Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication Encryption Method and Encryption System Based on Symmetric Encryption

A technology of authentication encryption and authentication information, which is applied to user identity/authority verification and key distribution, can solve the problems of being unable to resist forgery attacks by message receivers, unable to publicly verify signatures by third parties, and low security, so as to ensure reliability and Integrity, small amount of calculation, and improved transmission cost

Inactive Publication Date: 2011-12-21
CHONGQING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of this scheme is not high, and it cannot resist the forgery attack of the message receiver, and after a dispute occurs, the third party cannot publicly verify the signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication Encryption Method and Encryption System Based on Symmetric Encryption
  • Authentication Encryption Method and Encryption System Based on Symmetric Encryption
  • Authentication Encryption Method and Encryption System Based on Symmetric Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The invention proposes an authentication encryption method and system based on symmetric encryption and message recoverable signature technology. Specifically include the following steps.

[0020] Step A: The sending end and the receiving end automatically generate public and private keys, and send the public key and their corresponding identities to the server;

[0021] Step B: The sending end receives the public key of the receiving end through the server, the key generation unit of the sending end generates the session key of the sending end according to the public key of the receiving end and the selected random number, and the encryption unit uses the session key of the sending end to pair the message to be sent Encrypt, and use the selected random number, the message to be sent and its own private key to generate authentication information, and the sending unit sends the encrypted message and authentication information to the receiving end through the server;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention requests protection of an authentication and encryption method and system, which relate to the field of communication security. Combining message recoverable signature and symmetric encryption technology, using the commitment value that only the specified message receiving end can calculate as the session key to encrypt the message, the message receiving end verifies the validity of the message through the recoverable signature, so that it can be realized simultaneously in one logical step encryption and authentication. The key generating unit at the sending end generates a session key at the sending end, the encryption unit encrypts the message to be sent, the receiving end generates a session key at the receiving end, and the decryption unit uses the session key at the receiving end to decrypt the encrypted message. The message generates authentication confirmation information to verify the validity of the message. When a dispute occurs, the message receiver can convert the authenticated encrypted message signature into a common signature, allowing a third party to publicly verify the validity of the signature. The invention has the advantages of high security, low calculation amount and transmission cost, and the like.

Description

technical field [0001] The invention relates to the field of communication security, in particular to an authentication and encryption method in the communication process. Background technique [0002] With the development of computer and communication technology, more and more people use the network to transmit secret information, and the transmission of these secret messages often requires both confidentiality and authentication. The traditional way to realize authentication and confidentiality at the same time is to combine encryption and signature, and adopt the method of "sign first and then encrypt". The calculation and transmission costs of this combination are the sum of signature and encryption, and this traditional method uses public key encryption, the calculation speed is slow and the cost is high. The use of message recoverable signature technology can realize authentication and encryption at the same time at a lower transmission cost. Many scholars at home and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 李方伟孙逊张鑫张海波
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products