CN1658553A - Strong discrimination method of enciphered mode by public key cryptographic algorithm - Google Patents

Strong discrimination method of enciphered mode by public key cryptographic algorithm Download PDF

Info

Publication number
CN1658553A
CN1658553A CN 200410021866 CN200410021866A CN1658553A CN 1658553 A CN1658553 A CN 1658553A CN 200410021866 CN200410021866 CN 200410021866 CN 200410021866 A CN200410021866 A CN 200410021866A CN 1658553 A CN1658553 A CN 1658553A
Authority
CN
China
Prior art keywords
user
key
rand
authenticator
aaa server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410021866
Other languages
Chinese (zh)
Other versions
CN1658553B (en
Inventor
罗超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN 200410021866 priority Critical patent/CN1658553B/en
Publication of CN1658553A publication Critical patent/CN1658553A/en
Application granted granted Critical
Publication of CN1658553B publication Critical patent/CN1658553B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

This invention discloses a strong distinguishing method adopting open code key calculation encryption mode. The process is:found wireless chain-channel, the identifier sends the identification request to the user, and return the identification information to the server, the server find the user open code key and the information integrality code key from the database to found the dialog with the user, the server and the user produce the random numbers, encode the open code key for each other, decode the code key through the identifier, compare self random number with the random number changed by the opposite side and judge whether the identification is successful. Repeat this process for three times, and the server and the user calculate the whole identification and exchange integrality value through encoding and decoding code key and the information integrality code key and the relative information. The identifier judges whether the identification is successful, decides whether the user can get into the network and realizes the online communication of users and the broadcasting of the base station. The strong points are that it realizes the insurance of the identification of the user and the server and the safety of the communication.

