CN100531027C - Key transplanting method based on safety environment - Google Patents

Key transplanting method based on safety environment Download PDF

Info

Publication number
CN100531027C
CN100531027C CNB2005100362200A CN200510036220A CN100531027C CN 100531027 C CN100531027 C CN 100531027C CN B2005100362200 A CNB2005100362200 A CN B2005100362200A CN 200510036220 A CN200510036220 A CN 200510036220A CN 100531027 C CN100531027 C CN 100531027C
Authority
CN
China
Prior art keywords
key
private key
oaep
result
transplanting method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2005100362200A
Other languages
Chinese (zh)
Other versions
CN1741443A (en
Inventor
陈强
张璐
朱广志
张玮
刘鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sinosun Technology Co., Ltd.
Original Assignee
ZHAORI TECH Co Ltd SHENZHEN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHAORI TECH Co Ltd SHENZHEN filed Critical ZHAORI TECH Co Ltd SHENZHEN
Priority to CNB2005100362200A priority Critical patent/CN100531027C/en
Publication of CN1741443A publication Critical patent/CN1741443A/en
Application granted granted Critical
Publication of CN100531027C publication Critical patent/CN100531027C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A method of cipher key desired to implant to be above two portions and utilizing different mode to encipher them . combining and restoring them to be private key of cipher key after private key portion is deciphered by utilizing applied different enciphering mode at implantation receiving end .

