A Group Key Agreement Method Based on Symmetric Cryptography

A technology of group key negotiation and symmetric cipher, applied in the field of group key negotiation, it can solve the problems of unaffordable special network, large computing and communication resources, limited capacity, etc., achieving fast encryption and decryption speed and high communication efficiency , the effect of reducing the consumption of resources

Active Publication Date: 2020-12-22
LUOYANG NORMAL UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Traditional network authentication technologies include digital signature technology, challenge response technology, etc., but these technologies need to consume large computing and communication resources
These consumptions are nothing for resource-rich network elements, but may be unaffordable for special networks, such as resource-constrained wireless sensor network nodes with very limited computing resources and communication capabilities
Therefore, it is not suitable to use the traditional AKA technology in the resource-constrained communication environment, and a more efficient AKA method is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Group Key Agreement Method Based on Symmetric Cryptography
  • A Group Key Agreement Method Based on Symmetric Cryptography
  • A Group Key Agreement Method Based on Symmetric Cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Embodiment one, such as figure 1 As shown, a group key agreement method based on the DES symmetric encryption algorithm establishes a session key among n communication nodes u with the assistance of a server S, and does not need to confirm the key. Each communication node u i (1≤i≤n) has an identity information ID i (1≤i≤n), each communication node u i A shared key sk shared with the server S is preset i (1≤i≤n); the communication node u is stored in the server S i with the shared secret sk i and identity information ID i mapping table.

[0059] Specific steps include:

[0060] Step 1. All communication nodes u send authentication information to the same server S;

[0061] Step 2. The server S receives the authentication information, and then authenticates all communication nodes u according to the authentication information;

[0062] Step 3. After the server S authenticates all communication nodes u, it broadcasts verification information to all communication ...

Embodiment 2

[0086] Embodiment two, such as figure 2 As shown, a group key agreement method based on the AES symmetric encryption algorithm establishes a session key among n communication nodes u with the assistance of a server S, and does not need to confirm the key.

[0087] The specific process of step 1 and step 2 is the same as that of the first embodiment.

[0088] The concrete process of described step 3 comprises:

[0089] Step 3.1B, server S calculates

[0090]

[0091]

[0092] sk=H(k||ID 1 ||ID 2 ||...||ID n );

[0093] Step 3.2B, server S according to k' i calculate and H(k′ i ),in is server S using communication node u i The shared secret key sk i and encryption algorithm E' to k' i Obtained after encryption, H represents the hash algorithm;

[0094] Step 3.3B, server S uses sk as the key to encrypt a communication data m using CBC mode to generate the authentication code Mac sk (m), the method of generation can be the method of the hash function cluster...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A group key agreement method based on symmetric cryptography aims to build session keys between n communication nodes u, and comprises the following specific steps: 1, all communication nodes u send authentication information to the same server S; 2, the server S receives the authentication information, and identifies all communication nodes u according to the authentication information; 3, the server S identifies all communication nodes u, and broadcasts verification information to all communication nodes u; 4, all communication nodes u receive the verification information, and verify the server S according to the verification information; 5, all communication nodes u verify the server S, and independently calculate the session keys. The group key agreement method based on symmetric cryptography is fast in encryption / decryption speed, high in efficiency, good in safety, can effectively reduce the calculation quantity and communication traffic of the communication nodes with limited resource supplies, is simple in process, and short in time consumption.

Description

technical field [0001] The invention relates to the field of group key agreement, in particular to a group key agreement method based on symmetric cipher. Background technique [0002] In the network environment, communication is a necessary condition for connecting network nodes, and the communication process is the most dangerous way to cause information leakage. Therefore, it is an important research content to communicate in the network through certain protocol rules and to regulate the network behavior of users to protect the security of information. [0003] The basic technical means to protect data from being stolen is to use encryption measures, and before implementing encryption measures, a secret key needs to be generated. In a wireless network environment, the number of nodes is usually more than two, which requires a multi-party or group key agreement protocol to generate this key. When establishing a key, the user's identity must be authenticated through some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0625H04L9/0631H04L9/0833H04L9/0838
Inventor 查正邦滕济凯范刚龙
Owner LUOYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products