Secret key negotiation method suitable for secret key sharing of two communication parties

The invention relates to a secret key negotiation method suitable for secret key sharing of two communication parties, and belongs to the field of information security. According to the method, a public key algorithm is not used in the whole negotiation process, only one-way communication is carried...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ZHU LIANHAI, MA RUI, WANG JIAN, WANG FEI, WANG SHIREN, FENG JIZHE, WANG YAN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention relates to a secret key negotiation method suitable for secret key sharing of two communication parties, and belongs to the field of information security. According to the method, a public key algorithm is not used in the whole negotiation process, only one-way communication is carried out once, and after the random key of one party is sent to the opposite party, the two parties use the same calculation strategy to obtain the session key. In the aspect of security, six layers of security protection are set in total, and an attacker needs to complete six cracking operations at the same time to break through the secret key negotiation system. Even if the principle and implementation of the system are leaked by a bad person, as the secret key derivation algorithm, the HASH algorithm, the index calculation method and the method for obtaining the secret key through the index can be configured through strategies, as long as the algorithms and the strategies are modified, an attacker cannot realize the