Secret key negotiation method suitable for secret key sharing of two communication parties
The invention relates to a secret key negotiation method suitable for secret key sharing of two communication parties, and belongs to the field of information security. According to the method, a public key algorithm is not used in the whole negotiation process, only one-way communication is carried...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention relates to a secret key negotiation method suitable for secret key sharing of two communication parties, and belongs to the field of information security. According to the method, a public key algorithm is not used in the whole negotiation process, only one-way communication is carried out once, and after the random key of one party is sent to the opposite party, the two parties use the same calculation strategy to obtain the session key. In the aspect of security, six layers of security protection are set in total, and an attacker needs to complete six cracking operations at the same time to break through the secret key negotiation system. Even if the principle and implementation of the system are leaked by a bad person, as the secret key derivation algorithm, the HASH algorithm, the index calculation method and the method for obtaining the secret key through the index can be configured through strategies, as long as the algorithms and the strategies are modified, an attacker cannot realize the |
---|