Authentication encryption, verification decryption and communication method
A technology of authentication encryption and message authentication code, which is applied in key distribution, can solve the problems of inability to protect data confidentiality, integrity, protection, operation efficiency and low security boundaries, and achieve improved communication efficiency, high security, and high security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0084]A specific embodiment of the present invention discloses an authentication encryption method applied to the sender, such asfigure 1 As shown, including the following steps:
[0085]S1. Generate the initial vector IV of this encryption;
[0086]S2. Generate key stream 1 according to the key K shared with the receiving end and the initial vector IV obtained above;
[0087]S3. Encrypt the plaintext P1 according to the partial key Z1[1] in the key stream 1 to obtain the ciphertext C; use the partial key Z1[0] in the key stream 1 to combine the auxiliary data A, and receive The key H shared by the end generates a message authentication code Tag1; wherein, the partial key Z1[0] and the partial key Z1[1] together constitute the key stream one;
[0088]S4. Send the obtained C and Tag1 together with the A and IV to the receiving end, so that the receiving end decrypts to obtain the plaintext.
[0089]It is worth noting that the initial vector IV varies with the message, and the initial vector IV used...
Embodiment 2
[0092]Optimized on the basis of the solution of embodiment 1, step S2 further includes:
[0093]S21. According to the key K shared with the receiving end and the generated initial vector IV, the key stream Z1 is generated by the following formula
[0094]Z1=PRGl(IV,K) (1)
[0095]In the formula, PRGl() represents a pseudo-random number generator, l represents the bit length of Z1, and l is set as the sum of Tag1 length and plaintext length.
[0096]It is worth noting that, according to application requirements, the above-mentioned pseudo-random number generator PRG can use any secure sequence cipher algorithm, for example, the standard algorithm for commercial secret sequence cipher ZUC or ZUC-256 in China, or it can be constructed by hash algorithm or block cipher For example, it can be constructed through existing methods using my country's commercial secret standard hash algorithm SM3 or block cipher SM4, which can be understood by those skilled in the art.
[0097]S22. Generate key streams Z1[...
Embodiment 3
[0130]A specific embodiment of the present invention discloses a verification and decryption method applied to the receiving end that is matched with the method of embodiment 1, such asfigure 2As shown, including the following steps:
[0131]S5. Receive cipher text C, message authentication code Tag1, auxiliary data A and initial vector IV sent by the sender;
[0132]S6. Generate key stream 2 according to the key K shared with the sender and the initial vector IV;
[0133]S7. Generate a message authentication code Tag2 according to the partial key Z2[0] in the second key stream in combination with the auxiliary data A and the key H shared with the sender;
[0134]S8. Determine whether Tag1 and Tag2 are the same. If they are the same, parse the ciphertext C according to the partial key Z2[1] in the key stream 2 to obtain the plaintext P2 and output it; otherwise, output an invalid identifier.
[0135]It is worth noting that the partial key Z2[1] and the partial key Z2[0] together constitute the sec...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com