Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key Generation Method Based on Location Uniqueness Information

A key generation and unique technology, applied in the key field, can solve the problems of immaturity, low key cost, difficult key distribution and management, etc., and achieve the effects of short running time, resistance to dictionary attacks, and increased complexity

Active Publication Date: 2022-07-22
HARBIN INST OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing mature security mechanism is cryptography based on computing systems. However, with the development of science and technology and the increase of communication equipment, some disadvantages of traditional cryptography are gradually emerging. For example, the cost of decrypting keys is getting lower and lower. Access devices make key distribution and management particularly difficult, etc.
However, research in fields such as quantum security and physical layer security is still in its infancy and immature.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key Generation Method Based on Location Uniqueness Information
  • Key Generation Method Based on Location Uniqueness Information
  • Key Generation Method Based on Location Uniqueness Information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] Table 1 is a statistical table of the change of the initial value of the Logistic mapping with the time-varying factor. It can be seen that when the time-varying factor changes linearly, the generated random initial value changes irregularly and completely random. Under the same other conditions, the Logistic chaotic sequence generated by the initial value can be guaranteed to be completely random, so as to ensure the disorder of the filling method, which is beneficial to the MD5 algorithm to resist dictionary attacks.

[0058]

[0059]

[0060] Table 1 Logistic mapping initial value and time factor change result table

[0061] Table 2 and image 3 respectively reflect the change result of the generated key with the time factor. It can be found from the table that when the time factor varies linearly from 70 to 79, the generated key changes irregularly and is completely random; image 3 It reflects the key results generated by changing the time factor in repeate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a key generation method based on location uniqueness information, which is improved on the basis of the hash function. When the hash function fills the input information, a chaotic sequence is introduced to initialize the MD buffer. The message is processed in groups to ensure that the information filled each time will change randomly with the change of the input positioning information, which effectively avoids the disadvantage that the hash function is vulnerable to dictionary attacks. The change space of the key is enlarged, and the security of the key generation algorithm and the randomness of the generated key are improved; the present invention does not change the structure of the MD5 algorithm too much, so the original MD5 algorithm has irreversibility and initial value sensitivity. Equal properties still exist, and the improved algorithm has no significant increase in complexity and relatively short running time.

Description

technical field [0001] The invention belongs to the field of keys, and in particular, relates to a key generation method based on location uniqueness information. Background technique [0002] Communication security is related to military and national defense, the lifeline of the national economy, society and personal privacy, and is particularly important in today's information society. The existing mature encryption mechanism is based on the cryptography of the computing system, but with the development of science and technology and the increase of communication equipment, some disadvantages of traditional cryptography have gradually emerged. access equipment makes key distribution and management particularly difficult. However, research in areas such as quantum security and physical layer security is still in its infancy and immature. For the future air-space-ground communication network, the communication security threats brought by the characteristics of large coverag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0816H04L9/0643H04L9/001
Inventor 孟维晓闫富朝韩帅罗晓萌
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products