Key exchanging method based on public key certificate
A key exchange and public key certificate technology, which is applied in the usage of multiple keys/algorithms, user identity/authority verification, digital transmission systems, etc., can solve problems such as limiting the scope of communication, and achieve the effect of fast computing speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] When the present invention is used for network communication to exchange session keys, it is assumed that user A and user B exchange session keys. In this method, user A and user B share a system parameter (Z p , G, q, H, sig), here are examples where P is 512 bits and 1024 bits:
[0013] 512: P=0xED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7
[0014] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53用户A和用户B进行会话密钥的交换步骤如下:
[0015] User A randomly selects w∈Zq, and calculates u=g w , and put (u, sig A (u)) sent to B; User B verifies A's signature Sig A (u), if the signature is incorrect, stop the exchange, otherwise randomly select x∈Zq, calculate y=g x , and pu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com