Description

A kind of key transplanting method based on security context
Technical field
The invention belongs to computer safety field, relate to a kind of safe and reliable key transplanting method particularly based on security context.
Background technology
In the prior art, described security context is that all cipher key operation in this environment comprise that encryption and decryption are safe, specifically it is safe having two aspects at least: when carrying out secret key encryption and decryption oprerations, can guarantee that the private key part of key can not leaked; Can guarantee that the private data that is comprised in the object of encryption and decryption operation can not leaked.
In computer safety field the inside, for the transmission and the storage of the safety that guarantees key, adopted the safety of many methods protection keys, for example the private key of key is partly encrypted, be exactly wherein a kind of most important method.But, sometimes need in the computer application key shift is used down to the strange land security context.
In general, the PKI of a key partly is disclosed, and private key partly is need to be keep secret, and so, the private key with key partly shifts and need be perfectly safe usually.
Usually can adopt a kind of method in the prior art: use strange land security context user's PKI will need the private key of the key that shifts partly to encrypt; private key after encrypted sends to the strange land with this then, uses private key to decipher this encrypted private key by the user of strange land security context.Though this method is fairly simple, lower aspect security reliability, require than higher application for security reliability, this method also is not suitable for; Especially when the user's of strange land security context private key had leaked accidentally, the private key that needs so to shift just might be seized by force by the go-between, was untied, and the private key that so needs to shift has just been leaked, and its consequence is hardly imaginable.Therefore, need the higher method of a kind of security reliability of design.
Summary of the invention
The purpose of this invention is to provide a kind of key transplanting method,, propose a kind of more reliable and secure key transplanting method at the defective of tradition based on the key transplanting method of security context based on security context.
In order to reach above purpose, the technical solution adopted in the present invention is:
A kind of key transplanting method based on security context, it may further comprise the steps:
A), will need the private key of the key transplanted partly to be divided into plural part, adopt different cipher modes to encrypt;
B), with each several part private key part respectively through sending to the described graft end of accepting behind at least OAEP coding;
C), partly be decrypted the back and merge the private key part be reduced to key accepting the private key of graft end at this difference cipher mode;
Described key transplanting method, wherein, described step b) also comprises:
B1), result and the random number of each private key part behind the OAEP coding carried out xor operation, send to afterwards and accept graft end.
Described key transplanting method, wherein, the concrete steps of described method also comprise:
A11), will need the private key part separated into two parts of the key that shifts to be designated as K1 and K2, K1 is the length of private key and preceding 16 bytes of private key, K2 is made as the remainder of private key;
B11), create a key translation data bag, be designated as M1, it comprises length, K2 private key part and other relevant key information of K2;
C11), result that described key translation data bag is carried out behind the OAEP coding is made as O1, the input parameter of described OAEP coding is:
Be M1 expressly,
PHash is the cryptographic Hash of the possessory password of this key,
Seed is K1;
D11), create a random number, be made as R1, and carry out XOR with O1 and obtain X1 as a result;
E11), use strange land security context user's public key encryption X1, portable E1 as a result to the end;
F11), E1 and described random number R 1 are passed to described strange land user as a result with described portable.
Described key transplanting method, wherein, described strange land user also takes following steps:
A12) described strange land user uses the private key of oneself to decipher described portable E1 as a result, and then with described random number R 1 XOR, reduction obtains O1;
B12) decoding obtains plaintext M 1, seed (K1), pHash through OAEP to O1;
C12) K2 among preceding 16 bytes of the private key of K1 and the described M1 being combined is exactly the private key part that needs the key that shifts.
Described key transplanting method, wherein, the length of described key is 1024,2048, or higher figure place.
Described key transplanting method, wherein, described data also add the checking procedure to the transmission data in transmission.
A kind of key transplanting method based on security context provided by the present invention because its key that will need to shift is divided into two parts, and is hidden in a different manner, increased and has cracked difficulty, very difficultly can access a complete private key; Secondly, the each several part private key is encoded through an OAEP, expect that the private key part of key must crack the OAEP coding, has increased and has cracked difficulty; The third aspect, the result and a random number of described OAEP coding are carried out XOR, have increased once more and have cracked difficulty, make the transplanting of key become reliable more and safety by adopting above-mentioned a series of processing.
Description of drawings
Fig. 1 is the inventive method encryption flow under the local security environment;
Fig. 2 is the deciphering flow process of the inventive method after encryption key is transferred to the strange land security context.
Embodiment
Below, will describe each preferred embodiment of the present invention in detail.
A kind of key transplanting method based on security context of the present invention is mainly used in computer safety field, comprises following step in the present embodiment when the needs key transplanting:
(1) at first, the private key of the key that needs are shifted partly is divided into two: be designated as K1 and K2, K1 comprises the length (four bytes) of private key and preceding 16 bytes of private key, and K2 is the remainder (except preceding 16 bytes) of private key;
(2) create a key translation data bag M1 then, comprised the length of K2 among the M1, the key information that K2 key part is relevant with other; Here the form of M1 packet can be customized voluntarily by the user, and other relevant key informations are also customized according to the actual requirements voluntarily by the user;
(3) create one by the O1 as a result that described key translation data bag M1 is carried out after OAEP encodes, O1 is the value of one 198 byte length; The input parameter of OAEP coding can be with reference to as follows:
Expressly=M1,
The cryptographic Hash of the possessory password of this key of pHash=,
Seed=K1; According to the OAEP encryption algorithm, with reference to " PCKS#1v2.0:RSACryptography Standard " 9.1.1 joint, when using the OAEP coding, need do following adjustment to some steps: " Let pHash=Hash (P); an octet string of lengthhLen. ", wherein pHash sets the cryptographic Hash that shifts key owner password in the mode of input parameter; In " Generate a random octet string seed of length hLen. ", Seed sets K1 in the mode of input parameter; The form of original like this OAEP input parameter (M, P emLen) be transformed into (M, pHash, Seed, emLen).Wherein emLen is the length of coding back desired output, omits this input parameter in patent, and this parameter should be appointed as 198.
(4) create a random number R 1, this random number R 1 can be the length random number that is 198 bytes;
(5) create XOR X1 as a result, X1=R1 XOR O1;
(6) this XOR of public key encryption that uses strange land security context user X1 as a result obtains portable E1 as a result;
(7) E1 and described random number R 1 are passed to described strange land user as a result with described portable;
(8) described strange land user use oneself corresponding private key can to described portable as a result E1 be decrypted, obtain decrypted result D1, because RSA cryptographic algorithms, the corresponding PKI and the private key of encryption and decryption are different, are a kind of asymmetrical encryption algorithm therefore;
(9) with decrypted result D1 and described random number R 1 XOR, the reducible O1 as a result that obtains after OAEP encodes;
(10) decoding obtains M1, seed (K1), pHash to the O1 as a result behind this OAEP coding through OAEP again;
(11) K2 among preceding 16 bytes of the private key of K1 and the M1 partly being combined is exactly the private key part that needs the key that shifts.
Further, in the inventive method in order to make the present invention have better effect, preferably 1024 of the length of the key of RSA Algorithm, 2048, or higher figure place.Do not lose in transmission for the assurance data, add that preferably the method for data check has a variety of in the prior art, does not repeat them here to the verification of transmission data.
Effect of the present invention just is, the first, and the key that needs are shifted is divided into two Partial K 1 and K2, and K1, and K2 is hidden by different way, has increased to crack difficulty, very difficultly can access a complete private key; The second, M1 and K1 encode through an OAEP, expect that the private key part of key must crack the OAEP coding, have increased and have cracked difficulty; The 3rd, the result and random number R 1 XOR of OAEP coding have increased once more and have cracked difficulty.Make key transplanting become reliable more and safety by this a series of processing.
But should be understood that above-mentioned description at specific embodiment of the present invention is comparatively concrete, can not therefore think the restriction of scope of patent protection of the present invention, scope of patent protection of the present invention should be as the criterion with claims.