Description

A kind of strong discrimination method that adopts public key cryptography algorithm for encryption pattern
Technical field
The present invention relates in communication network, guarantee validated user accesses network resource, avoid its a kind of user of checking who is subjected to false server deception and the discrimination method of server both sides legal identity.
Background technology
In network communication field, use the most generally and realize that by ppp protocol the point-to-point link transmits data, adopt CHAP agreement (Challenge Handshake Authentication Protocol) to finish the identity of PPP link is differentiated, this CHAP agreement is for addressing inquires to the authentication protocol of shaking hands.The link both sides are called for short the PPPLCP protocol negotiation by the extendible LCP of point-to-point, and link is configured and tests to PPP.After the PPP link is set up, to differentiate earlier then according to identification result, whether decision allows link to enter the Network Control Protocol NCP negotiation in (Network Control Protocol) stage to connectionist's identity.CHAP carries out once " three-way handshake " by the both sides in the PPP link, finishes the other side's identity is differentiated.Its discriminating is after the PPPLCP agreement enters out state (opened), and discriminating side initiates the CHAP of opposite end is differentiated that its process is roughly as follows:
1. differentiate that direction sent CHAP challenge by the side of discriminating, challenge data is a random number or pseudo random number.
2. after being received CHAP challenge by discriminating side,, share the certain computation rules of information foundation such as password, obtain a uni-directional hash value as replying of inquiry sent to discriminating side with challenge data.
3. after receive and replys discriminating side, also according to identical computation rule, utilize and share key in this locality, information calculations such as challenge data go out the hashed value of an expectation, compare the hash result of CHAP response result and expectation, if consistent, then crossed identity and differentiate by the discriminating square tube, otherwise for differentiating failure.
The CHAP agreement is applicable to that mainly network access server NAS (Network AccessServer) connects the circuit switching from public switch telephone network PSTN or integrated services digital network ISDN, dials in the discriminating of connection or proprietary connection identity.
Promptly only the user is differentiated because the CHAP agreement is a unidirectional authentication protocol, rather than, therefore can not prevent Replay Attack the two-way authentication protocol between user and server.And the CHAP agreement is not differentiated identity separately and is extracted, thereby can not use in roaming environments.And the CHAP agreement does not support session key to derive, and can not be used for secure communication subsequently.
Using maximum communication transport protocols in the another kind of network communication field is radius protocol.
Because network access server NAS links to each other with the external world by Moden pond or other interface.The user enters network sharing information and resource by these interfaces, just need carry out identity to the user who enters network by these interfaces and differentiate, finishes the granted access to the user.RADIUS (RemoteAuthentication Dial-up User Service) need design for this just.It is a kind of standard of communicating by letter between network access server and a shared authentication server.According to this communication specification, the webserver is realized differentiating to the user who visits it by sharing authentication server.NAS and authentication server are according to mutual their authentication information, authorization message and the configuration information of standard.RADIUS gives authentication server and differentiates client (being NAS or authenticator) to the information processing standard, finishes discriminating to the client of visit NAS by these processing specifications, authorizes and configuration.
Put it briefly, the RADIUS authentication protocol has following principal character:
1), model of client
RADIUS with NAS as client.The main task of client is mutual (purpose is to collect user's authentication information) of finishing with calling party, sends the authentication information collected and the identification result that server sends it back is replied to server.The authentication server end is called the RADIUS authentication server, and it differentiates request msg according to the user that client sends, and user identity is differentiated, and returned identification result.
2), internet security
Share a pair of privacy key between radius server and the NAS.All communications between them all are subjected to this discriminating protection to key, and certain integrity protection is provided simultaneously.The sensitive data that transmits between this server and NAS (as user password) also is subjected to Confidentiality protection.Radius protocol also provides status attribute and discriminator (Authenticator), to prevent refusal attack, the spoofing attack to client or server.It is the IP security protocol stack that RFC3162 has defined RADIUS use IPSEC, but the support of IPSEC is not but required.
3), extendible design of protocol
The RADIUS message bag constitutes by a relatively-stationary message header and a series of attribute.Attribute adopts " attribute type, length, property value " tlv triple to form, and the user can define other attribute voluntarily, with the advanced radius authentication protocol.
4), authentication scheme flexibly
Radius protocol is supported different authentication protocols, differentiates to realize the user that needs are differentiated.The agreement of differentiating comprises PAP, CHAP, MS-CHAP etc., has also defined support EAP authentication protocol in RFC2869RADIUS Extensions.
RADIUS realizes the flow process that identity is differentiated:
When the user dials in NAS, NAS request radius server carries out user identity to be differentiated, after obtaining the RADIUS access and responding, and the service that the user obtains wishing.Roughly flow process is as follows for it:
1. dial-in customer and NAS set up PPP (also may for other agreement, as SLIP) and connect, and NAS requires the user to show authentication information.The mode that requirement is shown may be a self-defining notice of landing, and requires the user to key in user name and user password, or the authentication protocol by ppp protocol, transmits user's name information and password information as link frame-forming protocols such as CHAP.
2. the dial-in customer shows authentication information to NAS.
3. NAS has constructed a RADIUS message that is called " Access-Request " (being access request) according to these authentication informations, sends to radius server.Should comprise following content in the Access-Request message: the information such as port numbers of user name, user password, NAS name information (being used as RADIUS uses which to share the foundation of key), user capture.Wherein user password should be subjected to Confidentiality protection.
4. for a NAS, often are furnished with a main radius server and several standby radius servers.If NAS still can not receive response after sending the Access-Request certain hour, then NAS can think that this master server is unreachable.Therefore NAS can select to get in touch with second standby server.Selective rule does not provide in radius protocol: agreement realizes and can select second station server in the certain number of times failure of NAS re-send request may back that the selection server also can circulate.Such as after waiting for the master server answer failed, select second immediately, after waiting for second answer failed, select the 3rd immediately ... ..
5. after radius server is received Access-Request, at first find shared key between book server and the NAS according to the name information of NAS.If can not find (for example the NAS name is illegal), then access request should be dropped; If can find, then utilize to share the integrality, legitimacy of key authentication data etc.In RADIUS authentication data storehouse, search corresponding user's clauses and subclauses according to the user name in the request then.Having provided the user in these clauses and subclauses can accessed resources, and for these resources of visit institute must satisfied condition, as the password information that must show etc.RADIUS verifies seriatim according to authentication information whether the user satisfies all discrimination condition.
If 6. the user can not be by all checkings, then RADIUS sends it back " Access-Reject " (access reject) message to NAS, and the expression user can not be by checking.NAS is according to this message, and refusing provides required service for the user.
If 7. all checkings are all passed through, RADIUS sends one " visit is accepted " (Access-Accept) message or the user carried out the another inquiry of taking turns to NAS.The another if desired inquiry of taking turns.Then radius server sends one " visit is addressed inquires to " (Access-Challenge) message to NAS, provides one group of data in this message, requires the user data to be carried out the encryption of corresponding secret key.NAS sends to the dial-in customer with challenge information after receiving this inquiry, the user carries out respective encrypted, and the result is sent to NAS.NAS asks according to user's return results structure new " visit ", and sends to radius server.Server is verified this challenge response, if checking is passed through, then sends " visit an is accepted " message to NAS.
8. visit accepts should comprise in the message service (as PPP or the Telnet service) type that can be the user and provide, corresponding configuration information (as the IP address to PPP, subnet mask etc.).NAS is configured home environment after receiving this message, and starts the respective service to the dial-in customer.
Communication specification about the RADIUS authentication protocol here just is not specifically introduced.Can be referring to standards such as RFC2856, RFC2866, RFC2867, RFC2868, RFC2869, RFC2809.
RADIUS is mainly used in dialing PPP and terminal server visit.As time goes on, ever-increasing the Internet and introduce new access technique comprises wireless, DSL, mobile IP and Ethernet, and the router and the webserver (NAS) increase complexity and density.Simple radius protocol can not satisfy the new demand of aaa server aspect discriminating, mandate, charging.
The problem that radius protocol exists is:
Mistake is recovered problem: radius protocol is not supported the wrong failover of recovery mechanism, and the result is that different realizations has different failover.
Transmitting stage safety problem: RADIUS has defined the scheme that requires application layer discriminating and integrality in respond packet.And defined an additional discriminating and integrity mechanism in the RADIUS Extended Protocol, and only require requirement in the session of expansion authentication protocol (EAP).Though hiding, attribute supports that RADIUS does not provide the confidentiality of each grouping.When chargeing, the RADIUS account hypothesis is reset and is protected the bill server by the rear end to provide, rather than provides in agreement oneself.
Reliable transmission problem: RADIUS operates on the UDP, and the not behavior of definition re-transmission; Consequently, reliability changes with different realizations.This will be a problem when chargeing, and losing of grouping will directly cause income to be lost.
Act on behalf of support issue: RADIUS does not provide the obvious support to the agency, comprises the agent, is redirected and relaying.Because the behavior of expectation is definition not, different realizations is different.
The message problem that server is initiated: the front has been mentioned RADIUS and has been adopted model of client, though defined the message that radius server is initiated in dynamically differentiating, supports it but is optional.This realize connection as non-request disconnect or stride in the heterogeneous network as required differentiate/authorize again to be to be difficult to realize again.
Auditing possibility problem: RADIUS does not have definition of data object security mechanism, and consequently incredible agency can revise attribute or packets headers and not be found.Together with the support to capability negotiation, this is difficult to determine when disputing.
Capability negotiation problem: RADIUS does not support fault processing, capability negotiation or is the necessary/nonessential sign of attribute.Because RADIUS client and server are not known ability each other, the negotiation that they can not be successful is bipartite accepts service, perhaps in some cases, even can not know which service is implemented.
The other side finds and allocation problem: RADIUS realizes typically requiring server or client's the name and the manual configuration of address, together with corresponding shared secret.This will cause big administrative loads, and drawing template establishment reuses the RADIUS shared secret, and this will cause safe fragility.
Use the CHAP agreement to carry out authentication in sum merely, use radius protocol to carry out message transmission, all can not solve the two-way discriminating problem between the user and network in the mobile communication, can not effectively prevent the eavesdropping of physical layer, Replay Attack, there is the COMSEC insecurity between user and the access server NAS in dictionary attack.
Summary of the invention
In the communication network in modern times, the user wants the accesses network resource, at first will carry out the user-network access authentication, and the process of its discriminating is exactly the legitimacy of identifying user identity, could authorize the customer access network resource after discriminating is finished, and the customer access network resource is carried out accounting management.In general, discrimination process is finished by three entities: mobile node MN or title user, authenticator (Authenticator, in access network access server NAS, realize), aaa server (Authentication, Authorization and Accounting, discriminating, mandate and accounting server).Be connected for wireless channel between user MN and authenticator; For wire message way is connected, the communication transport protocols of the two is a radius protocol between authenticator and aaa server.
The objective of the invention is to: provide existing aaa server that user MN networking identity legitimacy is differentiated; prevent physical layer eavesdropping, Replay Attack, resist dictionary attack; also having user MN that aaa server is carried out authenticity differentiates; effectively carry out self-protection, a kind of strong discrimination method that adopts public key cryptography algorithm for encryption pattern of secure communication between user and access server or the authenticator in the realization 3G (Third Generation) Moblie.
The objective of the invention is that following technology discrimination process realizes by implementing:
A kind of strong discrimination method that adopts public key cryptography algorithm for encryption pattern, it is right to comprise that user MN has the open code key, privacy key wherein is by the preservation of user MN safety, public-key cryptography is kept in the aaa server, if intermediary aaa server is arranged, public-key cryptography is kept in the ownership AAAA server, and it is right that aaa server has the open code key, privacy key is wherein preserved by aaa server safety, and its public-key cryptography then needs to be had by user MN; The total message integrity key that carries out message integrity process of user MN and aaa server, the generation that the open code key is right and the assigning process of public-key cryptography are the outer processes of a band; Communicating by letter between user MN and authenticator is wireless channel; Communication protocol between authenticator and the aaa server adopts radius protocol.
It is characterized in that discrimination process carries out successively as follows:
1, user MN starts shooting in certain sector SC coverage of certain base station controller, sets up process by Radio Link, obtains the wireless transfer channel resource;
2, authenticator sends identity request to user MN, and request user MN returns its identity information;
3, user MN returns the IMSI information of self to authenticator, and sets up and differentiate session;
4, authenticator sends discriminating request/IMSI according to the IMSI identity information of user MN to its corresponding aaa server;
5, after aaa server is received and differentiated request/IMSI, from corresponding database, find public-key cryptography and the message integrity key of user MN, set up discriminating session with MN; Aaa server produces a random number R andA, and the public key encryption with user MN obtains En (RandA), sends response/En (RandA) to authenticator then;
6, authenticator is received the response/En (RandA) that sends from aaa server, sends to user MN then and differentiates request/En (RandA);
7, user MN receives the discriminating request En (RandA) that aaa server sends by authenticator, with the privacy key deciphering of oneself, obtained random number R andA, and RandA is made T conversion acquisition random number ring number Rand_A, produce a random number R andC simultaneously, public key encryption RandC and Rand_A and postpone usefulness aaa server obtains En (RandC+Rand_A), sends response/En (RandC+Rand_A) to authenticator then;
8, authenticator is received response/En (RandC+Rand_A) that user MN sends, and sends to aaa server then and differentiates request/En (RandC+Rand_A);
9, aaa server is received discriminating request/En (RandC+Rand_A) that authenticator sends, at first with the privacy key deciphering of oneself, obtain random number R andC and random number response Rand_A, relatively whether RandA is consistent with Rand_A, if inconsistent, differentiate failure; If differentiate successfully, aaa server obtains Rand_C by RandC by the T conversion, and obtains En (Rand_C) with the public key encryption of MN, and identity information IMSI, random number R andA, the RandC with the user obtains session key SK by the K conversion then; And with IMSI, RandA, RandC and message integrity key, calculate whole discriminating exchange integrity value HASH (m), will respond/En (Rand_C)+SK+HASH (m) then and send to authenticator by MAC;
10, authenticator is received response/En (Rand_C)+SK+HASH (m) that aaa server sends, and extracts session key SK and HASH (m); Broadcast key BK is encrypted with session key SK, send to user MN then and differentiate request/En (Rand_C)+En (BK);
11, after user MN receives discriminating request/En (Rand_C)+En (BK) that authenticator sends, at first obtain Rand_C with own private cipher key deciphering En (Rand_C), relatively whether RandC is consistent with Rand_C, if unanimity is then differentiated successfully; Identity information IMSI, the random number R andA that aaa server produces, the random number R andC that user oneself generates according to oneself obtains session key SK by the K conversion then, and deciphering En (BK) obtains broadcast key BK; According to ISMI, RandA, RandC and message integrity key, calculate whole discriminating exchange integrity value HASH (M) then, will respond HASH (M) again and send to authenticator by MAC;
12, after authenticator is received the response HASH (M) that user MN sends, relatively HASH (M) and HASH (m), if consistent, then discrimination process successfully can be carried out follow-up processing.
The invention has the advantages that: realized the discrimination process of aaa authentication system, can be used for user MN access service.Though adopted the public key cryptography algorithm, owing to the aaa authentication system only need carry out differentiating between user and the server, thereby can be without the architecture of PKI.System in addition can be in aaa server to have the key of a special use right for each user's discriminating, only need the right identifier of definition key just passable.Adopt this method in the aaa authentication system, will make system management easy, its key management complexity is O (n).Discrimination method of the present invention is two-way discriminating; existing user is to the discriminating of aaa server; the discriminating of aaa server to the user also arranged; can carry out self-protection; can prevent the eavesdropping of physical layer, prevent Replay Attack, can resist dictionary attack; can produce session key or assign sessions key, be used for safe communication between user and the access server NAS.
Description of drawings
Fig. 1 is bidirectional identification discrimination process figure of the present invention
