CN105591738B - A kind of key updating method and device - Google Patents

A kind of key updating method and device Download PDF

Info

Publication number
CN105591738B
CN105591738B CN201510980172.4A CN201510980172A CN105591738B CN 105591738 B CN105591738 B CN 105591738B CN 201510980172 A CN201510980172 A CN 201510980172A CN 105591738 B CN105591738 B CN 105591738B
Authority
CN
China
Prior art keywords
data volume
key
encrypted
flow
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510980172.4A
Other languages
Chinese (zh)
Other versions
CN105591738A (en
Inventor
梁栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201510980172.4A priority Critical patent/CN105591738B/en
Publication of CN105591738A publication Critical patent/CN105591738A/en
Application granted granted Critical
Publication of CN105591738B publication Critical patent/CN105591738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a kind of key updating method and device, is applied to key server, this method comprises: the data volume that each member device uses current key to encrypt in acquisition group;The data volume summation that all member devices are encrypted using the current key in statistics group;When the encryption data amount summation is greater than or equal to preset first data-quantity threshold, into group, each member device issues new key.It can effectively reduce the risk of Key Exposure under big flow background by the application, improve security of system.

Description

Key updating method and device
Technical Field
The present application relates to the field of network communication technologies, and in particular, to a method and an apparatus for updating a secret key.
Background
GD VPN (Group Domain Virtual Private Network) is a solution to realize centralized management of keys and security policies. The GD VPN network mainly comprises a KS (Key Server) and a GM (Group Member), wherein the KS is responsible for creating and maintaining a Key and issuing the Key and a security policy to the GM; the GM is a route forwarding device using keys and security policies.
In order to improve the security of the traffic flow, the key used by the GM needs to be updated regularly. At present, a key updating mode mainly comprises that KS issues a new key to GM period. In the key updating mode, under the condition of large service flow, the same key can be used for encrypting excessive data, so that the risk of key leakage is increased.
Disclosure of Invention
In view of the above, the present application provides a method and an apparatus for updating a key.
Specifically, the method is realized through the following technical scheme:
the application provides a secret key updating method, which is applied to a secret key server and comprises the following steps:
acquiring the data volume encrypted by each member device in the group by using the current key;
counting the sum of the data volume encrypted by all member devices in the group by using the current key;
and when the total amount of the encrypted data is greater than or equal to a preset first data amount threshold value, issuing a new key to each member device in the group.
The present application further provides a key update apparatus applied to a key server, the apparatus including:
the acquisition unit is used for acquiring the data volume encrypted by each member device in the group by using the current key;
the statistical unit is used for counting the sum of the data volume encrypted by all the member devices in the group by using the current key;
and the issuing unit is used for issuing a new key to each member device in the group when the total encrypted data volume is greater than or equal to a preset first data volume threshold value.
It can be seen from the above description that the data volume encrypted by the same secret key is limited by counting the encrypted data volume of the member devices in the group, so that the risk of secret key leakage under the background of large flow is reduced, and the system security is improved.
Drawings
FIG. 1 is a GD VPN networking schematic;
FIG. 2 is a flow chart of a rekeying method shown in an exemplary embodiment of the present application;
fig. 3 is a schematic diagram of a basic hardware structure of a device in which a key update apparatus is located according to an exemplary embodiment of the present application;
fig. 4 is a schematic structural diagram of a key update apparatus according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The GD VPN is a solution for realizing centralized management of keys and security policies, and is a point-to-multipoint tunnel-free connection. GD VPN provides a group-based IPsec (Internet Protocol Security) Security model, where all members in the same group share the same Security policy and key.
FIG. 1 is a schematic diagram of GD VPN networking, the network mainly consists of a key server KS and member devices GM (GM 1-GM 3), wherein KS is responsible for creating and maintaining keys and issuing keys and security policies to GM; the GM is a route forwarding device using keys and security policies.
In order to improve the security of GM traffic, the keys used by the GM need to be updated regularly. At present, a key updating mode mainly comprises that KS issues a new key to GM period. In the key updating mode, under the condition of large service flow, the same key can be used for encrypting excessive data, so that the risk of key leakage is increased.
In view of the foregoing problems, an embodiment of the present application provides a key updating method, where the method counts an amount of encrypted data of member devices in a group, and updates a key for the member devices based on the amount of encrypted data.
Referring to fig. 2, a flowchart of an embodiment of a key update method according to the present application is shown, and the key update process is described in this embodiment.
Step 201, acquiring the data volume encrypted by each member device in the group by using the current key.
In the embodiment of the present application, the key server may obtain the encrypted data volume of the member device in at least the following two ways:
in a first mode, the member device actively announces
Specifically, the traffic notification message sent by the receiving member device every time the amount of data encrypted using the current key reaches the second data amount threshold (e.g., N bytes) is received. Wherein the second data amount threshold may be determined by: first, a second data volume threshold is pre-configured on the key server, and when the member device registers with the key server, the key server pushes the second data volume threshold to the member device.
In an implementation manner, the key server may add a second data size threshold to a field corresponding to a TA load by adding a new payload type (TA load for short), and send a group key-PUSH exchange packet carrying the TA load to the member device, so as to achieve a purpose of pushing the second data size threshold to the member device. Wherein, the Group key-PUSH exchange message is a GDOI (Group Domain of Interpretation) protocol message.
The member device may use the second data volume threshold pushed by the key server as a basis for sending the traffic notification message, or may configure the second data volume threshold according to the network environment, instead of the second data volume threshold sent by the key server.
