CN102045333B - Method for generating safety message process key - Google Patents

Method for generating safety message process key Download PDF

Info

Publication number
CN102045333B
CN102045333B CN 201010213918 CN201010213918A CN102045333B CN 102045333 B CN102045333 B CN 102045333B CN 201010213918 CN201010213918 CN 201010213918 CN 201010213918 A CN201010213918 A CN 201010213918A CN 102045333 B CN102045333 B CN 102045333B
Authority
CN
China
Prior art keywords
key
data
random number
host computer
process key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 201010213918
Other languages
Chinese (zh)
Other versions
CN102045333A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Beijing Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN 201010213918 priority Critical patent/CN102045333B/en
Publication of CN102045333A publication Critical patent/CN102045333A/en
Application granted granted Critical
Publication of CN102045333B publication Critical patent/CN102045333B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method for generating a safety message process key, and belongs to the field of information safety. The method comprises the following steps that: an upper computer generates a first random number and transmits the first random number to intelligent key equipment; the intelligent key equipment generates a second random number and generates a first encryption process key and a first authentication process key; the intelligent key equipment returns first response information to the upper computer, wherein the first response information comprises the second random number; the upper computer generates a second encryption process key and a second authentication process key; the upper computer authenticates whether the second encryption process key is the same as the first encryption process key or not, and if so, the upper computer transmits a second message to the intelligent key equipment, wherein the second message comprises first authentication data; and the intelligent key equipment generates second authentication data and judges whether the second authentication data is the same as the first authentication data or not, if so, the intelligent key equipment returns response information about successful generation of the process key to the upper computer, and otherwise, the intelligent key equipment returns response information about failed generation of the process key to the upper computer.

