Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method combining multiple algorithms

A security authentication, multi-algorithm technology, applied in key distribution, can solve the problems of short brute force cracking theory time and information security threats, achieve the effect of small extra overhead and reduce the threat of key brute force cracking

Inactive Publication Date: 2018-01-09
GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new technology helps prevent key damage from being forced open by applying strong pressure on it or trying different methods until there are no signs of any problem beforehand. It also makes sure each piece of hardware used during an attack doesn't have its own vulnerabilities.

Problems solved by technology

Technological Problem addressed in this patented text relates how sensitive personalized electronic communication services require strong cryptographic techniques such as secure multi-factor authensis (SMA) protocols like Xiaoshuo's PINKID system. While traditional password systems only allow one user access per session, these solutions use shared secrets - they may also break down due to attacks from outside sources. There needs a more efficient method to ensure reliable encrypted identity verification without compromising any trustworthiness concerns associated with conventional digital certificatings.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method combining multiple algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] According to an embodiment of the present invention, a security authentication method combining the national secret SM4 algorithm and the 3DES algorithm is provided.

[0026] For the convenience of description, the following first analyzes the principle of the national secret SM4 algorithm and 3DES algorithm. In principle, these two algorithms have the following characteristics:

[0027] 1. The key length of the two algorithms is the same: the key length of the national secret SM4 algorithm and the 3DES algorithm are both 16 bytes, although the actual effective key length of the 3DES algorithm is 112 bits, but due to the actual application of the key The setting is in bytes, and the 3DES key is usually a 16-byte value.

[0028] 2. In the two algorithms, the lengths of plaintext and ciphertext data blocks are integer multiples. The length of the plaintext and ciphertext data blocks of the SM4 algorithm is 16 bytes, and the length of the 3DES algorithm plaintext and cip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication method combining multiple algorithms. The method comprises the following steps: 1) an authentication party sends a random number to the authenticated party; 2) the authenticated party selects an authentication algorithm to be adopted in the present authentication from at least two pre-appointed authentication algorithms according to a pre-appointedselection algorithm, then calculates an authentication check value according to the selected authentication algorithm and a received random number, and sends the authentication check value to the authentication party; 3) the authentication party selects the authentication algorithm to be adopted in the present authentication from the at least two pre-appointed authentication algorithms according to the pre-appointed selection algorithm, then calculates the authentication check value according to the selected authentication algorithm and the random number in the step 1); and 4) the authentication party compares the locally calculated authentication check value with the received authentication check value from the authenticated party to judge the authentication result. By adoption of the security authentication method, the threat of the key being broken by violence can be effectively reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner GIESECKE & DEVRIENT (CHINA) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products