Key agreement method in WAPI authentication mechanism

A technology of key negotiation and key, applied in the direction of synchronous sending/receiving of encrypted devices, data exchange through path configuration, etc.

Inactive Publication Date: 2005-09-07
XIDIAN UNIV
View PDF1 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The purpose of the present invention is to overcome the above-mentioned shortcoming of WAI, provide a kind of key agreement method in the WAPI authentication mechanism without changing the original WAI basic frame, to solve key agreement and identity authentication problem in WAPI, further improve the efficiency of WAPI authentication mechanism security strength

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key agreement method in WAPI authentication mechanism
  • Key agreement method in WAPI authentication mechanism
  • Key agreement method in WAPI authentication mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] When implementing the WAPI authentication and security infrastructure of the wireless LAN, firstly, the client STA and the access point AP obtain their respective public-private key pairs through the key generation algorithm, and then apply for their respective public key certificates from the authentication service unit ASU. The certificate can adopt the format stipulated in the national standard GB15629.11 for wireless local area network. Then, start the protocol interaction of the wireless local area network authentication infrastructure WAI, which includes two parts: certificate authentication and key negotiation. Among them, the certificate authentication process adopts the steps specified in the national standard GB15629.11, and the specific interactive process of the key negotiation is as follows: image 3 The three messages shown are carried out.

[0065] 1. The first message is that the client STA sends a key negotiation request to the access point AP. The re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key consulting method in the attestation mechanism of WAPI, solving the problems of ID attestation and secret key consultation of mobile equipment accessing to wireless local-area network. The method arranges three messages: request, response and answer of secret key and their interchanging course: a client-end STA generates a random number r0, encrypts the r0 by the public key of an access point AP and then sends the encrypted r0 and a conversation indication sign s to the AP; the AP decrypts to obtain the r0, selects the other random number r1, and calculates conversation secret key and message attestation code and sends the message attestation code, the indication sign s and the r1 encrypted by public key of the STA; the STA decrypts to obtain the r1 and attests the message attestation code transmitted from the AP to determine to access to the network and output conversation secret key; finally, the STA calculates the other message attestation code and sends it and s together to the AP; the AP attests the message attestation code transmitted by the STA and then outputs conversation secret key and allows the STA to access to the network. The method achieves universal combinable safety strength and implements ID attestation and secret key consultation, able to be used in improving the attestation mechanism in the WAPI.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to the security technology of wireless local area network, in particular to a key negotiation method of authentication mechanism in WAPI to solve the identity authentication and key negotiation problems when mobile equipment accesses the wireless local area network. Background technique [0002] In 2003, the China Intellectual Property Office announced the patent application (publication number: CN 1426200A) of "Safe Access of Mobile Terminals in Wireless Local Area Network and Data Security Communication Method of Wireless Links". The patents involved in this application are applied in China's wireless local area network national standard GB15629.11-Wireless Local Area Network Authentication and Security Infrastructure WAPI, where the wireless LAN authentication infrastructure is called WAI for short. WAI adopts a port-based authentication model similar to the IEEE 802...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/12H04L12/28
Inventor 李兴华马建峰张帆曹春杰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products