Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-key negotiation method used between encryption and decryption services

A key negotiation, encryption and decryption technology, applied in electrical components, wireless communications, security devices, etc., to solve the problems that key negotiation cannot rely on applications, the timing is uncontrollable, and the risk of key cracking or leakage increases.

Active Publication Date: 2020-12-29
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The key negotiation between encryption and decryption services cannot depend on the application, because the timing of sending data by the application calling the encryption and decryption service is uncontrollable;
[0004] 2. If a single key pair is used between two nodes, encryption and decryption services cannot be provided externally during key negotiation, which will cause interruption of communication among multiple applications using the service;
[0005] 3. There is a validity period for the key. Overdue use will increase the risk of the key being cracked or leaked. Therefore, the key must be renegotiated before the validity period ends.
And key renegotiation will also make it impossible to decrypt data that has been encrypted with the original key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-key negotiation method used between encryption and decryption services
  • Multi-key negotiation method used between encryption and decryption services
  • Multi-key negotiation method used between encryption and decryption services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0027] A multi-key negotiation method for encryption and decryption services. For two nodes A and B that provide encryption and decryption services, A independently selects N (N≥2) keys for encryption of data sent to B Operation (the encryption and decryption algorithm and key agreement algorithm corresponding to each key can be the same or different), the key address is 0 to N-1; and A is responsible for sending the keys of these N keys to B Negotiation process; set the key renegotiation period of N keys to be T, and T is less than the minimum key validity period of the N keys, then the i-th key will be initiated at (i-1)*T / N time key agreement. For any key with the address i (referred to as key i), the key negotiation is re-initiated after the time T, 2T, 3T... when the key agreement is initiated. Similarly, B independently select...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-key negotiation method used between encryption and decryption services, and relates to the technical field of communication security. According to the multi-key negotiation method, a node A independently selects N secret keys to be used for encryption operation of data sent to a node B, secret key addressing ranges from 0 to N-1, and the node A is responsible for initiating a secret key negotiation process of the N secret keys to the node B; key re-negotiation periods of the N keys are set to be T which is less than a minimum key validity period of the N keys, and key negotiation of the ith key is initiated at an (i-1)*T / N moment; for any key addressed as i, key negotiation is initiated again after the moment T, 2T, 3T... when the key negotiation is initiated; and similarly, the B independently selects M secret keys for encryption operation of the data sent to the A, and the B is responsible for initiating a secret key negotiation process of the M secretkeys selected by the B to the A. The multi-key negotiation method is suitable for multi-key negotiation between centralized encryption and decryption services, and is an important improvement on theprior art.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to a multi-key negotiation method used for encryption and decryption services. Background technique [0002] Encryption and decryption are computationally intensive. In addition, encryption and decryption algorithms and keys also need to be regularly upgraded and updated to prevent possible cracking. In the existing technology, the method of providing encryption and decryption services in a centralized manner is usually adopted, such as using proprietary encryption and decryption equipment, equipped with key cards, etc., which can reduce the difficulty of deploying encryption and decryption algorithms and improve the confidentiality of encryption and decryption algorithms and keys . However, when centralized encryption and decryption services are used, the following problems exist: [0003] 1. The key negotiation between encryption and decryption services cannot dep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/00H04W12/04
CPCH04W4/14
Inventor 蒋洪磊
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP