CN1323523C - Method of forming dynamic key in radio local network - Google Patents

Method of forming dynamic key in radio local network Download PDF

Info

Publication number
CN1323523C
CN1323523C CNB031090478A CN03109047A CN1323523C CN 1323523 C CN1323523 C CN 1323523C CN B031090478 A CNB031090478 A CN B031090478A CN 03109047 A CN03109047 A CN 03109047A CN 1323523 C CN1323523 C CN 1323523C
Authority
CN
China
Prior art keywords
key
wlan
wep
sta
generates dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031090478A
Other languages
Chinese (zh)
Other versions
CN1534931A (en
Inventor
刘廷永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031090478A priority Critical patent/CN1323523C/en
Publication of CN1534931A publication Critical patent/CN1534931A/en
Application granted granted Critical
Publication of CN1323523C publication Critical patent/CN1323523C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a method of forming a dynamic key in a radio local network, which is suitable for being applied between a wireless access terminal (STA) with a preshared key and a wireless local network access point (AP) and comprises the following steps: a, generating a random number between STA and AP; b, generating an encryption key ki by the random number together with the preshared key; c, between STA and AP, carrying out communication by taking the generated encryption key ki as the encryption key and using a wired equivalent privacy (WEP) cipher mode. The present invention has simple and effective realization, passes a key number by means of the filling (6 bits) of iv in a message and uses an anti-rebroadcast mechanism on the key number, which resists the message rebroadcast to a certain extent and effectively realizes the secrecy on the user information.

