Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key exchanging method based on public key certificate

A key exchange and public key certificate technology, which is applied in the usage of multiple keys/algorithms, user identity/authority verification, digital transmission systems, etc., can solve problems such as limiting the scope of communication, and achieve the effect of fast computing speed

Inactive Publication Date: 2005-03-09
ZHEJIANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the EKE protocol has a serious flaw, it requires both parties to know a shared password P, which greatly limits the scope of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] When the present invention is used for network communication to exchange session keys, it is assumed that user A and user B exchange session keys. In this method, user A and user B share a system parameter (Z p , G, q, H, sig), Z Here are examples where P is 512 bits and 1024 bits:

[0013] 512: P=QxED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7;

[0014] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53;

[0015] where Z p is a finite group generated modulo primes, G= is Z p The subgroup whose order is q (p=2q+1, p, q are large prime numbers), H is G 3 →G's anti-collision hash function, sig is a digital signature method against forgery and tampering.

[0016]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method of changing secret keys based on shared key certificates. It is a method of shared certificate and digital signature based on discrete logarithms in large prime number area and Diffie-Hellman secret key changing agreement, and with collision resist different functions. It is safe with a fast calculation speed, which has been proved.

Description

technical field [0001] The invention relates to a key exchange method for confidential or secure communication, in particular to a key exchange method based on public key certificates. Background technique [0002] Cryptographic algorithms and communication protocols with provable security are an important and difficult research topic in cryptography. The research on communication security and confidentiality revolves around finding stronger and better cryptosystems. Because the traditional cryptographic system uses a single key for encryption and decryption, once the encryption key is leaked, the entire cryptographic system will lose its function. Therefore, more and more defects have been exposed in practical applications, but because the encryption speed of the symmetric key system is much faster than that of the public key encryption, it has advantages in encrypting a large amount of data. Therefore, a hybrid encryption method is produced, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/14H04L9/32
Inventor 朱华飞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products