Description

A kind of generation method of safety message process key
Technical field
The invention belongs to information security field, particularly a kind of generation method of safety message process key.
Background technology
Along with the development of information security technology, intelligent cipher key equipment has been applied to the various aspects in work and life, is intercepted, distorts or give away secrets in order to prevent information, can utilize the safe packet function of intelligent cipher key equipment.The safe packet function of intelligent cipher key equipment, be set to the safe packet form when producing if refer to that some in intelligent cipher key equipment operates in, so when intelligent cipher key equipment being carried out these predetermined operations, the replying of the order that host computer sends and intelligent cipher key equipment all must be adopted the safe packet form with MAC (MessageAuthentication Code, Message Authentication Code) or enciphered data territory.The purpose of secure packet forwarding is the reliability that guarantees institute's swap data between host computer and intelligent cipher key equipment, integrality and to the authentication of transmit leg.The integrality of data and to the authentication of transmit leg by realizing with MAC, the reliability of data guarantees by the encryption to data field.
Summary of the invention
In order to improve the fail safe of safe packet, the invention provides a kind of generation method of safety message process key.Described technical method is as follows:
A kind of generation method of safety message process key, described method comprises:
Host computer generates the first random number;
Described host computer issues the first message to intelligent cipher key equipment, and described the first message comprises described the first random number;
Described intelligent cipher key equipment generates the second random number;
Described intelligent cipher key equipment generates the first ciphering process key and the first verification process key according to described the first random number and described the second random number;
Described intelligent cipher key equipment returns to the first response message to described host computer, and described the first response message comprises described the second random number;
Described host computer generates the second ciphering process key and the second verification process key according to described the first random number and described the second random number;
Whether described the second ciphering process key of described host computer checking is identical with described the first ciphering process key, if identical, described host computer issues the second message to described intelligent cipher key equipment; Otherwise described host computer issues the information of process key generation error to described intelligent cipher key equipment;
Wherein, described the second message comprises the first verify data that is generated by described the second verification process cipher key calculation;
After described intelligent cipher key equipment receives described the second message, generate the second verify data according to described the first verification process cipher key calculation;
Whether described the second verify data of described intelligent cipher key equipment checking is identical with described the first verify data, if identical, described intelligent cipher key equipment generates successful response message to described host computer return course key, otherwise described intelligent cipher key equipment is to the response message of described host computer return course key failed regeneration.
Described intelligent cipher key equipment specifically comprises according to the method for described the first random number and described second random number generation the first ciphering process key and the first verification process key:
After being split by predetermined rule, described the first random number and described the second random number be combined into living derived data;
Use respectively the static encryption key and the static authenticate key that preset in described intelligent cipher key equipment to be encrypted computing to described derived data, obtain described the first ciphering process key and described the first verification process key.
Describedly use respectively static encryption key and the static authenticate key that in described intelligent key, equipment presets to be encrypted computing to described derived data, the method that obtains described the first ciphering process key and described the first verification process key specifically comprises:
Use described static encryption key described derived data to be carried out the ecb mode cryptographic calculation of aes algorithm, the encrypt data that obtains after described cryptographic calculation is described the first ciphering process key;
Use described static authenticate key described derived data to be carried out the ecb mode cryptographic calculation of aes algorithm, the encrypt data that obtains after described cryptographic calculation is described the first verification process key.
Also comprise in described the first response message: the first encrypt data;
Described the first encrypt data, described intelligent cipher key equipment uses described the first ciphering process key described the first random number, the second random number and the first padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, with front 8 bytes in the encrypt data that obtains after described cryptographic calculation as described the first encrypt data.
Described the first padding data specifically comprises:
0x80?00?00?00?00?00?00?00?00?00?00?00?00?00?00?00。