Fig. 2 is a communication process flow chart of the present invention
Mark death refers to not existence of physical connection among the figure; Mark is set up expression link establishment state; Mark authentication expression discrimination process or differentiates successfully or differentiate failure, token network is represented to use Internet resources, and mark stops representing the state of termination of communicating by letter.
Embodiment
Content is mainly described the concrete application of discrimination method of the present invention in ppp protocol in this section.
In order to set up communication by point-to-point link, each end of ppp link must at first send the LCP grouping so that set and tests data-link.After link establishment well, the opposite end just can be differentiated.Then, PPP must send the NCP grouping so that select and set one or more network layer protocols.In case each selecteed network layer protocol all has been set, just can on link, send from the packet of each network layer protocol.Link will keep communicate configuration constant, close link up to direct LCP and NCP grouping, or when some external events take place (timer expiration of dormant state or network manager interfere).Setting, keep and stopping in the process of point-to-point link, ppp link is through several clearly stages, as shown in Figure 2.This figure does not provide all state exchanges.
Link death (physical connection does not exist)
Link necessarily begins and ends at this stage.When pointing out that physical layer is ready, PPP will enter link establishment phase when an external event (for example carrier sense or network manager set).In this stage, the LCP automaton will be in initial condition, will be to a UP startup of LCP automaton event signal to the conversion of link establishment phase.Attention: after disconnecting with modulator-demodulator, link will return this stage automatically.In with hard-wired link, weak point-only enough existence of detection equipment that this stage is suitable.
Link establishment phase
LCP is used to exchange configuration information grouping (Configure packets), connects.In case a configuration successful, information block (Configure-Ack packet) is sent out and is received, and has just finished exchange, has entered the LCP opening.All config options are all supposed and are Used Defaults, and change unless be configured the clearing house.Have any to note: the config option that does not only rely on the special network layer protocol is just disposed by LCP.In network layer protocol phase, the independently configuration of network layer protocol is handled by Network Control Protocol (NCP) independently.Any non-LCP grouping that receives in this in stage must quilt abandoning silently.Receive that LCP Configure-Request (LCP configuration requirement) can make link turn back to link establishment phase from network layer protocol phase or authentication phase.
The discriminating stage
On some links, before allowing the network layer protocol packet switching, an end of link may need the opposite end to be differentiated.The discriminating of acquiescence does not need to execute.Wish that the opposite end differentiates that according to a certain specific authentication protocol it must require to use this authentication protocol at link establishment phase so if once carry out.Should after link establishment, differentiate immediately as far as possible.And the link-quality inspection can take place simultaneously.In once carrying out, forbid because the quality examination of exchange link is divided into groups, and will differentiate this way of backward delay indefinitely.Before discriminating is finished, forbid advancing to network layer protocol phase from the discriminating stage.If differentiate failure, should be transitted to the link termination phase by the side of discriminating.In this stage, have only LCP, authentication protocol and link-quality to monitor that the grouping of agreement is allowed to.The grouping of other that receive in this stage must be by abandoning silently.Attention: in realization, only be because overtime or not reply with regard to the failure that causes discriminating be not right.Discriminating should allow certain to transmit again, only after failure is attempted in the discriminating of several times, just enters the link termination phase in the time of unavoidable.In discriminating, which side has refused the opposing party's discriminating, and which side will be responsible for beginning the link termination phase.Discrimination method of the present invention just uses in this stage.
Network layer protocol phase
In case PPP has finished the stage of front, each network layer protocol (for example IP, IPX, or AppleTalk) must be set respectively by suitable Network Control Protocol (NCP).Each NCP can be opened and closed at any time.Attention: detect because to need at first once to realize a large amount of time to be used for link-quality, so when waiting for peer setting NCP, execution should be avoided using fixing overtime.When a NCP is in the Opened state, PPP will carry corresponding network layer protocol grouping.When corresponding N CP was not in the Opened state, any network layer protocol that is supported grouping that receives all will be by abandoning silently.Attention: when LCP was in the Opened state, any protocol packet of not supported by this execution must be returned in Protocol-Reject.The agreement of having only support is just by abandoning silently.In this stage, the link communication amount is by LCP, any possible the constituting jointly of NCP and network layer protocol grouping.
The link termination phase
PPP can stop link at any time.The reason that causes the link termination is a lot: loss of carrier, discriminating failure, link-quality failure, idling cycle timer expiration or keeper close link.
LCP stops link with the method for exchange Terminate (termination) grouping.When link just was closed, PPP informing network layer protocol was so that they can take correct action.After exchange Terminate (termination) grouping, execution should notify physical layer to disconnect, so that compulsion links stops, especially when differentiating failure.The sender of Terminate-Request (termination-requirement) after receiving Terminate-Ack (termination-permission), perhaps after restarting the counter expiration, should disconnect connection.Receive the side of Terminate-Request, should wait for that the opposite end goes to cut off, after sending Terminate-Request, at least also will just allow disconnection through a Restart time (reboot time).PPP should advance to the dead stage of link.Any non-LCP grouping of receiving in this stage, must quilt abandoning silently.It is just enough that LCP closes link, do not need each NCP to send one and stop grouping.On the contrary, a NCP closes the termination that but is not enough to cause ppp link, even that NCP is a current unique NCP who is in the Opened state.

