Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication encryption, verification decryption and communication method

A technology of authentication encryption and message authentication code, which is applied in key distribution, can solve the problems of inability to protect data confidentiality, integrity, protection, operation efficiency and low security boundaries, and achieve improved communication efficiency, high security, and high security Effect

Pending Publication Date: 2020-12-29
XINGTANG TELECOMM TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the embodiment of the present invention aims to provide an authentication encryption method, a verification decryption method and a communication method to solve the problem that the existing technology has low operating efficiency and security boundary, and cannot provide confidentiality protection and integrity for data at the same time. problem of protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication encryption, verification decryption and communication method
  • Authentication encryption, verification decryption and communication method
  • Authentication encryption, verification decryption and communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084]A specific embodiment of the present invention discloses an authentication encryption method applied to the sender, such asfigure 1 As shown, including the following steps:

[0085]S1. Generate the initial vector IV of this encryption;

[0086]S2. Generate key stream 1 according to the key K shared with the receiving end and the initial vector IV obtained above;

[0087]S3. Encrypt the plaintext P1 according to the partial key Z1[1] in the key stream 1 to obtain the ciphertext C; use the partial key Z1[0] in the key stream 1 to combine the auxiliary data A, and receive The key H shared by the end generates a message authentication code Tag1; wherein, the partial key Z1[0] and the partial key Z1[1] together constitute the key stream one;

[0088]S4. Send the obtained C and Tag1 together with the A and IV to the receiving end, so that the receiving end decrypts to obtain the plaintext.

[0089]It is worth noting that the initial vector IV varies with the message, and the initial vector IV used...

Embodiment 2

[0092]Optimized on the basis of the solution of embodiment 1, step S2 further includes:

[0093]S21. According to the key K shared with the receiving end and the generated initial vector IV, the key stream Z1 is generated by the following formula

[0094]Z1=PRGl(IV,K) (1)

[0095]In the formula, PRGl() represents a pseudo-random number generator, l represents the bit length of Z1, and l is set as the sum of Tag1 length and plaintext length.

[0096]It is worth noting that, according to application requirements, the above-mentioned pseudo-random number generator PRG can use any secure sequence cipher algorithm, for example, the standard algorithm for commercial secret sequence cipher ZUC or ZUC-256 in China, or it can be constructed by hash algorithm or block cipher For example, it can be constructed through existing methods using my country's commercial secret standard hash algorithm SM3 or block cipher SM4, which can be understood by those skilled in the art.

[0097]S22. Generate key streams Z1[...

Embodiment 3

[0130]A specific embodiment of the present invention discloses a verification and decryption method applied to the receiving end that is matched with the method of embodiment 1, such asfigure 2As shown, including the following steps:

[0131]S5. Receive cipher text C, message authentication code Tag1, auxiliary data A and initial vector IV sent by the sender;

[0132]S6. Generate key stream 2 according to the key K shared with the sender and the initial vector IV;

[0133]S7. Generate a message authentication code Tag2 according to the partial key Z2[0] in the second key stream in combination with the auxiliary data A and the key H shared with the sender;

[0134]S8. Determine whether Tag1 and Tag2 are the same. If they are the same, parse the ciphertext C according to the partial key Z2[1] in the key stream 2 to obtain the plaintext P2 and output it; otherwise, output an invalid identifier.

[0135]It is worth noting that the partial key Z2[1] and the partial key Z2[0] together constitute the sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication encryption, verification decryption and communication method, belongs to the technical field of communication, and solves the problems that in the prior art,the operation efficiency and the security boundary are low, and confidentiality protection and integrity protection cannot be provided for data at the same time. The method comprises the following steps: a sending end executing an encryption program, generating an initial vector IV of the encryption, generating a key stream I according to a shared key K and the initial vector IV, encrypting a plaintext P1 according to the key stream I to obtain a ciphertext C, generating a message authentication code Tag1 in combination with affiliated data A and a shared key H, and sending the obtained C, Tag1, A and IV to a receiving end; and the receiving end executes a decryption program, generating a key stream II according to the shared key K and the received IV, generating a message authenticationcode Tag2 according to the key stream II, the received A, C and the received shared key H, judging whether Tag1 and Tag2 are consistent or not, if the Tag1 and Tag2 are consistent, analyzing the ciphertext C according to the key stream II to obtain a plaintext P2, and outputting the plaintext P2 if the Tag1 and Tag2 are or not consistent.

Description

Technical field[0001]The present invention relates to the field of communication technology, in particular to an authentication encryption method, a verification decryption method and a communication method.Background technique[0002]Confidentiality protection and integrity protection are two important goals of information security. With the development of Internet technology, message authentication in insecure channels has become more and more important. Encryption can be used to prevent illegal users from stealing data during transmission, that is, to protect the confidentiality of data. Message authentication code can be used to detect whether data has been tampered with during transmission, that is, to protect the integrity of data and to authenticate the source of data .[0003]Existing authentication encryption methods are generally based on block cipher structures, such as AES-GCM. Although they are more flexible to use, their operating efficiency and security are low.[0004]Exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04W12/00H04W12/06H04W12/10
CPCH04L9/085H04L9/0643H04L9/3226H04L9/0869H04L9/0863
Inventor 李鸿利王勇慧贾文义马永彪
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products