Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key agreement method and device

A key negotiation and key exchange protocol technology, applied in the field of key negotiation methods and devices, can solve problems such as reducing system session security, and achieve the effects of strong security and improved efficiency

Inactive Publication Date: 2009-11-18
THE PLA INFORMATION ENG UNIV
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventor found in the process of researching the existing technology that when performing key negotiation in the prior art, the two parties in the conversation need to perform multiple data exchanges to complete the key negotiation, and when one user or two parties using the protocol users When the long-term key sk is leaked at the same time, since the third party who obtains the leaked information can obtain the session key of the user in the system through calculation, the session security of the system is reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key agreement method and device
  • Key agreement method and device
  • Key agreement method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The embodiments of the present invention provide a key agreement method and device, which are applied to a key agreement system based on a key exchange protocol, in which a first user terminal obtains a key agreement session with the first user terminal from a certificate center. The long-term public key of the second user side, the temporary key of the first user side is randomly selected, and the first hash calculation is performed on the temporary key of the first user side and the long-term private key of the first user side to obtain the first intermediate value. The first intermediate value and the temporary key generate a first key agreement message, and after the first key agreement message is sent to the second user end, the second key agreement message returned by the second user end is received, and the first user end is based on The second key agreement message, the long-term public key of the second user end, the temporary key of the first user end, the long-te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key agreement method and a device. The method comprises the steps: a first user end obtains a long-term public key of a second user end conducting key agreement session with the first user end from a certificate authority; an ephemeral key of the first user end is selected randomly and the first hash calculation is conducted on the ephemeral key of the first user end and a long-term private key of the first user end to obtain a first intermediate value; according to the first intermediate value and the ephemeral key, first key agreement information is generated; after the first key agreement information is sent to the second user end, second key agreement information returned back from the second user end is received; and according to the second key agreement information, the long-term public key of the second user end, the ephemeral key of the first user end, the long-term private key of the first user end and the session identification of the key agreement session, the first user end conducts the second hash calculation to obtain a shared key. The method and the device improve the efficiency of the key agreement, and the long-term key and the ephemeral key of any party can not be simultaneously divulged, thus being capable of guaranteeing the security of agreement.

Description

Technical field [0001] The present invention relates to the technical field of secure communication, in particular to a key agreement method and device. Background technique [0002] Key agreement is a key establishment technology in which two or more participants in the system provide information together, and each derives a shared key whose results cannot be determined in advance by either party. Especially with the increasing complexity of the communication environment, the continuous development of information technology and the continuous improvement of computing power, the attack methods in the communication environment are also constantly developing, making many key agreement methods have different levels of security risks. Therefore, in modern communication , The participants in the communication should consider the security of the key agreement while ensuring the high efficiency of the key agreement. Common key agreement protocols include MQV, HMQV, NAXOS, CMQV, NETS, et...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/30H04L9/32
Inventor 马传贵程庆丰张汝云魏富山彭建华季新生许明艳黄开枝
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products