Claims (5)

1, a kind of key transplanting method based on security context, it may further comprise the steps:
A), will need the private key of the key transplanted partly to be divided into plural part, adopt different cipher modes to encrypt;
B), with each several part private key part respectively through sending to the described graft end of accepting behind at least OAEP coding;
C), partly be decrypted the back and merge the private key part be reduced to key accepting the private key of graft end at this difference cipher mode;
It is characterized in that: described b) step also comprises step b1) result and the random number of each private key part behind the OAEP coding carried out xor operation, send to afterwards and accept graft end.
2, key transplanting method according to claim 1 is characterized in that, the concrete steps of described method also comprise:
A11), will need the private key part separated into two parts of the key that shifts to be designated as K1 and K2, K1 is the length of private key and preceding 16 bytes of private key, K2 is made as the remainder of private key;
B11), create a key translation data bag, be designated as M1, it comprises length, the K2 private key part of K2;
C11), result that described key translation data bag is carried out behind the OAEP coding is made as O1, the input parameter of described OAEP coding is:
Be M1 expressly,
PHash is the cryptographic Hash of the possessory password of this key,
Seed is K1;
D11), create a random number, be made as R1, and carry out XOR with O1 and obtain X1 as a result;
E11), use strange land security context user's public key encryption X1, portable E1 as a result to the end;
F11), E1 and described random number R 1 are passed to described strange land user as a result with described portable.
3, key transplanting method according to claim 2 is characterized in that, described strange land user also takes following steps:
A12) described strange land user uses the private key of oneself to decipher described portable E1 as a result, and then with described random number R 1 XOR, reduction obtains O1;
B12) decoding obtains plaintext M 1, seed (K1), pHash through OAEP to O1;
C12) K2 among preceding 16 bytes of the private key of K1 and the described M1 being combined is exactly the private key part that needs the key that shifts.
4, according to any described key transplanting method of claim of claim 1~3, it is characterized in that the length of described key is 1024,2048, or higher figure place.
5, key transplanting method according to claim 4 is characterized in that, described data also add the checking procedure to the transmission data in transmission.
CNB2005100362200A 2005-07-28 2005-07-28 Key transplanting method based on safety environment Active CN100531027C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100362200A CN100531027C (en) 2005-07-28 2005-07-28 Key transplanting method based on safety environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100362200A CN100531027C (en) 2005-07-28 2005-07-28 Key transplanting method based on safety environment

Publications (2)

Publication Number Publication Date
CN1741443A CN1741443A (en) 2006-03-01
CN100531027C true CN100531027C (en) 2009-08-19

Family

ID=36093670

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100362200A Active CN100531027C (en) 2005-07-28 2005-07-28 Key transplanting method based on safety environment

Country Status (1)

Country Link
CN (1) CN100531027C (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009130882A (en) * 2007-11-28 2009-06-11 Oki Electric Ind Co Ltd Check value confirming method and apparatus
CN104052592B (en) * 2011-07-21 2017-08-25 华为技术有限公司 A kind of cipher key backup and moving method and system based on trust computing
CN105960775B (en) * 2014-03-03 2020-01-07 英特尔公司 Method and apparatus for migrating keys
CN104135371B (en) * 2014-08-18 2017-07-14 新华三技术有限公司 A kind of password store method and device
CN107451490B (en) * 2017-07-21 2020-02-28 广州大学 TrustZone-based security authentication method, device, system and storage medium
CN108537537A (en) * 2018-04-16 2018-09-14 杭州网看科技有限公司 A kind of safe and reliable digital cash Wallet System
CN109067517B (en) * 2018-06-22 2021-07-09 成都卫士通信息产业股份有限公司 Encryption and decryption device, encryption and decryption method and communication method of hidden key
CN109981576B (en) * 2019-02-22 2021-09-17 矩阵元技术(深圳)有限公司 Key migration method and device

