CN102946311A - Key dispersed method for enhancing safety of symmetric key system - Google Patents

Key dispersed method for enhancing safety of symmetric key system Download PDF

Info

Publication number
CN102946311A
CN102946311A CN2012104919656A CN201210491965A CN102946311A CN 102946311 A CN102946311 A CN 102946311A CN 2012104919656 A CN2012104919656 A CN 2012104919656A CN 201210491965 A CN201210491965 A CN 201210491965A CN 102946311 A CN102946311 A CN 102946311A
Authority
CN
China
Prior art keywords
key
management system
dispersion
dispersing
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104919656A
Other languages
Chinese (zh)
Other versions
CN102946311B (en
Inventor
李元正
廖成军
帅军军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201210491965.6A priority Critical patent/CN102946311B/en
Publication of CN102946311A publication Critical patent/CN102946311A/en
Application granted granted Critical
Publication of CN102946311B publication Critical patent/CN102946311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a key dispersed method for enhancing safety of a symmetric key system, and relates to the technical field of information safety and passwords. The key dispersed method includes the steps: (1) respectively filling secondary dispersing factors into a primary key management system; and (2) computing the secondary dispersing factors in a dispersed manner through specified keys according to the national standard algorithm by the primary key management system to obtain key data of a secondary key management system. The key dispersed method has the advantage that different dispersing factors can be computed in the dispersed manner through the specified keys by the key dispersed method to obtain a plurality of different key data. By the method, the single derivative transformation mode of directly using random numbers as keys is avoided, diversified key derivative transformation modes are provided, and safety in the key derivative transformation process is enhanced.