Described host computer specifically comprises according to the method for described the first random number and described second random number generation the second ciphering process key and the second verification process key:
Generate derived data according to described the first random number and described the second random number;
Use respectively the static encryption key and the static authenticate key that preset in described intelligent cipher key equipment to be encrypted computing to described derived data, obtain described the second ciphering process key and described the second verification process key.
The described static encryption key and the static authenticate key that preset in described intelligent cipher key equipment of using respectively is encrypted computing to derived data, and the method that obtains described the first ciphering process key and described the first verification process key specifically comprises:
Use described static encryption key described derived data to be carried out the ecb mode cryptographic calculation of aes algorithm, the encrypt data that obtains after described cryptographic calculation is described the second ciphering process key;
Use described static authenticate key described derived data to be carried out the ecb mode cryptographic calculation of aes algorithm, the encrypt data that obtains after described cryptographic calculation is described the second verification process key.
Whether identical method specifically comprises for described the second ciphering process key of described host computer checking and described the first ciphering process key:
Described host computer uses described the second ciphering process key described the first random number, described the second random number and described the first padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, with front 8 bytes in the encrypt data that obtains after described cryptographic calculation as described the second encrypt data;
Whether described the second encrypt data of described host computer comparison is identical with described the first encrypt data, if identical, described the second ciphering process key is identical with described the first ciphering process key.
Also comprise in described the second message: the 3rd encrypt data;
Described the 3rd encrypt data, described host computer uses described the second ciphering process key described the second random number, the first random number and the second padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation as the 3rd encrypt data;
Described the second padding data specifically comprises:
0x80?00?00?00?00?00?00?00?00?00?00?00?00?00?00?00。
The described method that generates the first verify data according to described the second verification process cipher key calculation specifically comprises:
Described host computer uses described the second verification process key the heading of the second message, described the 3rd encrypt data, the 3rd padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, is the first verify data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation.
After described intelligent cipher key equipment receives described the second message, generate the second verify data method according to described the first verification process cipher key calculation and specifically comprise:
Described intelligent cipher key equipment uses described the first ciphering process key described the second random number, the first random number and described the second padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, is the 4th encrypt data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation;
Described intelligent cipher key equipment uses described the first verification process key the heading of the second message, described the 4th encrypt data, described the 3rd padding data to be carried out the CBC pattern cryptographic calculation of aes algorithm, is the second verify data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation;
Described the 3rd padding data specifically comprises:
0x80?00?00。
Beneficial effect: by the generation method of safety message process key provided by the invention, can obtain ciphering process key and verification process key based on the safe packet of AES cryptographic algorithm, thereby improve the safe class of safe packet.
Description of drawings
The generation method flow diagram of a kind of safety message process key of providing in the embodiment of the present invention 1 is provided Fig. 1;
Fig. 2 generates the method schematic diagram of derived data in the embodiment of the present invention 1.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
Embodiment 1
Referring to Fig. 1, the embodiment of the present invention provides a kind of generation method of safety message process key, and the method comprises:
Step 101. intelligent cipher key equipment and host computer connect;
Generate one group of random number in step 102. host computer;
In embodiments of the present invention, the length of the random number that host computer generates is 8 bytes, is referred to as the host computer random number.
Step 103. host computer issues the initialization update command to intelligent cipher key equipment;
Host computer issues the initialization update command to intelligent cipher key equipment after generating random number, also comprises the host computer random number in this order.
The form of the order that host computer issues is as follows: command header, data-field length, data field, and optional acknowledgement command data-field length.
