Handshake method and system based on datagram security transmission protocol

A secure transmission protocol and datagram technology, which is applied in the handshake method and system field based on the datagram secure transmission protocol, can solve problems such as not supporting domestic commercial encryption algorithms, and cannot meet the independent and controllable requirements of information security, so as to facilitate horizontal extended effect

Active Publication Date: 2021-03-30
SUZHOU KEDA TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key agreement algorithm (such as ECDH, ECDHE, RSA, PSK), signature algorithm (such as ECDSA, RSA, PSK), symmetric encryption (such as AES), and digest algorithm (such as AEAD, SHA1, SHA256) adopted by DTLS are developed by the United States. Algorithm standards, do not support domestic commercial encryption algorithms, and cannot meet my country's independent and controllable needs for information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handshake method and system based on datagram security transmission protocol
  • Handshake method and system based on datagram security transmission protocol
  • Handshake method and system based on datagram security transmission protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Assuming that the handshake method is performed between client 1 and server 1, client 1 requests to establish a data transmission link with server 1, and subsequent data transmitted between client 1 and server 1 needs to use a domestic Commercial encryption algorithm encryption, the handshake process between client 1 and server 1 is as follows:

[0056] S101. Client 1 sends a client greeting message to request server 1 to shake hands with server 1. The client 1 greeting message includes a list of all domestic commercial cipher suites supported by the client for the server. choose.

[0057] S102. The server 1 receives the client greeting message, and sends a server greeting message to the client 1 after authentication. The server greeting message includes one of the domestic commercial cipher suites selected by the server 1 from the domestic commercial cipher suite list. Matching domestic commercial cipher suites.

[0058] S103. Client 1 and server 1 replace the key sp...

Embodiment 2

[0079] Assuming that the handshake method is performed between the client 2 and the server 2, and the client 2 requests to establish a data transmission link with the server 2, the client 2 and the server 2 need to use a method to determine the subsequent data transmission. master key specifications, the handshake process between client 2 and server 2 is as follows:

[0080] S201. The client 2 sends a client greeting message to the server 2 to request the server 2 to shake hands with it. The client 2 greeting message includes a list of all domestic commercial cipher suites supported by the client for the server choose.

[0081] S202. The server 2 receives the client hello message, and sends a server hello message and a server key exchange message to the client 2 in sequence after authentication, wherein:

[0082] The server hello message includes one matching domestic commercial cipher suite selected by the server 2 from the list of domestic commercial cipher suites.

[0083...

Embodiment 3

[0158]Assuming that the handshake method is performed between client 3 and server 3, the handshake process between client 3 and server 3 is as follows:

[0159] S301. The client 3 sends a client greeting message to the server 3 to request the server 3 to shake hands with it. The client 3 greeting message only includes a list of all domestic commercial cipher suites supported by the client for service terminal selection.

[0160] S302. The server 3 receives the client hello message, and determines whether the client hello message carries a stateless message authentication code.

[0161] S303. If the server 3 receives a message authentication code with or without status in the client greeting message, the server 3 calculates a message authentication code using a domestic hash algorithm, and combines the calculated message authentication code with the client greeting message. The carried message authentication codes are compared to authenticate the client 3.

[0162] S304. Afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention refers to a handshake method and system based on the datagram security transmission protocol. The handshake method includes: the client sends a client greeting message to the server, and the client greeting message includes all domestic commercial ciphers supported by the client. Package list; the server receives and judges whether the client greeting message carries a stateless message authentication code: if so, uses the domestic hash algorithm to calculate a message authentication code, and compares it with the message authentication code carried in the client greeting message to obtain Authenticate the client; after authentication, send a server greeting message to the client, informing the client of the domestic commercial cipher suite it has selected; the client and the server replace the key specifications according to the selected domestic commercial cipher suite, and establish a data transmission link road. The invention can meet the independent and controllable demand for information security in my country, fully utilizes the unique advantages of the domestic encryption algorithm, is compatible with the original DTLS protocol, and is convenient for horizontal expansion.

Description

technical field [0001] The invention relates to the field of datagram security transmission protocol, and belongs to a handshake method and system based on the datagram security transmission protocol. Background technique [0002] In recent years many applications using datagram transport have emerged. These applications include real-time video conferencing, internet telephony and online gaming. These applications are delay sensitive and thus use unreliable datagram transport (UDP). However, the UDP protocol itself does not have security. The UDP protocol is an unreliable protocol that is not connection-oriented, and does not encrypt the transmitted message segments. It cannot guarantee the identity authentication of the two parties in communication, the orderly reception of messages during transmission, and no loss. and encrypted transmission. [0003] The datagram transport layer security protocol (DTLS) implements the handshake connection between the client and the ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0863H04L63/0428H04L63/08H04L63/083H04L67/01
Inventor 李亚凯王彦杰顾志松雷心田胡传文常宇宙
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products