Description

A kind of key process for dispersing that strengthens the fail safe of symmetric key system
Technical field
The present invention relates to information security cryptographic technique field, relate in particular to a kind of key process for dispersing that strengthens the fail safe of symmetric key system.
Background technology
Cryptographic technique is the basic technology of information security, and key then is the basis of cryptographic technique Secure Application and the core element of informatization security.Along with the high speed of the information-based industry of China is all-round developing, also enter the comprehensive construction period based on the key management system of symmetric key system, the derivatization process of key is faced with more and more stricter specification requirement in the symmetric key system.
The key that uses in the current traditional symmetric key system mainly is to utilize encryption device to produce some key datas, and with some key datas as the key data that uses in the system.The key data production process is single in the said process, and to the key data conversion process of deriving itself, the key data production process is too not simple, is unfavorable for transmission and the use of key data in the multi-stage key management system, has certain potential safety hazard.
The comparatively complicated common employing of key dispersion technology realizes that voluntarily key disperses derivative algorithm, utilizes a plurality of dispersion factors to finish the key scatter operation in the symmetric key system.Key dispersion technology relative complex and loaded down with trivial details, the dispersion derivative algorithm fail safe that self realizes can not be protected; The dispersion factor One's name is legion that participates in the dispersion process is unfavorable for the operability that key disperses.In addition, by above-mentioned key dispersion technology, may cause identical key and dispersion factor to derive different keys, perhaps different keys derives identical key with dispersion factor, therefore has larger potential safety hazard.
Summary of the invention
The purpose of this invention is to provide a kind of key process for dispersing that strengthens the fail safe of symmetric key system, solve the security risk that exists in the above-mentioned cipher key derivative conversion process, improve the fail safe of cipher key derivative conversion process, meet the related request of the cipher key derivative conversion of current symmetric key system.
For achieving the above object, the present invention takes following technical scheme: a kind of key process for dispersing that strengthens the fail safe of symmetric key system may further comprise the steps: step (1), in the one-level key management system, inject respectively the secondary dispersion factor; Step (2), the one-level key management system utilizes the national standard algorithm, with the key of appointment the secondary dispersion factor is disperseed computing, obtains the key data of secondary key management system.
Preferred steps: after described step (2), add following steps:
Step (a) is injected three grades and is disperseed the factor in the secondary key management system;
Step (b), the secondary key management system is utilized the national standard algorithm, disperses the factors to disperse computing with the key of appointment to three grades, obtains the key data of three grades of key management systems.
Preferred steps: after the step (b), add again level Four and above key management system and inject level Four and above dispersion factor, carry out corresponding steps.
Preferred steps: inject the method for dispersion factors at different levels for adopting code list or IC-card.
Preferred steps: code folk prescription formula is directly inputted dispersion factors at different levels, and the IC-card mode need to be inputted the IC-card PIN code and read dispersion factors at different levels, finishes the injection of dispersion factors at different levels.
Preferred steps: after obtaining the key data of key management systems at different levels, adopt the key data of the key management systems at different levels after the threshold mechanism mode is disperseed key to back up.
Preferred steps: key management systems at different levels are divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation.
In sum, owing to adopted technique scheme, concrete beneficial effect of the present invention is:
1, the key process for dispersing adopts national standard algorithm (SM1 block cipher) to carry out key dispersion computing, and key dispersion calculating process is safe, reliability is strong;
2, the key process for dispersing is introduced dispersion factor, and dispersion factor is participated in the key dispersion process, has avoided single key data directly as the potential safety hazard of key, has higher practicality;
3, the key process for dispersing utilizes different dispersion factors by specifying key, can successively disperse computing to key, obtains the key data after some the dispersions, disperses that production process interlocks layer by layer, process is tight, has higher fail safe;
4, identical key data, different dispersion factors can divide some the different key datas that shed, and satisfies different application systems to the different demands of key data, has widely adaptability;
5, the key process for dispersing is supported the Multilayered encryption management system, satisfies successively protection, the special-purpose principle of special key, has obvious intrinsic advantage;
6, dispersion factor is important participant in the key dispersion process, the user can be according to actual conditions according to regular self-defining dispersion factor, and adopt the form of code list or IC-card to inject dispersion factor, avoid pure manual mode to inject the potential safety hazard that dispersion factor brings, strengthened the fail safe of dispersion factor injection process;
7, adopt the key data after 5 minutes 3 modes of closing of threshold mechanism (M of N) are disperseed key to back up, guaranteed the fail safe of cipher key backup process, promoted the general safety of key process for dispersing.
Generally speaking, adopt the technology of the present invention, can disperse computing to different dispersion factors by specifying key, obtain some different key datas.The method has avoided random number directly as the single mapping mode of deriving of key, the cipher key derivative mapping mode of diversification is provided, strengthen the fail safe of cipher key derivative conversion process, reduced the difficulty of system, exploitation and use, promoted ease for use and the maintainability of system.
Description of drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is key dispersion process schematic diagram.
Embodiment
Disclosed all features in this specification, or the step in disclosed all methods or the process except mutually exclusive feature and/or step, all can make up by any way.
Disclosed arbitrary feature in this specification (comprising any accessory claim, summary and accompanying drawing) is unless special narration all can be replaced by other equivalences or the alternative features with similar purpose.That is, unless special narration, each feature is an example in a series of equivalences or the similar characteristics.
Step (1), in the management of one-level key management system dispersion factor, the user adopts the secondary dispersion factor that the mode of yard list or IC-card is injected respectively, many parts are different;
Step (2), code folk prescription formula is directly inputted the secondary dispersion factor, and the IC-card mode need to be inputted the IC-card PIN code and read the secondary dispersion factor, finishes the secondary dispersion factor and injects;
Step (3), one-level key management system are utilized national standard algorithm (SM1 block cipher), with the key of appointment the secondary dispersion factor are disperseed computing, obtain secondary key management system key data;
Step (4), the secondary key management system key data that adopts threshold mechanism (M of N) to close in 5 minutes 3 after mode is disperseed key backs up.System is divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation;
Step (5), in ultimate key management system dispersion factor management, the user adopts the professional dispersion factor that the mode of yard list or IC-card is injected respectively, many parts are different;
Step (6), ultimate key management system are utilized national standard algorithm (SM1 block cipher), with the key of appointment professional dispersion factor are disperseed computing, obtain the business cipher key data;
Step (7), the business cipher key data that adopt threshold mechanism (M of N) to close in 5 minutes 3 after mode is disperseed key back up.System is divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation.
In addition, can be according to practical situations, the level of expanded keys management system and progression.
The key dispersion process needs the user to input different levels or other dispersion factor of level, and system utilizes the key of appointment that dispersion factor is disperseed computing, obtains not level or other key data of level.
Fig. 1 is key dispersion process schematic diagram.
Each critical process is described in detail as follows:
1. in the management of one-level key management system dispersion factor, the user adopts the secondary dispersion factor that the mode of yard list or IC-card is injected respectively, many parts different;
2. code folk prescription formula is directly inputted the secondary dispersion factor, and the IC-card mode need to be inputted the IC-card PIN code and read the secondary dispersion factor, finishes the secondary dispersion factor and injects;
3. the one-level key management system utilizes national standard algorithm (SM1 block cipher), with the key of appointment the secondary dispersion factor is disperseed computing, obtains secondary key management system key data;
4. the secondary key management system key data that adopts threshold mechanism (M of N) to close in 5 minutes 3 after mode is disperseed key backs up.System is divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation;
5. in secondary key management system dispersion factor management, the user adopts that the mode of yard list or IC-card is injected respectively, three grades of many parts of differences are disperseed the factor;
6. code folk prescription formula is directly inputted three grades of dispersion factors, and the IC-card mode need to be inputted the IC-card PIN code and read three grades and disperse the factors, finishes three grades and disperses the factors to inject;
7. the secondary key management system is utilized national standard algorithm (SM1 block cipher), disperses the factors to disperse computing with the key of appointment to three grades, obtains three grades of key management system key datas;
8. three grades of key management system key datas that adopt threshold mechanism (M of N) to close in 5 minutes 3 after mode is disperseed key back up.System is divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation;
9. in three grades of key management system dispersion factor management, the user adopts the professional dispersion factor that the mode of yard list or IC-card is injected respectively, many parts different;
10. three grades of key management systems utilize national standard algorithm (SM1 block cipher), with the key of appointment professional dispersion factor are disperseed computing, obtain business cipher key data (key data that concrete operation system need to be used);
11. the business cipher key data that adopt threshold mechanism (M of N) to close in 5 minutes 3 after mode is disperseed key back up.System is divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation;
12. can according to practical situations, finish the key scatter operation of multi-stage key management system.
In addition, the SM1 block cipher is a kind of commercial cipher grouping standard symmetry algorithm by the establishment of national Password Management office.This algorithm is the SM1 block cipher that national Password Management department examines, block length and key length all are 128 bits, algorithm security encryption strength and relevant software and hardware realize that performance is suitable with AES, and this algorithm is underground, and only the form with IP kernel is present in the chip.Adopt this algorithm to develop the safety products such as family chip, intellective IC card, intelligent code key, encrypted card, encryption equipment, be widely used in each application of E-Government, ecommerce and national economy.
Dispersion factor is the core element of key management system, and the generation of key all depends on dispersion factor and primary key disperses computing.Dispersion factor is exactly one group of regular data corresponding with numbering (character of 16 0~F, 16 system numbers of composition 8 or 16 bytes), for example: 2E14AD956BC78DF6 or C1925BE14AD4AD9E6D95F14A26D95E4A.Dispersion factor adopts different dispersion factor establishment rules to produce, but the particular content self-defining of dispersion factors at different levels, and carry out typing and management by the special messenger.
Dispersion factor can safety be stored in yard list or the IC-card, solved the safe storage problem of dispersion factor.Adopt code single (cipher envelope) when mode is injected dispersion factor, need the dispersion factor in special messenger's input code list; When adopting the IC-card mode to inject dispersion factor, need input IC-card PIN code, and from IC-card, read dispersion factor, finish the implant operation of dispersion factor.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature or any new combination that discloses in this manual, and the arbitrary new method that discloses or step or any new combination of process.

