Key negotiation method and system

A technology of key agreement and session key, which is applied in the field of information security, can solve problems such as the inability to predetermine the shared key of the result, hidden dangers of the key agreement method, and hidden dangers of the security system, so as to prevent anti-replay attacks and improve Safety, the effect of ensuring safety

Active Publication Date: 2020-12-08
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Key agreement is a key establishment technology. Two or more participants in the system jointly provide information and each derive a shared key that cannot be predetermined by any party. Especially with the increasingly complex communication environment, The continuous development of information technology and the continuous improvement of computing power, as well as the continuous development of attack methods in the communication environment, make many key negotiation methods have different degrees of security risks; existing terminal equipment and service platforms generally use fixed key For communication or simple encryption to generate and transmit session keys, the security is low. Once the session key is leaked, the entire security system will face major security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and system
  • Key negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] like figure 1 As shown, this embodiment proposes a key agreement method, including:

[0054] S1. The terminal device obtains a first key negotiation parameter, and constructs the first key negotiation parameter into key negotiation request information reqMsg and sends it to the service platform;

[0055] S2. The service platform acquires the second key negotiation parameter, and constructs the second key negotiation parameter and the first key negotiation parameter into data aData, where the first key negotiation parameter is the pair of the service platform The key agreement request information reqMsg is obtained after parsing;

[0056] S3, the service platform performs digest calculation on the data aData to generate a digest value aHash, and after obtaining the session key sKey according to the digest value aHash, signs the digest value aHash to obtain a signature value signMsg;

[0057] S4. The service platform encrypts the parameter information including the sign...

Embodiment 2

[0083] like figure 2 As shown, this embodiment provides a key negotiation system, including a terminal device and a service platform for performing key negotiation, and when the key negotiation is specifically implemented, the first security module set in the terminal device is a TF password card, The second security module set in the service platform is a PCI password card; the complete process of key negotiation between the terminal device and the service platform is as follows:

[0084] When generating the key agreement request information reqMsg, the specific work of the terminal device is as follows:

[0085] A1: Call the TF password card interface to read the end user digital certificate uCert;

[0086] A2: Call the random number generator in the TF password card to generate a random number r A ∈ [1, n-1];

[0087] A3: Call the TF password card to read the security chip hardware ID;

[0088] A4: Splicing uCert||r A ||ID||uTime (terminal timestamp), recorded as the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key agreement method, which comprises the following steps that: terminal equipment acquires a first key agreement parameter, constructs key agreement request information and sends the key agreement request information to a service platform; the service platform constructs the first key negotiation parameter and the obtained second key negotiation parameter into data aData,performs abstract calculation on the data aData to obtain a session key sKey, signs and encrypts an abstract value aHash to generate encrypted data incData, constructs key negotiation reply information with information in the second key negotiation parameter, and returns the key negotiation reply information to the terminal device; and the terminal equipment decrypts the encrypted data encData toobtain parameter information including a signature value signMsg, constructs the first key negotiation parameter and the second key negotiation parameter into data bData, performs abstract calculation to generate an abstract value bHash, performs signature verification on the signature value signMsg, and finally obtains a session key uKey through the abstract value bHash.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a key agreement method and system. Background technique [0002] Key agreement is a key establishment technology in which two or more parties in the system jointly provide information, and each derives a shared key whose result cannot be predetermined by either party, especially with the increasingly complex communication environment, The continuous development of information technology and the continuous improvement of computing power, as well as the continuous development of attack methods in the communication environment, make many key agreement methods have different degrees of security risks; existing terminal equipment and service platforms generally use fixed keys Communication or the generation and transmission of session keys by simple encryption methods have low security. Once the session keys are leaked, the entire security system will face major security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3247H04L9/3263H04L9/0838H04L9/0861
Inventor 彭金辉雷宗华陈万顺卫志刚
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products