Particularly, command header length is fixed, and includes concrete operations type that this order will carry out and the information such as parameter of order in command header, and the length of command header is 4 bytes in embodiments of the present invention; Data-field length, for the byte number of the data field that represents order, the part of this expression data-field length is a byte in embodiments of the present invention, its span is 0x00 to 0xFF; The object that data field, data field will operate for this order or carry out necessary other data of this order; Also comprise an optional part after data field, be used for the byte number that this order of expression is wished the data field of acknowledgement command, if do not comprise this part in order, do not need data field in acknowledgement command, if this part exists in the invention process, use a byte representation, its span is 0x00 to 0xFF, on duty when being 0x00, expression does not specifically limit data-field length in acknowledgement command, and in acknowledgement command, data-field length is 256 bytes to the maximum at this moment.
In embodiments of the present invention, the host computer random number of 8 bytes is included in the data field that upgrades initialization command.
Step 104. intelligent cipher key equipment is carried out the initialization update command, and returns to the execution result of this order to host computer;
After intelligent cipher key equipment receives above-mentioned initialization update command, generate the random number different from the host computer random number that one group of length is 8 bytes, be referred to as the token random number;
After intelligent cipher key equipment generates the token random number, intelligent cipher key equipment generates ciphering process key and verification process key according to pre-stored static encryption key and static authenticate key in the host computer random number of importing in mentioned order and the token random number that self generates and intelligent cipher key equipment;
Wherein, the ciphering process key is encrypted for the message data field that communication process between host computer and intelligent cipher key equipment is sent; The message that the verification process key is used for communication process between host computer and intelligent cipher key equipment is sent generates verify data or MAC (Message AuthenticationCode, Message Authentication Code).
After intelligent cipher key equipment executes the initialization update command, return to an acknowledgement command to host computer, comprising the execution result of initialization update command, comprise data field and two parts of conditional code at this acknowledgement command;
Wherein, the data field in acknowledgement command comprises: key derivation data, key information, token random number, token ciphertext;
The key derivation data are to write when producing intelligent cipher key equipment, immobilize, and the key derivation data length is 10 bytes in embodiments of the present invention;
Key information comprises key version and escape way agreement, and the key version is fixing 0xFF in embodiments of the present invention, and the escape way agreement is fixing 0x01;
The token ciphertext is that intelligent cipher key equipment carries out the AES cryptographic calculation of CBC pattern (cipher block chaining pattern) to following data: host computer random number+token random number+16 byte padding datas, and padding data is specially:
0x80?00?00?00?00?00?00?00?00?00?00?00?00?00?00?00
Particularly, the ciphering process key that the key that uses in this computing generates as intelligent cipher key equipment, initial vector is the 0x00 of 16 bytes, after completing, AES (Advanced Encryption Standard, Advanced Encryption Standard) cryptographic calculation gets front 8 bytes of operation result as the token ciphertext;
Last 2 bytes of acknowledgement command are conditional code, for example represent the command execution success when conditional code is 0x9000.
In embodiments of the present invention, the acknowledgement command form is specially:
Key derivation data (10 byte)+key information (2 byte)+token random number (8 byte)+token ciphertext (8 byte)+conditional code (2 byte);
In embodiments of the present invention, the intelligent cipher key equipment method that generates ciphering process key and verification process key is specially:
1) intelligent cipher key equipment generates one group of derived data that length is 16 bytes according to host computer random number and token random number;
The method that generates derived data in intelligent cipher key equipment is: intelligent cipher key equipment is according to the rule of making an appointment, and host computer random number and token random number changed obtaining derived data.The method that changes comprises according to certain rule host computer random number and token random number is split, mathematical operation, rearranges combination etc.
Referring to Fig. 2, in embodiments of the present invention, the method that generates derived data in intelligent cipher key equipment is specially:
Host computer random number and token random number are partitioned into respectively two identical parts of length: 4 bytes, totally 4 part 16 bytes after 4 bytes and front 4 bytes of token random number, token random number after front 4 bytes of host computer random number, host computer random number; Then intelligent cipher key equipment with above-mentioned 4 parts by the token random number after after 4 bytes, front 4 bytes of host computer random number, front 4 bytes of token random number, host computer random number the order of 4 bytes splice, 16 byte datas that obtain after splicing are derived data.
2) intelligent cipher key equipment uses the static encryption key derived data to be carried out ecb mode (code book pattern) cryptographic calculation of aes algorithm, with the encrypt data that obtains after this cryptographic calculation as the ciphering process key;
In embodiments of the present invention, the static encryption key is that host computer and intelligent cipher key equipment are made an appointment, and also preserves this static encryption key in host computer, and the length of static encryption key is 16 bytes.