Claims (7)

1. a key process for dispersing that strengthens the fail safe of symmetric key system is characterized in that, may further comprise the steps:
Step (1) is injected respectively the secondary dispersion factor in the one-level key management system;
Step (2), the one-level key management system utilizes the national standard algorithm, with the key of appointment the secondary dispersion factor is disperseed computing, obtains the key data of secondary key management system.
2. a kind of key process for dispersing that strengthens the fail safe of symmetric key system according to claim 1 is characterized in that: after described step (2), add following steps:
Step (a) is injected three grades and is disperseed the factor in the secondary key management system;
Step (b), the secondary key management system is utilized the national standard algorithm, disperses the factors to disperse computing with the key of appointment to three grades, obtains the key data of three grades of key management systems.
3. a kind of key process for dispersing that strengthens the fail safe of symmetric key system according to claim 2 is characterized in that: after the step (b), add level Four and above key management system again and inject level Four and above dispersion factor, carry out corresponding steps.
4. it is characterized in that according to claim 1 and 2 or 3 described a kind of key process for dispersing that strengthen the fail safe of symmetric key system: inject the method for dispersion factors at different levels for adopting code list or IC-card.
5. a kind of key process for dispersing that strengthens the fail safe of symmetric key system according to claim 4, it is characterized in that: code folk prescription formula is input dispersion factors at different levels directly, the IC-card mode need to be inputted the IC-card PIN code and read dispersion factors at different levels, finishes the injection of dispersion factors at different levels.
6. according to claim 1 and 2 or 3 described a kind of key process for dispersing that strengthen the fail safe of symmetric key system, it is characterized in that: after obtaining the key data of key management systems at different levels, adopt the key data of the key management systems at different levels after the threshold mechanism mode is disperseed key to back up.
7. a kind of key process for dispersing that strengthens the fail safe of symmetric key system according to claim 6, it is characterized in that: key management systems at different levels are divided into 5 parts with key data, and in safe storage to the 5 different IC-card, protected by the IC-card PIN code; Wherein any 3 IC-cards can carry out the key recovery operation.
CN201210491965.6A 2012-11-28 2012-11-28 A kind of key process for dispersing that strengthens the security of symmetric key system Active CN102946311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210491965.6A CN102946311B (en) 2012-11-28 2012-11-28 A kind of key process for dispersing that strengthens the security of symmetric key system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210491965.6A CN102946311B (en) 2012-11-28 2012-11-28 A kind of key process for dispersing that strengthens the security of symmetric key system