Claims (1)

1, a kind of strong discrimination method that adopts public key cryptography algorithm for encryption pattern, it is right to comprise that user MN has the open code key, privacy key wherein is by the preservation of user MN safety, public-key cryptography is kept in the aaa server, if intermediary aaa server is arranged, public-key cryptography is kept in the ownership AAAA server, and it is right that aaa server has the open code key, privacy key is wherein preserved by aaa server safety, and its public-key cryptography then needs to be had by user MN; The total message integrity key that carries out message integrity process of user MN and aaa server, the generation that the open code key is right and the assigning process of public-key cryptography are the outer processes of a band; Communicating by letter between user MN and authenticator is wireless channel; Communication protocol between authenticator and the aaa server adopts radius protocol.
It is characterized in that discrimination process carries out successively as follows:
A, user MN start shooting in certain sector SC coverage of certain base station controller, set up process by Radio Link, obtain the wireless transfer channel resource;
B, authenticator send identity request to user MN, and request user MN returns its identity information;
C, user MN return the IMSI information of self to authenticator, and set up and differentiate session;
D, authenticator be according to the IMSI identity information of user MN, sends to its corresponding aaa server and differentiate request/IMSI;
After e, aaa server are received and differentiated request/IMSI, from corresponding database, find public-key cryptography and the message integrity key of user MN, set up discriminating session with MN; Aaa server produces a random number R andA, and the public key encryption with user MN obtains En (RandA), sends response/En (RandA) to authenticator then;
F, authenticator are received the response/En (RandA) that sends from aaa server, send to user MN then and differentiate request/En (RandA);
G, user MN receive the discriminating request En (RandA) that aaa server sends by authenticator, with the privacy key deciphering of oneself, obtained random number R andA, and RandA is made T conversion acquisition random number ring number Rand_A, produce a random number R andC simultaneously, public key encryption RandC and Rand_A and postpone usefulness aaa server obtains En (RandC+Rand_A), sends response/En (RandC+Rand_A) to authenticator then;
H, authenticator are received response/En (RandC+Rand_A) that user MN sends, and send to aaa server then and differentiate request/En (RandC+Rand_A);
I, aaa server are received discriminating request/En (RandC+Rand_A) that authenticator sends, at first with the privacy key deciphering of oneself, obtain random number R andC and random number response Rand_A, relatively whether RandA is consistent with Rand_A, if inconsistent, differentiate failure; If differentiate successfully, aaa server obtains Rand_C by RandC by the T conversion, and obtains En (Rand_C) with the public key encryption of MN, and identity information IMSI, random number R andA, the RandC with the user obtains session key SK by the K conversion then; And with IMSI, RandA, RandC and message integrity key, calculate whole discriminating exchange integrity value HASH (m), will respond/En (Rand_C)+SK+HASH (m) then and send to authenticator by MAC;
J, authenticator are received response/En (Rand_C)+SK+HASH (m) that aaa server sends, and extract session key SK and HASH (m); Broadcast key BK is encrypted with session key SK, send to user MN then and differentiate request/En (Rand_C)+En (BK);
After k, user MN receive discriminating request/En (Rand_C)+En (BK) that authenticator sends, at first obtain Rand_C with own private cipher key deciphering En (Rand_C), relatively whether RandC is consistent with Rand_C, if unanimity is then differentiated successfully; Identity information IMSI, the random number R andA that aaa server produces, the random number R andC that user oneself generates according to oneself obtains session key SK by the K conversion then, and deciphering En (BK) obtains broadcast key BK; According to ISMI, RandA, RandC and message integrity key, calculate whole discriminating exchange integrity value HASH (M) then, will respond HASH (M) again and send to authenticator by MAC.
CN 200410021866 2004-02-20 2004-02-20 Strong discrimination method of enciphered mode by public key cryptographic algorithm Expired - Fee Related CN1658553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410021866 CN1658553B (en) 2004-02-20 2004-02-20 Strong discrimination method of enciphered mode by public key cryptographic algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410021866 CN1658553B (en) 2004-02-20 2004-02-20 Strong discrimination method of enciphered mode by public key cryptographic algorithm

Publications (2)

Publication Number Publication Date
CN1658553A true CN1658553A (en) 2005-08-24
CN1658553B CN1658553B (en) 2011-04-27

Family

ID=35007828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410021866 Expired - Fee Related CN1658553B (en) 2004-02-20 2004-02-20 Strong discrimination method of enciphered mode by public key cryptographic algorithm

Country Status (1)

Country Link
CN (1) CN1658553B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008065341A2 (en) 2006-12-01 2008-06-05 David Irvine Distributed network system
CN101325804B (en) * 2007-06-11 2011-04-20 华为技术有限公司 Method, device and system for acquiring cryptographic key
CN101034979B (en) * 2007-04-10 2011-05-11 中兴通讯股份有限公司 Protection method for user identify
CN102244861A (en) * 2011-08-14 2011-11-16 北京理工大学 Method for generating symmetric keys based on random state of wireless channel
CN102577224A (en) * 2009-08-07 2012-07-11 茂福公司 Method for searching for an entity using a verifier device, and related devices
CN105138870A (en) * 2015-10-08 2015-12-09 浪潮(北京)电子信息产业有限公司 Chip legality authentication method and device
CN105282168A (en) * 2015-11-06 2016-01-27 盛趣信息技术(上海)有限公司 Data interaction method and data interaction device based on CHAP protocol
CN107508847A (en) * 2016-06-14 2017-12-22 阿里巴巴集团控股有限公司 One kind connection method for building up, device and equipment
CN109586915A (en) * 2017-09-29 2019-04-05 国民技术股份有限公司 Automobile no-key controls authentication method, user terminal, car-mounted device and server
CN111132154A (en) * 2019-12-26 2020-05-08 飞天诚信科技股份有限公司 Method and system for negotiating session key

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6484258B1 (en) * 1998-08-12 2002-11-19 Kyber Pass Corporation Access control using attributes contained within public key certificates
US6532290B1 (en) * 1999-02-26 2003-03-11 Ericsson Inc. Authentication methods

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2472430A1 (en) 2006-12-01 2012-07-04 David Irvine Self encryption
WO2008065341A2 (en) 2006-12-01 2008-06-05 David Irvine Distributed network system
CN101034979B (en) * 2007-04-10 2011-05-11 中兴通讯股份有限公司 Protection method for user identify
CN101325804B (en) * 2007-06-11 2011-04-20 华为技术有限公司 Method, device and system for acquiring cryptographic key
CN102577224B (en) * 2009-08-07 2016-01-13 茂福公司 Be applicable to use authenticate device to retrieve method and the device thereof of entity
CN102577224A (en) * 2009-08-07 2012-07-11 茂福公司 Method for searching for an entity using a verifier device, and related devices
CN102244861B (en) * 2011-08-14 2013-09-18 北京理工大学 Method for generating symmetric keys based on random state of wireless channel
CN102244861A (en) * 2011-08-14 2011-11-16 北京理工大学 Method for generating symmetric keys based on random state of wireless channel
CN105138870A (en) * 2015-10-08 2015-12-09 浪潮(北京)电子信息产业有限公司 Chip legality authentication method and device
CN105138870B (en) * 2015-10-08 2018-09-07 浪潮(北京)电子信息产业有限公司 A kind of chip validity discrimination method and device
CN105282168A (en) * 2015-11-06 2016-01-27 盛趣信息技术(上海)有限公司 Data interaction method and data interaction device based on CHAP protocol
CN105282168B (en) * 2015-11-06 2019-02-05 盛趣信息技术(上海)有限公司 Data interactive method and device based on CHAP agreement
CN107508847A (en) * 2016-06-14 2017-12-22 阿里巴巴集团控股有限公司 One kind connection method for building up, device and equipment
US10868801B2 (en) 2016-06-14 2020-12-15 Banma Zhixing Network (Hongkong) Co., Limited Method and system for establishing connection
CN109586915A (en) * 2017-09-29 2019-04-05 国民技术股份有限公司 Automobile no-key controls authentication method, user terminal, car-mounted device and server
CN111132154A (en) * 2019-12-26 2020-05-08 飞天诚信科技股份有限公司 Method and system for negotiating session key

Also Published As

Publication number Publication date
CN1658553B (en) 2011-04-27

Similar Documents

Publication Publication Date Title
JP3863852B2 (en) Method of controlling access to network in wireless environment and recording medium recording the same
US8515078B2 (en) Mass subscriber management
US6487598B1 (en) Virtual dial-up protocol for network communication
EP3267653B1 (en) Techniques for authenticating a subscriber for an access network using dhcp
RU2372734C2 (en) Method and device for reauthentication in cellular communication system
TWI293844B (en) A system and method for performing application layer service authentication and providing secure access to an application server
US7421578B1 (en) Method and apparatus for electing a leader node in a computer network
US6754712B1 (en) Virtual dial-up protocol for network communication
KR101325790B1 (en) Distributed authentication functionality
CN1455556A (en) Wireless LAN safety connecting-in control method
JP2003234786A (en) Communication system including private base station controller for securing radio data for private/public network wireless packet data services and authentication method according to internet connection request of mobile terminals receiving the services
RU2424628C2 (en) Method and apparatus for interworking authorisation of dual stack operation
CN101867476A (en) 3G virtual private dialing network user safety authentication method and device thereof
WO2000062480A2 (en) Apparatus and method for transmitting messages across different multicast domains
WO2004008715A1 (en) Eap telecommunication protocol extension
US20090031395A1 (en) Security system for wireless networks
CN1658553B (en) Strong discrimination method of enciphered mode by public key cryptographic algorithm
JP3792648B2 (en) Wireless LAN high-speed authentication method and high-speed authentication method
CN101547158A (en) PADT message interaction method and device in PPPoE session
CN100490375C (en) Strong authentication method based on symmetric encryption algorithm
CN100428667C (en) Strong authentication method for digital signature mode using public key encrgption algorithm
CN1225870C (en) Method and apparatus for VLAN based network access control
CN1225941C (en) Roaming access method of mobile node in radio IP system
CN1802817A (en) Method and network for WLAN session control
JP5381622B2 (en) Wireless communication system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110427

Termination date: 20200220