3) intelligent cipher key equipment uses static authenticate key derived data to be carried out the ecb mode cryptographic calculation of aes algorithm, obtains the verification process key;
In embodiments of the present invention, static authenticate key is that host computer and intelligent cipher key equipment are made an appointment, and also preserves this static state authenticate key in host computer, and the length of static authenticate key is 16 bytes.
Step 105. host computer generates ciphering process key and verification process key;
Also include in host computer with intelligent cipher key equipment in identical static encryption key, static authenticate key;
Host computer is according to the host computer random number that self generates and the token random number that receives, use identical static encryption key, static authenticate key in intelligent cipher key equipment, and with intelligent cipher key equipment in identical computational methods generate ciphering process key and verification process key.
Whether the ciphering process key that step 106, host computer checking generate is correct, if correct, execution in step 107; Otherwise host computer issues the order of ending the generative process key to intelligent cipher key equipment, and intelligent cipher key equipment empties result of calculation before, finishes;
Whether correct method is specially the ciphering process key that the host computer checking generates:
The ciphering process key that the host computer utilization generates, carry out the computing identical with generation token ciphertext in intelligent cipher key equipment, if the result of computing is identical with the token ciphertext, the ciphering process key that generates in the ciphering process key that generates of host computer and intelligent cipher key equipment is identical, the ciphering process key that is the host computer generation is correct, execution in step 107; Otherwise host computer issues the order of ending the generative process key to intelligent cipher key equipment, and intelligent cipher key equipment empties result of calculation before, finishes.
Step 107. host computer issues the external authentication order to intelligent cipher key equipment;
In the external authentication order that host computer issues, data field comprises the host computer ciphertext of 8 byte lengths, the order MAC of 8 bytes;
The host computer ciphertext is: host computer carries out the AES cryptographic calculation of CBC pattern to following data, token random number+host computer random number+16 byte padding datas (padding data is specially 0,x80 00 00 00 00 00 0,000 00 00 00 00 00 00 00 00), particularly, the key that uses in this computing is the ciphering process key, initial vector is the 0x00 of 16 bytes, then gets front 8 bytes of operation result as the host computer ciphertext.
In this external authentication order, order MAC (Message Authentication Code, Message Authentication Code) be: 5 byte command heads, 8 byte host computer ciphertexts, the 3 byte padding datas (padding data be specially 0,x80 00 00) of host computer before to the host computer ciphertext carry out the AES cryptographic calculation of CBC pattern, the key that uses in this computing is the verification process key, initial vector is the 0x00 of 16 bytes, then gets front 8 bytes of operation result as order MAC.
The correct backward host computer return course key of data in step 108. intelligent cipher key equipment checking external authentication order generates successful information.
intelligent cipher key equipment uses the ciphering process key to carry out the AES cryptographic calculation of CBC pattern to token random number+host computer random number+16 byte padding datas (padding data is specially 0,x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00), initial vector is the 0x00 of 16 bytes, then get front 8 bytes of operation result as verification msg, then use the verification process key to 5 byte command heads in this external authentication order, verification msg, 3 byte padding datas (padding data is specially 0x800000) carry out the AES cryptographic calculation of CBC pattern, initial vector is the 0x00 of 16 bytes, then get front 8 bytes of operation result as checking MAC data, if the checking MAC data that intelligent cipher key equipment calculates are identical with order MAC in order that host computer issues, intelligent cipher key equipment can confirm that ciphering process key and verification process key generate successfully, then generate successful information 0x9000 to the host computer " return " key",
If intelligent cipher key equipment checking external authentication order mistake, intelligent cipher key equipment returns to the information of generative process wrong cipher key to host computer, and before result of calculation is emptied, and finishes.
When in host computer and intelligent cipher key equipment all successful generation after ciphering process key and verification process key, host computer and intelligent cipher key equipment just can use safe packet to carry out data communication: use aes algorithm utilize ciphering process secret key encryption order data field, use aes algorithm to utilize the order MAC of verification process cipher key calculation order.
The generation method of the safety message process key that provides by the embodiment of the present invention can obtain ciphering process key and verification process key based on the safe packet of AES cryptographic algorithm, thereby improve the safe class of safe packet.
The above is only preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, is equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (11)

