5G network authentication method and system based on DH ratchet algorithm

A network authentication and ratchet technology, applied in the field of information security, can solve the problems of easy leakage of shared keys and poor security of 5G systems

Active Publication Date: 2021-02-23
北京电信易通信息技术股份有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a 5G network authentication method and system based on the DH ratchet algorithm to solve the problems of poor security of the existing 5G system and easy leakage of the shared key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G network authentication method and system based on DH ratchet algorithm
  • 5G network authentication method and system based on DH ratchet algorithm
  • 5G network authentication method and system based on DH ratchet algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] The purpose of the present invention is to provide a 5G network authentication method and system based on the DH ratchet algorithm, which is no longer generated by the shared key K, and avoids security problems caused by the leakage of the shared key K.

[0043] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a 5G network authentication method and system based on a DH ratchet algorithm. The method comprises the steps that user equipment encrypts identity information through a ratchet wheel secret key and sends the identity information to a server for verification, and the confidentiality of the identity information is guaranteed; ratchet key pairs are generated for each entityin a 5G network, so that each entity encrypts transmission information through a ratchet key of the entity when transmitting information, information safety is guaranteed, mutual verification betweenthe entities is guaranteed by generating respective identity tokens of the entities, and counterfeit attacks are avoided. Through ratchet wheel stepping, each entity generates different ratchet wheelsecret keys in the session process, so that each session is encrypted by using different ratchet wheel secret keys, and the message transmission process is safer; the session key in 5G is generated through the ratchet wheel key instead of the shared key K, so that the security problem caused by leakage of the shared key K is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a 5G network authentication method and system based on a Diffie-Hellman (DH) ratchet algorithm. Background technique [0002] Mobile communication technology is widely used for voice, text and Internet access. Through these technologies, user equipment, usually a mobile phone, can connect to a base station through a wireless network and then connect to a service provider. Recently, two generations of mobile communication standards, 3G and 4G, have been designed by the Third Generation Partnership Project (3GPP) alliance, and the fifth generation (5G) mobile communication standard is being finalized, and the draft is now available . These standards describe protocols designed to provide security guarantees for subscribers and service providers. One of the most important protocols is Authentication and Key Agreement (AKA), which allows subscribers and their service pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/041H04W12/0471H04W12/06H04W12/122H04L9/06
CPCH04L9/0631H04W12/02H04W12/06
Inventor 焦显伟朱敏
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products