For example, assuming that the second data volume threshold configured on the key server KS is 1000 bytes, the member devices GM 1-GM 3 register with the KS, respectively, and during the registration process, the GM 1-GM 3 all receive the second data volume threshold (1000 bytes) pushed by the KS. The member device may use the second data volume threshold value pushed by the key server as a default value, and send the traffic notification message using the second data volume threshold value, that is, send the traffic notification message to the key server once every 1000 bytes are encrypted. Since the second data volume threshold is configured by the key server, the member device may not carry the second data volume threshold when sending the traffic advertisement packet to the key server. If the second data volume threshold value of the GM1 to be modified by a network administrator according to the network operation condition is 2000 bytes, the second data volume threshold value can be configured on the GM1 independently, after configuration, the GM1 sends a traffic notification message to the key server once every 2000 bytes of encryption, and the currently used second data volume threshold value is carried in the traffic notification message, so that the KS can carry out the second data volume threshold value carried in the traffic notification message according to the second data volume threshold value
In an implementation manner, the member device may also send a group key-PULL exchange packet carrying the TA load to the key server as a traffic notification packet by adding the currently-used second data volume threshold to the TA load corresponding field, where the group key-PULL exchange packet is a GDOI protocol packet.
The key server counts the number of the traffic advertisement messages received under the current key, and then calculates the data volume encrypted by the member device using the current key according to the second data volume threshold and the number of the traffic advertisement messages, for example, the second data volume threshold is 1000 bytes, the number of the received traffic advertisement messages is 5, and the encrypted data volume of the member device under the current key is 1000 × 5 — 5000 bytes.
Mode two, the key server actively inquires
Specifically, the key server periodically sends a Traffic query message to the group member devices, and in an implementation manner, the key server in the embodiment of the present application may send, to the member devices, a group public key-PUSH exchange message carrying an ET load as the Traffic query message through a new added load type (acquire Traffic Payload, abbreviated as ET load).
The member equipment self-counts the data volume encrypted by using the current key, and responds a flow response message to the key server according to the received flow query message, wherein the flow response message carries the data volume encrypted by the current key counted by the member equipment. In an implementation manner, the member device may send a group key-PULL exchange message carrying the ET payload to the key server as a traffic response message by adding the data volume encrypted by using the current key to the corresponding field of the ET payload.
And after receiving the flow response message, the key server directly acquires the current key encryption data volume counted by the member equipment from the flow response message.
Step 202, sum of the encrypted data amount of all member devices in the group under the current key is counted.
And step 203, when the total amount of the encrypted data is greater than or equal to a preset data amount threshold value, issuing a new key to each member device in the group.
And the key server judges whether the key needs to be updated according to the total encrypted data volume of the member equipment in the group. And controlling the data volume encrypted by the same key by presetting a data volume threshold value, thereby reducing the risk of key leakage.
From the above description, it can be seen that, under a large traffic flow, the method and the device can effectively reduce the data volume encrypted by the same key, and particularly, under the condition of a longer key updating period, can effectively improve the system security.
Corresponding to the embodiment of the key updating method, the application also provides an embodiment of the key updating device.
The embodiment of the key updating device can be applied to an encryption server or member equipment. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. A software implementation is taken as an example, and a logical means is formed by a processor of the device in which it is located running corresponding computer program instructions in a memory. From a hardware aspect, as shown in fig. 3, the present application is a hardware structure diagram of a device in which a key updating apparatus is located, except for the processor, the network interface, and the memory shown in fig. 3, the device in which the apparatus is located in the embodiment may also include other hardware according to an actual function of the device, which is not described again.
Please refer to fig. 4, which is a schematic structural diagram of a key update apparatus according to an embodiment of the present application. The key updating apparatus includes an obtaining unit 401, a counting unit 402, and a sending unit 403, where:
an obtaining unit 401, configured to obtain a data amount encrypted by each member device in the group using the current key;
a counting unit 402, configured to count a sum of data amounts encrypted by all member devices in the group using the current key;
an issuing unit 403, configured to issue a new key to each member device in the group when the total encrypted data amount is greater than or equal to a preset first data amount threshold.
Further, the air conditioner is provided with a fan,
the obtaining unit 401 is specifically configured to receive a traffic notification message sent by the member device when the data volume encrypted by using the current key reaches a second data volume threshold, where the traffic notification message carries the second data volume threshold; counting the number of the flow notification messages received under the current key; and calculating the data volume encrypted by the member equipment by using the current key according to the second data volume threshold and the counted number of the flow notification messages.
Further, the apparatus further comprises:
a configuration unit, configured to configure a second data amount threshold before the obtaining unit 401 obtains the data amount encrypted by each member device in the group using the current key; pushing the second data volume threshold to the member device;
the obtaining unit 401 is specifically configured to receive a traffic notification message sent by the member device when the data volume encrypted by using the current key reaches the second data volume threshold; counting the number of the flow notification messages received under the current key; and calculating the data volume encrypted by the member equipment by using the current key according to the second data volume threshold and the counted number of the flow notification messages.
Further, the air conditioner is provided with a fan,
the obtaining unit 401 is specifically configured to send a traffic query message to the member device; and receiving a flow response message responded by the member equipment according to the flow query message, wherein the flow response message carries the data volume encrypted by the member equipment by using the current key.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (6)