1. the generation method of a safety message process key, is characterized in that, described method comprises:
Host computer generates the first random number;
Described host computer issues the first message to intelligent cipher key equipment, and described the first message comprises described the first random number;
Described intelligent cipher key equipment generates the second random number;
Described intelligent cipher key equipment generates the first ciphering process key and the first verification process key according to described the first random number and described the second random number;
Described intelligent cipher key equipment returns to the first response message to described host computer, and described the first response message comprises described the second random number;
Also comprise in described the first response message: the first encrypt data;
Described the first encrypt data, described intelligent cipher key equipment uses described the first ciphering process key described the first random number, the second random number and the first padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, with front 8 bytes in the encrypt data that obtains after described cryptographic calculation as described the first encrypt data;
Described host computer generates the second ciphering process key and the second verification process key according to described the first random number and described the second random number;
Whether described the second ciphering process key of described host computer checking is identical with described the first ciphering process key, if identical, described host computer issues the second message to described intelligent cipher key equipment; Otherwise described host computer issues the information of process key generation error to described intelligent cipher key equipment;
Whether identical method specifically comprises for described the second ciphering process key of described host computer checking and described the first ciphering process key:
Described host computer uses described the second ciphering process key described the first random number, described the second random number and described the first padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, with front 8 bytes in the encrypt data that obtains after described cryptographic calculation as described the second encrypt data;
Whether described the second encrypt data of described host computer comparison is identical with described the first encrypt data, if identical, described the second ciphering process key is identical with described the first ciphering process key, otherwise described the second ciphering process key is not identical with described the first ciphering process key;
Wherein, described the second message comprises the first verify data that is generated by described the second verification process cipher key calculation;
After described intelligent cipher key equipment receives described the second message, generate the second verify data according to described the first verification process cipher key calculation;
Whether described the second verify data of described intelligent cipher key equipment checking is identical with described the first verify data, if identical, described intelligent cipher key equipment generates successful response message to described host computer return course key, otherwise described intelligent cipher key equipment is to the response message of described host computer return course key failed regeneration.
2. the method for claim 1, is characterized in that, described intelligent cipher key equipment specifically comprises according to the method for described the first random number and described second random number generation the first ciphering process key and the first verification process key:
Described the first random number and described the second random number are split rear combination producing derived data by predetermined rule;
Use respectively the static encryption key and the static authenticate key that preset in described intelligent cipher key equipment to be encrypted computing to described derived data, obtain described the first ciphering process key and described the first verification process key.
3. method as claimed in claim 2, it is characterized in that, describedly use respectively static encryption key and the static authenticate key that in described intelligent key, equipment presets to be encrypted computing to described derived data, the method that obtains described the first ciphering process key and described the first verification process key specifically comprises:
Use described static encryption key described derived data to be carried out the code book pattern cryptographic calculation of Advanced Encryption Standard, the encrypt data that obtains after described cryptographic calculation is described the first ciphering process key;
Use described static authenticate key described derived data to be carried out the code book pattern cryptographic calculation of Advanced Encryption Standard, the encrypt data that obtains after described cryptographic calculation is described the first verification process key.
4. the method for claim 1, is characterized in that, described the first padding data specifically comprises: 0,x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00.
5. the method for claim 1, is characterized in that, described host computer specifically comprises according to the method for described the first random number and described second random number generation the second ciphering process key and the second verification process key:
Generate derived data according to described the first random number and described the second random number;
Use respectively the static encryption key and the static authenticate key that preset in described intelligent cipher key equipment to be encrypted computing to described derived data, obtain described the second ciphering process key and described the second verification process key.
6. method as claimed in claim 5, it is characterized in that, the described static encryption key and the static authenticate key that preset in described intelligent cipher key equipment of using respectively is encrypted computing to derived data, and the method that obtains described the first ciphering process key and described the first verification process key specifically comprises:
Use described static encryption key described derived data to be carried out the code book pattern cryptographic calculation of Advanced Encryption Standard, the encrypt data that obtains after described cryptographic calculation is described the second ciphering process key;
Use described static authenticate key described derived data to be carried out the code book pattern cryptographic calculation of Advanced Encryption Standard, the encrypt data that obtains after described cryptographic calculation is described the second verification process key.
7. the method for claim 1, is characterized in that, also comprises in described the second message: the 3rd encrypt data;
Described the 3rd encrypt data, described host computer uses described the second ciphering process key described the second random number, the first random number and the second padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation as the 3rd encrypt data.
8. method as claimed in claim 7, is characterized in that, described the second padding data specifically comprises: 0,x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00.
9. method as claimed in claim 7, is characterized in that, the described method that generates the first verify data according to described the second verification process cipher key calculation specifically comprises:
Described host computer uses described the second verification process key the heading of the second message, described the 3rd encrypt data, the 3rd padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, is the first verify data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation.
10. method as claimed in claim 8, is characterized in that, after described intelligent cipher key equipment receives described the second message, generates the second verify data method according to described the first verification process cipher key calculation and specifically comprise:
Described intelligent cipher key equipment uses described the first ciphering process key described the second random number, the first random number and described the second padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, is the 4th encrypt data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation;
Described intelligent cipher key equipment uses described the first verification process key the heading of the second message, described the 4th encrypt data, the 3rd padding data to be carried out the cipher block chaining pattern cryptographic calculation of Advanced Encryption Standard, is the second verify data with front 8 byte datas in the encrypt data that obtains after described cryptographic calculation.
11. method as claimed in claim 9 is characterized in that, described the 3rd padding data specifically comprises: 0,x80 00 00.
CN 201010213918 2010-06-29 2010-06-29 Method for generating safety message process key Active CN102045333B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010213918 CN102045333B (en) 2010-06-29 2010-06-29 Method for generating safety message process key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010213918 CN102045333B (en) 2010-06-29 2010-06-29 Method for generating safety message process key

