PSK generation method and apparatus, user equipment, server, and storage medium

A technology for user equipment and servers, which is applied to secure communication devices and key distribution, can solve problems such as the key security can no longer be guaranteed, the asymmetric encryption algorithm has a large amount of calculation, and affects the communication efficiency of user equipment and servers, so as to ensure the security of the network. Safe and Calculation-Reduced Effects

Active Publication Date: 2018-12-07
SANGFOR TECH INC
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The asymmetric encryption algorithm has a large amount of calculation, which increases the computing burden of the user equipment and the server, and easily affects the communication efficiency between the user equipment and the server.
Moreover, with the improvement of computer cracking power, even if the key length of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PSK generation method and apparatus, user equipment, server, and storage medium
  • PSK generation method and apparatus, user equipment, server, and storage medium
  • PSK generation method and apparatus, user equipment, server, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0080] refer to figure 1 , figure 1 It is a schematic diagram of the user equipment structure of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0081] Such as figure 1 As shown, the user equipment may include: a first processor 1001 , such as a CPU, a first communication bus 1002 , a first user interface 1003 , a first network interface 1004 , and a first memory 1005 . Wherein, the first communication bus 1002 is used to realize connection and communication between these components. The first user interface 1003 may include a display screen (Display), an input unit such as a button, and may also include devices such as a remote control. Optionally, the first user interface 1003 may also include a standard wired interface and a wireless interface. The first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a PSK generation method and apparatus, user equipment, a server, and a storage medium. The method comprises the following steps: obtaining a random key string through a quantumkey distribution network; generating a first random number locally, and obtaining a second random number generated by the server; generating an initial plaintext by using the first random number and the second random number; and performing symmetric encryption based on the random key string and the initial plaintext to generate a PSK. According to the method, the random key string is obtained by using the quantum key distribution network with high security, and only symmetric encryption is adopted in the process of generating the PSK, so that the calculation amount of key generation can be reduced under the premise of ensuring the network security.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to a PSK generation method, device, user equipment, server and storage medium. Background technique [0002] In order to ensure the security of network communication, before the user equipment and the server start encrypted communication, the user equipment and the server usually need to be based on network security protocols such as Secure Sockets Layer (Secure Sockets Layer, SSL), Transport Layer Security (Transport Layer Security, TLS), etc. , to perform key agreement for network communication. [0003] Encrypted communication in the prior art usually needs to be paid for by the calculation amount of the user equipment and the server. In order to increase the difficulty of the key being cracked, the user equipment and the server usually obtain the key based on an asymmetric encryption algorithm such as the RSA algorithm. The asymmetric encryption algorithm has a larg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0852
Inventor 廖亮
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products