An Authentication Method Based on Public Key Encryption System

An authentication method and public key encryption technology, which is applied in the field of network security and information security, can solve problems such as unreliability, increased protocol complexity, and increased number of message interactions, and achieve the effect of resisting replay attacks and preventing impersonation

Active Publication Date: 2021-03-05
中国科学院沈阳计算技术研究所有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The purpose of identity authentication is to realize the secure communication of participants in an unreliable communication environment. Due to the unreliability of the network environment, there are various attack methods, such as identity impersonation, old message replay, etc., which lead to analysis The complexity of designing an authentication protocol
Existing identity authentication methods, in order to prevent message replay and identity impersonation attacks, usually use time stamps, send random numbers to each other, add sender identity marks, etc., but time stamps have difficulty in time synchronization and require additional Cost; sending random numbers to each other usually leads to an increase in the number of message interactions, which increases the complexity of the protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Authentication Method Based on Public Key Encryption System
  • An Authentication Method Based on Public Key Encryption System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the examples.

[0032] like figure 1 As shown, sender A and receiver B respectively represent client A and client B, an authentication method based on public key encryption system, including two functions of identity authentication and shared session key:

[0033] 1) The sender A and the receiver B send (local) random numbers N to the key distribution center respectively A , N B . The random number uses the private key K of sender A and receiver B respectively SA 、K SB Sign and use the public key K of the key distribution center PS Encryption, where the message sent by A is {A, B, ((N A )K SA )K PS}, the message sent by B is {A, B, (((N A )K SA )K PS , (N B )K SB )K PS} That is, A's message is forwarded by B.

[0034] 2) After receiving the message, the secret key distribution center uses its own private key K SS Decrypt the message and use the public key K of sender A an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method based on a public key encryption system, which is applied in environments such as instant message communication and network telephone, and includes identity authentication and generation of a shared session secret key. It mainly consists of three roles: sender A, receiver B, and key distribution center. During the execution of the protocol, the sender A and the receiver B complete the mutual identity authentication with the key distribution center and the mutual identity authentication between the sender A and the receiver B through the interaction with the key distribution center. During this period, sender A and receiver B respectively receive the shared session key generated by the key distribution center, and verify that the other party has also received the shared session key, so that the shared session can be used in the next stage of information interaction The secret key encrypts and decrypts the communication content. The invention fully satisfies the security requirements of the authentication protocol, can prevent old messages from being replayed, and resist identity masquerading attacks.

Description

technical field [0001] The invention relates to the technical fields of information security and network security, in particular to an authentication method based on a public key encryption system, which is suitable for identity authentication based on the public key encryption system and on this basis to carry out secure communication through a shared session key. Background technique [0002] The purpose of identity authentication is to realize the secure communication of participants in an unreliable communication environment. Due to the unreliability of the network environment, there are various attack methods, such as identity impersonation, old message replay, etc., which lead to analysis The complexity of designing an authentication protocol. Existing identity authentication methods, in order to prevent message replay and identity impersonation attacks, usually use time stamps, send random numbers to each other, add sender identity marks, etc., but time stamps have di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/083H04L9/085H04L9/0866H04L9/0869H04L9/3247H04L9/3263
Inventor 于金刚赵治刚
Owner 中国科学院沈阳计算技术研究所有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products