Method for achieving lightweight authentication and key agreement
A lightweight authentication and key agreement technology, applied in the field of lightweight identity authentication and key agreement, to achieve high efficiency, small data volume, and good security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0099] Example 1: Two-way authentication and key agreement using the symmetric key encryption algorithm present
[0100] As mentioned above, the present invention is based on symmetric cryptography, and performs identity authentication and establishes a session key on the premise that a shared key has been established between any two nodes. The specific steps are as follows:
[0101] (1) Preset a long-term shared key K between any two network node devices A and B.
[0102] In the key pre-distribution stage, a large key pool P and key identification are first generated; then a key is randomly selected as a preset key shared by two node devices until any two nodes have shared secret. If node A wants to initiate authentication to node B and establish a session key, node A finds the shared key K with node B, and the length of the key is 128 bits.
[0103] (2) Both the node device A and the node device implement the symmetric key encryption algorithm E, where E is the present alg...
Embodiment 2
[0114] Example 2: Two-way authentication and key agreement using the symmetric key encryption algorithm LBlock
[0115] As mentioned above, the present invention is based on symmetric cryptography, and performs identity authentication and establishes a session key on the premise that a shared key has been established between any two nodes. The length of the symmetric encryption key used is 128 bits, and the block size is 64 bits, but at the same time, the present invention can also be applied to symmetric encryption algorithms with other key lengths and block sizes. In this embodiment, a lightweight block cipher algorithm LBlock with a key of 80 bits and a block size of 64 bits is used. Specific steps are as follows:
[0116] (1) Preset a long-term shared key K between any two network node devices A and B.
[0117] In the key pre-distribution stage, a large key pool P and key identification are first generated; then a key is randomly selected as a preset key shared by two no...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com