fourth phase, the joining party verifies whether reception information equals the first part of the Hash value, if yes, the session key is output, and otherwise, the process is ended. The protocol is executed synchronously to realize dual authentication of password and position.An opponent can only implement pseudo authentication by guessing the password online but not carry out verification in a position inconsistent with a declared position by pretending to be the joiningparty, and any fake in the position and password by the opponent leads to failure in authentication.

Description

technical field [0001] The present invention relates to a key exchange protocol based on location and password. Background technique [0002] Password is an important security authentication method, and the location of the participant can also be used as a method for identity authentication. Among them, password-based key exchange needs to face the challenge of generating high-entropy session keys from low-entropy keys. The current password-based key exchange protocol is mainly used in the scene of the server client, and the mainstream technology adopts the encryption scheme of chosen ciphertext security (CCA2) security and the structure of smooth projective hash function (smooth projective hash function). In real production and life, location information is also an important type of authentication information, such as drone control stations, military base communications, etc. Usually the existing technology can easily judge the distance through the propagation speed and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L9/08
CPCH04L9/0838H04L9/3226H04L9/3236H04L63/061H04L63/08H04L63/083
Inventor 范佳赵伟曹云飞薛海洋李宝路献辉
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP