Unlock instant, AI-driven research and patent intelligence for your innovation.

A key agreement method and system

A key negotiation and session key technology, applied in the field of information security, can solve the problems of security risks, low security, and inability to pre-determine the result of the shared key of the key negotiation method, so as to prevent anti-replay attacks and improve security. sexual effect

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Key agreement is a key establishment technology. Two or more participants in the system jointly provide information and each derive a shared key that cannot be predetermined by any party. Especially with the increasingly complex communication environment, The continuous development of information technology and the continuous improvement of computing power, as well as the continuous development of attack methods in the communication environment, make many key negotiation methods have different degrees of security risks; existing terminal equipment and service platforms generally use fixed key For communication or simple encryption to generate and transmit session keys, the security is low. Once the session key is leaked, the entire security system will face major security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key agreement method and system
  • A key agreement method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] like figure 1 As shown, this embodiment proposes a key agreement method, including:

[0054] S1. The terminal device acquires a first key negotiation parameter, and constructs the first key negotiation parameter into key negotiation request information reqMsg and sends it to the service platform;

[0055] S2. The service platform obtains the second key negotiation parameter, and constructs the second key negotiation parameter and the first key negotiation parameter into data aData, wherein the first key negotiation parameter is The key agreement request information reqMsg is obtained after parsing;

[0056] S3. The service platform performs digest calculation on the data aData to generate a digest value aHash, and after obtaining a session key sKey according to the digest value aHash, signs the digest value aHash to obtain a signature value signMsg;

[0057] S4. The service platform encrypts the parameter information including the signature value signMsg to generate e...

Embodiment 2

[0083] like figure 2 As shown, this embodiment provides a key agreement system, including a terminal device and a service platform for performing key agreement. When implementing key agreement, the first security module set in the terminal device is a TF cipher card, The second security module set in the service platform is a PCI cipher card; the complete process of key negotiation between the terminal device and the service platform is specifically:

[0084] When generating the key agreement request message reqMsg, the specific work of the terminal device is as follows:

[0085] A1: Call the TF password card interface to read the end user digital certificate uCert;

[0086] A2: Call the random number generator in the TF password card to generate a random number r A ∈ [1, n-1];

[0087] A3: Call the TF password card to read the hardware ID of the security chip;

[0088] A4: Splicing uCert||r A ||ID||uTime (terminal timestamp), which is recorded as the key agreement requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a key negotiation method. The terminal device obtains the first key negotiation parameter, and constructs a key negotiation request message and sends it to the service platform; the service platform uses the first key negotiation parameter and the acquired second key negotiation parameter After constructing the data aData, perform digest calculation on it to obtain the session key sKey, then sign and encrypt the digest value aHash to generate encrypted data encData, and construct a key negotiation reply with the information in the second key negotiation parameter The information is returned to the terminal device; after the terminal device decrypts the encrypted data encData and obtains the parameter information including the signature value signMsg, it constructs the first key negotiation parameter and the second key negotiation parameter into data bData, and performs digest calculation to generate a digest value After bHash, verify the signature value signMsg, and finally obtain the session key uKey through the digest value bHash.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a key agreement method and system. Background technique [0002] Key agreement is a key establishment technology. Two or more participants in the system jointly provide information and each derive a shared key that cannot be determined in advance by any party. Especially with the increasingly complex communication environment, The continuous development of information technology and the continuous improvement of computing power, as well as the continuous development of attack methods in the communication environment, make many key negotiation methods have different degrees of security risks; existing terminal equipment and service platforms generally use fixed key Communication or the generation and transmission of session keys using simple encryption methods are less secure. Once the session key is leaked, the entire security system will face major security risks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3247H04L9/3263H04L9/0838H04L9/0861
Inventor 彭金辉雷宗华陈万顺卫志刚
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH