Authentication method based on public key encryption system

An authentication method and public key encryption technology, applied in the fields of network security and information security, can solve the problems of unreliability, increase the complexity of the protocol, and difficulty in time-stamp time synchronization, and achieve the effect of preventing impersonation and resisting replay attacks.

Active Publication Date: 2018-08-14
中国科学院沈阳计算技术研究所有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps ensure secure communication between two people by distributing keys over different parts (called messages or tokens). Each part contains unique identifiers for each person who sent it back separately. These codes are used only once during transmission, making sure they cannot be duplicated without being detected at all times. Additionally, this method prevents any attempts made against an authenticated entity's identification code.

Problems solved by technology

This patented technical problem addressed by this patents relates to ensuring that individuals can communicate safely with one another without being threatened or compromised due to any external factors like security threats or malware detection techniques used for identification purposes. Current methodologies involve complex algorithms involving complicated calculations and increased risk from these types of attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on public key encryption system
  • Authentication method based on public key encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the examples.

[0032] Such as figure 1 As shown, sender A and receiver B respectively represent client A and client B, an authentication method based on public key encryption system, including two functions of identity authentication and shared session key:

[0033] 1) The sender A and the receiver B send (local) random numbers N to the key distribution center respectively A , N B . The random number uses the private key K of sender A and receiver B respectively SA 、K SB Sign and use the public key K of the key distribution center PS Encryption, where the message sent by A is {A, B, ((N A )K SA )K PS}, the message sent by B is {A, B, (((N A )K SA )K PS , (N B )K SB )K PS} That is, A's message is forwarded by B.

[0034] 2) After receiving the message, the secret key distribution center uses its own private key K SS Decrypt the message and use the public key K of sender A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method based on a public key encryption system, applied to an environment of instant message communication, network telephone and the like. The authentication method comprises identity authentication and shared session key generation. The authentication method mainly consists of three roles: a sender A, a receiver B, and a key distribution center. In a protocol execution process, the sender A and the receiver B complete the mutual identity authentication with the key distribution center and the mutual authentication between the sender A and the receiver B through the interaction with the secret key distribution center, in the period, the sender A and the receiver B respectively receive a shared session key generated by the secret key distributioncenter, and the authentication party also receives the shared session key so as to use the shared session key to encrypt and decrypt communication contents in the next stage of information interaction. By adoption of the authentication method provided by the invention, the security requirements of the authentication protocol are fully met, the old message playback can be prevented, and the identity impersonation attacks are defended.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 中国科学院沈阳计算技术研究所有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products