Also Published As

Publication number Publication date
CN1741443A (en) 2006-03-01

Similar Documents

Publication Publication Date Title
CN100531027C (en) Key transplanting method based on safety environment
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
KR101091246B1 (en) A simple and efficient one-pass authenticated encryption scheme
CA2400220A1 (en) Consumable authentication protocol and system
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
US20120063592A1 (en) Apparatus for encrypting data
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
US20120140920A1 (en) Rna-based cryptographic system and method
US9059838B2 (en) Encryption algorithm with randomized buffer
CN104410493A (en) Secure data storage method and secure data read method based on distributed system infrastructure
CN115967485A (en) Encryption and decryption system based on quantum key
US20090010433A1 (en) Schryption method and device
AU5361099A (en) Efficient block cipher method
CN101964039B (en) Encryption protection method and system of copyright object
CN112907247B (en) Block chain authorization calculation control method
KR100551992B1 (en) encryption/decryption method of application data
CN115712919A (en) Regional medical data encryption and application method
Kaushik et al. Block encryption standard for transfer of data
JP2005114870A (en) Cryptocommunication system
WO2022096141A1 (en) Method for processing encrypted data
Sharma et al. Steganography techniques using cryptography-a review paper
CN102474413B (en) Private key compression
KR101076747B1 (en) Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
CN110474780A (en) Quantum PGP encryption method, encryption device, decryption method and decryption device after a kind of
CN111314051A (en) Encryption and decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHENZHEN ZHAORI TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: ZHAORI SCIENCE AND TECHNOLOGY CO. LTD., BEIJING

Effective date: 20061110

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20061110

Address after: Nine road 518040 Shenzhen city Futian District Tairan 213 building 6 floor C-3 block

Applicant after: Zhaori Tech Co., Ltd., Shenzhen

Address before: 100088 Beijing City, Haidian District Zhichun Road Jinqiu International Building No. 6 B block 4 layer

Applicant before: Zhaori Science and Technology Co., Ltd., Beijing

EE01 Entry into force of recordation of patent licensing contract

Assignee: Zhaori Science & Technology (Shenzhen) Co., Ltd.

Assignor: Zhaori Tech Co., Ltd., Shenzhen

Contract fulfillment period: 2009.2.28 to 2027.9.11 contract change

Contract record no.: 2009990000224

Denomination of invention: Key transplanting method based on safety environment

License type: Exclusive license

Record date: 2009.3.26

LIC Patent licence contract for exploitation submitted for record

Free format text: EXCLUSIVE LICENSE; TIME LIMIT OF IMPLEMENTING CONTACT: 2009.2.28 TO 2027.9.11; CHANGE OF CONTRACT

Name of requester: ZHAORI SCIENCE + TECHNOLOGY (SHENZHEN) CO., LTD.

Effective date: 20090326

C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SINOSUN TECHNOLOGY (SHENZHEN) CO., LTD.

Free format text: FORMER OWNER: SHENZHEN SINOSUN TECH CO., LTD.

Effective date: 20100622

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518040 TOWER C-3, 6/F, BUILDING 213, TAIRANJIU ROAD, FUTIAN DISTRICT, SHENZHEN CITY TO: 518040 TOWER C, 6/F, BUILDING 213, TAIRAN INDUSTRY DISTRICT, CHEGONGMIAO, FUTIAN DISTRICT, SHENZHEN CITY

TR01 Transfer of patent right

Effective date of registration: 20100622

Address after: 518040 Shenzhen city Futian District Che Kung Temple Tairan industrial district 213 building 6 floor C block

Patentee after: Sinosun Technology (Shenzhen) Co., Ltd.

Address before: Nine road 518040 Shenzhen city Futian District Tairan 213 building 6 floor C-3 block

Patentee before: Zhaori Tech Co., Ltd., Shenzhen

C56 Change in the name or address of the patentee

Owner name: SHENZHEN ZHAORI TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: ZHAORI SCIENCE + TECHNOLOGY (SHENZHEN) CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: 518040 Shenzhen city Futian District Che Kung Temple Tairan industrial district 213 building 6 floor C block

Patentee after: Shenzhen Sinosun Technology Co., Ltd.

Address before: 518040 Shenzhen city Futian District Che Kung Temple Tairan industrial district 213 building 6 floor C block

Patentee before: Sinosun Technology (Shenzhen) Co., Ltd.