Publications (2)

Publication Number Publication Date
CN102946311A true CN102946311A (en) 2013-02-27
CN102946311B CN102946311B (en) 2016-05-11

Family

ID=47729220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210491965.6A Active CN102946311B (en) 2012-11-28 2012-11-28 A kind of key process for dispersing that strengthens the security of symmetric key system

Country Status (1)

Country Link
CN (1) CN102946311B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162583A (en) * 2015-07-15 2015-12-16 北京江南天安科技有限公司 Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair
CN110324820A (en) * 2019-07-03 2019-10-11 易联众智能(厦门)科技有限公司 A kind of Internet of Things safety right appraisal method, system and readable medium
CN112054901A (en) * 2020-09-01 2020-12-08 郑州信大捷安信息技术股份有限公司 Key management method and system supporting multiple key systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1192834A (en) * 1995-06-05 1998-09-09 塞特科有限公司 Multi-step digital signature method and system
CN1615036A (en) * 2004-11-29 2005-05-11 上海电信技术研究院 Electronic paymenting service system and realizing method based on fixed telephone net short message
CN101132276A (en) * 2007-09-27 2008-02-27 中兴通讯股份有限公司 Method and system for symmetrical encryption of terminal data by SAM card
CN102355354A (en) * 2011-08-17 2012-02-15 山东省数字证书认证管理有限公司 Method for implementing digital signature by using radio frequency CPU card of non-signature algorithm module
CN103684759A (en) * 2012-09-11 2014-03-26 中国银联股份有限公司 Terminal data encrypting method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1192834A (en) * 1995-06-05 1998-09-09 塞特科有限公司 Multi-step digital signature method and system
CN1615036A (en) * 2004-11-29 2005-05-11 上海电信技术研究院 Electronic paymenting service system and realizing method based on fixed telephone net short message
CN101132276A (en) * 2007-09-27 2008-02-27 中兴通讯股份有限公司 Method and system for symmetrical encryption of terminal data by SAM card
CN102355354A (en) * 2011-08-17 2012-02-15 山东省数字证书认证管理有限公司 Method for implementing digital signature by using radio frequency CPU card of non-signature algorithm module
CN103684759A (en) * 2012-09-11 2014-03-26 中国银联股份有限公司 Terminal data encrypting method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162583A (en) * 2015-07-15 2015-12-16 北京江南天安科技有限公司 Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair
CN105162583B (en) * 2015-07-15 2018-10-26 北京江南天安科技有限公司 A kind of single, single-stage and multistage key pair dispersing method and its system
CN110324820A (en) * 2019-07-03 2019-10-11 易联众智能(厦门)科技有限公司 A kind of Internet of Things safety right appraisal method, system and readable medium
CN112054901A (en) * 2020-09-01 2020-12-08 郑州信大捷安信息技术股份有限公司 Key management method and system supporting multiple key systems

Also Published As

Publication number Publication date
CN102946311B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN109474423A (en) Data encryption/decryption method, server and storage medium
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
CN106610995B (en) Method, device and system for creating ciphertext index
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN103294958B (en) Kernel-level virtual polymerization and parallel encryption method for class-oriented Linux system
CN102857339B (en) Secret distribution sharing and recovery recombining method based on sequences
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN102316120A (en) Dynamic password lock based on network privacy protection
CN103326991A (en) Method for password encrypted storage and password authentication
CN102904877A (en) Binary serialization role permission management method based on cloud storage
CN102932140A (en) Key backup method for enhancing safety of cipher machine
CN102946311B (en) A kind of key process for dispersing that strengthens the security of symmetric key system
CN102222188A (en) Information system user password generation method
CN204759430U (en) Random cipher input device
CN103593592B (en) User data encryption and decryption method
CN203982391U (en) A kind of PCI-E encrypted card with network interface
CN106156655B (en) A kind of compressing file and authentication method towards cloud storage
CN103927463A (en) Application software copyright protection system for gateway server
CN105069331A (en) Computer binary code format based permission control method
CN201044107Y (en) Computer security debarkation and file protection system
Yang et al. Research and Design of Multi Dimension Protection System for Data Security in Cloud Computing Environment
Hu et al. The research and application of embedded database encryption method
CN113535664B (en) Database data synchronization method based on data page preloading
CN104125060B (en) It is a kind of without fixed algorithm key encryption technical method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 333, Yunhua Road, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: 610041, No. 8, pioneering Road, hi tech Zone, Sichuan, Chengdu

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.

CP03 Change of name, title or address