Key negotiation method and system

A technology of key negotiation and shared key, applied in transmission systems, digital transmission systems, public keys for secure communications, etc., can solve the problem that password authentication key exchange protocols cannot resist password guessing attacks, and achieve resistance to man-in-the-middle attacks. Effect

Active Publication Date: 2021-04-27
BEIJING WATCH DATA SYST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem that the password authentication key exchange protocol in the prior art cannot resist password guessing attacks, based on the national secret SM2 algorithm, the present invention provides a key agreement method and system capable of improving the security strength of the password authentication exchange key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and system
  • Key negotiation method and system
  • Key negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment

[0094] In the first embodiment, the elliptic curve parameters are system parameters of the SM2 elliptic curve public key cryptographic algorithm: wherein, G is the base point of the elliptic curve, its order is a prime number n, and h is a cofactor. In addition, the points M and N on the two elliptic curves are arbitrarily selected as public parameters. The Hash algorithm, KDF algorithm and the generating function F of the shared secret point are all consistent with the SM2 algorithm key exchange protocol.

[0095] figure 1 It is a structural block diagram of the key agreement system in the first embodiment 1.

[0096] The communication party A is composed of the following modules: the first private key generation module 11, the first public key generation module 12, the first combined public key generation module 13, the first information recovery module 14, the first shared key generation module 15, the first 1 An information verification module 16 and a first communicatio...

no. 2 Embodiment

[0159] image 3 is a structural block diagram of the key agreement system of the second embodiment, Figure 4 It is a flowchart of the key exchange protocol in the second embodiment.

[0160] Compared with the first embodiment, the second embodiment omits the first information verification module and the second information verification module and the calculation S 1 , S 2 , S A , S B and verification steps, others are the same as those in the first embodiment. Compared with the first embodiment, the second embodiment can reduce the number of information transfers between the communicating parties A and B.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key agreement system. A password authentication key exchange protocol is realized based on an SM2 algorithm, and a password shared by the two parties is converted into a shared key with a higher security level and a required length through two rounds or three rounds of information transmission. The two communication parties respectively generate temporary private keys, calculate a temporary public key and a password public key, calculate a combined public key on the basis of the temporary public key and the password public key, and transmit the combined public key to each other. And after receiving the combined public key of the opposite side, the two sides recover the temporary public key of the opposite side by using the password, calculate a common secret value by using the own public and private key pair, the own temporary public and private key pair, the opposite side temporary public key and the opposite side public key, and calculate a shared key according to an agreed algorithm on the basis.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a key negotiation method and system. Background technique [0002] The key exchange protocol is that the communication parties transmit messages through an insecure channel, calculate a shared secret value according to the transmitted message, and use the secret value to calculate a shared key for subsequent secure communication. [0003] A common key exchange algorithm is the DH key exchange algorithm, which can satisfy both communication parties to create a shared key through an insecure channel without any prior information from the other party. The process of the DH algorithm is that the communication parties each establish a temporary public-private key pair, and publicly pass the temporary public key to the other party; the two parties use their own temporary private key and the temporary public key passed by the other party to calculate a shared secret value...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/3066H04L9/3226H04L9/0838H04L9/085
Inventor 王慧郑江东张渊王幼君
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products