OPC UA (OPC Unified Architecture) key exchange method based on chaotic RSA encryption

A secret key exchange and key technology, which is applied to secure communication through chaotic signals, public keys for secure communication, user identity/authority verification, etc. Clients request at the same time and other problems to overcome inefficiency, high security, and good prime quality.

Inactive Publication Date: 2018-07-13
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

RSA is one of the widely used asymmetric encryption algorithms. The security of this algorithm is based on the fact that it is very difficult to factorize large numbers. The system randomly generates two large prime numbers for each encryption. To ensure security, the length of the key must be at least More than 1024 bits, which consumes a lot of system resources and is insufficient for industrial systems that are very sensitive to real-time
Moreo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • OPC UA (OPC Unified Architecture) key exchange method based on chaotic RSA encryption
  • OPC UA (OPC Unified Architecture) key exchange method based on chaotic RSA encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention proposes an OPC UA secret key exchange method based on chaotic RSA encryption, which is characterized in that the pseudo-randomness of the chaotic sequence generates a large prime number that meets the requirements instead of the traditional RSA to generate a prime number, and then encrypts the key through RSA and sends it to the customer The key information is exchanged between the terminal and the server to realize key sharing. The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] figure 1 Provided is the flow chart of the secret key generation and secret key exchange method of the chaotic RSA based on OPC UA in the present invention, which is specifically implemented in this way:

[0044] 1. When the OPC UA client needs to communicate with the server, it first sends a communication request to the server; this request includes all the security mechanisms s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an OPC UA (OPC Unified Architecture) key exchange method based on chaotic RSA encryption, and relates to industrial data communication and information security. The method is mainly used for securely exchanging key information between an OPC UA client and a server in order to complete a conversion process from asymmetric encryption to symmetric encryption. According to the method, a large prime number meeting requirement is generated according to the pseudo randomness of a chaotic sequence in order to replace a step of generating a prime number in traditional RSA. Through the establishment of a security channel between the OPC UA client and the server, a security mechanism of current communication is negotiated, and then key exchange is carried out. Through generation of the large prime number by the principle of chaos in the method, the encryption efficiency between OPC UA systems is increased. Moreover, the security of a key in an exchange process is ensured through design of a strict authentication and communication flow; symmetric encryption communication between OPC UA is realized; and the security and timeliness required in an industrial information exchange system are realized.

Description

technical field [0001] The invention relates to the field of industrial data communication, and belongs to the aspect of information security, in particular to an OPC UA secret key exchange method based on chaotic RSA encryption. Background technique [0002] The OPC Foundation released a new OPC UA (OPC Unified Architecture) unified architecture specification in 2008. Compared with the traditional OPC technology, the unified architecture proposes a unified object and architecture definition of the enterprise manufacturing model, based on the complete service-oriented (SOA), and migrates the original platform based on DCOM technology to the framework based on Web Service technology . The focus is on solving the problem of cross-firewall communication in current manufacturing systems. At the same time, the new unified architecture also clearly stipulates security specifications, emphasizing the importance of security in industrial network communications. [0003] Since most...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32H04L9/30H04L29/06
CPCH04L9/001H04L9/3033H04L9/3249H04L9/3263H04L63/0435H04L63/0823
Inventor 赵杰许申声罗志勇罗蓉宦红伦郑焕平韩冷杨美美
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products