1. A key updating method is applied to a key server, and is characterized by comprising the following steps:
performing the following operations on each member device in the group: receiving a flow notification message sent by member equipment when the data volume encrypted by using the current key reaches a second data volume threshold; counting the number of the flow notification messages received under the current key; calculating the data volume encrypted by the member equipment by using the current key according to the second data volume threshold and the counted number of the flow notification messages;
or,
performing the following operations on each member device in the group: sending a flow query message to member equipment; receiving a flow response message responded by the member equipment according to the flow query message, wherein the flow response message carries the data volume encrypted by the member equipment by using the current key;
counting the sum of the data volume encrypted by all member devices in the group by using the current key;
and when the total amount of the encrypted data is greater than or equal to a preset first data amount threshold value, issuing a new key to each member device in the group.
2. The method of claim 1, wherein:
and the traffic notification message carries the second data volume threshold.
3. The method of claim 1, wherein the receiving member device, prior to the traffic advertisement message sent each time the amount of data encrypted using the current key reaches the second data amount threshold, further comprises:
configuring a second data volume threshold;
pushing the second data volume threshold to the member device.
4. A key update apparatus applied to a key server, the apparatus comprising:
the acquiring unit is used for receiving a flow notification message sent by the member equipment when the data volume encrypted by using the current key reaches a second data volume threshold; counting the number of the flow notification messages received under the current key; calculating the data volume encrypted by the member equipment by using the current key according to the second data volume threshold and the counted number of the flow notification messages; or sending a flow query message to the member equipment; receiving a flow response message responded by the member equipment according to the flow query message, wherein the flow response message carries the data volume encrypted by the member equipment by using the current key;
the statistical unit is used for counting the sum of the data volume encrypted by all the member devices in the group by using the current key;
and the issuing unit is used for issuing a new key to each member device in the group when the total encrypted data volume is greater than or equal to a preset first data volume threshold value.
5. The apparatus of claim 4, wherein:
and the traffic notification message carries the second data volume threshold.
6. The apparatus of claim 4, wherein the apparatus further comprises:
a configuration unit configured to configure a second data amount threshold; pushing the second data volume threshold to the member device.
CN201510980172.4A 2015-12-22 2015-12-22 A kind of key updating method and device Active CN105591738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510980172.4A CN105591738B (en) 2015-12-22 2015-12-22 A kind of key updating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510980172.4A CN105591738B (en) 2015-12-22 2015-12-22 A kind of key updating method and device