Publications (2)

Publication Number Publication Date
CN102045333A CN102045333A (en) 2011-05-04
CN102045333B true CN102045333B (en) 2013-06-19

Family

ID=43911109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010213918 Active CN102045333B (en) 2010-06-29 2010-06-29 Method for generating safety message process key

Country Status (1)

Country Link
CN (1) CN102045333B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430605B (en) * 2015-12-10 2018-09-25 飞天诚信科技股份有限公司 A kind of method that bluetooth master-slave equipment and the two establish escape way
CN105635114B (en) * 2015-12-18 2019-02-26 恒宝股份有限公司 A kind of password method of calibration and system
CN106778308A (en) * 2016-12-19 2017-05-31 国网天津市电力公司信息通信公司 The wiring method and device of a kind of chip keys
CN108306726B (en) * 2017-01-13 2021-09-17 杭州海康威视数字技术股份有限公司 Secret key obtaining method and system
CN108734253B (en) * 2017-04-14 2024-01-30 广州众诺微电子有限公司 Consumable chip verification method, consumable chip and consumable container
CN109335906B (en) * 2018-08-01 2020-09-11 苏州汇川技术有限公司 Verification method, elevator control device and elevator peripheral device
CN108964912B (en) * 2018-10-18 2022-02-18 深信服科技股份有限公司 PSK generation method, PSK generation device, user equipment, server and storage medium
CN113950802B (en) * 2019-08-22 2023-09-01 华为云计算技术有限公司 Gateway device and method for performing site-to-site communication
CN110730183A (en) * 2019-10-22 2020-01-24 浙江中控技术股份有限公司 Encryption communication method and device of security control system
CN111260829B (en) * 2020-01-17 2021-12-28 多点(深圳)数字科技有限公司 Shopping cart intelligent lock data transmission encryption method
EP3902012A4 (en) * 2020-02-29 2022-02-23 Huawei Technologies Co., Ltd. Fault diagnostic method and apparatus, and vehicle
CN111460477B (en) * 2020-03-30 2023-08-11 北京经纬恒润科技股份有限公司 ECU security authentication method and device
CN113094731B (en) * 2021-04-15 2023-04-07 西南大学 Block chain privacy protection method based on different distribution recombination scheme

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999033221A1 (en) * 1997-12-19 1999-07-01 Koninklijke Philips Electronics N.V. Secure proxy signing device and method for use
CN101039180A (en) * 2007-05-09 2007-09-19 中兴通讯股份有限公司 Method and system for generating and transmitting key
CN101483654A (en) * 2009-02-09 2009-07-15 北京华大智宝电子系统有限公司 Method and system for implementing authentication and data safe transmission
CN101631017A (en) * 2008-07-14 2010-01-20 索尼株式会社 Information processing device, computer program, and information processing system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533474B2 (en) * 2008-02-27 2013-09-10 Red Hat, Inc. Generating session keys

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999033221A1 (en) * 1997-12-19 1999-07-01 Koninklijke Philips Electronics N.V. Secure proxy signing device and method for use
CN101039180A (en) * 2007-05-09 2007-09-19 中兴通讯股份有限公司 Method and system for generating and transmitting key
CN101631017A (en) * 2008-07-14 2010-01-20 索尼株式会社 Information processing device, computer program, and information processing system
CN101483654A (en) * 2009-02-09 2009-07-15 北京华大智宝电子系统有限公司 Method and system for implementing authentication and data safe transmission

Also Published As

Publication number Publication date
CN102045333A (en) 2011-05-04

Similar Documents

Publication Publication Date Title
CN102045333B (en) Method for generating safety message process key
US10439811B2 (en) Method for securing a private key on a mobile device
CN108377190B (en) Authentication equipment and working method thereof
US9253162B2 (en) Intelligent card secure communication method
CN104412273B (en) Method and system for activation
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
CN110621014B (en) Vehicle-mounted equipment, program upgrading method thereof and server
JP6417036B2 (en) Entity authentication method and apparatus based on pre-shared key
TWI636373B (en) Method and device for authorizing between devices
CN105790938A (en) System and method for generating safety unit key based on reliable execution environment
CN111541716A (en) Data transmission method and related device
US20210152361A1 (en) Authentication method and authentication device
CN104767766A (en) Web Service interface verification method, Web Service server and client side
CN111031535A (en) Secure communication method and system for smart card system
CN109309648B (en) Information transmission method and equipment
ES2926968T3 (en) A first entity, a second entity, an intermediate node, methods for establishing a secure session between a first and a second entity, and software products
CN105678542B (en) payment service interaction method, payment terminal and payment cloud terminal
CN100561913C (en) A kind of method of access code equipment
CN114297597B (en) Account management method, system, equipment and computer readable storage medium
CN112182551B (en) PLC equipment identity authentication system and PLC equipment identity authentication method
WO2018076299A1 (en) Data transmission method and device
CN114285557A (en) Communication encryption method, system and device
CN114124403A (en) Method, device and system for realizing remote control of equipment
CN108809925B (en) POS equipment data encryption transmission method, terminal equipment and storage medium
CN110768792A (en) Master key generation method and device and encryption and decryption method of sensitive security parameters

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant