A method for multi-key agreement between encryption and decryption services
A key negotiation, encryption and decryption technology, applied to key distribution, can solve the problems that key negotiation cannot rely on applications, the timing is uncontrollable, and the risk of key cracking or leakage increases.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0027] A multi-key negotiation method for encryption and decryption services. For two nodes A and B that provide encryption and decryption services, A independently selects N (N≥2) keys for encryption of data sent to B Operation (the encryption and decryption algorithm and key agreement algorithm corresponding to each key can be the same or different), the key address is 0 to N-1; and A is responsible for sending the keys of these N keys to B Negotiation process; set the key renegotiation period of N keys to be T, and T is less than the minimum key validity period of the N keys, then the i-th key will be initiated at (i-1)*T / N time key agreement. For any key with the address i (referred to as key i), the key negotiation is re-initiated after the time T, 2T, 3T... when the key agreement is initiated. Similarly, B independently select...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


