Unlock instant, AI-driven research and patent intelligence for your innovation.

Key exchange method and device

A key exchange and key technology, applied in the field of communication

Pending Publication Date: 2021-12-31
HUAWEI TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a key exchange method and device, which solves the problem of secure exchange of authenticable keys when two devices that do not know each other communicate. Exchange of Authenticable Keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exchange method and device
  • Key exchange method and device
  • Key exchange method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The network device in the technical solution of the embodiment of the present application can be any device with wireless or wired transceiver function or a chip that can be set on the device, and the device includes but is not limited to: evolved Node B (evolved Node B, eNB) , Radio Network Controller (Radio Network Controller, RNC), Node B (Node B, NB), Base Station Controller (Base Station Controller, BSC), Base Transceiver Station (Base Transceiver Station, BTS), Femtocell (for example, Home evolved NodeB, or Home Node B, HNB), baseband unit (BaseBand Unit, BBU), wireless fidelity (Wireless Fidelity, WIFI) system access point (Access Point, AP), wireless relay node, wireless backhaul Node, transmission point (transmission point, TP) or transmission receiving point (Transmission receiving point, TRP), router, etc., can also be 5G, such as NR, gNB in ​​the system, or transmission point (TRP or TP), 5G system One or a group (including multiple antenna panels) antenna p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a key exchange method and device, and relates to the field of communication, and the method comprises the steps: encrypting a first temporary key according to a first terminal key, a second terminal identifier and a first key updating parameter, and obtaining a first ciphertext; encrypting a first challenge parameter according to the first temporary key to obtain a second ciphertext; generating a first message, wherein the first message comprises the first ciphertext, the second ciphertext and the first key updating parameter; and sending the first message to intermediate equipment. According to the method, the problem of secure exchange of an authenticable key during communication between two pieces of equipment which are not mutually recognized is solved, and exchange of the authenticable key is completed under the condition that two communication entities do not share the key.

Description

technical field [0001] The present application relates to the communication field, and in particular to a key exchange method and device. Background technique [0002] Secure communication between two entities on the Internet usually relies on establishing a secure channel to securely transmit data so as to provide confidentiality and integrity of the transmitted data. The establishment of a secure channel usually requires the secure exchange of certifiable keys in advance. In the existing authenticated key exchange technology, there are forward security problems and the lack of a key update mechanism, which cannot deal with the risk of key leakage. An attacker can implement an identity impersonation attack by obtaining an old compromised key. [0003] Therefore, in view of the problems existing in the existing technical solutions, how to realize the secure exchange of authenticable keys between two devices that do not know each other is an urgent problem to be solved. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0841H04L9/0822H04L9/0891H04L63/061
Inventor 江伟玉刘冰洋王闯
Owner HUAWEI TECH CO LTD