Key negotiation method, device and equipment

A technology of key negotiation and encryption algorithm, applied in the field of key negotiation, which can solve the problems of poor security, long negotiation time between communication parties, and complex key calculation process.

Pending Publication Date: 2020-05-08
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a key agreement method, device and equipment, which are used to solve the technical problems of the prior art that the process of calculating the key is complicated, resulting in a long time-consuming negotiation between communication parties and poor security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method, device and equipment
  • Key negotiation method, device and equipment
  • Key negotiation method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] For ease of understanding, see figure 1 , Embodiment 1 of a key agreement method provided by this application includes: first-stage negotiation and second-stage negotiation.

[0048] Phase 1 negotiations include:

[0049] Step 101, the initiator negotiates with the responder through the security association payload to obtain the first cryptographic algorithm, and the security association payload includes relevant cryptographic algorithm suggestions.

[0050] It should be noted that the cryptographic algorithm may include at least one of the following: asymmetric cryptographic algorithm SM2, symmetric cryptographic algorithm SM1, cryptographic hash algorithm SM3, and a randomly generated temporary password; the initiator encapsulates the proposal of the cryptographic algorithm into a security association payload and sends it To the responding party, the responding party will reply a response security association payload, which includes accepting the cryptographic algori...

Embodiment 2

[0063] For ease of understanding, see figure 2 , the embodiment of this application provides a second embodiment of a key agreement method, including: a first-stage negotiation and a second-stage negotiation.

[0064] Phase 1 negotiations include:

[0065] Step 201, the initiator detects whether the responder supports NAT-T, so that the responder adjusts the port type according to the received detection result.

[0066] It should be noted that the detection of whether the other party supports NAT-T can be realized by exchanging the vendor ID payload. If it supports NAT-T, the NAT_D payload must be sent in the first stage of key negotiation. The responder receives this packet and decrypts it and passes the authentication. Finally, the original state of processing port 500 should be changed to port 4500. The subsequent negotiation process will be carried out using port 4500. Afterwards, all packets received by port 500 that are not newly negotiated will be discarded; the remai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key negotiation method, device and equipment. The method comprises first-stage negotiation and second-stage negotiation; in the first-stage negotiation, an initiator negotiates with a responder through a security alliance load to obtain a first cryptographic algorithm, and then, the initiator and the responder obtain a working key for communication between the initiator and the responder by adopting a first cryptographic algorithm and interaction between the initiator and the responder; in the second-stage negotiation, the initiator sends a first hash load to the responder, so that the responder returns a second hash load, and the initiator calculates the first session key according to the second hash load and sends a verification hash load to the responder, so that the responder calculates the second session key and judges whether the verification hash load is consistent with the first hash load or not. According to the method and the device, the technical problems of relatively long negotiation time and relatively poor security between two communication parties due to a complex key calculation process in the prior art are solved.

Description

technical field [0001] The present application relates to the technical field of data security, in particular to a key agreement method, device and equipment. Background technique [0002] Key agreement is a key establishment technology. Two or more participants in the system jointly provide information and derive a shared key that cannot be determined in advance by any party. Especially with the increasingly complex communication environment, The continuous development of information technology and the continuous improvement of computing power, as well as the continuous development of attack methods in the communication environment, make many key agreement methods have different degrees of challenges. [0003] In the prior art, the process of calculating the key is complicated, which leads to a long time-consuming negotiation between the communication parties, and the security of the key is poor, which may easily cause business data information to be leaked or maliciously t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/3268H04L9/3236
Inventor 林丹生曾智勇胡春潮周永言刘剑锋向谆潘君镇
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products