Publications (2)

Publication Number Publication Date
CN105591738A CN105591738A (en) 2016-05-18
CN105591738B true CN105591738B (en) 2018-12-25

Family

ID=55931014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510980172.4A Active CN105591738B (en) 2015-12-22 2015-12-22 A kind of key updating method and device

Country Status (1)

Country Link
CN (1) CN105591738B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494722A (en) * 2018-01-23 2018-09-04 国网浙江省电力有限公司电力科学研究院 Intelligent substation communication message completeness protection method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281535A (en) * 2010-06-10 2011-12-14 华为技术有限公司 Key updating method and apparatus thereof
CN102694647A (en) * 2011-03-25 2012-09-26 株式会社东芝 Node and group key updating method
CN103209072A (en) * 2013-04-27 2013-07-17 杭州华三通信技术有限公司 MACsec (Multi-Access Computer security) key updating method and equipment
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN104935593A (en) * 2015-06-16 2015-09-23 杭州华三通信技术有限公司 Data message transmitting method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281535A (en) * 2010-06-10 2011-12-14 华为技术有限公司 Key updating method and apparatus thereof
CN102694647A (en) * 2011-03-25 2012-09-26 株式会社东芝 Node and group key updating method
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
CN103209072A (en) * 2013-04-27 2013-07-17 杭州华三通信技术有限公司 MACsec (Multi-Access Computer security) key updating method and equipment
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN104935593A (en) * 2015-06-16 2015-09-23 杭州华三通信技术有限公司 Data message transmitting method and device

Also Published As

Publication number Publication date
CN105591738A (en) 2016-05-18

Similar Documents

Publication Publication Date Title
US10869192B2 (en) System and method of counter management and security key update for device-to-device group communication
JP7178365B2 (en) Method and system for Service Capability Exposure Function (SCEF)-based Internet of Things (IOT) communication
US10601874B2 (en) System and apparatus for providing network security
EP2779589B1 (en) Changing dynamic group VPN member reachability information
JP2018502471A5 (en)
DE102018101812A1 (en) Secure transfer of user information between applications
US20220256343A1 (en) Lattice mesh
KR20120126098A (en) Device management
US10699031B2 (en) Secure transactions in a memory fabric
US20210182347A1 (en) Policy-based trusted peer-to-peer connections
JP2016051921A (en) Communication system
WO2018214701A1 (en) Data message transmission method, network device, control device, and network system
Dang et al. Resource-efficient secure data sharing for information centric e-health system using fog computing
WO2020025128A1 (en) Certificate management
CN105591738B (en) A kind of key updating method and device
CN105981028A (en) Network element authentication in communication networks
JP2023524829A (en) An improved computer-implemented method of anonymous proximity tracking
CN110933050A (en) Privacy protection position sharing system and method
CN114598724B (en) Security protection method, device, equipment and storage medium for electric power Internet of things
CN103581034B (en) Message mirroring and encrypted transmitting method
CN112511994B (en) Multicast implementation method based on LoRaWan and supporting ACK mechanism
EP3451607B1 (en) Methods and devices for secure communication between network functions of a communication network
CN113630242A (en) Facilitating lossless security key flipping using data plane feedback
Wozniak et al. Geocast into the past: Towards a privacy-preserving spatiotemporal multicast for cellular networks
WO2016118170A1 (en) Configuration of a virtual local area network in a ring of devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: Xinhua three Technology Co., Ltd.

Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant before: Huasan Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant