Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication encryption method, verification decryption method and communication method

A technology of authentication encryption and message authentication code, which is applied to key distribution, can solve problems such as poor robustness, inability to provide confidentiality protection and integrity protection of data, and achieve high security, improve communication efficiency, and simple scheme

Pending Publication Date: 2021-01-05
XINGTANG TELECOMM TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the embodiment of the present invention aims to provide an encryption and decryption method based on communication authentication to solve the problems of poor robustness and inability to provide confidentiality protection and integrity protection for data at the same time in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication encryption method, verification decryption method and communication method
  • Authentication encryption method, verification decryption method and communication method
  • Authentication encryption method, verification decryption method and communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] A specific embodiment of the present invention discloses an authentication and encryption method applied to the sending end, such as figure 1 shown, including the following steps:

[0078] S1. Generate a reusable initial vector IV;

[0079] S2. According to the plaintext P1 to be sent and the attached data A, combine the key K1 and H shared with the receiving end and the initial vector IV to generate a message authentication code Tag1;

[0080] S3. According to the message authentication code Tag1 and the initial vector IV, generate a key stream Z1 in combination with the key K2 shared with the receiving end;

[0081] S4. Encrypt the plaintext P1 according to the key stream Z1, and send the obtained ciphertext C together with the message authentication code Tag1, attached data A, and initial vector IV to the receiving end, so that the receiving end can decrypt it to obtain clear text.

[0082] During implementation, when the sending end and the receiving end conduct ...

Embodiment 2

[0085] Optimizing on the basis of embodiment 1, step S2 further includes:

[0086] S21. Convert the plaintext P1 and the attached data A into N-bit packets respectively, encode the conversion result, and obtain the encoding result Encode(A, P1). Preferably, the Encode (A, P1) is obtained by the following formula

[0087] Encode(A, P1)=Partition(A)||Partition(P1)||L A ||L P1 (1)

[0088] In the formula, L P1 Indicates the 64-bit form of the bit length of the plaintext P1, L A Indicates the 64-bit form of the bit length of the auxiliary data A, and || indicates a splicing operation.

[0089] Exemplarily, N=128.

[0090] Suppose the data string A=1010101010, then the bit length of A is an integer 10, and the 64-bit form of the bit length of A is 0 60 ||1010, L P1 The meaning is similar.

[0091] If the last packet of the plaintext P1 and ancillary data A packets is less than 128 bits, use 0 to fill to 128 bits. For example: if |A|=256, then Partition(A)=A0||A1; if |A|=...

Embodiment 3

[0117] A specific embodiment of the present invention discloses a verification and decryption method applied to the receiving end corresponding to Embodiment 1, such as figure 2 shown, including the following steps:

[0118] S5. Receive the ciphertext C, message authentication code Tag1, initialization vector IV, and attached data A sent by the sender;

[0119] S6. Generate a key stream Z2 in combination with the key K2 shared with the sender according to the Tag1 and IV;

[0120] S7. Analyzing the ciphertext C according to the Z2 to generate a plaintext P2;

[0121] S8. According to the P2, IV, combined with the key K1, H shared with the sender to generate an authentication code Tag2;

[0122] S9. Determine whether the Tag1 is consistent with the Tag2, and if they are consistent, output plaintext P2 (P2=P1), otherwise, output an invalid identifier, and delete the decrypted plaintext P2.

[0123] It is worth noting that if the received message has not been tampered with, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication encryption, verification decryption and communication method, belongs to the technical field of communication, and solves the problems that the robustness ispoor and confidentiality and integrity protection cannot be provided for data at the same time in the prior art. The authentication encryption method of the sending end comprises the following steps:generating a reusable initial vector IV; generating a message authentication code Tag1 according to the plaintext P1 and the affiliated data A in combination with the IV and the shared keys K1 and H;generating a key stream Z1 according to the Tag1 and the IV in combination with the shared key K2; and encrypting the plaintext according to Z1, and sending the obtained ciphertext C and the Tag1, Aand IV to a receiving end. The verification and decryption method of the receiving end comprises the following steps: generating a key stream Z2 according to Tag1 and IV in combination with a shared key K2; analyzing the ciphertext C according to Z2 to generate a plaintext P2; generating a message authentication code Tag2 according to P2 and IV in combination with the shared key K1 and H; and judging whether the Tag1 and the Tag2 are consistent or not, and if so, outputting a plaintext P2. The method provided by the invention has strong robustness, and realizes anti-IV reuse and encryption anddecryption with affiliated data.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an authentication encryption method, a decryption method and a communication method. Background technique [0002] Confidentiality protection and integrity protection are two important goals of information security. With the development of Internet technology, message authentication in insecure channels becomes more and more important. Encryption can be used to prevent illegal users from stealing data during transmission and protect data confidentiality. Message authentication codes can be used to detect whether data has been tampered with during transmission, protect data integrity, and authenticate data sources. [0003] Existing authenticated encryption methods are generally based on block ciphers, with low efficiency and security. In the application process, it is necessary to ensure that the initial vector is not reused, which does not meet the requirements of strong...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04W12/04
CPCH04L9/0643H04L9/085H04W12/04
Inventor 马永彪李鸿利王勇慧贾文义
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products