Handshake method and system based on datagram secure transmission protocol

A security transmission protocol and datagram technology, which is applied in the field of handshake methods and systems based on datagram security transmission protocol, can solve the problems of not supporting domestic commercial cryptographic algorithms, unable to meet the independent and controllable requirements of information security, etc., to facilitate horizontal extended effect

Active Publication Date: 2018-10-12
SUZHOU KEDA TECH
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key agreement algorithm (such as ECDH, ECDHE, RSA, PSK), signature algorithm (such as ECDSA, RSA, PSK), symmetric encryption (such as AES), and digest algorithm (such as AEAD, SHA1, SHA256) adopted by DTLS are developed by the United States. Algorithm standards, do not support domestic commercial encryption algorithms, and cannot meet my country's independent and controllable needs for information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handshake method and system based on datagram secure transmission protocol
  • Handshake method and system based on datagram secure transmission protocol
  • Handshake method and system based on datagram secure transmission protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Assuming that the handshake method is performed between client 1 and server 1, client 1 requests to establish a data transmission link with server 1, and subsequent data transmitted between client 1 and server 1 needs to use a domestic Commercial encryption algorithm encryption, the handshake process between client 1 and server 1 is as follows:

[0056] S101. Client 1 sends a client greeting message to request server 1 to shake hands with server 1. The client 1 greeting message includes a list of all domestic commercial cipher suites supported by the client for the server. choose.

[0057] S102. The server 1 receives the client greeting message, and sends a server greeting message to the client 1 after authentication. The server greeting message includes one of the domestic commercial cipher suites selected by the server 1 from the domestic commercial cipher suite list. Matching domestic commercial cipher suites.

[0058] S103. Client 1 and server 1 replace the key sp...

Embodiment 2

[0079] Assuming that the handshake method is performed between the client 2 and the server 2, and the client 2 requests to establish a data transmission link with the server 2, the client 2 and the server 2 need to use a method to determine the subsequent data transmission. master key specifications, the handshake process between client 2 and server 2 is as follows:

[0080] S201. The client 2 sends a client greeting message to the server 2 to request the server 2 to shake hands with it. The client 2 greeting message includes a list of all domestic commercial cipher suites supported by the client for the server choose.

[0081] S202. The server 2 receives the client hello message, and sends a server hello message and a server key exchange message to the client 2 in sequence after authentication, wherein:

[0082] The server hello message includes one matching domestic commercial cipher suite selected by the server 2 from the list of domestic commercial cipher suites.

[0083...

Embodiment 3

[0158]Assuming that the handshake method is performed between client 3 and server 3, the handshake process between client 3 and server 3 is as follows:

[0159] S301. The client 3 sends a client greeting message to the server 3 to request the server 3 to shake hands with it. The client 3 greeting message only includes a list of all domestic commercial cipher suites supported by the client for service terminal selection.

[0160] S302. The server 3 receives the client hello message, and determines whether the client hello message carries a stateless message authentication code.

[0161] S303. If the server 3 receives a message authentication code with or without status in the client greeting message, the server 3 calculates a message authentication code using a domestic hash algorithm, and combines the calculated message authentication code with the client greeting message. The carried message authentication codes are compared to authenticate the client 3.

[0162] S304. Afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention refers to a handshake method and a handshake system based on a datagram secure transmission protocol. The handshake method comprises: sending a client greeting message to the server by the client, wherein the client greeting message contains a list of all domestic commercial cipher suites supported by the client; receiving and determining whether the client greeting message carries astateless message authentication code by the server: if so, calculating to obtain a message authentication code by using a domestic hash algorithm, and comparing with the message authentication codecarried by the client greeting message to authenticate the client; sending a server greeting message to the client after the authentication, and informing the client of the domestic commercial ciphersuite selected by the client; and replacing the key specification according to the selected domestic commercial cipher suite by the client and the server, thereby establishing a data transmission link. The invention is capable of meeting the requirement of self-controllable information security in China and fully utilizing the unique advantages of the domestic encryption algorithm, and is compatible with the original DTLS protocol, and convenient for horizontal expansion.

Description

technical field [0001] The invention relates to the field of datagram security transmission protocol, and belongs to a handshake method and system based on the datagram security transmission protocol. Background technique [0002] In recent years many applications using datagram transport have emerged. These applications include real-time video conferencing, internet telephony and online gaming. These applications are delay sensitive and thus use unreliable datagram transport (UDP). However, the UDP protocol itself does not have security. The UDP protocol is an unreliable protocol that is not connection-oriented, and does not encrypt the transmitted message segments. It cannot guarantee the identity authentication of the two parties in communication, the orderly reception of messages during transmission, and no loss. and encrypted transmission. [0003] The datagram transport layer security protocol (DTLS) implements the handshake connection between the client and the ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0863H04L63/0428H04L63/08H04L63/083H04L67/01
Inventor 李亚凯王彦杰顾志松雷心田胡传文常宇宙
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products