Unlock instant, AI-driven research and patent intelligence for your innovation.

Key agreement method and system

A technology of key agreement and shared key, which is applied in transmission system, digital transmission system, public key of secure communication, etc. It can solve the problem that password authentication key exchange protocol cannot resist password guessing attack, and achieve resistance to man-in-the-middle attack Effect

Active Publication Date: 2022-04-22
BEIJING WATCH DATA SYST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem that the password authentication key exchange protocol in the prior art cannot resist password guessing attacks, based on the national secret SM2 algorithm, the present invention provides a key agreement method and system capable of improving the security strength of the password authentication exchange key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key agreement method and system
  • Key agreement method and system
  • Key agreement method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment

[0094] In the first embodiment, the elliptic curve parameters are system parameters of the SM2 elliptic curve public key cryptographic algorithm: wherein, G is the base point of the elliptic curve, its order is a prime number n, and h is a cofactor. In addition, the points M and N on the two elliptic curves are arbitrarily selected as public parameters. The Hash algorithm, KDF algorithm and the generating function F of the shared secret point are all consistent with the SM2 algorithm key exchange protocol.

[0095] figure 1 It is a structural block diagram of the key agreement system in the first embodiment 1.

[0096] The communication party A is composed of the following modules: the first private key generation module 11, the first public key generation module 12, the first combined public key generation module 13, the first information recovery module 14, the first shared key generation module 15, the first 1 An information verification module 16 and a first communicatio...

no. 2 Embodiment

[0159] image 3 is a structural block diagram of the key agreement system of the second embodiment, Figure 4 It is a flowchart of the key exchange protocol in the second embodiment.

[0160] Compared with the first embodiment, the second embodiment omits the first information verification module and the second information verification module and the calculation S 1 , S 2 , S A , S B and verification steps, others are the same as those in the first embodiment. Compared with the first embodiment, the second embodiment can reduce the number of information transfers between the communicating parties A and B.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key agreement system. Based on the SM2 algorithm, the password authentication key exchange protocol is realized. Through two or three rounds of information transmission, the password shared by both parties is transformed into a shared key with a higher security level and a required length. Both communication parties generate temporary private keys, calculate temporary public keys and password public keys, and calculate a combined public key based on the two and pass it on to the other party. After the two parties receive the combined public key of the other party, they use the password to recover the temporary public key of the other party, use their own public-private key pair, their own temporary public-private key pair, the other party's temporary public key, and the other party's public key to calculate a common secret value, and On this basis, the shared key is calculated according to the agreed algorithm.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a key negotiation method and system. Background technique [0002] The key exchange protocol is that the communication parties transmit messages through an insecure channel, calculate a shared secret value according to the transmitted message, and use the secret value to calculate a shared key for subsequent secure communication. [0003] A common key exchange algorithm is the DH key exchange algorithm, which can satisfy both communication parties to create a shared key through an insecure channel without any prior information from the other party. The process of the DH algorithm is that the communication parties each establish a temporary public-private key pair, and publicly pass the temporary public key to the other party; the two parties use their own temporary private key and the temporary public key passed by the other party to calculate a shared secret value...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08
CPCH04L9/3066H04L9/3226H04L9/0838H04L9/085
Inventor 王慧郑江东张渊王幼君
Owner BEIJING WATCH DATA SYST