Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chain key exchange method, client, server and system

A technology of key exchange and server, which is applied in the field of server and system, client, and chain key exchange method, which can solve the problems that attackers cannot carry out eavesdropping man-in-the-middle attacks, cannot achieve cracking, security risks, etc., and reduce network security. Effects of resource consumption, increased attack difficulty, and leak prevention

Active Publication Date: 2021-04-23
张华
View PDF15 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the introduction of the chain key exchange protocol, the attacker cannot conduct eavesdropping man-in-the-middle attacks
The existing chain key exchange protocol usually divides the ciphertext into two intervals for transmission, so that even if the attacker obtains part of the encrypted data, he cannot achieve the purpose of deciphering the actual information. However, the security verification methods of these service programs are vulnerable to " The characteristics of the man-in-the-middle attack make it possible for the man-in-the-middle to crack passwords at a relatively small cost after many attempts. "Pretend to be a real server to receive the data sent by the user to the server, and then pretend to be the user to send the data to the real server, thereby stealing important data
The current transmission method has a large security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chain key exchange method, client, server and system
  • Chain key exchange method, client, server and system
  • Chain key exchange method, client, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Please refer to the attached figure 1 And attached Figure 5 , Embodiment 1 of the present invention provides a chain key exchange method, which is applicable to client 1, and the method includes:

[0063] Step S11: Client 1 generates a first public key and a first private key paired with the first public key.

[0064] Step S12: Send the first public key to the server 2.

[0065] Step S13: Receive the second public key sent by the server 2.

[0066] Step S14: Client 1 generates an initial vector, and then uses the second public key to encrypt the initial vector with an encryption algorithm to obtain the client ciphertext.

[0067] Step S15: Randomly cut the client ciphertext into N parts, and obtain the first to Nth client sub-ciphertexts, where N is the number negotiated by the communication parties; the data size of the N client sub-ciphertexts is uncertain of. Attackers cannot judge the number of ciphertext cuts by eavesdropping on the data, and therefore cannot...

Embodiment 2

[0083] Please refer to the attached figure 2 And attached Figure 5 , Embodiment 2 of the present invention provides a method for exchanging chain keys, which is applicable to the server 2 and corresponds to the method in Embodiment 1 above. By way of example and not limitation, the methods include:

[0084] Step S21: the server 2 receives the first public key sent by the client 1.

[0085] Step S22: the server 2 generates a second public key and a second private key paired with the second public key.

[0086] Step S23: the server 2 sends the second public key to the client 1.

[0087] Step S24: Server 2 receives the first client sub-ciphertext sent by client 1.

[0088] Step S25: The server 2 generates a session key, and uses the first public key to encrypt the session key with an encryption algorithm to obtain server ciphertext.

[0089] Step S26: Randomly cut the server ciphertext into N parts to obtain the first to N th server sub-ciphertexts, where N is the number n...

Embodiment 3

[0100] Please refer to the attached figure 1 , attached image 3 , attached Figure 5 , Embodiment 3 of the present invention provides a client 1, as an example but not a limitation, corresponding to the chain key exchange method provided in Embodiment 1 above, since the client 1 provided in the embodiment of the present application is the same as the above-mentioned The chain key exchange method provided in Embodiment 1 is corresponding, so the implementation of the aforementioned chain key exchange method is also applicable to a client 1 provided in this embodiment, so it is no longer used in this embodiment A detailed description. The client 1 includes:

[0101] A first generating unit 101, configured to generate an initial vector, a first public key, and a first private key paired with the first public key;

[0102] The first sending unit 102 is configured to send the first public key to the server 2;

[0103] The first receiving unit 103 is configured to receive the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data security, in particular to a chain key exchange method, a client, a server and a system. The method comprises the following steps: enabling a client to generate a first public key and a first private key; sending the first public key to a server, and receiving a second public key sent by the server; generating an initial vector, and encrypting the initial vector by using a second public key to obtain a client ciphertext; randomly cutting the client ciphertext into N parts, and carrying out distribution and exchange with a server to obtain server sub-ciphertext; and combining the server sub-ciphertext into a server ciphertext, and decrypting the server ciphertext by using the first private key to obtain a session key. On the basis of an original chain key exchange protocol, corresponding improvement is made for possible man-in-the-middle attacks, traditional halving transmission is abandoned, an N-time chain key exchange algorithm is adopted, the encryption strength of data is greatly improved, attackers cannot crack the data within the effective time of information. And the possibility that the secret-related information is cracked is reduced, and the data security is ensured.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a chain key exchange method, a client, a server and a system. Background technique [0002] The importance of data security is self-evident, and it is necessary to ensure data security during data transmission. In practical applications, in order to ensure data security during TCP (Transmission Control Protocol, Transmission Control Protocol) communication, all data in the data transmission process between the client and the server needs to be encrypted. [0003] The chain key exchange method is based on a technique whereby half of the encrypted information is unable to decrypt the ciphertext. In an actual cryptographic application protocol, it is often necessary to generate a temporary key for encrypting transmission information, which is also called a session key. The session key is generally only used during communication, and the session key will be destroyed immediat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/061H04L9/0838H04L63/0442H04L9/085
Inventor 张华
Owner 张华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products