An authentication key agreement method and implementation device based on cross-interlock mechanism

An authentication key agreement and key agreement technology, which is applied in the field of authentication key establishment, can solve the problems that the participants cannot judge the initiator or the responder, unfavorably calculate the session key, and cannot detect attacks, etc., so as to improve the anti-jamming attack ability, high success rate, effect of ensuring symmetry

Active Publication Date: 2021-10-22
WUHAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 2) There is no key confirmation link, and it is vulnerable to jamming (Jamming) attacks: the attacker can repeatedly generate and send random M A To allow the victim B to perform the negotiation process and generate a series of unnecessary calculations, this type of attack cannot be detected without a confirmation link, which is fatal to wireless communication users powered by batteries, etc.
[0014] 3) It is not symmetric and inconvenient to implement: for a distributed network, the identities of users have an equal relationship, and usually any party should be both an initiator and a responder
However, if both parties act as initiators at the same time, the above negotiation method will waste energy due to repeated negotiations, and it will also easily cause the participants to be unable to judge whether they are initiators or responders, which is not conducive to correctly arranging the order of calculating session key parameters ( due to slightly different methods of computing the final shared secret between the initiator and the responder)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication key agreement method and implementation device based on cross-interlock mechanism
  • An authentication key agreement method and implementation device based on cross-interlock mechanism
  • An authentication key agreement method and implementation device based on cross-interlock mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The invention is mainly based on the non-certificate authentication / self-authentication public key mechanism, and proposes a session key negotiation method and an implementation device for realizing two-party authentication through a cross-interlocking method based on difficult problems. This method fully considers the problem of preventing counterfeit attacks in the negotiation process, and ensures the reliability of the negotiation through the confirmation stage of the symmetric key after the negotiation. The authentication session key agreement through the invention is safer and more reliable.

[0072] The implementation of the present invention can be divided into three stages and carry out (main process such as figure 2 shown):

[0073] Phase One (S1): Initialization.

[0074] First, select the public key primitive (such as ECC, RSA, etc.) Curve parameters, large prime numbers, etc.), select relevant security algorithms, Hash functions, etc.

[0075] Then gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In order to minimize the cost of the authentication key agreement process on the basis of ensuring safety and reliability, the invention discloses an authentication key agreement method based on a cross-interlock mechanism and an implementation device thereof. Using the basic difficulty of the public key to achieve mutual authentication by means of cross-interlocking, as long as the attacker cannot obtain the long-term private key and temporary private key of one party at the same time or the long-term private key of the two parties at the same time, the session key negotiated by this method It is safe, and reliable key agreement is realized by adding a key confirmation link. The ECC-based embodiment shows that the calculation amount is only 4 scalar times, and each party only needs to send one message in the negotiation phase (excluding confirmation). Therefore, the present invention provides a safe, reliable and efficient authentication session key negotiation method and its implementing device.

Description

technical field [0001] The invention belongs to the technical field of authentication key establishment in network security, in particular to a public key-based non-certificate authentication or self-authentication key negotiation (or distribution, distribution, exchange) method, which can be used for inter-node security in distributed networks Efficiently negotiate shared session keys. Background technique [0002] With the continuous development of information technology, computer networks have developed from local area networks, wide area networks, and the Internet to the current mobile Internet, Internet of Things and other next-generation networks, and the most important issue in the industrial application of these network technologies is security. Especially with the research and application of the wireless and open next-generation Internet, security issues become more prominent. In order to realize the secure communication of open and interconnected computer networks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/083H04L9/0844H04L9/3066H04L2209/80
Inventor 孙发军何炎祥
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products