Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key exchange method and device, storage medium and computing device

A key exchange and shared key technology, applied in the fields of devices and storage media, key exchange methods, and computing devices, can solve problems affecting implementation efficiency, complex algorithm design, asymmetric steps, etc., to save processing resource consumption, The algorithm design is simple and the effect of improving efficiency

Active Publication Date: 2020-04-14
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the key exchange algorithm of RSA and ECC, the key exchange parties usually perform the same operation, but the steps performed by both parties in the SM2 key exchange standard algorithm are asymmetrical, and the algorithm design is complicated, which is inconvenient for both parties to the key exchange , and affect the realization efficiency
Moreover, the interaction between the two parties is cumbersome, and the number of information transfers is large, which is not conducive to protecting the shared key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exchange method and device, storage medium and computing device
  • Key exchange method and device, storage medium and computing device
  • Key exchange method and device, storage medium and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, before introducing the key exchange algorithm of the present application, first combine figure 1 Introduces the SM2 key exchange standard algorithm.

[0056] First, the symbols involved in the SM2 key exchange standard algorithm are explained:

[0057] A, B: Two users using public key cryptography.

[0058] a, b: elements in Fq, they define an elliptic curve E on Fq.

[0059] d A : User A's private key.

[0060] d B : User B's private key.

[0061] E(Fq): The set of all rational points (including the point O at infinity) of the elliptic curve E on Fq.

[0062] Fq: A finite field containing q elements.

[0063] G: A base point of an elliptic curve whose order is a prime number.

[0064] Hash(): Cryptographic hash function.

[0065] Hv(): A cryptographic hash function with a message digest length of v bits.

[0066] h: cofactor, where h=1.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key exchange method and a device, a storage medium and a computing device, and relates to the technical field of information security. The method comprises the following steps: receiving an RB sent by opposite-end equipment; if it is determined that the RB meets the elliptic curve equation, calculating QA based on rA, RB, dA and PB; if it is determined that the QA meets the elliptic curve equation, generating a shared key KA according to a KDF key derivation function and specified parameters, and other parameters, except for the coordinate (xA, yA) corresponding to theQA, in the specified parameters are the same as those of the opposite-end equipment for calculating the shared key. Therefore, the execution steps of the two key exchange parties are the same, the algorithm is simple, and the two key exchange parties are convenient and efficient. And the information is transmitted only once, so that the processing resource consumption caused by multiple times ofinformation interaction is reduced, and the key negotiation efficiency can be improved. Moreover, in the transmission process, even if the RB is intercepted, the shared key cannot be obtained, so thatthe security of the shared key is ensured.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a key exchange method, device, storage medium, and computing device. Background technique [0002] The birth of public key cryptography has become a revolutionary event in cryptography, which solves the key exchange protocol problem that traditional symmetric cryptography is difficult to solve. At present, public key cryptography mainly includes RSA, ECC / SM2, IBC / SM9, etc. Correspondingly, many key exchange algorithms have appeared, for example, the DH (Diffie-Hellman) key exchange algorithm based on RSA, the national key exchange algorithm based on ECC, etc. The encrypted version of the SM2 key exchange algorithm, etc. [0003] In the key exchange algorithm of RSA and ECC, the key exchange parties usually perform the same operation, but the steps performed by both parties in the SM2 key exchange standard algorithm are asymmetrical, and the algorithm d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0838H04L9/0866H04L9/0869H04L9/3033H04L9/3066
Inventor 丁敏
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products