Description

A kind of method that in WLAN (wireless local area network), generates dynamic key
Technical field
The present invention relates to field of data encryption, relate in particular to a kind of method that in WLAN (wireless local area network), generates dynamic key.
Technical background
In WLAN (wireless local area network), information between the access point (AP) of wireless access terminal (STA) and WLAN (wireless local area network) utilizes public electromagnetic wave to transmit, any prison hearer who has similar STA equipment can receive these electromagnetic waves, if these electromagnetic waves are expressly transmitted, user's privacy and other key messages all might be divulged a secret.As shown in Figure 1, be in the WLAN (wireless local area network), the schematic diagram that information is transmitted.
Prior art 1:
In order to resist the prison hearer, the communication between STA and AP can be protected by the mode of encrypting.IEEE 802.11b standard provides WEP (Wired Equivalent Privacy), guarantees the safety of WLAN.WEP adopts the RC4 symmetric cryptosystem at link layer, just can get permission the resource of access network when the key of STA must be identical with the key of AP, thereby prevent the monitoring of unauthorized user and disabled user's visit.Because up to the present, 802.11 standards do not have the concrete standard that regulation manages key, and therefore existing implementation generally is to use static keys to encrypt.So-called static keys is exactly to dispose identical key by manual mode at STA and AP end, and encryption and decryption is used this key, unless configuration change, the key of encryption and decryption can not change.WEP encrypts can pre-configured maximum 4 keys, show that key of use in encrypting message by two flag bits, make deciphering can reach correct solving expressly.
WEP uses the IV with 24 in encryption, reuse in a quite short time because the same key of same IV fails to be convened for lack of a quorum.One 24 field comprises 2 24 powers, 16777216 possible values just, supposes that network traffics are 11M, transmits the bag of 1500 bytes, and about five hours, IV will reuse so.In case this reusing taken place, the assailant just had 2 not isolog with identical keys encrypt content, might be able to obtain the value of the XOR of these 2 plaintexts by XOR 2 ciphertexts, this XOR result can be used for decrypted data packet.(when using identical key, the XOR value expressly and the XOR value of ciphertext are the same.If) therefore the assailant know when IV reuses clear content when taking place, can not decrypt another one content expressly even know the key stream that any encryption is used yet.
Prior art one adopts the way to manage of static keys, can only dispose 4 keys at most, as the fail safe that will guarantee that WLAN inserts, and must frequent manual change key.Fig. 2 is a WEP ciphered data plot structure, and the WEP static encryption is distinguished the static keys of use by Key ID.
Prior art makes mode by hand change key, has increased key management loaded down with trivial details of STA and AP.It is particularly evident when this hangs many user STA under AP.
If the user can not in time change key, user's safety just may be on the hazard so.
Prior art 2:
Present many authentication protocols are EAP-TLS for example, keys such as EAP-TTLS generate agreement and are suggested and are applied in the WEP encryption, for present equipment, must do more change, require server and user side to support this quasi-protocol, increased the complexity of whole system.
As shown in Figure 3, be to use the networking diagram of authentication protocol.STA and AS are by AP (or AC) transparent transmission or transmit negotiation message, finally generate key at STA and AS end through consultation, and by some approach key are sent to the AP use.
Present numerous equipment is not supported this authentication.This system realizes complicated, and AS is had very high requirement.It is also higher that STA implements complexity.Prior art does not have regulation to carry out the key that how the index negotiation obtained when WEP encrypted in addition, and how the key of front and back is distinguished.
Summary of the invention
The object of the invention is to use simple method to realize the dynamic replacing of key, and applies it in the WEP encryption, and need not to change WEP ciphered data frame structure.
For this reason, the present invention adopts following scheme:
A kind of method that generates dynamic key in WLAN (wireless local area network) WLAN is applicable between the wireless access terminal STA and wireless local network connecting point AP that has wildcard, it is characterized in that may further comprise the steps:
A, between STA and AP, generate a random number random;
B, generate an encryption key Ki by the Hash verification method by described random number random and wildcard;
Between c, STA and the AP, be encryption key, adopt Wired Equivalent Privacy WEP cipher mode to communicate with above-mentioned generation encryption key Ki.
Described step b, in the following way:
Ki=PRF(MasterKey,K(i-1)),K0=random,1<=i<64;
Described PRF represents generating function, and MasterKey is a wildcard.
Described step b, in the following way:
Ki=PRF(MasterKey,K(i-1)‖K(i-2)……‖K0),1<=i<64;
Described PRF represents generating function, and " ‖ " represents serial connection, and MasterKey is a wildcard.Described PRF is HMAC_MD5, HMAC_SHA1.
The described method that generates dynamic key in WLAN when key generates each time, produces a random number random.
Described step c, in the following way:
In the IV field that WEP encrypts, use 6bits as the index that WEP uses encryption key, select key at receiving terminal with this index.
Described receiving terminal, the WEP that only accepts i and i-1, i+1 encrypts message.
The described method that in WLAN, generates dynamic key, AP and STA can initiate key and change, in WEP encrypts, the WEP encrypted secret key number pointed out in the WEP ciphertext during replacing, and the value of the opposite end cipher key number of updating maintenance.
The described method that generates dynamic key in WLAN, the opposite end uses the key of this cipher key number that message is decrypted after receiving the ciphertext that has cipher key number, also verifies the value of the opposite end cipher key number of passing through the back updating maintenance at successful decryption.
Described wireless local network connecting point AP can replace with wireless local net access controller AC.
The present invention has following beneficial effect:
1, the advantage of this scheme is to generate dynamic key to adopt AP and STA to handle, and has alleviated load of server.
2, owing to wildcard does not use in WEP encrypts, thus even decoded the WEP encryption key, just leaked the information of using this secret key encryption, and wildcard or safety, because hash function itself is irreversible.
3, because key upgrades,, adopt bob-weight to broadcast mechanism, resisted the message replay to a certain extent for cipher key number so transmit cipher key number by means of the filling (6bits) of the iv in the message.
4, this scheme realizes simply, can just can obtain than adopting the higher safety of static wep in very little cost, realizes simply effectively need not WEP ciphered data frame is done any expansion, has just utilized filler in the past.
5, this programme can be realized the negotiation to a user one key, effectively user profile is realized maintaining secrecy.
Description of drawings
Fig. 1 is the interface schematic diagram of WLAN (wireless local area network) in the prior art;
Fig. 2 is that WEP encrypts the data frame structure schematic diagram that uses in the prior art;
Fig. 3 is an authentication protocol networking schematic diagram in the prior art;
Fig. 4 is a schematic flow sheet of the present invention.
Embodiment
Below in conjunction with the specific embodiment of the present invention is described.
Can guarantee the dynamic replacing of key between STA of the present invention and the AP by synchronous mode, its thought is based on wildcard MasterKey, by the random number random that produces at random, dynamically generate an encryption key, and finish the transmission of data with this encryption key that dynamically generates.Here, AP also can be a wireless local net access controller (AC), does not have the difference of essence on realization flow.
As shown in Figure 4, be particular flow sheet of the present invention, as can be seen from the figure, the present invention specifically may further comprise the steps:
A, STA and AP set up a random number random by sending message.This random number need not to maintain secrecy, but will confirm that the opposite end has this random number really.This random number can produce at STA, also can produce at AP, also can produce jointly at two ends, and it produces the position does not have substantial influence to the solution of the present invention.
B, AP and STA use this random number random as seed, generate dynamic encryption key K1 (comprising IV) according to wildcard MasterKey.Follow-up encryption key (comprising IV) is defined as Ki (1<=i<64), adds 1 at i at every turn, earthquake became 1 by 64 o'clock; Follow-up Ki is according to the K1 of front, K2 ..., K (i-1) and MasterKey and random number random generate.
The method that generates derive subsequent keys Ki by master key MasterKey and random number random is a lot: followingly represent generating function explanation with PRF, wherein PRF can be HMAC_MD5, HMAC_SHA1, perhaps other Hash verification method.
Mode 1:
Ki=PRF(MasterKey,K(i-1)),K0=random
K0 does not use in encryption, and the key that uses during encryption is Ki (1<=i<64).
Mode 2:
Ki=PRF (MasterKey, K (i-1) ‖ K (i-2) ... ‖ K0), " ‖ " expression herein will be connected in series.
In order to ensure higher fail safe, can when generating, use each key a random number random.Do seed with this random number then and generate dynamic key with master key MasterKey.
C, STA adopt WEP to encrypt and communicate with AP, this moment, encryption key was K1 (key K 1 is generated by random number random and wildcard MasterKey), as shown in Figure 2, the IV field provides the actual IV of 24bits, the filling of 6bits and the key ID of 2bits in WEP encrypts.The present invention uses the filling of 6bits that the key that uses is carried out index.
D, AP read the WEP enciphered data that STA sends, key is selected in filling according to 6bits, but in order to prevent Replay Attack, AP safeguards the cipher key number state of a STA, the WEP that only accepts current key number and 1 cipher key number in front and back encrypts message, other packet loss.
AP and STA can initiate key and change, and need not to notify the other side during replacing, only need in WEP encrypts the WEP encrypted secret key number is pointed out in the WEP ciphertext, and the value of the opposite end cipher key number of updating maintenance.The opposite end uses the key of this cipher key number that message is decrypted after receiving this message, and the value of the opposite end cipher key number of updating maintenance (be generally add 1 mould 64, but will skip 0).
The present invention realizes effectively simple, need not WEP ciphered data frame is done any expansion, the filler before just having utilized.Because wildcard does not use in WEP encrypts, thus even decoded the WEP encryption key, just leaked the information of using this secret key encryption, and wildcard or safety.In addition, the present invention transmits cipher key number by means of the filling (6bits) of the iv in the message, adopts bob-weight to broadcast mechanism for cipher key number, has resisted the message replay to a certain extent, effectively user profile is realized maintaining secrecy.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (10)

1, a kind of method that generates dynamic key in WLAN (wireless local area network) WLAN is applicable between the wireless access terminal STA and wireless local network connecting point AP that has wildcard, it is characterized in that may further comprise the steps:
A, between STA and AP, generate a random number random;
B, generate an encryption key Ki by the Hash verification method by described random number random and wildcard;
Between c, STA and the AP, be encryption key, adopt Wired Equivalent Privacy WEP cipher mode to communicate with above-mentioned generation encryption key Ki.
2, the method that generates dynamic key in WLAN as claimed in claim 1 is characterized in that described step b, in the following way:
Ki=PRF(MasterKey,K(i-1)),K0=random,1<=i<64;
Described PRF represents generating function, and MasterKey is a wildcard.
3, the method that generates dynamic key in WLAN as claimed in claim 1 is characterized in that described step b, in the following way:
Ki=PRF(MasterKey,K(i-1)‖K(i-2)……‖K0),1<=i<64;
Described PRF represents generating function, and " ‖ " represents serial connection, and MasterKey is a wildcard.
4, as claim 2 or the 3 described methods that in WLAN, generate dynamic key, it is characterized in that described PRF is HMAC_MD5, HMAC_SHA1.
5, the method that generates dynamic key in WLAN as claimed in claim 1 when it is characterized in that key generates each time, produces a random number random.
6, the method that generates dynamic key in WLAN as claimed in claim 1 is characterized in that described step c, in the following way:
In the IV field that WEP encrypts, use 6bits as the index that WEP uses encryption key, select key at receiving terminal with this index.
7, the method that generates dynamic key in WLAN as claimed in claim 6 is characterized in that described receiving terminal, and the WEP that only accepts i and i-1, i+1 encrypts message.
8, the method that in WLAN, generates dynamic key as claimed in claim 1, it is characterized in that AP and STA can initiate key and change, in WEP encrypts, the WEP encrypted secret key number is pointed out in the WEP ciphertext during replacing, and the value of the opposite end cipher key number of updating maintenance.
9, the method that in WLAN, generates dynamic key as claimed in claim 8, it is characterized in that the opposite end is after receiving the ciphertext that has cipher key number, use the key of this cipher key number that message is decrypted, also verify the value of the opposite end cipher key number of passing through the back updating maintenance at successful decryption.
10, the method that generates dynamic key in WLAN as claimed in claim 1 is characterized in that described wireless local network connecting point AP, and AC replaces with the wireless local net access controller.
CNB031090478A 2003-04-02 2003-04-02 Method of forming dynamic key in radio local network Expired - Fee Related CN1323523C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031090478A CN1323523C (en) 2003-04-02 2003-04-02 Method of forming dynamic key in radio local network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031090478A CN1323523C (en) 2003-04-02 2003-04-02 Method of forming dynamic key in radio local network

Publications (2)

Publication Number Publication Date
CN1534931A CN1534931A (en) 2004-10-06
CN1323523C true CN1323523C (en) 2007-06-27

Family

ID=34283248

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031090478A Expired - Fee Related CN1323523C (en) 2003-04-02 2003-04-02 Method of forming dynamic key in radio local network

Country Status (1)

Country Link
CN (1) CN1323523C (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100612255B1 (en) * 2005-01-11 2006-08-14 삼성전자주식회사 Apparatus and method for data security in wireless network system
CN100495963C (en) 2006-09-23 2009-06-03 西安西电捷通无线网络通信有限公司 Public key certificate state obtaining and verification method
CN101155092B (en) * 2006-09-29 2010-09-08 西安电子科技大学 Wireless local area network access method, device and system
CN101394664B (en) * 2007-09-19 2012-01-04 华为技术有限公司 Mobile node, method and system for implementing media irrelevant switching
CN101163145B (en) * 2007-11-13 2011-09-14 成都市华为赛门铁克科技有限公司 Method and device of transmitting data packet and method of negotiating key
US8422513B2 (en) * 2008-05-23 2013-04-16 Nokia Siemens Networks Oy Providing station context and mobility in a wireless local area network having a split MAC architecture
CN101521882B (en) * 2009-03-24 2014-03-12 中兴通讯股份有限公司南京分公司 Method and system for updating preshared key
CN101902324B (en) * 2010-04-29 2012-11-07 天维讯达无线电设备检测(北京)有限责任公司 Method and system for establishing communication key between nodes
CN103249047B (en) 2012-02-10 2018-11-23 南京中兴新软件有限责任公司 The access authentication method and device of WLAN hot spot
CN104243409A (en) * 2013-06-14 2014-12-24 中国普天信息产业股份有限公司 Terminal-to-terminal data transmission method
DK2955871T3 (en) * 2014-06-12 2017-05-01 Nagravision Sa Cryptographic method for securely exchanging messages and apparatus and system for performing this method
CN107659396B (en) * 2016-07-23 2022-07-22 东莞宏大动力科技有限公司 Dynamic encryption method
CN107872315B (en) * 2017-07-28 2020-09-22 深圳和而泰智能控制股份有限公司 Data processing method and intelligent terminal
CN109040108B (en) * 2018-08-31 2020-10-30 桂林电子科技大学 Privacy protection data collection method for mobile phone sensing task
CN109714176B (en) * 2019-03-13 2021-11-30 苏州科达科技股份有限公司 Password authentication method, device and storage medium
CN110650016B (en) * 2019-09-02 2022-09-23 南京南瑞继保电气有限公司 Method for realizing network data security of AC/DC control protection system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991407A (en) * 1995-10-17 1999-11-23 Nokia Telecommunications Oy Subscriber authentication in a mobile communications system
WO2003017568A1 (en) * 2001-08-17 2003-02-27 Nokia Corporation Security in communications networks
US20030051140A1 (en) * 2001-09-13 2003-03-13 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
CN1406034A (en) * 2001-09-13 2003-03-26 株式会社东芝 Electronic apparatus with relay function in wireless data communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991407A (en) * 1995-10-17 1999-11-23 Nokia Telecommunications Oy Subscriber authentication in a mobile communications system
WO2003017568A1 (en) * 2001-08-17 2003-02-27 Nokia Corporation Security in communications networks
US20030051140A1 (en) * 2001-09-13 2003-03-13 Buddhikot Milind M. Scheme for authentication and dynamic key exchange
CN1406034A (en) * 2001-09-13 2003-03-26 株式会社东芝 Electronic apparatus with relay function in wireless data communication

Also Published As

Publication number Publication date
CN1534931A (en) 2004-10-06

Similar Documents

Publication Publication Date Title
US8788802B2 (en) Constrained cryptographic keys
CN101473668B (en) Method and apparatus for security protection of an original user identity in an initial signaling message
US6931132B2 (en) Secure wireless local or metropolitan area network and related methods
CN1323523C (en) Method of forming dynamic key in radio local network
CN101600204B (en) File transmission method and system
CN102257842A (en) Enhanced security for direct link communications
JP2012019511A (en) System and method of safety transaction between wireless communication apparatus and server
CN100452697C (en) Conversation key safety distributing method under wireless environment
CN112073115B (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
JP2000083018A (en) Method for transmitting information needing secrecy by first using communication that is not kept secret
WO2007059558A1 (en) Wireless protocol for privacy and authentication
CN102036238A (en) Method for realizing user and network authentication and key distribution based on public key
CN102884756A (en) Communication device and communication method
US20020199102A1 (en) Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network
Borsc et al. Wireless security & privacy
CN107659405B (en) The encrypting and decrypting method of data communication between a kind of substation boss station
CN108540287A (en) Internet of Things safety management encryption method
Luo A simple encryption scheme based on wimax
CN101640840B (en) Broadcast or multicast-based safe communication method and broadcast or multicast-based safe communication device
CN111093193A (en) MAC layer communication security mechanism suitable for Lora network
WO2005117334A1 (en) State based secure transmission for a wireless system
CN110650016B (en) Method for realizing network data security of AC/DC control protection system
CN114339740B (en) AKA authentication method and system for 5G communication
JP7160443B2 (en) Wireless communication system, server, terminal, wireless communication method, and program
Eren et al. WiMAX-Security–Assessment of the Security Mechanisms in IEEE 802.16 d/e

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070627

Termination date: 20130402