Secret key negotiation method suitable for secret key sharing of two communication parties

A secret key negotiation and secret key technology, which is applied in the field of information security, can solve the problems of high-end real-time communication control and difficult to meet the demand

Pending Publication Date: 2021-08-31
BEIJING INST OF COMP TECH & APPL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is how to provide a secret key negotiation method suitable for the sharing of secret keys by both communication parties, so as to solve the problem that the existing secret key negotiation method is difficult to meet the requirements of high-end scenarios requiring real-time communication control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key negotiation method suitable for secret key sharing of two communication parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, content and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0038] The invention relates to a method for negotiating a secret key between communication parties, which is particularly suitable for an environment that requires high real-time communication and limited hardware computing resources.

[0039] Need to realize following key content in the present invention:

[0040] 1) Shared secret key matrix

[0041] The shared secret key matrix is ​​composed of 32x32 secret keys. The corresponding element of each row and column is a true random number secret key. The length of the secret key varies according to different requirements. In this invention, a 32-byte true random number secret key is used. , other secret keys of byte size also belong to the scope of the invention. Accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secret key negotiation method suitable for secret key sharing of two communication parties, and belongs to the field of information security. According to the method, a public key algorithm is not used in the whole negotiation process, only one-way communication is carried out once, and after the random key of one party is sent to the opposite party, the two parties use the same calculation strategy to obtain the session key. In the aspect of security, six layers of security protection are set in total, and an attacker needs to complete six cracking operations at the same time to break through the secret key negotiation system. Even if the principle and implementation of the system are leaked by a bad person, as the secret key derivation algorithm, the HASH algorithm, the index calculation method and the method for obtaining the secret key through the index can be configured through strategies, as long as the algorithms and the strategies are modified, an attacker cannot realize the collusion that the attacker communicates with the system to steal system information.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a secret key negotiation method suitable for secret key sharing between communication parties. Background technique [0002] The current general secret key negotiation method is based on the three-way handshake to exchange the parameter information of both parties, and then generate the session secret key through password calculation. The calculation speed is slow (public key calculation is used in the negotiation process, and public key calculation is time-consuming). This secret key negotiation method is difficult to meet the high-end scenarios that require real-time communication control. Contents of the invention [0003] (1) Technical problems to be solved [0004] The technical problem to be solved by the present invention is how to provide a secret key negotiation method suitable for key sharing between communication parties, so as to solve the problem th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F16/901G06F7/58
CPCG06F21/602G06F16/901G06F7/588
Inventor 祝连海王飞王施人王艳马睿冯吉喆王剑
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products