A method, terminal and system for realizing secure communication
A secure communication and terminal technology, applied in the field of secure communication, can solve the problems of prolonging the establishment time of secure channels, reducing communication efficiency, and taking a long time for private key calculations, so as to reduce storage space requirements, optimize calculation processes, and reduce Quantity effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0183] Please refer to figure 1 , a method for realizing secure communication, the present embodiment is described from the perspective of one of the terminals of the two communicating parties that are interacting, including the steps:
[0184] S0. First, pre-prepare a work certificate, a root certificate corresponding to the work certificate, and a private key corresponding to the work certificate, respectively, on the two interacting terminals. The details are as follows:
[0185] Another terminal: a prefabricated root certificate crtroot, a first work certificate crt_a_e signed by the root certificate, and a first private key pri_a_e corresponding to the first work certificate;
[0186] The terminal: a prefabricated root certificate crtroot, a second work certificate crt_b_e signed by the root certificate, and a second private key pri_b_e corresponding to the second work certificate;
[0187] Among them, the root certificate is used to issue subordinate certificates, that ...
Embodiment 2
[0196] The difference between this embodiment and Embodiment 1 is that the step S1 further includes: receiving a first random number r1 sent by the other terminal, and the length of the random number r1 can be set according to actual needs. This embodiment In the example, the length is 32 bytes;
[0197] Use the first work certificate crt_a_e to encrypt the first temporary session key rpk1 and the first random number r1 to obtain the first encrypted data enc(crt_a_e, rpk1+r1), so that the other terminal uses the same A first private key pri_a_e corresponding to a work certificate crt_a_e decrypts the first encrypted data enc(crt_a_e, rpk1+r1) to obtain a third random number r1', and according to the first random number r1 and the third random number r1 'Verify the legitimacy of the first encrypted data sender;
[0198] In the step S2, the second encrypted data includes after the other terminal uses the second work certificate crt_b_e to encrypt the second temporary session ke...
Embodiment 3
[0213] Please refer to figure 2 , a method for realizing secure communication, the present embodiment is described from the perspective of two communicating parties interacting, including the steps:
[0214] S0. First, pre-prepare a work certificate, a root certificate corresponding to the work certificate, and a private key corresponding to the work certificate, respectively, on the two interacting terminals. The details are as follows:
[0215] The second terminal: a prefabricated root certificate crtroot, a first work certificate crt_a_e signed by the root certificate, and a first private key pri_a_e corresponding to the first work certificate;
[0216] The first terminal: a prefabricated root certificate crtroot, a second work certificate crt_b_e signed by the root certificate, and a second private key pri_b_e corresponding to the second work certificate;
[0217] Among them, the root certificate is used to issue subordinate certificates, that is, crt_a_e and crt_b_e are...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


