WO2005031619A2 - Setup and application of mapping cryptogram and device and method thereof - Google Patents
Setup and application of mapping cryptogram and device and method thereof Download PDFInfo
- Publication number
- WO2005031619A2 WO2005031619A2 PCT/CN2004/001101 CN2004001101W WO2005031619A2 WO 2005031619 A2 WO2005031619 A2 WO 2005031619A2 CN 2004001101 W CN2004001101 W CN 2004001101W WO 2005031619 A2 WO2005031619 A2 WO 2005031619A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- information
- security
- digital signature
- group
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- the invention belongs to the field of information technology security and relates to information security services: identity authentication, information integrity authentication, and non-repudiation. Background technique
- Authentication of identity usually includes identity credentials, seal or handwritten signature, user ID and simple password, biometric system
- PKI public key infrastructure
- Identity credentials and handwritten signatures usually exist in physical form, which is easy to forge, difficult to distinguish, and inconvenient to exchange information; simple passwords are easy to be compromised or stolen; biometrics, authentication tokens, and smart cards are vulnerable to a series of attacks and use The cost is high; the combined authentication method is a combination of a password and an authentication method such as an authentication token, which relatively improves security.
- Public key infrastructure (PKI) is currently a more feasible solution, but its implementation is relatively complicated. For strict transactions, complicated measures such as adding time stamps are difficult for ordinary people to understand, and there are also hidden security risks in practical applications.
- Information integrity can usually be checked with a message digest code.
- Data transmitted over the network is usually implemented using digital signatures using public key cryptography, or using Secure Sockets Layer (SSL) or Internet Security Protocol (IPSec).
- SSL Secure Sockets Layer
- IPSec Internet Security Protocol
- Non-repudiation is usually achieved using digital signature methods using public key cryptography.
- Current security technologies :
- Biometric system fingerprint, iris, etc. authentication
- Magnetic cards are easy to copy. Although they are currently used in large quantities, they are gradually being phased out due to their insufficient security. Various authentication tokens and smart cards are relatively difficult to copy. Various IC cards are now being promoted and used, but they require expensive access equipment and a large number of trusted terminals, and the promotion is slow.
- the Internet Security Protocol is an information security technology based on the network layer in the Open System Interconnection (OSI) model.
- Open System Interconnection The OSI model divides the communication model hierarchy into seven layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.
- the Internet Security Protocol ensures the confidentiality, integrity, and authenticity of data communications through public IP networks through encryption and authentication at the network layer.
- the above protocol layers can be used transparently.
- SSL Secure Sockets Layer
- the Secure Sockets Layer ensures the confidentiality, integrity, and authenticity of data communications by establishing a secure channel between two parties in a communication.
- the Secure Sockets Layer (SSL) is now widely used on the Internet.
- the digital signature is obtained by calculating the message digest of the message, and then encrypting the message digest with the private key using the public key cryptosystem.
- the digital signature is decrypted with the public key and the message digest obtained from the message is calculated. Compare, if the same, then the verification is correct. Only the person who has the private key can calculate the digital signature through encryption, and realize the data authentication, data integrity, and non-repudiation through the uniqueness of the digital signature.
- Digital signature applications usually have a public key infrastructure (PKI) and a timestamp service (TSS).
- PKI public key infrastructure
- TSS timestamp service
- Public key infrastructure is the management service and process of user certificates for public key cryptosystems.
- Digital signature is the current actual security standard, and it is an encryption method that is difficult to crack with current calculation methods, speed and time. With the current development of hardware and software, the speed of hardware is constantly accelerating, and distributed computing methods are widely used. After a few years, the digital signature standard will be modified. In theory, digital signatures can be cracked from three aspects: (a) Cryptographic attack methods. The large prime numbers taken by the RSA algorithm are usually within a certain range. As long as the range of prime numbers is traversed by the exhaustive method, the corresponding password can be found. This method is currently not practical.
- (C) Digital signature replay attack method Collect the digital signatures used by users, decrypt them to obtain the message digest code, and keep a piece of information that can be arbitrarily longer than the signature length in the message that needs to be signed, such as the serial number of the product, or other numbers, and constantly change the variable information.
- the exhaustive method is used to calculate the message digest of the message. Because the message digest algorithm has pseudo-randomness, as long as the variable information is of sufficient length, a message digest can always be found with the same message digest code as the decrypted message. put.
- Secure electronic transactions are protocols that provide a secure framework for shopping and payment in open network Internet e-commerce transactions. It is based on digital signature technology and introduces and uses double signatures. Because of the use of double signatures, its security is higher than that of single digital signatures (especially difficult to implement replay attacks), but the use is more complicated and currently not widely used.
- the combined authentication method is to combine multiple security methods and use them together to increase the security of use, such as adding digital password authentication while using digital certificates.
- network communication is the most open part.
- security of data communication is more emphasized, and various high-strength encryption methods are used.
- a Trojan program may completely expose your information, passwords may be leaked, certificates may be stolen, and even the software program interface you use looks like The same, but it may have been replaced.
- For the service provider a large amount of manpower, material resources, and technology can be invested to support the establishment of a high-security firewall or protocol isolation with the support of a large amount of funds. Even so, it is not 100% secure.
- the one-time-one-cipher system converts plaintext sequences with equal-length key sequences into equal-length ciphertext sequences. Caesar's replacement method is usually used. Binary data is usually encrypted with an exclusive-OR algorithm. Knowing the ciphertext sequence and the corresponding key sequence Reverts back to plain text sequences of equal length.
- the one-time-one-cipher system is a theoretically unbreakable cryptographic system, and its plaintext, key, and ciphertext sequence are of equal length. Because the algorithm is public, of the three sequences of plaintext, key, and ciphertext, knowing two of them can derive the third sequence.
- Block cipher and stream cipher (serial cipher).
- Block cipher is to encrypt data blocks with a password. It is used periodically for each block cipher.
- Stream cipher is to use a password to generate a pseudo-random key stream (usually mixed with encrypted data), and then encrypt the data stream.
- Message Digest 3 ⁇ 4 is an algorithm that combines inputs of any length to produce a pseudo-random output of a fixed length, also known as hashing or hashing.
- HMAC Message authentication checksum
- the technical problem to be solved by the solution of the present invention is mainly information security services in an open environment, including security identity authentication, security information exchange, ensuring information integrity and non-repudiation.
- This technology can also be applied to closed environments.
- the so-called open environment refers to a state in which the information is temporarily hidden or the place passed during the communication process is not hidden, and the outside world can easily obtain the information, easily copy or change it.
- the Internet, telephone lines, radio communications, and public terminals are all open environments.
- a closed environment is an environment in which information is not easily exposed, copied, and changed compared to an open environment.
- IPSec Internet Security Protocol
- SSL Secure Sockets Layer
- PKI Public Key Infrastructure
- the latter are application-layer-based security technologies.
- OSI Open System Interconnection
- Other application layer security methods are mostly based on various protocols based on public key infrastructure (PKI) digital signatures.
- PKI public key infrastructure
- any digital signature or protocol that can be authenticated by a third party offline non-real time is not very secure because it can be authenticated offline, It means that the attacker can try authentication for an unlimited number of times, so in theory, the attacker can always use exhaustive methods to find the results that meet the requirements.
- X and Y be two non-empty sets. If there is a rule such that for each element in X, according to the rule, there is a uniquely determined element in Y corresponding to it, then it is called a mapping from X to Y. Referred to as
- Mapping is the process by which a variable corresponds to another variable through a certain rule.
- the starting variable is the independent variable, and the corresponding variable is the dependent variable.
- the mapping password divides the password information into two parts, one of which is a mapping corresponding to the change of the corresponding law, which is called a contingency password, which is recorded as a set ⁇ , and the other part is a password source, which is recorded as a set.
- a new set of information is obtained through the transformation of some elements of the cryptographic source using a certain model or a corresponding rule, and it is recorded as a set! ⁇ / 1.
- mapping relationship is the mapping of the new model set M to the cryptographic source ya.
- mapping that is, for each determined new model set M element, a unique rule can be found from the cryptographic source ⁇
- the identified elements correspond to them.
- the elements of the new set M can correspond to the cryptographic source elements in a multi-law, many-to-one correspondence.
- the new set M is a new set of cryptographic source sets converted through various rules and multiple types.
- the new set M can be a new set formed based on a model based on a set of password sources, or a set of new elements generated by various elements of the cryptographic source through one-way hash functions and other rules.
- the relationship can be written in another form as follows
- the corresponding rule combined with the strain code corresponds to a certain logical position in the new set M model, so as to correspond to a certain element in the set M, and then passes a certain rule (usually a single Directional rules, such as one-way hash functions, are combined into a new password.
- a certain rule usually a single Directional rules, such as one-way hash functions, are combined into a new password.
- f B L X ⁇ M, f B X, M, N combined is a composite mapping: f B : (X, f B X)) ⁇ N
- the use of the password becomes periodic and integrated, and on the other hand, because the new password is easy to use after use Exposing, the direct law relationship of the original password is easy to guess. Real In fact, as long as the correspondence rule of the mapping cipher method is simplified, the above situation can be obtained.
- mapping cryptographic relationship is that the independent variable points to or corresponds to the relevant element formed by the corresponding cryptographic source model through some kind of law or algorithm related to the strained cryptography to form new cryptographic information. This correspondence does not directly generate a new password through an algorithm, but only corresponds to the relevant elements of the password source according to a certain preset model, and then combines with a certain rule to form a new password.
- a cryptographic source is a logically ordered collection of cryptographic information elements with pseudo-randomness. Through a set model, each element can be recombined to form new information.
- the cryptographic source does not have any algorithmic relationship directly with the secret information to be encrypted or the encrypted plain code. Only the new password formed by recombination directly participates in the encryption operation.
- the password source elements can be rearranged according to the number into an ordered arrangement of a certain length, or the password source elements can be arranged into a cube according to the physical model, and so on. There can be various models.
- Contingency passwords are information associated with corresponding laws or algorithms. New password information is not obtained directly from contingency passwords. Contingency passwords are one of the elements of a changing correspondence.
- the contingency cipher can also be divided into multiple parts according to the multi-layer correspondence. For example, the contingency cipher part is used as a new mapping cipher relationship, which can form multiple correspondences.
- the contingency password and the password source may have part or all of the same part, that is, part or all of the intersection. Therefore, the response password and the password source are divided according to the purpose of use.
- the independent variables of the mapping password relationship can be various variables, random variables, or ordered variables. Take a simple example of a mapped password.
- the independent variable uses a sequence number. Starting from 1, the corresponding algorithm can use a one-way function. In combination with the strain code, a pseudo-random correspondence can be formed. The pseudo-random corresponds to the corresponding number. If the number of uses is less than 3 ⁇ 4 2 8 8 times, then Its security effect is similar to one-time one-time password (because any algorithm can be broken, so it is not safe to use only one-way function without strain strain password. The longer the strain password, the more likely it is, the corresponding relationship The more complicated it is.), The amount of data that can be encrypted is 3 ⁇ 4 8 * 128 bits!
- a 1024-bit password can only encrypt 1024-bit data, and after the information is made public, the password will be cracked through the relationship between the ciphertext and the plaintext.
- the encrypted password method is used and then encrypted, and the same encryption algorithm is used, even if the ciphertext and plaintext are known, only the mapped password can be obtained.
- the mapped password is a new password based on a one-way function and a strained password. It only contains part of the information related relationship of the original password, or part of the related information of the element, the original password information still cannot be completely cracked.
- the password is generally longer.
- the password length can usually be more than 1024 bits or even 1 M or more.
- the original password information does not directly participate in the encryption operation. Only the new password formed by the mapping directly participates in the encryption operation. This makes the original password information difficult to leak. Generally, a new password formed by not all but only part of the original password information forms a relationship with the secret information to be encrypted or the encrypted plain code through some algorithm or rule. In this way, the password information used every time is basically different, which makes it impossible to use ordinary guessing methods to guess the password information.
- the password usually has some information (contingency password) related to the logical position of the logical model formed by the partial password (password source), so it is extremely difficult to guess the password information by analyzing the encryption result.
- the new passwords that are available are likely to be different (or different sources), and their use effect can be close to one-time passwords.
- the password information element is reused after multiple combinations and changes.
- the password information of the mapped password is usually relatively long, and is generally more than 1024 bits.
- mapping cipher In the traditional cryptographic technology, the clear code is obtained by encrypting the information by using a certain algorithm. All three of these relationships are related. However, in the mapping cipher technology, the information to be encrypted and the encrypted plain code are only related to part of the cipher information through a rule. Similarities and differences between mapping ciphers and stream ciphers (serial ciphers):
- Stream cipher is to use a password to generate a pseudo-random key stream (usually mixed with encrypted data), and then encrypt the data stream. As long as the password and encrypted information are determined, the key stream is also determined. Now, the entire encrypted information and process can be determined. However, the mapping password needs to be given an argument to generate a new password, which is then encrypted. The key stream can also be obtained by the ordered arrangement of new passwords obtained from multiple arguments. If encrypted data is used as an independent variable, stream ciphers can also be considered as a special case of mapped ciphers: the cipher model is an overall cipher, with a usage period of 1, there is no strain cipher or the strain cipher is empty.
- the password usage period of the stream password is 1, and the password usage period of the mapped password is usually large.
- mapping passwords usually use different password information to participate in the encryption algorithm operation each time.
- the mapped password has the following characteristics ⁇
- the password information is divided into two parts according to the purpose: one part is used as the mapping corresponding law change relationship, which is called strain password, which is recorded as set B, and the other part is used as the password source, which is recorded as set ya.
- the cryptographic source obtains a new set of information by applying a transformation of a certain model or a corresponding rule, and records it as set M. Use the mapping method as
- the corresponding rule combined with the strain code is mapped to a certain logical position in the new set M model, so as to correspond to a certain element in the set M, and then passed a certain rule (usually Is a one-way rule, such as a one-way hash function) is combined into a new password, and the set of independent variables is X, the new password
- a certain rule usually Is a one-way rule, such as a one-way hash function
- f B L ⁇ ⁇ M, :(,)- ⁇ combined is a composite mapping: f B : (X, f B L (X)) ⁇ N
- mapping of the independent variables corresponds to the logical model formed by the cipher source, and then a new cipher is formed by a certain rule. It needs to be used in combination with independent variables.
- a password group is composed of one or two or more ordered passwords.
- a password group can complete an information task, and each password performs a different function.
- Each password group is assigned a number, which can be used to save, use and index this password group.
- the new password information obtained through the mapping of the arguments is the only determined password group, which is the mapping password group.
- the password group contains multiple ordered passwords. If the argument is used as the number of the cipher group, the numbered cipher group is obtained from the mapped cipher group.
- One-time numbered password group When the corresponding relationship is that the argument directly corresponds to a part of the password information to form a password group, and the password information is not reused, a one-time numbered password group is formed, and the argument is the corresponding number.
- the passwords in numbered cipher groups are randomly generated by different random seeds, are random numbers (repeably in fact, should be pseudo-random numbers strictly), and have randomness; Each password can only be used for valid authentication information once. Each password can be registered for the number of uses and can be invalidated based on the number of fault tolerances.
- the so-called "valid authentication information once" means that after one password or one group of information is authenticated with a password, other passwords cannot be used to authenticate other information, but the authenticated information can be repeatedly calculated and authenticated.
- mapping cipher group digital signature is expressed as follows:
- mapping cipher group digital signatures have the following characteristics:
- mapping cipher group uses an independent variable
- the digital signature is associated with the independent variable.
- the independent variable is only valid once. That is, after one or a group of information is authenticated with the mapped cipher group generated by the independent variable, it cannot be used again.
- the mapped cipher group generated by the argument authenticates other information.
- the password of the mapping cipher group has sufficient length, that is, the password space is large enough, so that for a message digest of a certain length, there are enough collisions, so that the collision space is close to or larger than the message digest space, and it is impossible to pass the message digest code. Brute force attacks reduce password security.
- the digital signature uses a mapped cipher group, and the password information has a long-period characteristic.
- the algorithm can be used publicly. The public use of the algorithm does not affect the security of the digital signature of the mapped cipher group.
- the client and the server share the password information of the mapping cipher group in advance, and store it encrypted.
- the server serves as a trusted institution.
- the message producer calculates the digital signature of the mapping cipher group for the message, and sends the message, arguments, and digital signature together.
- After the authenticator receives the information, as long as the digital signature is calculated and compared, if the digital signatures are consistent, the verification can be known.
- the information is complete and has not been altered, as it is almost impossible for any third party who is not sharing password information to obtain a digital signature that meets the requirements. Therefore, the digital signature of the mapped cipher group cannot be changed or forged.
- mapping cipher group digital signature cannot be reused. Because the mapping cipher group digital signature is associated with the argument, and the argument is only valid once, a mapping cipher group digital signature can only authenticate a message effectively once, and it cannot be used for other authentications. But for the same message, you can generate different digital signatures with different arguments.
- Non-repudiation that is, non-repudiation.
- the service party is a trusted entity. Based on its reputation, it uses a series of measures and systems to ensure its trustworthiness. The digital signature of any client must be verified by the service party. Once the verification is correct, it can be determined. Is issued by the customer.
- PKI public key infrastructure
- Message digests are used in the authentication process, and they all require trusted institutions to implement identity authentication, message integrity authentication, and non-repudiation.
- the two authentication methods and processes are different.
- the public key infrastructure (PKI) -based digital signature can be obtained by anyone who obtains the public key for authentication, and the authentication method is offline authentication, which does not require authentication by a third party. Mapping cipher group digital signature Must and can only be authenticated by a trusted service provider, the authentication method is online authentication.
- the password information of the two is also different.
- the digital signature of the Public Key Infrastructure (PKI) uses a private key and a public key password. Each time the same password information is used, the usage cycle is 1.
- the mapping password group digital signature is generally used for a long time. Use different password information each time.
- the digital signature of the mapped cipher group becomes a one-time numbered digital group digital signature.
- the digital signature of the one-time numbered cipher group is expressed as follows:
- One-time digital signature technology calculates the message digest using a one-way hash function based on a one-time password or one-time numbered cipher group with sufficient password length.
- the message authentication checksum is the message digest. For a message digest of a certain length, In the password space of the password length, there are enough collisions, so that the collision space is close to or larger than the message digest space, and it is impossible to reduce the security of the password from the message digest code through an exhaustive attack.
- the so-called one-time password means that the password can only be used for valid authentication information once.
- the one-time password usage period is infinite, so that using historical analysis methods or tools to analyze the encryption process or encryption results is useless for guessing password information.
- the step-by-step binding processing technology refers to that information tasks can be divided into multiple steps, which are respectively associated with different passwords and are completed in order. Its characteristics are:
- Each step has a verification of the information associated with the different passwords used in the other steps. In other words, some information (including the message digest) in each step must be related to some passwords, and these passwords have not been used in other steps. Each step must have its own unique password, which is a sign of distinguishing "steps".
- the password space is enhanced for more secure use.
- This information task can be bound with corresponding other information (such as the transaction terminal number).
- the transaction is carried out step by step. Even if the information of a certain step is intercepted, it still does not affect the overall security of the information task. For example, if someone lost all their documents during a trip, he could call family members or friends at another place to get a password (strictly speaking, it should be a one-time digital signature), and use a teller machine or other terminal (such ATM or terminal only needs to enter the correct one-time digital signature to withdraw money), but at the same time, someone may be tapping and withdrawing money on another ATM, but because the transaction uses step-by-step binding processing technology, it is connected with the terminal ATM For binding, the transaction is carried out in multiple steps.
- ATMs in both places cannot succeed at the same time, such as eavesdropping.
- a person cannot get the complete password information after the first step is successful, because his family or friends will only tell him the next password information after the previous step is successful. Only the real person may succeed in more than two steps at the same time. So the whole transaction is still safe.
- the identity can be identified through the initial steps. If it is a false identity, the remaining secret information will not be sent again to ensure the security of the entire task.
- Prevent human error Divide information tasks into multiple steps that can be completed by multiple customers. Prevents human error. For example, if A transfers funds to B's account, if A completes it, then A may mistake the account; if this task is divided into two steps, after A initiates the transfer transaction, it can be completed only after B confirms, which is avoided. Human error is possible.
- Controllable encryption technology method It refers to the method that the entire encryption process can be controlled or monitored manually. Its process cannot be fully automatic. Its characteristics are:
- Password information can only be read by encrypted software or hardware.
- the encryption process and content can be controlled or monitored manually. If only the necessary information of the encrypted part can be controlled, it is part of the controllable encryption, such as specifying the number of encryptions, the length of the encrypted data, the specific content of the encryption, or the part of the content that the encryption must include, or the specific content of the specific location of the data, Such as the account number and amount in the transfer. Sometimes partially controlled encryption can meet the needs of practical use. The number of times of encryption must be controlled, all or part of the encrypted content must be controlled or monitored manually, and all or necessary parts of the encrypted content must be confirmed before or after encryption.
- a simple and convenient controllable encryption method is to physically separate information encryption from information transmission.
- Length, etc. after locking the restriction conditions, it can be transmitted through other interfaces, such as serial port or USB interface, or even wireless communication, to transmit the remaining encrypted information; the encrypted information or one-time digital signature can also be displayed after Manual transmission, which is also conducive to manual monitoring, or transmitted through other interfaces such as serial port or USB interface, wireless communication interface, to achieve semi-automation, but the entire process can be controlled according to encryption needs, or the information is displayed after encryption. Manual monitoring is in line with the principle of controlled encryption methods, so it is not possible to fully automate the process. We put together the password storage and the encryption algorithm. The device whose encryption process conforms to the principle of the controllable encryption method is called a controllable encryption device.
- the feature of the controllable encryption device is that the password is stored in the device, and the password can be updated or supplemented. After the password is saved, the password information is no longer directly exchanged outside the device, and only the encrypted software or hardware in the device can read it;
- the encryption algorithm is implemented in the device, which can extract the password to encrypt or verify the input or locked information; the encryption device has a display device that can display all or part of the encrypted information for manual control or manual monitoring; the number of encryption can be Control, the encryption operation can only be performed after the number of encryptions is controlled on demand; semi-automatic encryption can be achieved after the necessary part of the encrypted content is controlled, or manually entered Full content control; use step-by-step binding processing technology for multi-step tasks, and then proceed to the next step after completing the previous step of encryption or verification.
- the device whose encryption process conforms to the principle of controlled encryption method is called one-time digital Signature device.
- the one-time digital signature device method has the following characteristics:
- the device can store, index and use a large number of one-time numbered password groups by number, and the password groups are stored confidentially.
- the password information is not necessarily visible, and is usually not visible. Only the encryption process can be used. The password information can be updated and supplemented at any time as needed. After the password group is saved, the password information is no longer directly exchanged outside the device, and only the encrypted software or hardware in the device can read it.
- the encryption process conforms to the principle of controlled encryption methods.
- the encryption operation can only be performed after the number of encryptions is controlled as needed; the encrypted information or encryption conditions can be controlled manually or in whole, and supervision can be performed after encryption.
- the encrypted information and encryption conditions After locking all or part of the encrypted information and encryption conditions, it can transmit and verify the information to be encrypted and one-time digital signature information through other interfaces, such as serial port or USB interface, radio communication interface, etc. After encryption, the encryption can be displayed. Information for monitoring.
- the calculation and verification of the one-time digital signature of the next step is performed only after the calculation and verification of the one-time digital signature of the previous response is correct, so as to prevent the artificial verification of the previous step that has not yet taken place. Passing the authentication revealed the next secret information.
- the device itself has a lock password, which can only be used after unlocking the password.
- One-time digital signature device can save customer information at the same time for easy use.
- OSI Open System Interconnection
- IPSec Internet Security Protocol
- SSL Secure Sockets Layer
- PKI public key infrastructure
- Customer and service technology model The two parties that directly exchange security information are divided into customer and service.
- the client is the party that initiated the request for information exchange, usually the party that requested the service.
- the service party is a relatively passive response to the request, the party that provides the information exchange, usually the party that provides the information service, and the service party is the trusted subject.
- Reliable information exchange between individual customers can be carried out by the service provider. Individual customers cannot directly exchange trusted information, but general information can be exchanged. Information reliability can be verified by the service provider.
- An information task or information event is composed of multiple information exchanges. The event information cannot be repeated, that is, there is no exactly the same information in the same information event.
- Information security objects are the main body of storage and processing of security information. After the security objects are formed, the security information sent by the objects must be marked with the object security mark, and the security information received and processed by the objects must be With the security sign of the other party, the security information sent or received cannot be forged and changed, and the security information must be marked with an event. Its characteristics are as follows:
- the security object stores and keeps its own security information, and the secret information is not directly transmitted to the outside.
- the security information sent or received by the security object must bear the security mark of the object.
- the security information used cannot be forged or changed.
- the information security mark will not conform to the information being forged or changed. Norms, except for trusted institutions, only this object can correctly generate its own information security mark.
- the safety information with safety signs sent or received by the security objects must include event signs.
- Event signs can be implemented in safety information or in safety signs.
- Security information can be copied, but it cannot be reused. That is, the security information of one event cannot be reused by another event. This makes it impossible to replay security information for different events. For the same event, it is impossible to replay without the same security information.
- General digital signatures only focus on the security of digital information that is signed, and the object of information security is to receive, process and Sending security information is abstracted as a whole.
- As a security object it integrates various security elements, such as password information, encryption methods, encryption processes, and so on.
- All security elements form a subject, which can be used as a box. You It can be kept in a safe place so that it can provide secure information.
- the advantages of security objects are the simplicity of security, the abstraction and centralization of security elements, so that security features can be separated from other various complex systems. For example, due to the application of open system interconnection, general terminals have become untrustworthy subjects, so we can extract all security elements from the terminals to form a security object.
- the security object has nothing to do with the communication and terminal used. As long as the security of the information security object is ensured, various communications and terminals can be used safely, even if the communication or terminal is unsafe and untrusted. Applying the concept of information security objects to the widely used public key infrastructure (PKI) -based digital signatures can also be very effective in strengthening security.
- PKI public key infrastructure
- the security mark can be implemented by digital signature.
- Customer security is a security object, and it is the main body of the customer to send, receive, and process security information. After the security of the customer is formed, the security information sent by the customer must be marked with the customer security mark, and the customer receives and processes The safety information must bear the service-side safety mark.
- safety inspections such as full inspections, element inspections, partial inspections, mixed inspections, etc., depending on the safety requirements.
- Service security is the main body that the service party sends, receives, processes and saves the security information.
- the security information sent by the service party must be marked with the service security mark, and the security information received and processed must bear the customer's security mark.
- the service provider does not process information without safety signs. Its characteristics are similar to customer security.
- service security is the subject that depends on service security. Without service security, there is no customer security. Service security is a trusted entity whose security is built on its reputation.
- the security object is an independent subject of security information and does not depend on any communication method or external environment. However, if the security object is invaded or destroyed, the security information may be leaked.
- Security object based on mapping cipher group digital signature and its information exchange process-if the client logo, password information, generation method of cipher group, mapping cipher group digital signature rule and process are secure All the elements are aggregated together to form an object, and the external information exchange of the object meets the characteristics and requirements of the secure object, and a client secure object based on the digital signature of the mapping cipher group is obtained.
- the service security object based on the digital signature of the mapping cipher group has the following basic characteristics ⁇
- the device composed of the above object characteristics is a security object device that maps a digital signature of a cipher group.
- the specific characteristics of the device method are:
- the device stores object information, including object number and password information.
- mapping cipher group is installed.
- a digital signature method for the message mapping cipher group is installed.
- a digital signature verification method for the message mapping cipher group is installed.
- the device implements the digital signature and verification process of the message mapping cipher group.
- Security object information exchange process for mapping cipher group digital signature :
- the client security object and the service security object share the password information of the mapped cipher group in a direct sharing manner.
- the password information is a cryptographic sequence with pseudo-random properties generated by the server.
- Each information task can be divided into multiple information exchange processes.
- the number of ordered passwords to be included in each password group is determined according to the information exchange number of the most commonly used tasks. For large information tasks, it can be divided into small information tasks.
- a customer security object When a customer security object needs to make a service request, it usually takes an ordered variable as an independent variable, selects an unused independent variable, and calculates a mapped password group using the password information through a mapping method.
- the client security object forms a service request message according to the service requirements.
- the client security object calculates a digital signature on the message with the first password of the password group.
- the customer sends the security information formed by the customer number, message, argument, and corresponding digital signature to the server.
- the service security object receives security information from the customer security object.
- the service security object selects the customer number and independent variables, extracts the customer password information, and calculates and generates the corresponding mapped password. Group.
- the service security object uses the same password used by the client to calculate and verify the client and digital signature on the message.
- the service security object generates a processing result message.
- the service security object uses the second password of the cipher group to calculate a digital signature on the resulting message.
- the server sends the security message formed by the result message and the corresponding digital signature to the client.
- the client security object receives the returned security information from the service security object.
- the client security object uses the same password to verify the message and digital signature. If the verification is incorrect, it requests the result information again until it obtains the real result information.
- the client security object After the client security object verifies that the message is correct, it processes the message.
- the above steps complete the process of one response exchange of messages. For information tasks of multiple messages, the above steps 2 to 14 may be repeated accordingly until the information tasks are completed.
- the use of passwords either periodically uses short passwords or one-time passwords with unlimited periods, making the security of periodic passwords difficult to solve or causing huge problems with password information.
- the solution of the invention can conveniently realize secure information services at various communication terminals, and information can be used without encryption during transmission. It is a security protocol that does not depend on the communication method and communication process and the communication terminal, so that the information is secure. It is completely independent of communication and client terminals to achieve client security. It is a client security protocol.
- the center isolates the protocol from the outside world.
- the isolation can use a different protocol from the external communication or a custom protocol to isolate the authentication server from external communication. This way, even if an attacker invades all external environments, including communication terminals, communication lines, and The communication server cannot invade the authentication server through a custom protocol, and it is impossible to forge legitimate information that does not meet the user's wishes.
- Mapping cipher group digital signature is an easy-to-use digital signature method.
- the concept of a security object not only focuses on the security of information exchange, but also to solve the customer's information security, including the security of exchanged information, the security of customer identity authentication, the security of customer password information, the security of the encryption process, etc., its security and communication methods It has nothing to do with the terminal and provides a feasible way to solve information security. detailed description
- Embodiment One Banking System Transfer Payment Security Solution
- the password mode uses a mapped password group, and the password information uses an ASCII character set with a size of 4096 bits, of which 1024 bits are used as the contingency password and 3072 bits are used as the password source.
- the mapped password group is an ordered 4 passwords, and the password length of the password group is 128 bits (the password length is related to the digital signature length, and the actual application needs to be adjusted appropriately, usually the password length is twice the digital signature length).
- another 128-bit static password is added as a supplementary password, and a 256-bit static password is added as a supplementary secret encryption information.
- the mapping takes natural numbers as independent variables.
- the password source model is a 128-bit ordered arrangement of the password source elements in bytes.
- the number of permutations is approximately l (, we can specify that this is a different self-variation The maximum number of times you can use it (in fact, you don't need to use more than 10 natural numbers, many people have changed their passwords!). Calculate the number of permutations as follows
- the password mapping rule is: The argument is mixed with a 128-bit supplementary password (such as a product) to obtain a number A. This number is divided by the 1024 number plus 1 to get a number B that is not greater than 1024. A is divided by the remainder of 128 and then Add 1 to get a number C that is not greater than 128. In the strain code, start from the B position, and intercept a length of C. If it exceeds 1024, you can count from the beginning.
- a 128-bit supplementary password such as a product
- the hybrid method can use a one-way hash function to perform a second operation and then connect, if the number of K is greater than 59, then Discarding the high-order part and using K1 as the permutation number to correspond to the password source model, the first password of the mapped cipher group is obtained (for a regular arrangement, each byte position of the password can be calculated), and it can also be obtained He ordered three password.
- the digital signature is the Arabic numeral character set, which takes 8 Arabic numerals.
- the 128-bit password obtained by mapping the cipher group, the added 256-bit static password, and the message are combined to calculate the message digest using a one-way hash function.
- a 160-bit message digest can be obtained, and then converted into an 8-digit Arabic number. Get the digital signature of the mapped cipher group.
- Customers can be divided into single-object customers and multi-object customers. For general personal customers, only one customer security object is required, which is a single object customer. For customers such as companies that require multiple customer security objects, such as supermarkets or department stores, the same payment account may require multiple payment counters, or It is the income and expenditure that need to be verified by multiple persons, and multiple customer security objects are required. For multi-object customers, you can set different permissions for the customer objects. For different objects of the same customer, the mapping password information can be the same. The service provider can implement information sharing to save storage space. Two digits can be added after the customer number as the customer's secure object number to identify different objects. Each object is supplemented with a password and Static passwords are different. '.
- Customer security object elements and settings include the following basic elements:
- Customer password information Includes 4096-bit mapped password information, 128-bit supplementary password, and 256-bit static password.
- the message can consist of numbers and a small number of symbols. It can usually be entered using the keypad, or it can be confirmed by the non-secure information of the previous item.
- Service security object elements and settings. Customer security objects include the following basic elements:
- Security isolation of security objects Setting a security object does not make it safe. It is also necessary to implement security isolation for the security object to separate the security object from the unsafe environment and implement information exchange with security information, so that the security object can ensure the security state. Because the security object does not depend on any communication method, isolation can usually be isolated using a custom communication protocol, or various other protocols, but it is necessary to ensure that other dangerous or destructive processes are blocked. The most secure method It is even possible to use physical isolation and use manual transmission of information.
- the password information can be shared directly. Customers can directly share passwords after authenticating their identity at the bank.
- the password information is randomly generated by the service security object, which is pseudo-random. Safe transaction mode.
- A transfers 100 yuan to the B account.
- the transfer process is as follows:
- a customer security object selects the next unused argument and calculates the mapping password group.
- A forms a signed message with the funds transfer transaction code, B's account number and amount, and uses the first serial number password to calculate a digital signature for the message.
- A transmits the arguments, messages, and digital signature to the service security object (hereinafter referred to as S). Because all the information is in the form of the Arabic numeral character set, it can be easily transmitted using various tools: Internet, telephone, SMS, fax, etc. It can even be transmitted manually, as long as the tools can transmit the Arabic numeral information.
- S After S receives the transaction message sent by A, S extracts the information of A and calculates the mapping cipher group to verify the transaction message of A. If the verification is incorrect, it returns an error message of A. After three errors of the same argument, The argument is invalidated.
- S generates a result message, calculates a digital signature on the message with a second serial number password, saves the result and digital signature, and returns the result message and digital signature to A, or leaves it to A for inquiry.
- A receives the preliminary transaction result information returned by S, checks the digital signature with the same password, and checks whether the information is correct. If it is incorrect, he reapplies to S for transaction result information until the correct transaction result is obtained.
- Client B security object (hereinafter referred to as B) selects the next unused argument and calculates the mapping password group.
- B forms a signed message with the transaction code and amount of funds transferred, and uses the first serial number password to calculate a digital signature M2 on the message.
- B sends the argument, the incoming message, and the digital signature M2, and A's digital signature M1, to the service security object S together.
- S After receiving the transaction message sent by B, S extracts the information of A and B respectively, and calculates the mapping cipher group, verifies the digital signature M2 of the transaction message of B, and verifies the digital signature M1 of the transaction message of A.
- S generates result messages of B and B respectively. Calculate a digital signature for the result A message with the password of the fourth serial number of A, calculate a digital signature for the result message B with the password of the second serial number of B, save the result and digital signature, and return the result information to B, or leave it to A and B for inquiry.
- a and B can query the final transaction result information and verify the digital signature of the message until the real information is obtained.
- both A and B can know exactly whether the transaction result is successful or failed. The transaction process is complete.
- Both A and B need to submit transaction information and digital signatures to prevent human error from transferring the account. At the same time, both parties cannot deny the fact that the transfer result is successful or failed, and the use of multiple passwords can prevent the occurrence of weak passwords.
- Semi-automatic payment transfer mode If you are shopping in a mall, it is too much trouble to follow the above transfer mode! In fact, customers in similar shopping malls are relatively good customers. We can add a transfer mode to allow two submissions of messages and signatures to be submitted at one time, but the transaction funds must be periodically frozen, which can simplify it. The transaction process, but security is still guaranteed. In addition, a special communication channel between customers needs to be established to realize the semi-automatic payment process-A pays 100 yuan to B's merchant account.
- the customer security object A needs to sign the information during the transfer transaction mainly including the transaction code, the counterparty's account number and the transaction amount, and the customer security object B needs the signature information during the funds transfer transaction to be the transaction code and amount. What both parties need to verify is the digital signature of the resulting message.
- Customer's security object A is in the locked automatic transaction state: Select the next unused argument to calculate the mapping password group.
- the transaction code is the automatic transfer out of the transaction code.
- the transaction amount can be set or not. If set The amount is based on the set amount. It is waiting to receive the account and amount information transmitted by the other party through the dedicated communication channel.
- the client's security object B sends the account number and payment amount information to A through the dedicated communication channel.
- the payment information received by customer security object A if the amount has been set, the amount is compared. If the amount does not match, an incorrect amount is sent and returned to B; if the amount is not set, the received amount shall prevail; if the information is correct A automatically calculates a digital signature on the payment information using the first and third passwords.
- the customer security object A automatically sends the payment information to the service security object (hereinafter referred to as S) through the communication system of B.
- S After S receives the automatic payment information, it extracts A's information and verifies the signature of the information to ensure correctness.
- S executes a transfer transaction, and transfers 100 yuan from account A to account B, and at the same time freezes the transfer of funds from B.
- the processing result is 1 and the failure is 0.
- S calculates a digital signature for the transaction result information of A and B respectively. For B, the next unused argument is automatically selected for use, and the transaction result information is saved and returned to A and 8.
- a and B receive the transaction result information and verify the transaction result information.
- Embodiment 2 Security transaction solution for banking system
- One-time numbered password group settings used by the customer.
- the character set of the password is set to Arabic numerals, so that almost any communication method can be used.
- One-time digital signatures use 8 numeric characters.
- Each password in the password group uses 16 numbers. It can be set according to the step-by-step steps required by the transaction. The number of passwords in a password group.
- transactions can be divided into two steps or three steps. Each step requires two passwords for response, two passwords are required to determine the password group in two steps, and six passwords are required for the password group in three steps.
- the password returned in the event of an error is obtained by incrementally changing the last response password.
- a password is added to each password group, and the number of passwords in the password group can be determined as required.
- the bank collects multiple random seeds to randomly generate a one-time numbered password group for the customer. After the customer passes the identity authentication to the bank's service point, he uses direct key exchange with Customers directly share multiple one-time numbered password groups, and the bank encrypts the one-time numbered password groups with high-strength encryption and stores them in the database. When customers need services, they are dispatched and decrypted for use. The customer saves the one-time serial number password group in the one-time digital signature device, and can use the one-time digital signature device to perform one-time digital signature and authentication of the information at any time.
- the algorithm can use the MD5 or SHA-1 algorithm to generate a digest code under the ASCII character set, and then convert the ASCII characters to integers and divide by 10 to take the remainder to convert to the Arabic numeral character set. According to certain rules, a number of 8 characters in length
- the formal summary takes the last 8 Arabic numerals as a one-time digital signature, and the algorithm is public and cannot be cracked.
- the security can reach (10 14 — 1) / 10 14 , which is already quite secure, and the need to improve the security can also increase the length of the one-time digital signature, or increase the steps of the transaction.
- Two replies can securely confirm the identity of the customer, so each password group requires two pairs of passwords, and each pair of passwords responds correctly once.
- the message is first-time digitally signed with the first password of the first pair of passwords of a certain number.
- the agreed message must include the transaction code for identity authentication.
- Number, message, the number of the one-time number cipher group and the signature are sent to the bank service side together, and after the bank verifies, the bank answers with the second password signature of the first pair of passwords.
- the second pair of passwords is used for the same authentication when confirming the identity.
- a password that is specifically used for responding when an error occurs is needed. This password can be obtained by converting the last correct response password, because when an error occurs, the last correct response password is not used. In the response, if the same message is all signed, the message only needs to be transmitted once, and only the signature can be transmitted in each response.
- Client A's account a transfers (or freezes) funds
- Client B's account b is transferred in (or transferred from frozen account a and then transferred to account b) funds, and at the same time, the funds are frozen;
- Each step requires that the customer A who owns the transfer account a verify and sign the transfer information.
- the transfer information that needs to be signed includes the transaction code, the transfer account number, and the transfer funds.
- the first step is submitted by the customer A.
- the information submitted is provided by the customer.
- Number, transfer information that needs to be signed (including transaction code, transfer account number and transfer funds), cipher group number, corresponding one-time digital signature; but signatures after the second step can be submitted by customer A who owns transfer account a
- client A can pass the signature to client B who has transferred account b, and then client B submits it to the bank server for verification.
- the benefit of the latter is that it will not cause funds to be transferred to the wrong account.
- the transfer transaction password group is set to three pairs plus one total of seven passwords, and two pairs plus one total of five passwords can also be used. It can be set as required. If a third party review is required, the third party can perform a one-time digital signature review and verification of the transaction after the first transfer, and the next transfer operation can only be performed after the review is correct.
- Other information authentication such as loan authentication, repayment authentication, account balance authentication, etc.
- identity authentication is similar to identity authentication, except that the authenticated information is the agreed information, transaction code, loan account number, loan amount, etc.
- the steps are all right, usually a cipher group with two pairs of passwords is used.
- banking applications such as phone banking, online banking, short message banking, digital payment settlement, pure digital public authentication withdrawal, etc.
- Some service applications are listed below:
- buttons and voice for general information exchange, such as ordinary information query, but for important information exchange, they need to be authenticated by a one-time digital signature.
- general information exchange such as ordinary information query
- telephone banking can also conduct the following transactions ⁇
- Instant payment by phone is actually an instant transfer transaction, but requires both the payer and payee to open a customer number at the bank.
- the payer submits a payment request by performing a one-time digital signature on the transaction code, transferred account number, and amount, and then pays The person then performs a second signature as a confirmation signature, and delivers the confirmation signature to the payee.
- the payer logs on to the telephone banking service and confirms the payer's second signature and adds his own account and amount signatures, so that both parties can confirm the success or failure of the payment, and it is impossible to deny the transaction.
- a network bank can be constructed at low cost and with high security.
- the bank WEB server and the authentication server are isolated by using protocols, a high degree of security can be achieved.
- protocol isolation is implemented between the two servers, such as a custom protocol isolation of the serial port.
- the web server can be modified arbitrarily. All information, but it is still impossible to impersonate or break the authentication relationship.
- the web server can also add a firewall to improve security. Because the solution of the present invention is based on customer security and does not rely on any customer communication terminal, there is no security threat to customers when using any communication terminal.
- a secure communication channel formed by a Secure Sockets Layer can be applied between the WEB server and the client terminal to increase security and security functions.
- SSL Secure Sockets Layer
- Payment settlement is the process of transfer transactions.
- General electronic payment settlement requires high-strength encryption equipment, such as POS machines that use credit cards (or magnetic cards), which requires high-cost purchase of equipment and merchants with a certain degree of credibility, and the increase in interconnection between banks In many aspects, it also increases a lot of costs, and credit card information and passwords are also easy to leak.
- the digital payment settlement of the solution of the present invention as long as the customer provides a one-time digital signature and a second confirmation signature on the payment information, it can be achieved by any communication method for transmitting digital information. Because payment information and one-time digital signatures are both Arabic digital character information, it is extremely convenient to use telephone or Internet communication. One-time digital signature information is not afraid of being stolen and can be used publicly.
- Any communication method that can transmit Arabic digital character information can be used. Used to achieve payment settlement.
- the payment information or payment conditions that need to be encrypted can be locked in a one-time digital signature device. At this time, the locked payment information can only be encrypted and signed with a one-time number password group, and can be automatically used with a simple device.
- the payment information and the corresponding one-time digital signature are transmitted from the interface to the bank, thereby realizing semi-automatic payment settlement.
- Digital payment settlement can also be used for online shopping payment. When shopping online, the shopper first submits payment information and a one-time digital signature to indicate the payment intention, and then receives a second one-time digital signature to confirm the payment when the goods are received to achieve settlement. Pay.
- the digital payment settlement using the scheme of the present invention can truly realize secure and reliable real-time payment settlement at any place and at any time. Since the requirements of the used terminal and communication equipment are relatively simple, it can be widely used at low cost and in a wide range. The name of digital payment settlement more accurately reflects the essence of the application and is different from the traditional traditional electronic payment settlement.
- the withdrawal process is divided into two steps.
- the customer submits the withdrawal information and a one-time digital signature.
- the withdrawal account is bound with the withdrawal account number, the withdrawal amount, and the withdrawal terminal information.
- the bank authenticates the client's identity and withdrawal information. Confirm the withdrawal information by step, and you can get the corresponding cash after completing the withdrawal correctly.
- Embodiment 3 Security trading solutions for open environment securities trading
- the securities party is the service party and the participating buyers and sellers are the client parties.
- the securities party has always been a reliable service provider that provides buying and selling transactions. This solution only provides a more convenient and safe way for transactions.
- Securities trading is characterized by strong real-time performance and high security requirements. Based on these characteristics, we require securities transactions to be submitted at one time. In order to increase security, strict identity authentication is required before the transactions. According to the above requirements, we set up one-time numbered password groups. Each group of password groups has one pair or two passwords. One-time numbered password groups can be used. For identity verification, it can also be used for trading. For ease of use, we can set the character set of the password to Arabic numerals, so that almost any communication method can be used. One-time digital signatures use 8 numeric characters, and each password in the password group uses 16 numeric characters. The algorithm can use MD5 or SHA-1 to generate a digest code and then convert the digest into a form of Arabic numeral characters of corresponding length as a one-time digital signature.
- the client goes to the securities party to open a customer number and applies for a one-time numbering password group.
- the security party randomly generates a one-time numbering password group and shares it directly with the customer.
- the security party encrypts the one-time numbering password group and saves it in the database.
- the customer needs service Schedule it for use.
- the customer saves the password in the one-time digital signature device, and can perform one-time digital signature and authentication on the information after unlocking the one-time digital signature device at any time.
- the client needs to apply for a login password, which is used during login to enhance security.
- a one-time numbered password set must also be used for strict identity authentication.
- strict identity authentication a one-time numbered password group can be used to perform a one-time digital signature on a piece of digital information (including the identity authentication transaction code). The signature can be passed before it is confirmed.
- one-time serial number password group When trading, you must use a one-time serial number password group to digitally sign the one-time transaction code, security code, and price. In addition to submitting securities information for trading, you must also provide the serial number and one-time serial number password group. Digital signature information. After receiving the securities trading transaction information, one-time serial number password group and one-time digital signature information, the securities party verifies the one-time digital signature of the customer. If it is correct, it submits the transaction and returns the correct information to the customer and A correct one-time digital signature, otherwise an error message and a failed one-time digital signature are returned.
- the telephone transaction method can be implemented securely and reliably, and the network transaction method is also more simple and secure.
- This solution is conducive to the implementation of protocol isolation, as long as a custom protocol is passed between the WEB server (or other server connected to the client terminal) and the authentication server. With isolation, a high degree of security can be achieved. Since the solution of the present invention does not provide a security function, a secure socket protocol layer (SSL) secure communication channel may be applied between the WEB server and the client to increase security and security functions, and also between the WEB server and the externally connected network. A firewall can be used for added security.
- SSL secure socket protocol layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Description
映射密码的设置和使用及其装置方法 技术领域 Setting and use of mapping password and device method thereof
本发明属于信息技术安全领域, 涉及信息安全服务: 身份认证、 信息完整性认证以及非 否认性。 背景技术 The invention belongs to the field of information technology security and relates to information security services: identity authentication, information integrity authentication, and non-repudiation. Background technique
随着科技的进步和电子技术的普遍应用, 信息安全服务的方法和产品越来越多, 在开放 的通讯系统中, 比如 Internet互联网, 很多是基于公钥密码技术的应用。 With the advancement of science and technology and the widespread application of electronic technology, more and more methods and products of information security services are being used. In open communication systems, such as the Internet, many applications are based on public key cryptography.
身份的认证通常有身份凭证、 章印或手写签名、 用户 ID和单纯口令字、 生物统计学系统 Authentication of identity usually includes identity credentials, seal or handwritten signature, user ID and simple password, biometric system
(指纹、 虹膜等认证)、 认证令牌、 智能卡以及组合认证, 还有基于公钥基础设施 (PKI ) 的 数字签名。 身份凭证及手写签名通常以实物形式存在, 易于伪造, 难于分辨, 不方便信息的 交换; 单纯口令字容易失密或被窃取; 生物统计学、 认证令牌、 智能卡都容易受到一系列攻 击,而且使用成本较高; 组合认证方法是口令字与认证令牌等认证方法加以组合, 相对提高了 安全性。 公钥基础设施(PKI )是目前一个比较可行的方案, 但实施比较复杂, 对于严密的交 易需要增加时戳等复杂措施, 一般人难于理解, 而且在实际的应用中也同样存在安全隐患。 (Fingerprint, iris, etc.), authentication tokens, smart cards, and combination authentication, as well as digital signatures based on public key infrastructure (PKI). Identity credentials and handwritten signatures usually exist in physical form, which is easy to forge, difficult to distinguish, and inconvenient to exchange information; simple passwords are easy to be compromised or stolen; biometrics, authentication tokens, and smart cards are vulnerable to a series of attacks and use The cost is high; the combined authentication method is a combination of a password and an authentication method such as an authentication token, which relatively improves security. Public key infrastructure (PKI) is currently a more feasible solution, but its implementation is relatively complicated. For strict transactions, complicated measures such as adding time stamps are difficult for ordinary people to understand, and there are also hidden security risks in practical applications.
信息完整性通常可以用消息摘要码来检验,在网络中传输的数据通常使用公钥密码技术的 数字签名方法实现, 或者使用提供安全服务的安全套接字协议层 (SSL)或 Internet安全协 议 ( IPSec) 来实现。 Information integrity can usually be checked with a message digest code. Data transmitted over the network is usually implemented using digital signatures using public key cryptography, or using Secure Sockets Layer (SSL) or Internet Security Protocol ( IPSec).
非否认性通常使用公钥密码技术的数字签名方法实现。 当前使用的安全技术: Non-repudiation is usually achieved using digital signature methods using public key cryptography. Current security technologies:
1、 常用的简单安全措施: 1. Common simple security measures:
常用的简单安全方法有身份凭证、 章印或手写签名等认证, 这些认证方法通常都是实物 认证, 使用人工识别, 容易被伪造, 难以分辨, 并且不方便信息的交换; 还有用户 ID和单纯 口令字等认证, 容易失密而被假冒身份。 Commonly used simple security methods include authentication such as identity vouchers, seals, or handwritten signatures. These authentication methods are usually physical authentication, using manual identification, easy to be forged, difficult to distinguish, and inconvenient for information exchange; user ID and simple Passwords and other authentications are easy to lose confidentiality and be impersonated.
2、 生物统计学系统(指纹、 虹膜等认证)。 2. Biometric system (fingerprint, iris, etc. authentication).
需要高成本的设备及可信终端, 也不便于信息的交流, 因为信息经传输后, 容易被复制、 替换而变得不可信。 High-cost equipment and trusted terminals are required, and information exchange is also not convenient, because after information is transmitted, it is easy to be copied and replaced and becomes untrustworthy.
3、 磁卡、 认证令牌、 智能卡。 3. Magnetic card, authentication token, smart card.
磁卡容易被复制, 目前虽然在被大量使用, 但由于其不够安全的特性, 正在逐渐被淘汰。 各种认证令牌和智能卡相对不容易被复制,各种 IC卡现正在逐步推广使用,但需要昂贵的接 入设备和大量可信终端, 推广进度较慢。 Magnetic cards are easy to copy. Although they are currently used in large quantities, they are gradually being phased out due to their insufficient security. Various authentication tokens and smart cards are relatively difficult to copy. Various IC cards are now being promoted and used, but they require expensive access equipment and a large number of trusted terminals, and the promotion is slow.
4、 Internet安全协议 (IPSec)。 4. Internet Security Protocol (IPSec).
Internet安全协议(IPSec)是开放系统互连 0SI (Open System Interconnection)模型 中基于网络层的信息安全技术。开放系统互连 OSI模型将通讯模型层次划分为七层:物理层, 数据链路层, 网络层, 传输层, 会话层, 表示层, 应用层。 Internet安全协议 (IPSec)通过 网络层的加密和认证, 确保通过公共 IP网络的数据通信的保密性、完整性和真实性。其以上 的各协议层可以透明地使用。 The Internet Security Protocol (IPSec) is an information security technology based on the network layer in the Open System Interconnection (OSI) model. Open System Interconnection The OSI model divides the communication model hierarchy into seven layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. The Internet Security Protocol (IPSec) ensures the confidentiality, integrity, and authenticity of data communications through public IP networks through encryption and authentication at the network layer. The above protocol layers can be used transparently.
5、 安全套接字协议层(SSL)。 5. Secure Sockets Layer (SSL).
这是 Internet互连中基于传输层的信息安全技术。 安全套接字协议层 (SSL)通过在通 讯的双方之间建立一个安全的通道, 来确保数据通信的保密性、 完整性和真实性。 安全套接 字协议层 (SSL) 现在互联网上得到广泛的应用。 This is an information security technology based on the transport layer in Internet interconnection. The Secure Sockets Layer (SSL) ensures the confidentiality, integrity, and authenticity of data communications by establishing a secure channel between two parties in a communication. The Secure Sockets Layer (SSL) is now widely used on the Internet.
6、 基于应用层的信息安全技术。 确 认 本
( 1 )基于公钥基础设施 (PKI ) 的数字签名。 6. Information security technology based on the application layer. Confirm this (1) Digital signature based on public key infrastructure (PKI).
通过对消息计算消息摘要, 再利用公钥密码系统使用私钥对消息摘要进行加密就得到数 字签名, 需要验证数字签名时, 使用公钥对数字签名进行解密后与对消息计算得到的消息摘 要进行比较, 如果相同, 则验证正确。 只有掌握私钥的人才能通过加密计算出数字签名, 通 过数字签名的唯一性实现数据的认证、 数据完整性和非否认性。 数字签名的应用通常要具备 公钥基础设施 (PKI ) 以及时戳服务 (TSS)。 公钥基础设施 (PKI) 就是公钥密码系统用户 证书的管理服务和过程。 数字签名是当前实际的安全标准, 是当前计算方法、 速度和时间难 以破解的加密方法。 以当前硬件、 软件的发展, 硬件速度不断加快, 分布式计算方法得到广 泛应用, 若干年后数字签名标准就要作出修改。 理论上可以从三个方面对数字签名作破解: (a) 密码攻击方法。 RSA算法所取的大素数通常在一定范围内, 只要用穷举法遍历一 定范围的素数, 就可以找出相应密码。 此方法当前现实不可行。 The digital signature is obtained by calculating the message digest of the message, and then encrypting the message digest with the private key using the public key cryptosystem. When the digital signature needs to be verified, the digital signature is decrypted with the public key and the message digest obtained from the message is calculated. Compare, if the same, then the verification is correct. Only the person who has the private key can calculate the digital signature through encryption, and realize the data authentication, data integrity, and non-repudiation through the uniqueness of the digital signature. Digital signature applications usually have a public key infrastructure (PKI) and a timestamp service (TSS). Public key infrastructure (PKI) is the management service and process of user certificates for public key cryptosystems. Digital signature is the current actual security standard, and it is an encryption method that is difficult to crack with current calculation methods, speed and time. With the current development of hardware and software, the speed of hardware is constantly accelerating, and distributed computing methods are widely used. After a few years, the digital signature standard will be modified. In theory, digital signatures can be cracked from three aspects: (a) Cryptographic attack methods. The large prime numbers taken by the RSA algorithm are usually within a certain range. As long as the range of prime numbers is traversed by the exhaustive method, the corresponding password can be found. This method is currently not practical.
( b) 数字签名攻击方法。 对某一消息计算得到消息摘要, 因为签名的长度是确定的, 只要用穷举法对所有特定长度的数字签名计算消息摘要,就可以得到符合验证要求的"数字签 名"。 (b) Digital signature attack methods. A message digest is calculated for a certain message, because the length of the signature is determined. As long as the message digest is calculated for all digital signatures of a specific length by using the exhaustive method, a "digital signature" that meets the verification requirements can be obtained.
( C) 数字签名重放攻击方法。 收集用户用过的数字签名, 解密得到消息摘要码, 在需 要签名的消息中保留一段比签名长度更长的可以任意作改变的信息, 比如产品的序号, 或者 其他编号, 不断更改可变信息, 使用穷举法对消息计算消息摘要, 因为消息摘要算法具有伪 随机性, 故只要可变信息足够长度, 总可以找到一个消息摘要与解密得到的消息摘要码相同, 这就实现了数字签名的重放。 可能有人会认为计算巨量个数文件的消息摘要, 再找出相同的 摘要是很艰难的事情, 但如果把产品的编号附加在文件的末尾, 就可以改变为计算很多小段 信息的消息摘要, 问题就简化得多了! (C) Digital signature replay attack method. Collect the digital signatures used by users, decrypt them to obtain the message digest code, and keep a piece of information that can be arbitrarily longer than the signature length in the message that needs to be signed, such as the serial number of the product, or other numbers, and constantly change the variable information. The exhaustive method is used to calculate the message digest of the message. Because the message digest algorithm has pseudo-randomness, as long as the variable information is of sufficient length, a message digest can always be found with the same message digest code as the decrypted message. put. Some people may think that it is very difficult to calculate the message summary of a huge number of files, and then find the same summary, but if you add the product number to the end of the file, you can change to calculate the message summary of many small pieces of information. The problem is much simplified!
此外, 算法攻击方法也可能存在。 当前公钥密码系统大多是釆用 RSA算法, 其安全基于 大数分解的难度, 但总有一天, 人们会找到方法容易地分解两个大素数之积。 In addition, algorithmic attack methods may also exist. Most of the current public key cryptosystems use the RSA algorithm, and its security is based on the difficulty of large number decomposition, but one day, people will find a way to easily decompose the product of two large prime numbers.
(2)安全 /通用因特网邮件扩充服务 (S/MIME)。 (2) Security / General Internet Mail Extension Service (S / MIME).
这是一个用于保护电子邮件安全的规范协议, 它描述了一个通过对经数字签名和加密的 对象进行 MIME封装的方式来增加密码安全服务的协议。 这个协议基于数字签名, 其安全性 与数字签名基本相同。 This is a canonical protocol for protecting email security. It describes a protocol for adding cryptographic security services by MIME encapsulating digitally signed and encrypted objects. This protocol is based on digital signature, and its security is basically the same as digital signature.
(3) 安全电子交易 (SET)c (3) Secure Electronic Transactions (SET) c
安全电子交易是为在开放式网络 Internet 电子商务交易中进行购物和支付提供一个安全 框架的协议。 它基于数字签名技术, 并引入和使用了双重签名。 因为使用了双重签名, 其安 全性比单一数字签名较高(特别难于实施重放攻击),但使用比较复杂, 目前未得到广泛使用。 Secure electronic transactions are protocols that provide a secure framework for shopping and payment in open network Internet e-commerce transactions. It is based on digital signature technology and introduces and uses double signatures. Because of the use of double signatures, its security is higher than that of single digital signatures (especially difficult to implement replay attacks), but the use is more complicated and currently not widely used.
7、 组合认证方法。 7. Combination authentication method.
组合认证方法就是将多种安全方法组合起来一起使用, 以增加使用的安全性, 比如在使 用数字证书的同时增加口令字认证。 The combined authentication method is to combine multiple security methods and use them together to increase the security of use, such as adding digital password authentication while using digital certificates.
在幵放式网络系统中, 网络通讯是最为开放的部分, 目前更多地强调了数据通讯的安全, 使用了各种各样的高强度加密方法。 但对网络终端未能足够安全的措施, 用来防护可能的黑 客入侵, 可能一个木马程序可以使你的信息完全暴露, 密码会泄露, 证书也可能被窃取, 甚 至你使用的软件程序界面看起来一样, 但也可能已被更换。 对于服务方, 可以投入大量的人 力、 物力、 技术, 通过大量资金的支持, 建立高安全性的防火墙或协议隔离, 即使如此, 也 还不是百分之一百的安全。 而对于无数的客户终端来说, 不可能有强大的资金与实力建立高 强度安全的网络防火墙, 甚至大多数的客户对安全的了解所知甚少。 所以在实际应用中, 如 何保证信息安全, 如何使客户终端以及通讯安全可信赖地使用, 成为开放系统安全的重要问 题。 与本方案接近或相关的技术:
1、 一次—密系统。 In the open-ended network system, network communication is the most open part. At present, the security of data communication is more emphasized, and various high-strength encryption methods are used. However, there is not enough security measures for network terminals to protect against possible hacking. A Trojan program may completely expose your information, passwords may be leaked, certificates may be stolen, and even the software program interface you use looks like The same, but it may have been replaced. For the service provider, a large amount of manpower, material resources, and technology can be invested to support the establishment of a high-security firewall or protocol isolation with the support of a large amount of funds. Even so, it is not 100% secure. For countless customer terminals, it is impossible to have strong funds and strength to build a high-intensity and secure network firewall, and even most customers know little about security. Therefore, in practical applications, how to ensure information security and how to make client terminals and communications used securely and reliably have become important issues for open system security. Technologies close to or related to this solution: 1. Once-dense system.
一次一密系统将明文序列用等长的密钥序列变换为等长的密文序列,通常用凯撒代替法, 对二进制数据加密常用异或算法, 知道密文序列和相应的密钥序列即可还原回等长的明文序 列。 一次一密系统是理论上不可攻破的密码系统, 其明文、 密钥、 密文序列等长。 因为算法 是可公开的, 明文、 密钥、 密文这三个序列中, 知道其中两个, 可推导出第三个序列。 The one-time-one-cipher system converts plaintext sequences with equal-length key sequences into equal-length ciphertext sequences. Caesar's replacement method is usually used. Binary data is usually encrypted with an exclusive-OR algorithm. Knowing the ciphertext sequence and the corresponding key sequence Reverts back to plain text sequences of equal length. The one-time-one-cipher system is a theoretically unbreakable cryptographic system, and its plaintext, key, and ciphertext sequence are of equal length. Because the algorithm is public, of the three sequences of plaintext, key, and ciphertext, knowing two of them can derive the third sequence.
2、 分组密码与流密码 (序列密码)。 2. Block cipher and stream cipher (serial cipher).
分组密码就是将数据分组用密码进行加密操作。 对每一分组密码周期性地使用。 流密码 是使用密码生成伪随机的密钥流 (通常与加密的数据进行混合), 再对数据流进行加密。 Block cipher is to encrypt data blocks with a password. It is used periodically for each block cipher. Stream cipher is to use a password to generate a pseudo-random key stream (usually mixed with encrypted data), and then encrypt the data stream.
3、 消窗、摘要。 3. Elimination of windows and abstracts.
消息摘 ¾是一种把任意长度的输入揉合而产生固定长度的伪随机输出的算法, 也叫作杂 凑或散列。 Message Digest ¾ is an algorithm that combines inputs of any length to produce a pseudo-random output of a fixed length, also known as hashing or hashing.
4、 基于单向散列函数 (杂凑函数) 的消息认证校验和 (HMAC)。 4. Message authentication checksum (HMAC) based on one-way hash function (hash function).
双方采用同一密钥,将消息和密钥放在一起用杂凑函数计算摘要,校验摘要以检验消息 的完整性。 参考文献: Both parties use the same key, put the message and the key together, calculate the digest with a hash function, and check the digest to verify the integrity of the message. references:
1、 《密码工程实践指南》 1. "Cryptographic Engineering Practice Guide"
作者: (美) Steve Burnett & Stephen Paine Author: (US) Steve Burnett & Stephen Paine
译: 冯登国 周永彬 张振峰 Translation: Feng Dengguo, Zhou Yongbin, Zhang Zhenfeng
出版: 清华大学出版社 Publisher: Tsinghua University Press
2、 《应用密码学:协议、 算法与 C源程序》 2.``Applied Cryptography: Protocols, Algorithms, and C Source Programs ''
作者: (美) Bruce Schneier Author: (US) Bruce Schneier
译: 吴世忠 祝世雄 张文政 Translation: Wu Shizhong, Zhu Shixiong, Zhang Wenzheng
出版: 机械工业出版社 Publishing: Machinery Industry Press
3、 《密码学与计算机网络安全》 3. "Cryptography and Computer Network Security"
作者: 卿斯汉 Author: Qing Si-Han
出版: 清华大学出版社, 广西科学技术出版社 发明内容 Publication: Tsinghua University Press, Guangxi Science and Technology Press
本发明方案所要解决的技术问题主要是在开放式环境中信息的安全服务, 包括安全身份 认证、 安全信息交换, 确保信息的完整性以及非否认性, 该技术也可以应用于封闭式环境。 所谓开放式环境, 是指信息暂时存放或通讯过程中经过的地方不隐秘, 外界对信息容易获取 得到、 容易复制或作改变的这样一种状态。 比如 internet互联网络、 电话线路、 无线电通 讯、 公用终端等, 都属于开放式环境。 而封闭式环境是相对于开放式环境而言, 信息不容易 暴露、 被复制和被改变的环境。 The technical problem to be solved by the solution of the present invention is mainly information security services in an open environment, including security identity authentication, security information exchange, ensuring information integrity and non-repudiation. This technology can also be applied to closed environments. The so-called open environment refers to a state in which the information is temporarily hidden or the place passed during the communication process is not hidden, and the outside world can easily obtain the information, easily copy or change it. For example, the Internet, telephone lines, radio communications, and public terminals are all open environments. A closed environment is an environment in which information is not easily exposed, copied, and changed compared to an open environment.
当前在信息安全领域中通常使用的都是基于密码或证书的认证或加密方法, 其特点是为 了方便使用, 重复周期性地使用, 使得秘密及其结果容易导致各种攻击, 比如盗窃、 密码攻 击、 重放攻击等等。 另一方面, 很多加密算法都釆用了高强度加密技术, 使得很多加密操作 都需要在客户终端上进行, 但由于互连系统的开放性, 很多客户终端未能得到有效的保护, 客户终端容易被入侵而变得不再可以信赖。 如何使客户终端以及通讯方便、 安全、 可信赖地 使用, 成为开放式系统安全的重要问题。 当前在 internet互联网使用得最多的安全技术就是 Internet安全协议 (IPSec)、 安全套接字协议层 (SSL)、 基于公钥基础设施 (PKI ) 的数字 签名, 后者是基于应用层的安全技术, 在开放系统互连 OSI模型中居于更高层, 相对比前两 者更加安全,其他应用层安全方法大都是基于基于公钥基础设施( PKI )数字签名的各种协议。 但任何可以第三方离线非实时认证的数字签名或协议都不是十分安全的,因为可以离线认证,
意味着攻击者可以无限次尝试认证, 故理论上攻击者总可以用穷举法找到符合要求的结果。 常用的密码周期性地重复使用带来很多不安全隐患, 一次一密系统使用的一次性密码, 其使 用周期是无限大, 使用十分安全, 但密码量太大而使用不便, 能否可以有个折中的办法, 使 得可以增大密码使用的周期性达到使用安全的情况而又不至于密码量太大?对于居于应用层 安全的协议, 由于客户终端的不可信而导致的安全问题, 可否通过提升安全层次来解决? 技术方案 At present, in the field of information security, authentication or encryption methods based on passwords or certificates are commonly used. The characteristics are to facilitate the use and repeated periodic use, which makes the secret and its results easy to cause various attacks, such as theft and password attacks. , Replay attacks, and more. On the other hand, many encryption algorithms use high-strength encryption technology, so that many encryption operations need to be performed on the client terminal. However, due to the openness of the interconnected system, many client terminals cannot be effectively protected, and it is easy for client terminals. Be hacked and become untrustworthy. How to make customer terminals and communications easy, safe, and reliable to use has become an important issue for open system security. At present, the most commonly used security technologies in the Internet are Internet Security Protocol (IPSec), Secure Sockets Layer (SSL), and Public Key Infrastructure (PKI) -based digital signatures. The latter are application-layer-based security technologies. In the open system interconnection OSI model, it resides at a higher level and is more secure than the former two. Other application layer security methods are mostly based on various protocols based on public key infrastructure (PKI) digital signatures. However, any digital signature or protocol that can be authenticated by a third party offline non-real time is not very secure because it can be authenticated offline, It means that the attacker can try authentication for an unlimited number of times, so in theory, the attacker can always use exhaustive methods to find the results that meet the requirements. Frequent use of common passwords brings a lot of hidden dangers. One-time passwords used by one-time password systems have infinite use periods and are very safe to use. However, the amount of passwords is too large and inconvenient to use. A compromise method, which makes it possible to increase the periodicity of password use to achieve safe use without the password being too large? For the protocol that resides at the application layer security, can the security problem caused by the untrusted client terminal be solved by improving the security level? Technical solutions
映射密码方法。 Map password method.
映射的定义: Definition of mapping:
设 X, Y是两个非空集合, 如果存在一个法则 , 使得对 X中的每一个元素 , 按法则 , 在 Y中有唯一确定的元素与之对应, 则称为从 X到 Y的映射, 记作 Let X and Y be two non-empty sets. If there is a rule such that for each element in X, according to the rule, there is a uniquely determined element in Y corresponding to it, then it is called a mapping from X to Y. Referred to as
/: X→Y /: X → Y
映射是一个变量通过某种法则对应到另一个变量的过程, 开始的变量是自变量, 对应的 变量是因变量。 Mapping is the process by which a variable corresponds to another variable through a certain rule. The starting variable is the independent variable, and the corresponding variable is the dependent variable.
映射密码将密码信息分为两部分, 一部分作为映射的对应法则变化关系, 称作应变密码, 记为集合^ 另一部分作为密码源, 记为集合丫。 The mapping password divides the password information into two parts, one of which is a mapping corresponding to the change of the corresponding law, which is called a contingency password, which is recorded as a set ^, and the other part is a password source, which is recorded as a set.
通过密码源的部分元素应用某种模型或某种对应法则的转换得到新的信息集合, 记为集 合!\/1。 用映射方法记作 A new set of information is obtained through the transformation of some elements of the cryptographic source using a certain model or a corresponding rule, and it is recorded as a set! \ / 1. Use the mapping method as
/„,■ Μ→Υ / „, ■ Μ → Υ
注意上面映射的关系, 是新模型集合 Μ到密码源丫的映射, 根据映射的定义, 就是说对 于每一个确定的新模型集合 Μ元素,都可以按某一法则,从密码源 Υ中找到唯一确定的元素 与之相对应。也就是说新集合 Μ的元素对应到密码源元素可以是多法则、多对一的对应关系。 新集合 Μ是密码源集合通过各种法则、 多种转换而成的新集合。 比如新集合 Μ可以是以密 码源集合为基础所构造的模型而形成的新集合, 也可以是密码源各部分元素通过单向散列函 数等多种法则生成的新元素的集合。 其关系可以用另一种形式记为如下 Note that the above mapping relationship is the mapping of the new model set M to the cryptographic source ya. According to the definition of the mapping, that is, for each determined new model set M element, a unique rule can be found from the cryptographic source Υ The identified elements correspond to them. In other words, the elements of the new set M can correspond to the cryptographic source elements in a multi-law, many-to-one correspondence. The new set M is a new set of cryptographic source sets converted through various rules and multiple types. For example, the new set M can be a new set formed based on a model based on a set of password sources, or a set of new elements generated by various elements of the cryptographic source through one-way hash functions and other rules. The relationship can be written in another form as follows
M =∑Mi , „,: Y→Mi M = ∑M i , „,: Y → M i
对于任意一个自变量, 通过结合了应变密码的对应法则, 对应到新集合 M模型中的某一 逻辑位置, 从而对应到集合 M中的某一确定元素, 再一起通过某一法则 (通常是单向法则, 比如单向散列函数) 结合为新密码。 设自变量的集合为 X, 新密码的集合为 N, 映射可以记 录如下: For any one of the independent variables, the corresponding rule combined with the strain code corresponds to a certain logical position in the new set M model, so as to correspond to a certain element in the set M, and then passes a certain rule (usually a single Directional rules, such as one-way hash functions, are combined into a new password. Let the set of independent variables be X and the set of new passwords be N. The mapping can be recorded as follows:
fB L: X→M , fB X,M、 N 结合起来就是一个复合的映射: fB:(X,fB X)) ^ N 通过以上两个映射过程, 给定了映射密码的应变密码及密码源, 以及给定的对应法则, 对于任意一个自变量, 都可以找到唯一确定的新密码与之相对应, 这就是映射密码方法。 上面的论述是有点复杂了, 那么为什么不用自变量和密码通过单向散列函数等法则结合 生成新的密码? 因为单向散列函数的单向性, 也很难计算出原密码。 但如果是这样简单化, 就变成了自变量、 原密码与新密码之间直接的法则结合关系, 一方面密码使用变得周期化、 整体化, 另一方面, 由于新密码经使用后容易暴露, 原密码的直接法则关系容易被猜测。 实
际上只要将映射密码方法的对应法则简单化, 就可以得到以上的情况。 f B L : X → M, f B X, M, N combined is a composite mapping: f B : (X, f B X)) ^ N Through the above two mapping processes, the strain of the mapping password is given The password, the password source, and the given correspondence rule, for any independent variable, a unique new password can be found corresponding to it. This is the mapping password method. The above discussion is a bit complicated, so why not use a combination of independent variables and passwords to generate new passwords through rules such as one-way hash functions? Because of the one-way nature of the one-way hash function, it is also difficult to calculate the original password. But if it is so simple, it will become a direct legal combination between the independent variable, the original password and the new password. On the one hand, the use of the password becomes periodic and integrated, and on the other hand, because the new password is easy to use after use Exposing, the direct law relationship of the original password is easy to guess. Real In fact, as long as the correspondence rule of the mapping cipher method is simplified, the above situation can be obtained.
映射密码关系是自变量通过某种与应变密码相关的法则或算法, 指向或者对应到相应的 密码源模型形成的相关元素, 形成新的密码信息。 这种对应关系不是通过算法直接生成新的 密码,只是对应到密码源按照某种预先设定的模型的相关元素, 再通过某种法则结合才能形 成新的密码。 The mapping cryptographic relationship is that the independent variable points to or corresponds to the relevant element formed by the corresponding cryptographic source model through some kind of law or algorithm related to the strained cryptography to form new cryptographic information. This correspondence does not directly generate a new password through an algorithm, but only corresponds to the relevant elements of the password source according to a certain preset model, and then combines with a certain rule to form a new password.
密码源是具有伪随机性的密码信息元素的逻辑有序集合, 通过设定的模型, 各元素可以 重新组合形成新的信息。 密码源不直接与待加密的秘密信息或加密后的明码发生任何算法关 系。 只有重新组合形成的新密码才直接参与加密运算。 对于设定的模型, 比如可以把密码源 元素按编号重新排列成一定长度的有序排列, 或者把密码源元素按物理模型排列成立方体, 等等, 可以有各种各样的模型。 A cryptographic source is a logically ordered collection of cryptographic information elements with pseudo-randomness. Through a set model, each element can be recombined to form new information. The cryptographic source does not have any algorithmic relationship directly with the secret information to be encrypted or the encrypted plain code. Only the new password formed by recombination directly participates in the encryption operation. For the set model, for example, the password source elements can be rearranged according to the number into an ordered arrangement of a certain length, or the password source elements can be arranged into a cube according to the physical model, and so on. There can be various models.
应变密码是与对应法则或算法相关联的信息, 新密码信息不会直接从应变密码中得到, 应变密码是变化的对应关系其中一个要素。 应变密码也可以根据多层对应关系再分为多个部 分, 比如将应变密码部分作为一个新的映射密码关系, 这样可以形成多重的对应关系。 Contingency passwords are information associated with corresponding laws or algorithms. New password information is not obtained directly from contingency passwords. Contingency passwords are one of the elements of a changing correspondence. The contingency cipher can also be divided into multiple parts according to the multi-layer correspondence. For example, the contingency cipher part is used as a new mapping cipher relationship, which can form multiple correspondences.
在实际的应用中, 为了节省存储, 应变密码与密码源可以有部分或全部相同部分, 即部 分或全部交集。 所以应变密码与密码源是以使用的用途来划分的。 In practical applications, in order to save storage, the contingency password and the password source may have part or all of the same part, that is, part or all of the intersection. Therefore, the response password and the password source are divided according to the purpose of use.
映射密码关系的自变量可以是各种变量, 可以是随机的变量, 也可以是有序的变量。 举一个简单的映射密码例子。 密码的长度是 1024位, 其中应变密码长度是 256位, 密 码源是 768位, 如果生成 128位的新密码, 使用按编号重新排列的有序排列模型, 那么将有 = 768! = 640128 a 1 5*ιο359种不同的排列, 如果算法比较好, 具有随机性,The independent variables of the mapping password relationship can be various variables, random variables, or ordered variables. Take a simple example of a mapped password. The length of the password is 1024 bits, of which the strain password length is 256 bits and the password source is 768 bits. If a new 128-bit password is generated and an ordered arrangement model is used to rearrange by number, then there will be = 768! = 640 128 a 1 5 * ιο 359 different permutations. If the algorithm is better, it has randomness.
768 (768 - 128)! 640! L 'J ι υ 768 (768-128)! 640! L ' J ι υ
那么密码的使用周期就应与 /¾2 8 8接近, 或者更大。 自变量使用序号, 从 1开始, 其对应算法 则可以使用单向函数, 结合应变密码就可以形成伪随机的对应关系, 伪随机对应到相应的编 号, 如果使用次数小于 ¾2 8 8次, 那么其安全效果就与一次一密差不多 (因为任何算法都是可 以攻破的, 所以只是单独使用单向函数而不使用应变密码是不安全的, 应变密码越长, 其可 能性就越多, 对应关系就越复杂。), 可以加密的数据量是 ¾8 * 128位!但实际上因为每一位 只有 1和 0两种情况, 这样排列中必定有很多相同的排列, 如果用保守的映射方法, 只是对 每一字节作为密码的映射元素, 1024位就是 128字节, 应变密码长度 256位就是 32字节, 密码源 768位就是 96字节, 128位的新密码就是 16字节, 使用按编号重新排列的有序排列 模型, 种不同的排列, 可以加密的数据量是 6 6 * 16字节!如
Then the life cycle of the password should be close to / ¾ 2 8 8 or larger. The independent variable uses a sequence number. Starting from 1, the corresponding algorithm can use a one-way function. In combination with the strain code, a pseudo-random correspondence can be formed. The pseudo-random corresponds to the corresponding number. If the number of uses is less than ¾ 2 8 8 times, then Its security effect is similar to one-time one-time password (because any algorithm can be broken, so it is not safe to use only one-way function without strain strain password. The longer the strain password, the more likely it is, the corresponding relationship The more complicated it is.), The amount of data that can be encrypted is ¾ 8 * 128 bits! But in fact, because there are only 1 and 0 cases for each bit, there must be many identical arrangements in this arrangement. If you use a conservative mapping method, Just for each byte as the mapping element of the password, 1024 bits is 128 bytes, the length of the response password is 256 bits is 32 bytes, the password source is 768 bits is 96 bytes, and the new 128-bit password is 16 bytes. Ordered arrangement model with number rearrangement, a different arrangement, the amount of data that can be encrypted is 6 6 * 16 bytes!
果使用周期足够大时, 只要自变量不相同、 不重复使用, 甚至使用多少次都对使用安全没有 多大影响。如果使用一次一密系统, 1024位密码就只能加密 1024位数据,而且信息公开后, 密码也就会通过密文和明文的关系而破解。 但如果使用映射密码方法后再加密, 并使用相同 的加密算法, 即使知道密文和明文, 只能得到映射的密码, 映射的密码是建立在单向函数和 应变密码基础之上的新密码, 它只包涵了原密码的部分信息相关关系, 或者是部分元素相关 信息, 原来的密码信息还是不能完全破解。 If the period of use is large enough, as long as the independent variables are not the same, they are not reused, and even how many times they are used will not have much impact on the safety of use. If a one-time encryption system is used, a 1024-bit password can only encrypt 1024-bit data, and after the information is made public, the password will be cracked through the relationship between the ciphertext and the plaintext. However, if the encrypted password method is used and then encrypted, and the same encryption algorithm is used, even if the ciphertext and plaintext are known, only the mapped password can be obtained. The mapped password is a new password based on a one-way function and a strained password. It only contains part of the information related relationship of the original password, or part of the related information of the element, the original password information still cannot be completely cracked.
映射密码的特点: Features of the mapped password:
1、 密码长度一般较长。 密码长度通常可以是 1024位以上甚至 1 M或更大。 1. The password is generally longer. The password length can usually be more than 1024 bits or even 1 M or more.
2、 密码信息使用时需使用自变量生成新的密码再进行加密。 2. When the password information is used, a new password must be generated using the argument and then encrypted.
3、 原密码信息不直接参与加密运算,只有映射形成的新密码直接参与加密运算。这就使 得原密码信息不易泄漏。
、 通常不是全部而只是部分原始的密码信息形成的新密码与待加密的秘密信息或加密 后的明码通过某种算法或法则形成某种关系。这样每次使用的密码信息基本上都是不 相同的, 这就无法使用通常的推测方法去推测密码信息。 3. The original password information does not directly participate in the encryption operation. Only the new password formed by the mapping directly participates in the encryption operation. This makes the original password information difficult to leak. Generally, a new password formed by not all but only part of the original password information forms a relationship with the secret information to be encrypted or the encrypted plain code through some algorithm or rule. In this way, the password information used every time is basically different, which makes it impossible to use ordinary guessing methods to guess the password information.
5、 密码通常有部分信息(应变密码)与部分密码(密码源)形成的逻辑模型的逻辑位置 有关, 这样就极难以通过分析加密结果去推测密码信息。 5. The password usually has some information (contingency password) related to the logical position of the logical model formed by the partial password (password source), so it is extremely difficult to guess the password information by analyzing the encryption result.
6、 对不同的自变量, 通常对应到不同的新密码, 这样就使得密码的使用周期变得较大。 6. Different independent variables usually correspond to different new passwords, which makes the use cycle of passwords longer.
在一定的使用次数范围内, 可得到的新密码都极可能不同 (或者是来源不同), 其使 用效果就可以接近一次性密码。 Within a certain range of usage times, the new passwords that are available are likely to be different (or different sources), and their use effect can be close to one-time passwords.
7、 密码信息元素通过多次组合及变化后进行复用。 7. The password information element is reused after multiple combinations and changes.
8、 当对应关系为自变量直接对应到密码信息,并且密码信息不进行复用,为一次性密码。 映射密码技术与传统密码技术的不同- 8. When the corresponding relationship is that the argument directly corresponds to the password information, and the password information is not reused, it is a one-time password. The difference between mapping cryptography and traditional cryptography-
1、 传统密码技术要求密码长度较短, 易于使用。 而映射密码的密码信息通常比较长, 一般都在 1024位以上。 1. Traditional password technology requires short password length and easy to use. The password information of the mapped password is usually relatively long, and is generally more than 1024 bits.
2、 传统密码技术普遍直接使用密码,但映射密码技术需用自变量映射得到新密码后再使 用。 2. Traditional password technology generally uses passwords directly, but mapping password technology requires independent variable mapping to obtain a new password before use.
3、 传统密码普遍是每次周期性地重复使用。只有一次一密系统使用一次性密码,周期是 无穷大, 但得不到广泛的使用。 映射密码技术的密码信息使用周期很长, 在周期范围 内基本没有重复使用。 3. Traditional passwords are generally reused periodically. Only one-time password systems use one-time passwords, and the period is infinite, but they are not widely used. The use period of the password information of the mapping password technology is very long, and there is basically no reuse in the period range.
4、 传统密码技术中明码是通过某种算法使用密码对信息进行加密得到,也就是说,待加 密信息的全部、秘密的整体信息与加密后的明码之间通过某种算法或法则形成某种关 系, 这三者都是整体相关联的。 但映射密码技术中, 待加密信息、 加密后的明码只是 与密码信息的部分通过法则形成关联关系。 映射密码与流密码 (序列密码) 的异同: 4. In the traditional cryptographic technology, the clear code is obtained by encrypting the information by using a certain algorithm. All three of these relationships are related. However, in the mapping cipher technology, the information to be encrypted and the encrypted plain code are only related to part of the cipher information through a rule. Similarities and differences between mapping ciphers and stream ciphers (serial ciphers):
1、 使用方法异同: 流密码是使用密码生成伪随机的密钥流 (通常与加密的数据进行混 合), 再对数据流进行加密, 只要密码与加密的信息确定了, 密钥流也就确定了, 整 个加密信息及过程都可以确定。 但映射密码需要给定自变量才能产生新密码, 再进行 加密。 通过多个自变量得到的新密码的有序排列, 也可以得到密钥流。 如果把加密数 据作为自变量,流密码也可以看作是映射密码的一种特殊情形:密码模型是整体密码, 使用周期为 1, 没有应变密码或者说应变密码为空。 1. Similarities and differences in the use method: Stream cipher is to use a password to generate a pseudo-random key stream (usually mixed with encrypted data), and then encrypt the data stream. As long as the password and encrypted information are determined, the key stream is also determined. Now, the entire encrypted information and process can be determined. However, the mapping password needs to be given an argument to generate a new password, which is then encrypted. The key stream can also be obtained by the ordered arrangement of new passwords obtained from multiple arguments. If encrypted data is used as an independent variable, stream ciphers can also be considered as a special case of mapped ciphers: the cipher model is an overall cipher, with a usage period of 1, there is no strain cipher or the strain cipher is empty.
2、 流密码的密码使用周期为 1, 映射密码的密码使用周期通常比较大。 2. The password usage period of the stream password is 1, and the password usage period of the mapped password is usually large.
3、 流密码每次都使用全部密码信息参与加密法则运算,映射密码通常每次都使用不同的 密码信息参与加密法则运算。 映射密码具有如下特征- 3. Stream ciphers use all the password information to participate in the encryption algorithm operation each time, and mapping passwords usually use different password information to participate in the encryption algorithm operation each time. The mapped password has the following characteristics −
1、 密码信息按用途分为两部分: 一部分作为映射的对应法则变化关系, 称作应变密 码, 记为集合 B, 另一部分作为密码源, 记为集合丫。 1. The password information is divided into two parts according to the purpose: one part is used as the mapping corresponding law change relationship, which is called strain password, which is recorded as set B, and the other part is used as the password source, which is recorded as set ya.
2、 密码源通过应用某种模型或某种对应法则的转换得到新的信息集合, 记为集合 M。 用映射方法记作 2. The cryptographic source obtains a new set of information by applying a transformation of a certain model or a corresponding rule, and records it as set M. Use the mapping method as
fmy: M→Y f my : M → Y
3、 对于任意一个自变量,通过结合了应变密码的对应法则,对应到新集合 M模型中 的某一逻辑位置,从而对应到集合 M中的某一确定元素,再一起通过某一法则(通 常是单向法则, 比如单向散列函数) 结合为新密码, 设自变量的集合为 X, 新密
码的集合为 N, 映射可以记录如下: 3. For any one of the independent variables, the corresponding rule combined with the strain code is mapped to a certain logical position in the new set M model, so as to correspond to a certain element in the set M, and then passed a certain rule (usually Is a one-way rule, such as a one-way hash function) is combined into a new password, and the set of independent variables is X, the new password The set of codes is N, and the mapping can be recorded as follows:
fB L: Χ→Μ , :( , ) - Ν 结合起来就是一个复合的映射: fB:(X,fB L(X))→N f B L : χ → M, :(,)-Ν combined is a composite mapping: f B : (X, f B L (X)) → N
4、 对给定了映射密码的应变密码及密码源, 以及给定的对应法则, 对于任意一个自 变量, 都可以找到唯一确定的新密码与之相对应。 4. For the contingency password and password source given the mapping password, and the corresponding correspondence rule, for any independent variable, a unique new password can be found to correspond to it.
5、 通过自变量的映射, 结合应变密码的对应法则, 对应到密码源形成的逻辑模型, 再通过某一法则形成新的密码。 需要结合自变量进行使用。 5. The mapping of the independent variables, combined with the corresponding law of the contingency cipher, corresponds to the logical model formed by the cipher source, and then a new cipher is formed by a certain rule. It needs to be used in combination with independent variables.
6、 每次进行信息加密, 只与密码信息的一部分间接相关联。 每次加密使用的密码信 息都几乎不同。 6. Each time the information is encrypted, it is only indirectly related to a part of the password information. The password information used for each encryption is almost different.
7、 整个密码信息使用的周期很长。 映射密码组 7. The cycle of using the entire password information is very long. Map password group
首先说明编号密码组的概念。 First, the concept of a numbered cipher group will be explained.
密码组是由一个或两个以上有序的密码组成, 一个密码组可完成一个信息任务, 各密码 完成不同的功能。 A password group is composed of one or two or more ordered passwords. A password group can complete an information task, and each password performs a different function.
编号密码组: 每一个密码组编定有一个编号, 可根据此编号来保存、 使用和索引此密码 组。 Numbered Password Group: Each password group is assigned a number, which can be used to save, use and index this password group.
在映射密码中, 自变量通过映射得到的新密码信息是唯一确定的密码组, 就是映射密码 组, 密码组中包涵了多个有序的密码。 如果把自变量作为密码组的编号, 从映射密码组就得 到了编号密码组。 In the mapping password, the new password information obtained through the mapping of the arguments is the only determined password group, which is the mapping password group. The password group contains multiple ordered passwords. If the argument is used as the number of the cipher group, the numbered cipher group is obtained from the mapped cipher group.
一次性编号密码组: 当对应关系为自变量直接对应到密码信息的一部分形成密码组, 并 且密码信息不进行复用, 就形成一次性编号密码组, 自变量为对应编号。 One-time numbered password group: When the corresponding relationship is that the argument directly corresponds to a part of the password information to form a password group, and the password information is not reused, a one-time numbered password group is formed, and the argument is the corresponding number.
一次性编号密码组的特性: 编号密码组中的密码由不同的随机种子随机生成, 是随机数 (实际上有可重复性, 严格来说应该是伪随机数), 具有随机性; 密码组的每一个密码只能用 来使用有效认证信息一次, 每一密码可以登记使用次数, 可以根据容错次数作废。 所谓"有效 认证信息一次"是指用一个密码对一个或一组信息进行认证后,不能再使用该密码对其他信息 进行认证, 但可以对已认证的信息进行重复计算认证。 基于映射密码组的数字签名方法: Features of one-time numbered cipher groups: The passwords in numbered cipher groups are randomly generated by different random seeds, are random numbers (repeably in fact, should be pseudo-random numbers strictly), and have randomness; Each password can only be used for valid authentication information once. Each password can be registered for the number of uses and can be invalidated based on the number of fault tolerances. The so-called "valid authentication information once" means that after one password or one group of information is authenticated with a password, other passwords cannot be used to authenticate other information, but the authenticated information can be repeatedly calculated and authenticated. Digital signature method based on mapping cipher group:
签名的特性: Signature characteristics:
1、 签名是可信的 1.Signature is trusted
2、 签名是不可伪造的 2.The signature is unforgeable
3、 签名不可重用 3.Signature is not reusable
4、 签名的文件是不可改变的 4.Signed documents are immutable
5、 签名是不可抵赖的 5.Signature is non-repudiation
不管是手工签名还是数字签名都应符合以上签名的特性。 Both manual and digital signatures should meet the characteristics of the above signatures.
映射密码组数字签名表述如下: The mapping cipher group digital signature is expressed as follows:
使用自变量生成足够密码长度的映射密码组, 应用单向散列函数法则, 对消息计算消息 摘要, 就得到映射密码组数字签名, 映射密码组数字签名与自变量相关联, 并且自变量只是 有效使用一次。 映射密码组生成的密码具有足够长度是指: 对于特定长度的消息摘要, 在足 够密码长度的密码空间内, 存在足够多的碰撞, 使得碰撞空间接近或大于消息摘要空间, 也 就不可能从消息摘要码通过穷举法攻击达至减少密码的安全性。
映射密码组数字签名具有如下特征: Use the argument to generate a mapped cipher group of sufficient password length, apply the one-way hash function rule, calculate the message digest for the message, and get the mapped cipher group digital signature. The mapped cipher group digital signature is associated with the argument, and the argument is only valid Use once. The password generated by mapping the cipher group has sufficient length means that: for a message digest of a certain length, there are enough collisions in a password space of sufficient password length, so that the collision space is close to or larger than the message digest space, and it is impossible to retrieve the message from the message. Digest codes can be used to reduce the security of passwords through brute force attacks. Mapping cipher group digital signatures have the following characteristics:
1、 用单向散列函数并使用映射密码组的密码对消息计算消息摘要。 1. Use a one-way hash function and calculate the message digest for the message using the password of the mapped cipher group.
2、 因为映射密码组要使用自变量,使得数字签名与自变量相关联, 自变量只有效使用一 次, 即用自变量生成的映射密码组对一个或一组信息进行认证后, 不能再使用该自变 量生成的映射密码组对其他信息进行认证。 2. Because the mapping cipher group uses an independent variable, the digital signature is associated with the independent variable. The independent variable is only valid once. That is, after one or a group of information is authenticated with the mapped cipher group generated by the independent variable, it cannot be used again. The mapped cipher group generated by the argument authenticates other information.
3、 映射密码组的密码有足够长度, 即密码空间足够大, 使得对于特定长度的消息摘要, 存在足够多的碰撞, 使得碰撞空间接近或大于消息摘要空间, 也就不可能从消息摘要 码通过穷举法攻击达至减少密码的安全性。 3. The password of the mapping cipher group has sufficient length, that is, the password space is large enough, so that for a message digest of a certain length, there are enough collisions, so that the collision space is close to or larger than the message digest space, and it is impossible to pass the message digest code. Brute force attacks reduce password security.
4、 数字签名使用映射密码组, 密码信息具有使用长周期特性。 4. The digital signature uses a mapped cipher group, and the password information has a long-period characteristic.
5、 算法可以公开使用。 算法公开使用不影响映射密码组数字签名的安全性。 5. The algorithm can be used publicly. The public use of the algorithm does not affect the security of the digital signature of the mapped cipher group.
6、 数据完整性认证。 客户方与服务方预先共享映射密码组的密码信息, 并且加密存放, 服务方作为可信赖机构。 消息生产方对消息计算映射密码组数字签名, 并把消息、 自 变量和数字签名一起发送,认证方收到信息后,只要同样计算并比较传送的数字签名, 如果数字签名一致, 就可以验证知道信息是完整的, 没有被改动过, 因为任何不是共 享密码信息的第三方都几乎不可能得到符合要求的数字签名。所以带有映射密码组数 字签名的信息不可被改变, 也不可被伪造。 6. Data integrity certification. The client and the server share the password information of the mapping cipher group in advance, and store it encrypted. The server serves as a trusted institution. The message producer calculates the digital signature of the mapping cipher group for the message, and sends the message, arguments, and digital signature together. After the authenticator receives the information, as long as the digital signature is calculated and compared, if the digital signatures are consistent, the verification can be known. The information is complete and has not been altered, as it is almost impossible for any third party who is not sharing password information to obtain a digital signature that meets the requirements. Therefore, the digital signature of the mapped cipher group cannot be changed or forged.
7、 数字签名不可重用。由于映射密码组数字签名与自变量相关联,而自变量只有效使用 一次, 所以一个映射密码组数字签名也只能对一个消息有效认证一次, 不可能再用于 其他认证。 但对于同一消息, 可以用不同的自变量生成不同的数字签名。 7. Digital signatures cannot be reused. Because the mapping cipher group digital signature is associated with the argument, and the argument is only valid once, a mapping cipher group digital signature can only authenticate a message effectively once, and it cannot be used for other authentications. But for the same message, you can generate different digital signatures with different arguments.
8、 第三方认证。信息交换的双方, 如果都是客户方, 就不能直接进行可信信息认证, 但 可在信息交换后通过服务方进行认证。 比如甲方发送一个消息给乙方, 但乙方不能肯 定这信息一定是甲发送的, 也不能确定这消息是否是完整的。 所以甲方必须对消息进 行数字签名, 并把消息和数字签名信息一起发送; 乙方收到消息后, 可对服务方发送 消息的认证请求, 服务方接受请求后对甲发送的信息进行认证, 然后用与乙方的共享 密码信息对该消息进行签名, 并返回给乙方, 乙方收到消息和签名信息后, 对数字签 名进行验证, 以确定信息的可靠性。 对于短的消息可以在服务方保存, 但对于很长的 消息可以生成消息摘要码, 再对消息摘要码进行数字签名, 这样就可以把对长消息的 认证变为对短消息的认证。 比如, 甲方要传送一个文件给乙方, 甲方就要对文件生成 消息摘要码, 并对消息摘要进行数字签名, 一起发送。 乙方同样对文件生成消息摘要 码, 比较消息摘要, 并通过服务方认证数字签名以证明文件的完整性和确定是甲方所 签发。 8. Third party certification. If both parties to the information exchange are customers, they cannot directly authenticate the trusted information, but they can authenticate through the server after the information exchange. For example, Party A sends a message to Party B, but Party B cannot confirm that the information must be sent by Party A, and it cannot determine whether the message is complete. Therefore, Party A must digitally sign the message and send the message with the digital signature information. After receiving the message, Party B can send an authentication request to the server to send the message. After receiving the request, the server authenticates the information sent by Party A, and then The message is signed with the shared password information with Party B and returned to Party B. After receiving the message and the signed information, Party B verifies the digital signature to determine the reliability of the information. For short messages, you can save them on the service side, but for very long messages, you can generate a message digest code, and then digitally sign the message digest code. In this way, you can change the authentication of long messages to the authentication of short messages. For example, if Party A wants to send a file to Party B, Party A will generate a message digest code for the file, and digitally sign the message digest and send it together. Party B also generates a message digest code for the file, compares the message digest, and verifies the digital signature through the server to prove the integrity of the document and confirms that it was issued by Party A.
9、 非否认性, 即不可抵赖。服务方是可信赖的主体, 以其信誉为基础, 通过一系列措施 和制度去保证其可信赖性, 任何客户方的数字签名必须经服务方进行验证, 并且一经 验证正确, 就能确定一定是该客户所签发。 9. Non-repudiation, that is, non-repudiation. The service party is a trusted entity. Based on its reputation, it uses a series of measures and systems to ensure its trustworthiness. The digital signature of any client must be verified by the service party. Once the verification is correct, it can be determined. Is issued by the customer.
10、 与传统基于公钥基础设施 (PKI ) 的数字签名异同。 在认证过程中都使用了消息 摘要,并且都需要可信赖机构,都能实现进行身份认证、消息完整性认证和非否认性。 两者认证方式和过程不同, 基于公钥基础设施(PKI) 的数字签名可以由任何人取得 公钥进行认证, 并且其认证方式是离线认证, 无需通过第三者进行认证; 映射密码组 数字签名必须而且只能通过可信赖的服务方进行认证, 其认证方式是在线认证。 两者 密码信息也不同, 公钥基础设施 (PKI ) 的数字签名使用私钥和公钥密码, 每次使用 相同的密码信息, 其使用周期为 1 ; 映射密码组数字签名使用周期一般很长, 每次使 用不同的密码信息。 10. Similarities and differences with traditional public key infrastructure (PKI) -based digital signatures. Message digests are used in the authentication process, and they all require trusted institutions to implement identity authentication, message integrity authentication, and non-repudiation. The two authentication methods and processes are different. The public key infrastructure (PKI) -based digital signature can be obtained by anyone who obtains the public key for authentication, and the authentication method is offline authentication, which does not require authentication by a third party. Mapping cipher group digital signature Must and can only be authenticated by a trusted service provider, the authentication method is online authentication. The password information of the two is also different. The digital signature of the Public Key Infrastructure (PKI) uses a private key and a public key password. Each time the same password information is used, the usage cycle is 1. The mapping password group digital signature is generally used for a long time. Use different password information each time.
11、 当映射密码组为一次性编号密码组时,映射密码组数字签名就成为一次性编号密 码组数字签名。 11. When the mapped cipher group is a one-time numbered cipher group, the digital signature of the mapped cipher group becomes a one-time numbered digital group digital signature.
一次性编号密码组数字签名表述如下:
一次性数字签名技术是计算消息摘要使用基于足够密码长度的一次性密码或一次性编号 密码组的单向散列函数的消息认证校验和, 即消息摘要, 对于特定长度的消息摘要, 在足够 密码长度的密码空间内, 存在足够多的碰撞, 使得碰撞空间接近或大于消息摘要空间, 也就 不可能从消息摘要码通过穷举法攻击达至减少密码的安全性。 The digital signature of the one-time numbered cipher group is expressed as follows: One-time digital signature technology calculates the message digest using a one-way hash function based on a one-time password or one-time numbered cipher group with sufficient password length. The message authentication checksum is the message digest. For a message digest of a certain length, In the password space of the password length, there are enough collisions, so that the collision space is close to or larger than the message digest space, and it is impossible to reduce the security of the password from the message digest code through an exhaustive attack.
一次性数字签名技术主要特征: Main characteristics of one-time digital signature technology:
1、 使用单向散列函数计算消息摘要,具有的单向性。只可以用密码对消息计算出消息摘 要, 不可能通过消息摘要计算出密码信息。 1. Use a one-way hash function to calculate the message digest, which is one-way. You can only use the password to calculate the message digest for the message. It is not possible to calculate the password information from the message digest.
2、 具有单向散列函数的伪随机性和抗碰撞性。 通过单向散列函数计算得到的消息摘要, 具有伪随机性, 因为一个好的单向散列函数计算是一个对消息的足够混乱和扩散过 程, 消息或者密码的每一位微小改变, 都会导致在消息摘要结果引起巨大的变化, 在 消息摘要中得到了差别很大的、 完全不同的结果, 所有的变化结果是伪随机的, 并且 对消息的较少改变不易导致产生相同的消息摘要, 即抗碰撞性。 2. Pseudo-randomness and collision resistance with one-way hash function. The message digest calculated by the one-way hash function is pseudo-random, because a good one-way hash function calculation is a sufficiently chaotic and diffusion process for the message. Every small change in the message or password will cause The result of the message digest caused a huge change, and very different and completely different results were obtained in the message digest. All the changes were pseudo-random, and fewer changes to the message would not easily lead to the same message digest. Impact resistance.
3、 在使用的密码空间内, 存在足够多的碰撞。因为密码长度比消息摘要长度大得多, 根 据鸽笼原理,必定存在很多的碰撞,就是有很多不同的密码可以生成相同的消息摘要, 密码与消息摘要是多对一关系。这样就不可以根据消息摘要和算法确定具体使用的密 码,只要增加密码长度就可以扩大碰撞空间,当碰撞空间接近或大于消息摘要空间时, 甚至不会减少密码的安全性。 3. There are enough collisions in the password space used. Because the length of the password is much larger than the length of the message digest, according to the pigeonhole principle, there must be many collisions, that is, there are many different passwords that can generate the same message digest, and the password and message digest have a many-to-one relationship. In this way, the specific password cannot be determined according to the message digest and algorithm. As long as the password length is increased, the collision space can be enlarged. When the collision space is close to or larger than the message digest space, the security of the password will not even be reduced.
4、 一次一密特性。所谓一次性密码, 是指密码只能用来有效认证信息一次。一次性密码 使用周期是无限大, 这样用历史的分析方法或工具对加密过程或加密结果进行分析对 猜测密码信息就毫无用处。 分步绑定处理技术, 是指信息任务可以分成多个步骤, 分别与不同的密码相关联, 按序 完成。 其特征是: 4. One density at a time. The so-called one-time password means that the password can only be used for valid authentication information once. The one-time password usage period is infinite, so that using historical analysis methods or tools to analyze the encryption process or encryption results is useless for guessing password information. The step-by-step binding processing technology refers to that information tasks can be divided into multiple steps, which are respectively associated with different passwords and are completed in order. Its characteristics are:
1、 每一个步骤有与其他步骤所使用的不同的密码所关联的信息的校验。 也就是说, 每一个步骤中的某些信息(包括消息摘要), 必定与某些密码有关系, 而这些密码在 其他步骤的过程中是没有使用过的。每个步骤必定有其专用的密码, 这是区分"分步" 的标志。 1. Each step has a verification of the information associated with the different passwords used in the other steps. In other words, some information (including the message digest) in each step must be related to some passwords, and these passwords have not been used in other steps. Each step must have its own unique password, which is a sign of distinguishing "steps".
2、 信息任务各个步骤按约定的顺序来完成, 只有上一步完成后才能进行下一步处 理; 对每一个步骤, 一经处理完成, 其使用的密码和相应加密信息不能再用于同样 ' 的或其他的处理, 这就是绑定处理。 2. Each step of the information task is completed in the agreed order, and the next step can be processed only after the previous step is completed; once each step is completed, the password and corresponding encrypted information used cannot be used for the same or other This is the binding processing.
分步绑定处理技术的作用- The role of step-by-step binding processing technology-
1、 增强了密码空间, 使用更加安全。 1. The password space is enhanced for more secure use.
2、 将密码组与信息任务进行绑定。 与信息任务有关的所有密码所关联的有关信息, 不会在一次信息交换中全部传递出去, 每一次信息交换只交换部分密码关联的信息。 信息任务与密码组绑定后才会发送剩余密码所关联的信息, 密码组一经绑定, 不能 再用于其他信息任务。 攻击者如果要攻击密码, 必须要得到与全部密码关联的信息, 但当他得到此信息时, 该密码组已不能作其他使用, 这就确保了信息任务及密码的' 安全。 通过密码组与信息任务绑定, 也可以有效防止中间人攻击。 2. Bind the password group to the information task. The relevant information related to all passwords related to the information task will not be transmitted in one information exchange, and only a part of the password-related information is exchanged in each information exchange. After the information task is bound to the password group, the information associated with the remaining passwords will be sent. Once the password group is bound, it cannot be used for other information tasks. If an attacker wants to attack a password, he must obtain the information associated with all passwords, but when he gets this information, the password group can no longer be used for other purposes, which ensures the security of the information task and password. By binding password groups to information tasks, man-in-the-middle attacks can also be effectively prevented.
3、 可以将该信息任务与相应的其他信息(比如交易终端号)进行绑定。 交易分步进 行, 即使某一步的信息被截取, 仍然不会影响信息任务整体的安全性。 比如某人在 旅行中丢失了所有证件, 他可以在异地打电话给家人或朋友取得密码 (严格地说应 是一次性数字签名), 并在使用本发明方案技术的柜员机或其他终端 (这种柜员机 或终端只需输入正确一次性数字签名即可取款) 上取款, 但同时也可能会有人正在 窃听, 并在另一柜员机上取款, 但因为交易使用了分步绑定处理技术, 与终端柜员 机进行绑定, 交易分多步进行, 在第一步时, 两地柜员机不可能同时成功, 如窃听
人第一步成功就不能得到完整的密码信息, 因为他的家人或朋友只有在他前一步成 功后才会告诉他下一步的密码信息, 只有真正的本人才有可能在两步以上同时成功, 故整个交易仍是安全的。 3. This information task can be bound with corresponding other information (such as the transaction terminal number). The transaction is carried out step by step. Even if the information of a certain step is intercepted, it still does not affect the overall security of the information task. For example, if someone lost all their documents during a trip, he could call family members or friends at another place to get a password (strictly speaking, it should be a one-time digital signature), and use a teller machine or other terminal (such ATM or terminal only needs to enter the correct one-time digital signature to withdraw money), but at the same time, someone may be tapping and withdrawing money on another ATM, but because the transaction uses step-by-step binding processing technology, it is connected with the terminal ATM For binding, the transaction is carried out in multiple steps. In the first step, ATMs in both places cannot succeed at the same time, such as eavesdropping. A person cannot get the complete password information after the first step is successful, because his family or friends will only tell him the next password information after the previous step is successful. Only the real person may succeed in more than two steps at the same time. So the whole transaction is still safe.
4、 可有效防止身份欺骗。 在信息事务过程中, 通过开始的步骤 ίέ可以识别身份, 如 果是假的身份, 其余的秘密信息就不会再发送出去, 确保整个任务安全。 4, can effectively prevent identity fraud. In the information transaction process, the identity can be identified through the initial steps. If it is a false identity, the remaining secret information will not be sent again to ensure the security of the entire task.
5、 可防止人为错误。 将信息任务分成多个步骤, 可由多个客户来共同完成。 可防止 人为错误。 比如甲转帐资金到乙的帐户, 如果全部由甲来完成, 可能甲会搞错帐号; 如果将此任务分为两步, 甲发起转帐交易后, 由乙来确认后才能完成, 这就避免了 人为错误的可能。 5. Prevent human error. Divide information tasks into multiple steps that can be completed by multiple customers. Prevents human error. For example, if A transfers funds to B's account, if A completes it, then A may mistake the account; if this task is divided into two steps, after A initiates the transfer transaction, it can be completed only after B confirms, which is avoided. Human error is possible.
6、 可用来划分不同交易, 使用不同功能的密码组。 6. It can be used to divide different transactions and use different password groups.
7、 可以防止由于算法的弱点或者弱密钥的出现引起对安全的影响。 . 可控加密技术方法: 是指整个加密过程是可以由人工控制或监督的方法, 其过程不可能 是全自动的, 其特征是: 7. It can prevent the impact on the security caused by the weakness of the algorithm or the appearance of the weak key. Controllable encryption technology method: It refers to the method that the entire encryption process can be controlled or monitored manually. Its process cannot be fully automatic. Its characteristics are:
1、 密码信息只有加密的软件或硬件可以读取。 1. Password information can only be read by encrypted software or hardware.
2、 加密过程及加密内容可以人工控制或人工监督。如果只可控制加密部分的必要信 息, 即为部分可控加密, 比如规定加密次数, 加密数据长度, 加密的具体内容, 或 者是加密必须包括的部分内容, 又或者是数据特定位置的特定内容, 例如转帐中的 帐号及金额。 有时部分可控加密即可以满足实际使用的需要。 对加密次数必须进行 控制, 对加密内容必须有全部或部分进行人工控制或进行人工监督, 加密内容在加 密前或加密后必须全部或必要部分得到确认。 2. The encryption process and content can be controlled or monitored manually. If only the necessary information of the encrypted part can be controlled, it is part of the controllable encryption, such as specifying the number of encryptions, the length of the encrypted data, the specific content of the encryption, or the part of the content that the encryption must include, or the specific content of the specific location of the data, Such as the account number and amount in the transfer. Sometimes partially controlled encryption can meet the needs of practical use. The number of times of encryption must be controlled, all or part of the encrypted content must be controlled or monitored manually, and all or necessary parts of the encrypted content must be confirmed before or after encryption.
简单和方便的可控加密方法是使信息加密与信息传输物理分离。 A simple and convenient controllable encryption method is to physically separate information encryption from information transmission.
可控加密方法的作用: The role of controlled encryption methods:
1、 确保密码的安全。使用了可控加密方法, 其他人不管使用什么方法都不能读取到 密码内容。 甚至客户本人也不用读取密码内容, 只需在加密时由加密主体 (加密的 软件或硬件) 引用密码。 所以密码可以完全不向外开放。 1. Ensure the security of the password. A controlled encryption method is used, and no one else can read the password content no matter what method is used. Even the customer himself does not have to read the password content, only the encryption body (encrypted software or hardware) refers to the password during encryption. So the password can not be opened at all.
2、 确保加密信息的安全。 因为加密的过程和内容是可以控制的, 故所有的加密信息 必定是按需生成, 所有信息都必须按要求使用。 要存储成成千上万的信息, 对当前现代的存储器已不是什么难事, 而且本发明的一次性 数字签名算法可以使用相对简单的算法, 实现起来相对要简单容易, 这就使得将密码信息的 存储和数据的加密做在一个较小的设备或装置中成为可能。 而需要加密的信息, 可以通过手 工按键输入, 如果需加密的信息比较多, 可以在手工录入加密的限制条件后, 比如限定加密 次数, 限制需要加密信息的某一固定部分, 或者是限定加密信息的长度等等, 在锁定限制条 件后,可再通过其他接口, 比如串口或 USB接口,甚至使用无线通讯,传输其余需加密信息; 加密后得到的信息或一次性数字签名也可以通过显示后再手工传送, 这也有利于人工监控, 或者通过串口或 USB接口、无线通讯接口等其他接口传送出去, 实现半自动化, 但整个过程 都是可以根据加密需要来控制的, 或者在加密后显示信息进行人工监控, 符合可控加密方法 原则, 因此也不可能是过程全自动化的。 我们把密码存储和加密算法做成放在一起, 加密过 程符合可控加密方法原则的装置, 叫作可控加密装置。 可控加密装置的特征是, 密码保存在 装置中, 可对密码进行更新或补充, 密码保存后, 密码信息不再对装置外进行直接交换, 只 有装置中进行加密的软件或硬件可以读取; 在装置中实现加密算法, 可以提取密码对输入或 锁定的信息进行加密或验证; 加密装置带有显示装置, 可以显示被加密的全部或部分信息, 以便于进行人工控制或者人工监控; 加密次数可以控制, 必须在按需控制加密次数后加密操 作才可以进行; 可以在控制必要的部分加密内容后, 实现半自动加密, 也可以用手工录入进
行全部内容控制; 对多步骤任务使用分步绑定处理技术, 完成上一步的加密或验证后才能进 行下一步骤处理。 我们把" "次性编号密码组存储和一次性数字签名算法做成放在一起, 可以 对信息进行计算及验证一次性数字签名, 加密过程符合可控加密方法原则的装置, 叫作一次 性数字签名装置。 只要使用本发明方案的信息安全认证过程和一次性数字签名装置, 就能够 方便、 安全地实现信息认证, 包括安全身份认证, 安全方便地完成信息任务。 一次性数字签名装置方法, 具有如下特征: 2. Ensure the security of encrypted information. Because the encryption process and content can be controlled, all encrypted information must be generated on demand, and all information must be used as required. To store tens of thousands of information, it is not difficult for the current modern memory, and the one-time digital signature algorithm of the present invention can use a relatively simple algorithm, and it is relatively simple and easy to implement, which makes the password information Encryption of storage and data is made possible in a smaller device or device. The information that needs to be encrypted can be entered by manually pressing keys. If there is a lot of information that needs to be encrypted, you can manually enter the encryption restrictions, such as limiting the number of encryptions, limiting a certain part of the information that needs to be encrypted, or limiting the encrypted information. Length, etc., after locking the restriction conditions, it can be transmitted through other interfaces, such as serial port or USB interface, or even wireless communication, to transmit the remaining encrypted information; the encrypted information or one-time digital signature can also be displayed after Manual transmission, which is also conducive to manual monitoring, or transmitted through other interfaces such as serial port or USB interface, wireless communication interface, to achieve semi-automation, but the entire process can be controlled according to encryption needs, or the information is displayed after encryption. Manual monitoring is in line with the principle of controlled encryption methods, so it is not possible to fully automate the process. We put together the password storage and the encryption algorithm. The device whose encryption process conforms to the principle of the controllable encryption method is called a controllable encryption device. The feature of the controllable encryption device is that the password is stored in the device, and the password can be updated or supplemented. After the password is saved, the password information is no longer directly exchanged outside the device, and only the encrypted software or hardware in the device can read it; The encryption algorithm is implemented in the device, which can extract the password to encrypt or verify the input or locked information; the encryption device has a display device that can display all or part of the encrypted information for manual control or manual monitoring; the number of encryption can be Control, the encryption operation can only be performed after the number of encryptions is controlled on demand; semi-automatic encryption can be achieved after the necessary part of the encrypted content is controlled, or manually entered Full content control; use step-by-step binding processing technology for multi-step tasks, and then proceed to the next step after completing the previous step of encryption or verification. We put together the "" one-time number cipher group storage and one-time digital signature algorithm together, which can calculate and verify the information and verify the one-time digital signature. The device whose encryption process conforms to the principle of controlled encryption method is called one-time digital Signature device. As long as the information security authentication process and one-time digital signature device of the solution of the present invention are used, information authentication can be conveniently and securely implemented, including security identity authentication, and information tasks can be safely and conveniently completed. The one-time digital signature device method has the following characteristics:
1、 该装置可以按编号存储、索引和使用大量的一次性编号密码组, 密码组保密存储。密 码信息不一定是可见的, 而且通常是不可见的, 只有加密过程可以使用, 密码信息可 以根据需要随时更新和补充。 密码组保存后, 密码信息不再对装置外进行直接交换, 只有装置中进行加密的软件或硬件可以读取。 1. The device can store, index and use a large number of one-time numbered password groups by number, and the password groups are stored confidentially. The password information is not necessarily visible, and is usually not visible. Only the encryption process can be used. The password information can be updated and supplemented at any time as needed. After the password group is saved, the password information is no longer directly exchanged outside the device, and only the encrypted software or hardware in the device can read it.
2、 实现一次性数字签名算法,可以根据密码组编号使用一次性编号密码组对信息进行计 算及验证一次性数字签名。 2. To implement a one-time digital signature algorithm, you can use the one-time number cipher group to calculate information and verify the one-time digital signature according to the cipher group number.
3、 加密过程符合可控加密方法原则。 必须在按需控制加密次数后加密操作才可以进行; 对加密的信息或加密条件可以全部或者部分进行人工控制, 在加密后可以进行监督。 3. The encryption process conforms to the principle of controlled encryption methods. The encryption operation can only be performed after the number of encryptions is controlled as needed; the encrypted information or encryption conditions can be controlled manually or in whole, and supervision can be performed after encryption.
4、 可以通过手工按键输入需加密信息, 或者通过手工设定或录入加密的限制条件。 4. You can enter the information to be encrypted by manually pressing keys, or you can manually set or enter the encryption restrictions.
5、 在锁定全部或部分加密信息和加密条件后, 可以通过其他接口, 比如串口或 USB接 口、 无线电通讯接口等, 传输和验证需加密的信息和一次性数字签名信息, 在加密后 可以显示加密的信息, 以进行监督。 5. After locking all or part of the encrypted information and encryption conditions, it can transmit and verify the information to be encrypted and one-time digital signature information through other interfaces, such as serial port or USB interface, radio communication interface, etc. After encryption, the encryption can be displayed. Information for monitoring.
6、 根据分步绑定处理技术的应用, 只有上一步应答的一次性数字签名计算及验证正确 后, 才进行下一步的一次性数字签名的计算及验证, 以防止人为的上一步验证还没有 认证通过就泄露了下一步的秘密信息。 6. According to the application of the step-by-step binding processing technology, the calculation and verification of the one-time digital signature of the next step is performed only after the calculation and verification of the one-time digital signature of the previous response is correct, so as to prevent the artificial verification of the previous step that has not yet taken place. Passing the authentication revealed the next secret information.
7、 为增加一次性数字签名装置安全性,装置本身设有锁定密码,需要解除密码锁定后才 能使用。 7. In order to increase the security of the one-time digital signature device, the device itself has a lock password, which can only be used after unlocking the password.
8、 一次性数字签名装置可以同时保存客户的信息, 以方便使用。 〖 基于客户安全和服务安全的信息安全技术- 当前安全模式的划分, 很多是按照开放系统互连 OSI (Open System Interconnection ) 模型来划分, 如 Internet安全协议(IPSec)是网络层安全的信息安全技术, 安全套接字协议 层(SSL)是 Internet互连中基于传输层的信息安全技术, 基于公钥基础设施(PKI ) 的数字 签名等是应用层安全的信息安全技术。 毫无疑问, 以上协议在开放系统互连 0SI的通信过程 中, 使用是安全的, 但问题是现在的安全范围已经超出了开放系统互连 0SI模型, 不仅仅是 通信过程, 比如各种终端机已不可信赖的情况, 通信过程再保密也是徒劳。 在这种情况下, 再用开放系统互连 0SI模型来规范安全模式是不科学的, 也是不可能达到安全效果的。 所以 有必要把安全的范围作进一步的提高。 基于信息安全对象的信息安全技术是居于更高层次的 安全技术。 8. One-time digital signature device can save customer information at the same time for easy use. 〖Information security technology based on customer security and service security-The current security model is divided according to the Open System Interconnection (OSI) model. For example, Internet Security Protocol (IPSec) is a network layer security information security technology. The Secure Sockets Layer (SSL) is an information security technology based on the transport layer in the Internet interconnection. Digital signatures based on public key infrastructure (PKI) are information security technologies at the application layer. There is no doubt that the above protocols are safe to use in the Open System Interconnection 0SI communication process, but the problem is that the current security scope has exceeded the Open System Interconnection 0SI model, not only the communication process, such as various terminals In the untrustworthy situation, it is futile to keep the communication confidential. In this case, it is unscientific to use the open system interconnection 0SI model to regulate the security model, and it is impossible to achieve security effects. It is necessary to further improve the scope of security. Information security technology based on information security objects is a higher level security technology.
客户和服务的技术模型: 直接进行安全信息交换的双方分为客户方和服务方。 客户方是 主动发起信息交换请求的一方, 通常是服务需求的一方。 服务方是相对被动响应请求, 提供 信息交换的一方, 通常是提供信息服务的一方, 服务方是可信赖的主体。 各个客户方个体之 间的可信赖信息交换可通过服务方主体进行, 各客户个体之间不能直接进行可信赖信息交换, 但可以进行一般信息交换, 信息可靠性可再通过服务方进行验证。 信息任务或者信息事件由 多个信息交换组成, 事件信息不可以重复, 也就是说, 同一信息事件中, 没有完全相同的信 息。 Customer and service technology model: The two parties that directly exchange security information are divided into customer and service. The client is the party that initiated the request for information exchange, usually the party that requested the service. The service party is a relatively passive response to the request, the party that provides the information exchange, usually the party that provides the information service, and the service party is the trusted subject. Reliable information exchange between individual customers can be carried out by the service provider. Individual customers cannot directly exchange trusted information, but general information can be exchanged. Information reliability can be verified by the service provider. An information task or information event is composed of multiple information exchanges. The event information cannot be repeated, that is, there is no exactly the same information in the same information event.
信息安全对象的概念和特征: 信息安全对象是一个安全信息存储和处理的主体, 在安全 对象形成后, 对象发出的安全信息必须加上对象安全标志, 对象接收和处理的安全信息必须
带有对方安全标志, 使得发送或接收的安全信息不能被伪造和更改, 同时安全信息必须带有 事件标志。 其特征如下: The concept and characteristics of information security objects: Information security objects are the main body of storage and processing of security information. After the security objects are formed, the security information sent by the objects must be marked with the object security mark, and the security information received and processed by the objects must be With the security sign of the other party, the security information sent or received cannot be forged and changed, and the security information must be marked with an event. Its characteristics are as follows:
1、 安全对象对自身安全信息进行存储和保密, 秘密信息不直接对外传送。 1. The security object stores and keeps its own security information, and the secret information is not directly transmitted to the outside.
2、安全对象发出或收到的的安全信息必须带有对象安全标志,使用得安全信息不可以被 伪造, 也不可以被改变, 信息被伪造或者信息被改变后信息的安全标志就会不符合规范, 除 信赖机构外, 只有该对象才能正确生成自已的信息安全标志。 2. The security information sent or received by the security object must bear the security mark of the object. The security information used cannot be forged or changed. The information security mark will not conform to the information being forged or changed. Norms, except for trusted institutions, only this object can correctly generate its own information security mark.
3、安全对象发出或收到的带有安全标志的安全信息必须包涵事件标志,事件标志可以在 安全信息中实现, 也可以在安全标志中实现。 安全信息可以被复制, 但不可以被复用, 也就 是一个事件发生的安全信息, 不可能被另一事件用来重复使用。 这就使得对不同事件, 安全 信息不可以重放。 而对于同一事件, 没有相同的安全信息, 也就不可能重放。 乍一看, 以上的特点倒是与一般的数字签名特点有点类似, 但其有着本质的差别: 一般 的数字签名只着重于所签名的数字信息的安全, 而信息安全对象是将整个接收、 处理和发送 安全信息作为一个整体抽象出来, 作为一个安全的对象, 它集合了各种安全要素, 比如密码 信息、 加密方法、 加密过程等等, 所有的安全要素形成一个主体, 可以作为一个黒盒子, 你 可以把它放到一个安全的地方保管起来, 这样它就能提供安全的信息。 安全对象的优点在于 安全的简单化、 安全要素抽象化、 集中化, 使得安全特性可以从其他各种复杂的系统分别开 来。 比如, 由于开放系统互联的应用, 使得一般的终端都成为不可信赖的主体, 那么我们就 可以把所有的安全要素从终端中抽离出来, 形成一个安全对象。 安全对象与使用的通讯和终 端无关, 只要保证信息安全对象的安全, 就可以安全地使用各种通讯和终端, 即使通讯或终 端是不安全、不可信的。将信息安全对象概念应用于当前广泛使用的基于公钥基础设施(PKI ) 的数字签名, 也可以十分有效地加强安全性。 3. The safety information with safety signs sent or received by the security objects must include event signs. Event signs can be implemented in safety information or in safety signs. Security information can be copied, but it cannot be reused. That is, the security information of one event cannot be reused by another event. This makes it impossible to replay security information for different events. For the same event, it is impossible to replay without the same security information. At first glance, the above characteristics are somewhat similar to general digital signatures, but they have essential differences: General digital signatures only focus on the security of digital information that is signed, and the object of information security is to receive, process and Sending security information is abstracted as a whole. As a security object, it integrates various security elements, such as password information, encryption methods, encryption processes, and so on. All security elements form a subject, which can be used as a box. You It can be kept in a safe place so that it can provide secure information. The advantages of security objects are the simplicity of security, the abstraction and centralization of security elements, so that security features can be separated from other various complex systems. For example, due to the application of open system interconnection, general terminals have become untrustworthy subjects, so we can extract all security elements from the terminals to form a security object. The security object has nothing to do with the communication and terminal used. As long as the security of the information security object is ensured, various communications and terminals can be used safely, even if the communication or terminal is unsafe and untrusted. Applying the concept of information security objects to the widely used public key infrastructure (PKI) -based digital signatures can also be very effective in strengthening security.
安全标志可以通过数字签名的方法来实现。 . 客户安全的概念和特征: 客户安全是一个安全对象, 是客户方发送、 接收和处理安全信 息的主体, 在客户安全形成后, 客户发出的安全信息必须加上客户安全标志, 客户接收和处 理的安全信息必须带有服务方安全标志。 但在实际应用中有很多需要交换的信息是未经安全 标志的, 对这种信息应当尽量减少使用, 并且需要经人工判断确定安全后才能使用。 人工判 断安全检査也有很多种方法, 比如作全部检查、 要素捡查、 部分抽查、 混合检查等等, 可视 乎安全要求具体确定。 The security mark can be implemented by digital signature. The concept and characteristics of customer security: Customer security is a security object, and it is the main body of the customer to send, receive, and process security information. After the security of the customer is formed, the security information sent by the customer must be marked with the customer security mark, and the customer receives and processes The safety information must bear the service-side safety mark. However, in practical applications, there is a lot of information that needs to be exchanged without security signs. Such information should be used as little as possible, and it can only be used after it is determined to be safe by human judgment. There are also many methods for manually judging safety inspections, such as full inspections, element inspections, partial inspections, mixed inspections, etc., depending on the safety requirements.
服务安全的概念: 服务安全是服务方发送、 接收、 处理和保存安全信息的主体, 服务方 发出的安全信息必须加上服务安全标志,其接收和处理的安全信息必须带有客户方安全标志, 服务方不处理没有附带安全标志的信息。 其特性与客户安全类似。 The concept of service security: Service security is the main body that the service party sends, receives, processes and saves the security information. The security information sent by the service party must be marked with the service security mark, and the security information received and processed must bear the customer's security mark. The service provider does not process information without safety signs. Its characteristics are similar to customer security.
客户安全与服务安全都是安全对象, 两者有区别: Customer security and service security are both security objects. There are differences between the two:
1、 客户安全可处理安全信息,也可处理不安全信息,但需要人工检查判断后才能转为安 全信息。 服务安全不处理没有附带安全标志的信息。 1. Customer safety can handle both safety information and unsafe information, but it needs to be checked and judged manually before it can be converted into safety information. Service Security does not process information that is not accompanied by a safety sign.
2、 客户因可能遭遇和处理不安全信息,其处理过程不可能完全实现自动处理,服务安全 只处理带有安全标志的安全信息, 可以实现自动处理过程。 2. Because customers may encounter and process unsafe information, the processing process cannot be fully automated. Service security only handles security information with safety signs, which can realize automatic processing.
3、 由于服务方是可信赖的主体,故客户安全是依赖于服务安全的主体,没有服务安全也 就没有客户安全。 服务安全是可信赖的主体, 其安全建立在其信誉基础之上。 3. Since the service provider is a trusted subject, customer security is the subject that depends on service security. Without service security, there is no customer security. Service security is a trusted entity whose security is built on its reputation.
安全对象是安全信息的独立主体, 不依赖于任何通讯方式以及外部环境, 但如果安全对 象被入侵或毁坏, 安全信息就可能泄露。 基于映射密码组数字签名的安全对象及其信息交换过程- 如果把客户标志、 密码信息、 密码组的产生方法、 映射密码组数字签名法则及过程等安
全要素集合到一起形成一个对象, 并且对象对外的信息交换符合安全对象的特征和要求, 就 得到基于映射密码组数字签名的客户安全对象。 The security object is an independent subject of security information and does not depend on any communication method or external environment. However, if the security object is invaded or destroyed, the security information may be leaked. Security object based on mapping cipher group digital signature and its information exchange process-if the client logo, password information, generation method of cipher group, mapping cipher group digital signature rule and process are secure All the elements are aggregated together to form an object, and the external information exchange of the object meets the characteristics and requirements of the secure object, and a client secure object based on the digital signature of the mapping cipher group is obtained.
基于映射密码组数字签名的客户安全对象具有如下基本特征: The client security object based on the digital signature of the mapped cipher group has the following basic characteristics:
1、 包涵客户标志, 即客户号信息。 1. Include customer logo, that is, customer number information.
2、 包涵映射密码信息。 2. Contains mapping password information.
3、 密码信息更新方法。 3. Password information update method.
4、 映射密码组方法。 4. Map cipher group method.
5、 对消息映射密码组数字签名方法。 5. Digital signature method for message mapping cipher group.
6、 对消息映射密码组数字签名验证方法。 6. Digital signature verification method for message mapping cipher group.
7、 非安全消息的安全确认方法。 7. Security confirmation methods for non-secure messages.
8、 消息传递或交换方法。 基于映射密码组数字签名的服务安全对象具有如下基本特征- 8. Message passing or exchange methods. The service security object based on the digital signature of the mapping cipher group has the following basic characteristics −
1、 包涵各个客户标志, 即客户号信息。 1. Contains each customer logo, that is, customer number information.
2、 包涵各个客户的映射密码信息, 各客户密码自变量使用的信息。 2. Contains the mapping password information of each customer and the information used by each customer's password argument.
3、 客户密码信息更新方法。 3. Update method of customer password information.
4、 映射密码组方法。 4. Map cipher group method.
5、 对消息映射密码组数字签名方法。 5. Digital signature method for message mapping cipher group.
6、 对消息映射密码组数字签名验证方法。 6. Digital signature verification method for message mapping cipher group.
7、 消息传递或交换方法。 7. Message passing or exchange methods.
8、 客户安全信息保存方法。 8. Customer safety information preservation method.
9、 其他安全服务属性(服务方的专业服务内容)。 9. Other security service attributes (professional service content of the service party).
10、 其他安全服务方法。 按以上对象特征所组成的装置就是映射密码组数字签名的安全对象装置, 其装置方法的 具体特征是: 10. Other security service methods. The device composed of the above object characteristics is a security object device that maps a digital signature of a cipher group. The specific characteristics of the device method are:
1、 装置存储对象的信息, 包括对象编号和密码信息。 1. The device stores object information, including object number and password information.
2、 装置了映射密码组方法。 2. The method of mapping cipher group is installed.
3、 装置了对消息映射密码组数字签名方法。 3. A digital signature method for the message mapping cipher group is installed.
4、 装置了对消息映射密码组数字签名验证方法。 4. A digital signature verification method for the message mapping cipher group is installed.
5、 装置实现了消息映射密码组数字签名和验证过程。 映射密码组数字签名的安全对象信息交换过程: 5. The device implements the digital signature and verification process of the message mapping cipher group. Security object information exchange process for mapping cipher group digital signature:
. 首先客户安全对象与服务安全对象通过直接共享的方式共享映射密码组的密码信息。 密 码信息是由服务方产生的具有伪随机属性的密码序列。 每个信息任务可以分为多个信息交换 过程, 按最常用任务的信息交换数确定每一个密码组需包涵的有序密码数, 对于大的信息任 务可以划分为小的信息任务。 First, the client security object and the service security object share the password information of the mapped cipher group in a direct sharing manner. The password information is a cryptographic sequence with pseudo-random properties generated by the server. Each information task can be divided into multiple information exchange processes. The number of ordered passwords to be included in each password group is determined according to the information exchange number of the most commonly used tasks. For large information tasks, it can be divided into small information tasks.
客户安全对象与服务安全对象进行安全信息认证时, 信息任务的信息交换步骤过程: When the client security object and the service security object perform security information authentication, the information exchange steps of the information task:
1、 客户安全对象需要提出服务请求时,通常以有序的变量作为自变量,选取没有用过的 自变量, 通过映射方法用密码信息计算出映射密码组。 1. When a customer security object needs to make a service request, it usually takes an ordered variable as an independent variable, selects an unused independent variable, and calculates a mapped password group using the password information through a mapping method.
2、 客户安全对象根据服务需求形成服务请求消息。 2. The client security object forms a service request message according to the service requirements.
3、 客户安全对象以密码组的第一个密码对消息计算数字签名。 3. The client security object calculates a digital signature on the message with the first password of the password group.
4、 客户方将客户号、 消息、 自变量及相应的数字签名形成的安全信息发送到服务方。 4. The customer sends the security information formed by the customer number, message, argument, and corresponding digital signature to the server.
5、 服务安全对象接收到来自客户安全对象的安全信息。 5. The service security object receives security information from the customer security object.
6、 服务安全对象选取客户号和自变量,提取客户密码信息,并计算生成相应的映射密码
组。 6. The service security object selects the customer number and independent variables, extracts the customer password information, and calculates and generates the corresponding mapped password. Group.
7、 服务安全对象用客户使用的同一个密码对消息计算并验证客户和数字签名。 7. The service security object uses the same password used by the client to calculate and verify the client and digital signature on the message.
8、 如果验证数字签名正确, 则信息是可信的, 对消息作相应处理和保存。 8. If the digital signature is verified to be correct, the information is credible, and the message is processed and stored accordingly.
9、 服务安全对象产生处理结果消息。 9. The service security object generates a processing result message.
10、 服务安全对象使用密码组的第二个密码对结果消息计算数字签名。 10. The service security object uses the second password of the cipher group to calculate a digital signature on the resulting message.
11、 服务方将结果消息和相应的数字签名形成的安全信息发送到客户方。 11. The server sends the security message formed by the result message and the corresponding digital signature to the client.
12、 客户安全对象接收来自服务安全对象的返回的结果安全信息。 12. The client security object receives the returned security information from the service security object.
13、 客户安全对象使用同样的密码对消息和数字签名进行验证, 如验证不正确, 重新 请求结果信息, 直到得到真实的结果信息。 13. The client security object uses the same password to verify the message and digital signature. If the verification is incorrect, it requests the result information again until it obtains the real result information.
14、 客户安全对象验证消息正确后, 则处理消息。 14. After the client security object verifies that the message is correct, it processes the message.
15、 以上各步完成了消息的一次应答交换过程, 对于多个消息的信息任务, 可相应重 复以上 2至 14步过程, 直到信息任务完成。 此前的各种信息安全技术, 对密码的使用要么周期性地使用短密码, 要么使用无限大周 期的一次性密码, 使得周期密码的安全难以解决或者带来密码信息的巨量问题。 基于映射密 码组数字签名的安全对象方法,密码信息形成使用的长周期性,有效解决了周期密码的安全, 有效地防止各种与密码相关的攻击方法, 同时密码信息不会巨量增长, 密码信息在一定长度 内可满足实际使用的需要。 15. The above steps complete the process of one response exchange of messages. For information tasks of multiple messages, the above steps 2 to 14 may be repeated accordingly until the information tasks are completed. In the previous various information security technologies, the use of passwords either periodically uses short passwords or one-time passwords with unlimited periods, making the security of periodic passwords difficult to solve or causing huge problems with password information. A secure object method based on the digital signature of the mapped cipher group, the long-term periodicity of the password information is formed, which effectively solves the security of the periodic password, effectively prevents various password-related attack methods, and the password information does not grow massively. The information can meet the needs of practical use within a certain length.
目前大多数都是通过高强度加密数据信息或者是高强度加密数据通讯的通道, 以实现信 息交换的安全, 但客户终端的安全需要由客户保护, 而在服务方也必须要有高度安全的防火 墙; 一方面, 高强度的数据加密或通讯通道, 需要强大的硬件和软件支持, 另一方面客户终 端和服务方的安全难以保证。 本发明方案可以方便地在各种通讯终端实现安全的信息服务, 信息在传输过程中甚至可以不使用加密, 是一种不依赖于通讯方式和通讯过程以及通讯终端 的安全协议, 使信息安全性完全独立于通讯及客户终端, 以实现客户端的安全, 是一种客户 安全的协议, 通过较为简单的客户终端和通讯方式即可以实现安全的客户信息认证; 同时也 可以方便、低成本地对服务中心与外界进行协议隔离, 隔离时可使用与外部通讯不同的协议, 或者是自定义协议, 使认证服务器与外部通讯进行隔离, 这样即使攻击者入侵了所有外部环 境, 包括通讯终端、 通讯线路和通讯服务器, 也不可能通过自定义协议入侵到认证服务器, 不可能伪造出不符合使用者意愿的合法信息。 At present, most of them use high-strength encrypted data information or high-strength encrypted data communication channels to achieve the security of information exchange. However, the security of the client terminal needs to be protected by the client, and the server must also have a highly secure firewall. On the one hand, high-intensity data encryption or communication channels require strong hardware and software support; on the other hand, the security of client terminals and service parties is difficult to guarantee. The solution of the invention can conveniently realize secure information services at various communication terminals, and information can be used without encryption during transmission. It is a security protocol that does not depend on the communication method and communication process and the communication terminal, so that the information is secure. It is completely independent of communication and client terminals to achieve client security. It is a client security protocol. Through simpler client terminals and communication methods, secure client information authentication can be achieved. At the same time, services can be conveniently and cost-effectively provided. The center isolates the protocol from the outside world. The isolation can use a different protocol from the external communication or a custom protocol to isolate the authentication server from external communication. This way, even if an attacker invades all external environments, including communication terminals, communication lines, and The communication server cannot invade the authentication server through a custom protocol, and it is impossible to forge legitimate information that does not meet the user's wishes.
映射密码组数字签名是简单易用的数字签名方法。 另外, 安全对象的概念不仅仅是着重 交换信息的安全, 而且为解决客户的信息安全, 包括交换信息的安全、 客户身份认证安全、 客户密码信息安全、 加密过程安全等等, 其安全与通信方式和终端无关, 提供了可行的解决 信息安全的途径。 具体实施方式 Mapping cipher group digital signature is an easy-to-use digital signature method. In addition, the concept of a security object not only focuses on the security of information exchange, but also to solve the customer's information security, including the security of exchanged information, the security of customer identity authentication, the security of customer password information, the security of the encryption process, etc., its security and communication methods It has nothing to do with the terminal and provides a feasible way to solve information security. detailed description
实施例一: 银行系统转帐支付安全解决方案 Embodiment One: Banking System Transfer Payment Security Solution
在这方案中, 我们确定银行方是服务方, 是可信赖的一方。 与银行业务往来的企业或个 人作为客户方。 In this scenario, we determined that the bank is the servicer and the trusted party. Companies or individuals dealing with banking are the clients.
首先定义密码模式。密码模式采用映射密码组,密码信息使用 ASCII字符集,大小为 4096 位, 其中 1024位作为应变密码, 3072位作为密码源。 映射的密码组为有序的 4个密码, 密 码组的密码长度为 128位 (密码长度与数字签名长度有关, 实际应用需作适当调整, 通常密 码长度是数字签名长度的一倍)。 为增加安全性, 另外再增加 128位静态密码作为补充密码, 增加 256位静态密码作为补充的秘密加密信息。 映射以自然数作为自变量。 密码源模型为密 码源元素以字节为单位的 128位有序排列, 排列数大约为 l( , 我们可以规定这是不同自变
量使用次数的上限(实际上不用超过 10位的自然数, 很多人都更换密码了!)。计算排列数如 下
First define the password mode. The password mode uses a mapped password group, and the password information uses an ASCII character set with a size of 4096 bits, of which 1024 bits are used as the contingency password and 3072 bits are used as the password source. The mapped password group is an ordered 4 passwords, and the password length of the password group is 128 bits (the password length is related to the digital signature length, and the actual application needs to be adjusted appropriately, usually the password length is twice the digital signature length). In order to increase security, another 128-bit static password is added as a supplementary password, and a 256-bit static password is added as a supplementary secret encryption information. The mapping takes natural numbers as independent variables. The password source model is a 128-bit ordered arrangement of the password source elements in bytes. The number of permutations is approximately l (, we can specify that this is a different self-variation The maximum number of times you can use it (in fact, you don't need to use more than 10 natural numbers, many people have changed their passwords!). Calculate the number of permutations as follows
如果按每一客户安全对象使用的密码信息量为 5k计, 1000客户就大约是 5M, 100万客 户大约是 5G, 按这个比例, 目前建立大容量客户的服务系统十分可行。 If the amount of password information used by each customer's security object is 5k, 1,000 customers are about 5M, and 1 million customers are about 5G. According to this proportion, it is very feasible to establish a service system for large-capacity customers.
密码映射法则为: 自变量与 128位补充密码混合(比如乘积)得到一个数 A, 这个数除 以 1024的佘数再加 1, 得到一个不大于 1024的数 B, A除以 128的余数再加 1, 得到一个 不大于 128的数 C, 在应变密码中从 B位置开始, 截取长度为 C的一段, 超出 1024部分可 从头算起, 这样就得到一段密码 Y1, 同样从数字对(B+1, C+1 )可得到密码段 Υ2, 数字对 ( B+2, C+2) 可得到密码段 Υ3, 数字对(B+3, C+3) 可得到密码段 Υ4 (实际上补充密 码与应变密码构成了一个二层映射关系); 将 Υ1与静态密码和自变量混合可得到一个数 Κ1, 混合方式可用单向散列函数进行二次运算再连接, 如果 Κ位数大于 59位则舍弃高位部分, 用 Κ1作为排列编号对应到密码源模型, 就得到映射密码组的第一个密码(对有规则的排列, 密码各个字节位置可通过计算得到), 同样可得到其他三个有序密码。映射模式可以很多, 以 上只是映射模式之一。 The password mapping rule is: The argument is mixed with a 128-bit supplementary password (such as a product) to obtain a number A. This number is divided by the 1024 number plus 1 to get a number B that is not greater than 1024. A is divided by the remainder of 128 and then Add 1 to get a number C that is not greater than 128. In the strain code, start from the B position, and intercept a length of C. If it exceeds 1024, you can count from the beginning. This way, you can get a code Y1, also from the number pair (B + 1, C + 1) can get the password segment Υ2, the number pair (B + 2, C + 2) can get the password segment Υ3, the number pair (B + 3, C + 3) can get the password segment Υ4 (actually supplement the password And a strained password form a two-level mapping relationship); mixing Υ1 with the static password and the independent variable can get a number K1, the hybrid method can use a one-way hash function to perform a second operation and then connect, if the number of K is greater than 59, then Discarding the high-order part and using K1 as the permutation number to correspond to the password source model, the first password of the mapped cipher group is obtained (for a regular arrangement, each byte position of the password can be calculated), and it can also be obtained He ordered three password. There can be many mapping modes, and the above is just one of the mapping modes.
数字签名模式。 数字签名为阿拉伯数字字符集, 取 8位阿拉伯数字。 将映射密码组得到 的 128位密码、 增加的 256位静态密码、 消息一起用单向散列函数进行混合计算消息摘要, 通常可得到 160位的消息摘要, 再转换为 8位的阿拉伯数字, 就得到映射密码组数字签名。 Digital signature mode. The digital signature is the Arabic numeral character set, which takes 8 Arabic numerals. The 128-bit password obtained by mapping the cipher group, the added 256-bit static password, and the message are combined to calculate the message digest using a one-way hash function. Generally, a 160-bit message digest can be obtained, and then converted into an 8-digit Arabic number. Get the digital signature of the mapped cipher group.
客户可以分为单对象客户和多对象客户。 对于一般的个人客户, 只需要一个客户安全对 象, 是单对象客户; 对于公司等需要多个客户安全对象的客户, 例如超市或者百货商店, 同 一个收款帐号可能需要多个收款柜台, 或者是收入、 支出需要多人核实, 就需要用到多客户 安全对象。 对多对象客户, 可以设置客户对象的不同权限。 相同客户的不同对象, 其映射密 码信息可以相同, 服务方可以实现信息共享, 以节省存储空间, 可在客户号后增加两位编号 作为客户安全对象编号以识别不同的对象, 各对象补充密码和静态密码不同。 '. Customers can be divided into single-object customers and multi-object customers. For general personal customers, only one customer security object is required, which is a single object customer. For customers such as companies that require multiple customer security objects, such as supermarkets or department stores, the same payment account may require multiple payment counters, or It is the income and expenditure that need to be verified by multiple persons, and multiple customer security objects are required. For multi-object customers, you can set different permissions for the customer objects. For different objects of the same customer, the mapping password information can be the same. The service provider can implement information sharing to save storage space. Two digits can be added after the customer number as the customer's secure object number to identify different objects. Each object is supplemented with a password and Static passwords are different. '.
客户安全对象要素及设置。 客户安全对象包括如下基本要素: Customer security object elements and settings. Customer security objects include the following basic elements:
1、 客户对象编号, 唯一识别该客户安全对象。 1. Customer object number, which uniquely identifies the customer security object.
2、 客户密码信息。 包括 4096位映射密码信息、 128位补充密码、 256位静态密码。 2. Customer password information. Includes 4096-bit mapped password information, 128-bit supplementary password, and 256-bit static password.
3、 下一个未使用的有序自变量。 3. The next unused ordered argument.
4、 密码信息更新方法。 4. Password information update method.
5、 如上所述的映射密码方法。 5. Map password method as described above.
6、 对消息计算映射密码组数字签名方法。 6. Calculate the mapping cipher group digital signature method for the message.
7、 对消息验证映射密码组数字签名方法。 7. Digital signature method for message authentication mapping cipher group.
8、 信息传递或交换方法。 对象与外界需要信息交换, 可以采用各种接口。 8. Information transmission or exchange methods. Objects need to exchange information with the outside world, and various interfaces can be used.
9、 非安全消息的安全确认方法。安全对象对收到的没有经过数字签名的消息需要进行人 工确认, 可在监视器上显示, 然后手工进行确认。 9. Security confirmation method for non-secure messages. The security object needs to manually confirm the received message without digital signature, which can be displayed on the monitor and then manually confirmed.
10、 需签名的消息生成方法。消息可由数字及少量符号组成,通常可使用小键盘录入, 也可以通过上一项的非安全信息进行安全确认方法。 服务安全对象要素及设置。 客户安全对象包括如下基本要素: 10. Message generation method to be signed. The message can consist of numbers and a small number of symbols. It can usually be entered using the keypad, or it can be confirmed by the non-secure information of the previous item. Service security object elements and settings. Customer security objects include the following basic elements:
1、 所有客户帐户信息。 包括客户号、 帐号、 帐户资金等。 1. All customer account information. Including customer number, account number, account funds, etc.
2、 所有客户安全对象的信息。包括客户安全对象编号、密码信息、下一个未使用的有序
自变量等等。 2. Information of all customer security objects. Includes customer security object number, password information, next unused order Arguments and so on.
3、 if密码生成方法。 由服务安全对象随机生成, 具有伪随机性。 3. if password generation method. It is randomly generated by the service security object and has pseudo-randomness.
4、 客户安全对象信息更新方法。 4. Customer security object information update method.
5、 如上所述的映射密码方法。 5. Map password method as described above.
6、 对消息计算映射密码组数字签名方法。 6. Calculate the mapping cipher group digital signature method for the message.
7、 对消息验证映射密码组数字签名方法。 7. Digital signature method for message authentication mapping cipher group.
8、 安全信息保存方法。 记录客户安全对象交易信息。 8. Security information preservation method. Record customer security object transaction information.
9、 转帐交易方法。 9. Transfer transaction method.
10、 安全消息生成方法。 10. Security message generation method.
11、 信息传递或交换方法。 在实际的应用中, 帐户资金和转帐交易方法等与安全无关的具体事务可以从服务安全对 象中分离出来, 由不同的功能对象处理。 在本例中为简单、 方便起见, 加入到服务安全对象 中处理。 11. Information transmission or exchange methods. In practical applications, specific transactions that are not related to security, such as account funds and transfer transaction methods, can be separated from service security objects and processed by different functional objects. In this example, for simplicity and convenience, it is added to the service security object for processing.
安全对象的安全隔离。 设置了安全对象并非就变得安全了, 还要对安全对象实施安全隔 离, 使安全对象与不安全的环境相分离, 以安全信息实现信息交换, 这样才能使得安全对象 保证安全状态。 因为安全对象不依赖于任何通信方式, 所以隔离通常可以采用自定义通信协 议进行隔离, 也可以采用其他各种协议, 但需要保证其他有危险或破坏性的过程被阻隔开来, 最安全的方法甚至可以采用物理隔离, 使用人工传递信息。 Security isolation of security objects. Setting a security object does not make it safe. It is also necessary to implement security isolation for the security object to separate the security object from the unsafe environment and implement information exchange with security information, so that the security object can ensure the security state. Because the security object does not depend on any communication method, isolation can usually be isolated using a custom communication protocol, or various other protocols, but it is necessary to ensure that other dangerous or destructive processes are blocked. The most secure method It is even possible to use physical isolation and use manual transmission of information.
密码共享方式。 密码信息的共享可以采用直接共享方式, 客户到银行通过认证身份后直 接进行密码共享, 密码信息由服务安全对象随机生成, 具有伪随机性。 安全交易模式。 Password sharing method. The password information can be shared directly. Customers can directly share passwords after authenticating their identity at the bank. The password information is randomly generated by the service security object, which is pseudo-random. Safe transaction mode.
对等转帐模式。 A转帐 100元给 B帐户, 转帐过程如下: Peer-to-Peer Transfer Mode. A transfers 100 yuan to the B account. The transfer process is as follows:
1、 A客户安全对象(以下简称为 A)选取下一个未使用的自变量, 计算出映射密码组。 1. A customer security object (hereinafter referred to as A) selects the next unused argument and calculates the mapping password group.
2、 A以资金转出交易代码、 B的帐号和金额形成签名消息, 使用第一序号密码对消息计 算数字签名。 2. A forms a signed message with the funds transfer transaction code, B's account number and amount, and uses the first serial number password to calculate a digital signature for the message.
3、 A将自变量、 消息以及数字签名传送给服务安全对象 (以下简称为 S)。 因为所有的 信息都是阿拉伯数字字符集形式,所以可以方便地使用各种工具传送:互联网、电话、 手机短信、 传真等等,甚至可用人工传送, 只要能传送阿拉伯数字信息的工具皆可。 3. A transmits the arguments, messages, and digital signature to the service security object (hereinafter referred to as S). Because all the information is in the form of the Arabic numeral character set, it can be easily transmitted using various tools: Internet, telephone, SMS, fax, etc. It can even be transmitted manually, as long as the tools can transmit the Arabic numeral information.
4、 S收到 A送来的交易消息后, 提取 A的信息, 并同样计算出映射密码组, 验证 A的 交易消息, 如果校验不正确, 返回 A出错信息, 同一自变量三次出错后, 该自变量作 废。 4. After S receives the transaction message sent by A, S extracts the information of A and calculates the mapping cipher group to verify the transaction message of A. If the verification is incorrect, it returns an error message of A. After three errors of the same argument, The argument is invalidated.
5、 S验证 A交易消息正确, 将 A的资金 100元转出, 扣减 A帐户金额 100元, 如果成 功, 结果标志为 1, 否则为 0。 5. S verifies that the transaction information of A is correct, transfers 100 yuan of A's funds, and deducts 100 yuan from the account of A. If it succeeds, the result flag is 1, otherwise it is 0.
6、 S生成结果消息, 以第二序号密码对消息计算数字签名, 将结果及数字签名保存, 并 将结果消息息及数字签名返回给 A, 或留待 A査询。 6. S generates a result message, calculates a digital signature on the message with a second serial number password, saves the result and digital signature, and returns the result message and digital signature to A, or leaves it to A for inquiry.
7、 A接收到 S返回的初步交易结果信息,以同样密码校验数字签名,检查信息是否正确, 如不正确则重新向 S申请交易结果信息, 直至得到正确的交易结果为止。 7. A receives the preliminary transaction result information returned by S, checks the digital signature with the same password, and checks whether the information is correct. If it is incorrect, he reapplies to S for transaction result information until the correct transaction result is obtained.
8、 如果交易失败, A中止或重新交易。如果成功, A以第三序号密码重新对交易消息计 算数字签名 M1。
9、 A将交易情况通知 B客户, 并将数字签名 M1交给 B。 8. If the transaction fails, A suspends or restarts the transaction. If successful, A recalculates the digital signature M1 on the transaction message with the third serial number password. 9. A notifies B's customer of the transaction and hands digital signature M1 to B.
10、 B客户安全对象(以下简称为 B) 选取下一个未使用的自变量, 计算出映射密码 组。 10. Client B security object (hereinafter referred to as B) selects the next unused argument and calculates the mapping password group.
1 1、 B以资金转入交易代码和金额形成签名消息, 使用第一序号密码对消息计算数字 签名 M2。 1 1. B forms a signed message with the transaction code and amount of funds transferred, and uses the first serial number password to calculate a digital signature M2 on the message.
12、 B将自变量、 转入消息和数字签名 M2, 还有 A的数字签名 M1, 一起传送给服 务安全对象 S。 12. B sends the argument, the incoming message, and the digital signature M2, and A's digital signature M1, to the service security object S together.
13、 S收到 B送来的交易消息后,分别提取 A、 B的信息,并同样计算出映射密码组, 验证 B的交易消息数字签名 M2, 并验证 A的交易消息数字签名 M1。 13. After receiving the transaction message sent by B, S extracts the information of A and B respectively, and calculates the mapping cipher group, verifies the digital signature M2 of the transaction message of B, and verifies the digital signature M1 of the transaction message of A.
14、 S验证所有交易消息正确, 将资金 100元转入 B的帐户 (并可对 100元金额实 施冻结, 留待一段时间, 比如一天后再自行解冻), 如果成功, 结果标志为 1, 失败为 0。 不管结果如何, 相应密码不可再使用。 14. S verifies that all transaction messages are correct, and transfers 100 yuan of funds to B's account (and can freeze the amount of 100 yuan and leave it for a period of time, such as unfreezing it one day later). If it succeeds, the result flag is 1, and the failure is 0. Regardless of the result, the corresponding password can no longer be used.
15、 S分别生成 、 B的结果消息。 以 A第四序号密码对 A结果消息计算数字签名, 以 B第二序号密码对 B结果消息计算数字签名,将结果及数字签名保存,将结果信息 返回给 B, 或留待 A、 B査询。 15. S generates result messages of B and B respectively. Calculate a digital signature for the result A message with the password of the fourth serial number of A, calculate a digital signature for the result message B with the password of the second serial number of B, save the result and digital signature, and return the result information to B, or leave it to A and B for inquiry.
16、 A和 B可以分别査询到最终的交易结果信息, 验证消息数字签名, 直到得到真实 的信息为止。 16. A and B can query the final transaction result information and verify the digital signature of the message until the real information is obtained.
17、 根据最后结果的数字签名, A和 B都可以确切知道交易结果是成功还是失败。交 易过程完成。 17. According to the digital signature of the final result, both A and B can know exactly whether the transaction result is successful or failed. The transaction process is complete.
A和 B双方都需要提交交易信息和数字签名是为了防止人为失误转错帐户, 同时双方都 无法否认转帐结果成功或失败这一事实,而且使用多个密码可以防止有弱密码的情况出现。 半自动支付转帐模式。 如果在商场购物, 按以上的转帐模式实在是太麻烦了!实际上类似 商场的客户都是信誉相对较好的客户, 我们可以增加一种转帐模式, 让两次提交的消息及签 名在一次提交, 但一定需要实施交易资金定期内冻结, 这样就可以简化了交易过程, 但安全 性仍得到保障。 另外需建立客户间特别通讯通道, 实现半自动支付过程- A支付 100元给 B商户帐户。 Both A and B need to submit transaction information and digital signatures to prevent human error from transferring the account. At the same time, both parties cannot deny the fact that the transfer result is successful or failed, and the use of multiple passwords can prevent the occurrence of weak passwords. Semi-automatic payment transfer mode. If you are shopping in a mall, it is too much trouble to follow the above transfer mode! In fact, customers in similar shopping malls are relatively good customers. We can add a transfer mode to allow two submissions of messages and signatures to be submitted at one time, but the transaction funds must be periodically frozen, which can simplify it. The transaction process, but security is still guaranteed. In addition, a special communication channel between customers needs to be established to realize the semi-automatic payment process-A pays 100 yuan to B's merchant account.
客户安全对象 A在转帐交易过程中, 需要签名的信息主要是交易代码、 对方的帐号和交 易金额, 客户安全对象 B在资金转入交易过程中需要签名的信息主要是交易代码和金额。 双 方需要验证的是结果消息的数字签名。 The customer security object A needs to sign the information during the transfer transaction mainly including the transaction code, the counterparty's account number and the transaction amount, and the customer security object B needs the signature information during the funds transfer transaction to be the transaction code and amount. What both parties need to verify is the digital signature of the resulting message.
1、 客户安全对象 A处于锁定自动交易状态: 选取下一个未使用的自变量, 计算出映射 密码组, 交易代码为自动转出交易代码, 交易金额可以设定, 也可不设定, 如果设定 金额, 以设定金额为准, 通过专用通讯通道等待接收对方传送的帐号及金额信息。 1. Customer's security object A is in the locked automatic transaction state: Select the next unused argument to calculate the mapping password group. The transaction code is the automatic transfer out of the transaction code. The transaction amount can be set or not. If set The amount is based on the set amount. It is waiting to receive the account and amount information transmitted by the other party through the dedicated communication channel.
2、 客户安全对象 B通过专用通讯通道向 A发送帐号及收款金额信息。 2. The client's security object B sends the account number and payment amount information to A through the dedicated communication channel.
3、 客户安全对象 A收到的支付信息, 如金额已设定, 比较金额, 不符则发出金额错信 息, 并返回给 B; 如金额未设定, 以收到的金额为准; 如信息无误, A自动使用第一、 三个密码对支付信息计算数字签名。 3. The payment information received by customer security object A, if the amount has been set, the amount is compared. If the amount does not match, an incorrect amount is sent and returned to B; if the amount is not set, the received amount shall prevail; if the information is correct A automatically calculates a digital signature on the payment information using the first and third passwords.
4、 客户安全对象 A通过 B的通讯系统自动将支付信息发送给服务安全对象(以下简称 为 S)。 4. The customer security object A automatically sends the payment information to the service security object (hereinafter referred to as S) through the communication system of B.
5、 S收到自动支付信息后, 提取 A的信息, 并验证信息的签名以确保正确。 5. After S receives the automatic payment information, it extracts A's information and verifies the signature of the information to ensure correctness.
6、 S在信息正确后, 实施转帐交易, 从 A帐户转帐 100元到 B帐户, 并同时冻结 B该 转入资金, 处理结果成功为 1, 失败为 0。
7、 S分别对 A和 B对交易结果信息计算数字签名, 对 B可自动选取下一个未使用的自 变量来使用, 保存交易结果信息并返回给 A和8。 6. After the information is correct, S executes a transfer transaction, and transfers 100 yuan from account A to account B, and at the same time freezes the transfer of funds from B. The processing result is 1 and the failure is 0. 7. S calculates a digital signature for the transaction result information of A and B respectively. For B, the next unused argument is automatically selected for use, and the transaction result information is saved and returned to A and 8.
8、 A和 B收到交易结果信息, 验证交易结果信息。 8. A and B receive the transaction result information and verify the transaction result information.
9、 A和 B保留交易结果信息, 可在监视器上显示, 待人工进行确认, 交易完成。 实施例二: 银行系统安全交易解决方案 9. A and B retain the transaction result information, which can be displayed on the monitor, pending manual confirmation, and the transaction is completed. Embodiment 2: Security transaction solution for banking system
在这方案中, 我们确定银行方是服务方, 是可信赖的一方。 我们为什么把钱存进银行, 却换来银行的一本纸本子或者一张塑料卡片?是因为我们相信银行,这基于两个方面的原因: 1 ) 银行的制度保证客户的资金安全; 2)银行的信誉也为我们作出同样的保证。 在这里, 我 们假定这两个原因仍然成立并存在。 其他参与银行业务的各方都是客户方, 是服务需求方。 客户方必须在银行开立客户号, 并关联该客户的帐号。 In this scenario, we determined that the bank is the servicer and the trusted party. Why do we deposit money in the bank, but get a paper or a plastic card from the bank? It is because we trust the bank, which is based on two reasons: 1) the bank's system guarantees the safety of customers' funds; 2) the creditworthiness of the bank also gives us the same guarantee. Here, we assume that these two reasons still hold and exist. The other parties involved in banking are customers and service demanders. The customer must open a customer number at the bank and link the customer's account number.
客户使用的一次性编号密码组设置。 密码的字符集定为阿拉伯数字, 这样几乎任何通讯 方式都可以使用, 一次性数字签名采用 8个数字字符, 密码组中的每一个密码采用 16个数 字, 可根据交易需要的分步步骤设定密码组中的密码数,一般交易通常可以分为两个步骤或三 个步骤。 每个步骤应答需要两个密码, 两个步骤时确定密码组需要四个密码, 三个步骤时密 码组需要六个密码, 对出错时应答的密码以最后一个回应密码通过增量变换后得到。 如果同 时需要校验帐户的余额, 则每个密码组还要增加一个密码, 密码组的密码数可以根据需要确 定。 在客户申请一次性编号密码组时, 银行方通过釆集多个随机种子, 为该客户随机生成一 次性编号密码组, 由客户到银行的服务点通过身份认证后, 以直接密钥交换方式与客户直接 共享多个一次性编号密码组, 银行把一次性编号密码组进行高强度加密后保存在数据库中, 在客户需要服务时, 调度出来解密后使用。 客户把一次性编号密码组保存在一次性数字签名 装置中, 可随时使用一次性数字签名装置对信息进行一次性数字签名和认证。 One-time numbered password group settings used by the customer. The character set of the password is set to Arabic numerals, so that almost any communication method can be used. One-time digital signatures use 8 numeric characters. Each password in the password group uses 16 numbers. It can be set according to the step-by-step steps required by the transaction. The number of passwords in a password group. Generally, transactions can be divided into two steps or three steps. Each step requires two passwords for response, two passwords are required to determine the password group in two steps, and six passwords are required for the password group in three steps. The password returned in the event of an error is obtained by incrementally changing the last response password. If the balance of the account needs to be verified at the same time, a password is added to each password group, and the number of passwords in the password group can be determined as required. When a customer applies for a one-time numbered password group, the bank collects multiple random seeds to randomly generate a one-time numbered password group for the customer. After the customer passes the identity authentication to the bank's service point, he uses direct key exchange with Customers directly share multiple one-time numbered password groups, and the bank encrypts the one-time numbered password groups with high-strength encryption and stores them in the database. When customers need services, they are dispatched and decrypted for use. The customer saves the one-time serial number password group in the one-time digital signature device, and can use the one-time digital signature device to perform one-time digital signature and authentication of the information at any time.
一次性数字签名算法的设置。 算法可以在 ASCII字符集下采用 MD5或 SHA-1算法生成 摘要码, 然后再将 ASCII字符转换为整数后除以 10取余数转换为阿拉伯数字字符集, 按一 定规则取相应长度 8个字符的数字形式摘要, 比如取后面 8个阿拉伯数字, 作为一次性数字 签名, 而且该算法是可以公开的, 是不可能被破解的。 Setting of the one-time digital signature algorithm. The algorithm can use the MD5 or SHA-1 algorithm to generate a digest code under the ASCII character set, and then convert the ASCII characters to integers and divide by 10 to take the remainder to convert to the Arabic numeral character set. According to certain rules, a number of 8 characters in length The formal summary, for example, takes the last 8 Arabic numerals as a one-time digital signature, and the algorithm is public and cannot be cracked.
如果交易可分为两步, 每一个密码可以容错 3次(使用三次不正确则作废), 那么每次交 易被完全猜中的机会是 (3/108) * (3 /108) =9/1016*1/1015, 即 10的 15次方分之一, 设 置连续 10次密码签名出错后锁定该客户, 成功冒充客户签名的机会是 1/101 5*10 = 1/1014。 安全性可以达到(1014—1 ) /1014, 已经是相当安全的了, 而且需要提高安全性还可以增加 一次性数字签名的长度, 或者增加交易的步骤。 If the transaction can be divided into two steps, each password can be tolerated 3 times (three times if it is incorrect if used incorrectly), then the chance of each transaction being completely guessed is (3/10 8 ) * (3/10 8 ) = 9 / 10 16 * 1/10 15 , which is one-fifth of 10, and set the client to be locked after 10 consecutive password signature errors. The chance of successfully impersonating the client's signature is 1/10 1 5 * 10 = 1/10 14 . The security can reach (10 14 — 1) / 10 14 , which is already quite secure, and the need to improve the security can also increase the length of the one-time digital signature, or increase the steps of the transaction.
我们可以根据不同的交易业务种类, 约定信息的签名方法。 We can agree on the method of signature of information according to different types of transaction business.
现根据交易的过程和要求对以下三种交易认证分别列举设计交易信息的签名方法: According to the transaction process and requirements, the following three transaction authentications are listed to design the signature method of transaction information:
1、 客户身份认证。 1. Customer authentication.
2、 资金转帐交易。 2. Fund transfer transactions.
3、 其他信息认证。 3. Other information certification.
身份认证分为两个步骤: Identity authentication is a two-step process:
( 1 )发起身份认证; (1) Initiating identity authentication;
(2)确认身份认证。 (2) Confirm identity authentication.
进行两次应答即可以安全地确认客户的身份, 所以每一密码组需要两对密码, 每对密码 进行一次正确的应答。 客户发起身份认证请求时, 对约定的消息使用某一编号的第一对密码 的第一个密码对消息进行一次性数字签名, 约定的消息必须包括身份认证的交易码, 把客户
号、 消息、 一次性编号密码组的编号和签名一起发送到银行服务方, 银行验证后以第一对密 码的第二个密码签名作答。 确认身份时也用第二对密码作同样的认证。 另外还需要一个专门 用于出错时回应的密码, 这个密码就可以用最后的正确回应密码加以变换得到, 因为在出错 时, 最后的正确回应密码没有使用。 在应答中, 如果都对相同的消息作签名, 那么该消息只 需要传输一次, 各次应答时, 只传输签名即可。 Two replies can securely confirm the identity of the customer, so each password group requires two pairs of passwords, and each pair of passwords responds correctly once. When the client initiates an identity authentication request, the message is first-time digitally signed with the first password of the first pair of passwords of a certain number. The agreed message must include the transaction code for identity authentication. Number, message, the number of the one-time number cipher group and the signature are sent to the bank service side together, and after the bank verifies, the bank answers with the second password signature of the first pair of passwords. The second pair of passwords is used for the same authentication when confirming the identity. In addition, a password that is specifically used for responding when an error occurs is needed. This password can be obtained by converting the last correct response password, because when an error occurs, the last correct response password is not used. In the response, if the same message is all signed, the message only needs to be transmitted once, and only the signature can be transmitted in each response.
假设由客户 A的帐户 a转帐资金到客户 B的帐户 b, 资金转帐可以分为三个步骤: Assuming that funds are transferred from account A of customer A to account b of customer B, the fund transfer can be divided into three steps:
( 1 ) 客户 A的帐户 a转出 (或冻结) 资金; (1) Client A's account a transfers (or freezes) funds;
(2)客户 B的帐户 b转入(或从冻结的帐户 a转出后再转入帐户 b) 资金, 并同时对该 资金实施冻结; (2) Client B's account b is transferred in (or transferred from frozen account a and then transferred to account b) funds, and at the same time, the funds are frozen;
(3) 解冻转入帐户 b的冻结资金。 (3) Unfreeze the frozen funds transferred to account b.
各个步骤都需要由拥有转出帐户 a的客户 A对转帐信息进行认证签名, 需要签名的转帐 信息包括交易码、 转入帐号和转入资金; 第一步由客户 A提交, 提交的信息有客户号、 需签 名的转帐信息 (包括交易码、 转入帐号和转入资金)、 密码组编号、 相应的一次性数字签名; 但第二步以后的签名可以由拥有转出帐户 a的客户 A提交,也可以由客户 A将签名传递给拥 有转入帐户 b的客户 B后, 再由客户 B提交银行服务方验证, 后者的好处是不会导致资金转 错帐户的情况,甚至可以在客户 B提交时增加客户 B的签名认证,以达到多重签名认证更加安 全,并且客户 B也不可以否认知道资金转入其帐户的事实。所以对于完整的资金转帐交易的转 出方, 一次性编号密码组至少需要三对密码, 但有些转帐交易可以在完成第二步骤后在一定 时间后 (比如一天后) 自动解冻资金, 所以分两步也可以完成转帐交易。 另外应该增加在完 成转帐后帐户余额的验证, 所以需要另外增加一个密码作验证帐户余额用。 所以转帐交易密 码组设置为三对另加一个共七个密码, 也可以使用二对加一个共五个密码。 可以根据需要进 行设置。 如果需要第三者复核, 可以在第一步转出后由第三者对交易进行一次性数字签名复 核认证, 只有在复核正确后才能进行下一步的转入操作。 Each step requires that the customer A who owns the transfer account a verify and sign the transfer information. The transfer information that needs to be signed includes the transaction code, the transfer account number, and the transfer funds. The first step is submitted by the customer A. The information submitted is provided by the customer. Number, transfer information that needs to be signed (including transaction code, transfer account number and transfer funds), cipher group number, corresponding one-time digital signature; but signatures after the second step can be submitted by customer A who owns transfer account a Alternatively, client A can pass the signature to client B who has transferred account b, and then client B submits it to the bank server for verification. The benefit of the latter is that it will not cause funds to be transferred to the wrong account. Adding the signature verification of customer B when submitting to achieve multi-signature authentication is more secure, and customer B cannot deny the fact that he knows that the funds were transferred to his account. So for the transferee of a complete fund transfer transaction, at least three pairs of passwords are required for the one-time numbered password group, but some transfer transactions can automatically unfreeze the funds after a certain period of time (such as one day later) after completing the second step, so two Steps can also complete the transfer transaction. In addition, the verification of the account balance should be added after completing the transfer, so an additional password is needed to verify the account balance. Therefore, the transfer transaction password group is set to three pairs plus one total of seven passwords, and two pairs plus one total of five passwords can also be used. It can be set as required. If a third party review is required, the third party can perform a one-time digital signature review and verification of the transaction after the first transfer, and the next transfer operation can only be performed after the review is correct.
其他信息认证, 比如贷款认证, 还款认证, 帐户余额认证等等, 与身份认证相类似, 只 是所认证的信息为约定的信息, 交易码、 贷款帐号、 贷款金额等, 一般只需要经过两个步骤 就可以了, 通常就采用有两对密码的密码组。 Other information authentication, such as loan authentication, repayment authentication, account balance authentication, etc., are similar to identity authentication, except that the authenticated information is the agreed information, transaction code, loan account number, loan amount, etc. The steps are all right, usually a cipher group with two pairs of passwords is used.
另外为了增加安全, 保护一次性编号密码组的使用, 防止拒绝服务攻击, 客户方需要申 请登陆密码, 在登陆时使用, 以加强安全性; 对于金额较大或都安全要求更高的交易, 还可 以增加交易后报告的措施, 比如电话通知、 短信通知、 邮件通知等等。 In addition, in order to increase security, protect the use of one-time numbered password groups, and prevent denial of service attacks, customers need to apply for a login password and use it during login to enhance security. For transactions with large amounts or higher security requirements, You can add measures for post-transaction reporting, such as phone notifications, SMS notifications, email notifications, and so on.
通过对以上的设置, 就可以得到很多银行业务应用, 比如电话银行、 网络银行、 短信银 行、 数字支付结算、 纯数字公开认证取款等等, 现列举部分服务应用如下: By setting the above, you can get many banking applications, such as phone banking, online banking, short message banking, digital payment settlement, pure digital public authentication withdrawal, etc. Some service applications are listed below:
1、 电话银行。 1. Telephone banking.
客户以登陆密码登陆后, 可以用按键和语音进行一般的信息交换, 比如普通的信息査询, 但对于重要的信息交换, 需要经过一次性数字签名认证。 电话银行除了一般传统的信息查询, 约定帐户转帐、 其他约定交易外, 还可以进行以下交易- After logging in with the login password, customers can use buttons and voice for general information exchange, such as ordinary information query, but for important information exchange, they need to be authenticated by a one-time digital signature. In addition to the general traditional information inquiry, contracted account transfers, and other contracted transactions, telephone banking can also conduct the following transactions −
(1)系统内任意帐户转帐。 这是银行本系统内部的帐户转帐, 转帐时需要对交易码、 转 入帐号及转帐金额进行一次性数字签名。 (1) Transfer any account in the system. This is a bank account transfer within the bank's own system. A one-time digital signature of the transaction code, transfer account number, and transfer amount is required when transferring.
(2)系统外转帐。 这是对银行外到其他银行的帐户转帐, 通常系统外转帐需要提供转出 帐号、 转入行号、 转入帐号、 转入户名、 转帐金额, 但电话难以提供户名, 故可以 先打电话到人工服务, 请银行职员录入相关信息, 并对交易码、 转入行号、 帐号、 转帐金额进行签名后提交, 再用自动电话服务进行二次签名确认。 (2) Transfer outside the system. This is an account transfer from a bank to another bank. Usually, the system transfer needs to provide the transfer account number, transfer line number, transfer account number, transfer account name, and transfer amount, but it is difficult to provide the account name by phone, so you can call Phone to manual service, ask the bank staff to enter the relevant information, and sign the transaction code, transfer line number, account number, and transfer amount, and submit it, and then use the automatic telephone service for secondary signature confirmation.
(3)电话汇款。 同系统外转帐, 但签名的是收款人身份证件编号和金额信息。 (3) Telephone remittance. The same as outside the system, but the signature is the payee ID number and amount information.
(4)电话即时支付。 即时支付实际上是一种即时转帐交易, 但要求支付人和收款人都在 银行开立客户号, 支付人通过对交易码、 转入帐号和金额进行一次性数字签名提出 支付请求, 然后支付人再进行二次签名作为确认签名, 并将确认签名交收款人, 收
款人登陆电话银行服务, 以支付人二次签名并加上自已对帐号和金额的签名进行确 认, 这样支付双方都可以确认支付的成功或失败, 并且都不可能否认所进行的交易。(4) Instant payment by phone. Instant payment is actually an instant transfer transaction, but requires both the payer and payee to open a customer number at the bank. The payer submits a payment request by performing a one-time digital signature on the transaction code, transferred account number, and amount, and then pays The person then performs a second signature as a confirmation signature, and delivers the confirmation signature to the payee. The payer logs on to the telephone banking service and confirms the payer's second signature and adds his own account and amount signatures, so that both parties can confirm the success or failure of the payment, and it is impossible to deny the transaction.
2、 网络银行。 2. Online banking.
使用本发明方案, 可以低成本、 高度安全地构建网络银行。 只要在银行 WEB服务器与 认证服务器之间通过使用协议隔离, 就可以实现高度的安全性。 即使入侵者入侵了 WEB服 务器, 但他不可能到达认证服务器, 因为两种服务器之间实现了协议隔离, 比如是串口的自 定义协议隔离, 就算入侵者控制了 WEB服务器, 可以任意修改 WEB服务器上所有信息, 但 仍不可能假冒身份或者破解认证关系。当然, WEB服务器也可以增加防火墙, 以提高安全性。 因为本发明方案是基于客户安全的, 不依赖于任何客户通讯终端, 所以客户使用任何通讯终 端都不会有安全烕胁。 另外由于本发明方案不提供保密功能, 可以在 WEB服务器与客户终 端之间应用安全套接字协议层 (SSL) 构成的安全通讯通道, 以增加安全性和保密功能。 网 络银行几乎能安全实现除现金外的大部分银行服务, 比如信息查询、 转帐、 汇款、 缴费、 贷 款、 支付结算等等。 With the solution of the present invention, a network bank can be constructed at low cost and with high security. As long as the bank WEB server and the authentication server are isolated by using protocols, a high degree of security can be achieved. Even if the intruder invades the web server, he cannot reach the authentication server because protocol isolation is implemented between the two servers, such as a custom protocol isolation of the serial port. Even if the intruder controls the web server, the web server can be modified arbitrarily. All information, but it is still impossible to impersonate or break the authentication relationship. Of course, the web server can also add a firewall to improve security. Because the solution of the present invention is based on customer security and does not rely on any customer communication terminal, there is no security threat to customers when using any communication terminal. In addition, since the solution of the present invention does not provide a security function, a secure communication channel formed by a Secure Sockets Layer (SSL) can be applied between the WEB server and the client terminal to increase security and security functions. Internet banking can almost safely implement most banking services except cash, such as information inquiry, transfer, remittance, payment, loan, payment settlement and so on.
3、 数字支付结算。 3. Digital payment settlement.
支付结算就是转帐交易的过程。 一般的电子支付结算, 需要高强度的加密设备, 比如使 用信用卡(或磁卡) 的 POS机, 既需要高成本购买设备, 又需要商户要有一定的信誉度, 而 且各个银行互联互通时又要增加很多环节, 也就增大了很多成本, 而且信用卡的信息和密码 也容易泄漏。 使用本发明方案的数字支付结算, 只要客户提供了对支付信息的一次性数字签 名及二次确认签名, 就可以通过任何传输数字信息的通讯方式实现。 因为支付信息和一次性 数字签名都是阿拉伯数字字符信息, 使用电话或网络通讯都极为方便,一次性数字签名信息不 怕被窃取, 可以公开使用, 只要能传输阿拉伯数字字符信息的通讯方式, 都可以用来实现支 付结算。 另外, 可以在一次性数字签名装置中对需要加密的支付信息或支付条件进行锁定, 此时只能对锁定的支付信息使用一个一次性编号密码组进行加密签名, 使用简单的设备就可 以自动地将支付信息及相应的一次性数字签名从接口传送到银行, 从而实现半自动的支付结 算。 数字支付结算也可以用于网上购物支付, 在网上购物时, 购物人先提交支付信息及一次 性数字签名, 以表明支付意向, 在收到货物时再进行二次一次性数字签名确认以实现结算支 付。 使用本发明方案的数字支付结算能够真正实现在任何地方、 任何时间的安全可靠的实时 支付结算, 由于使用的终端以及通讯设备要求相对简单, 可以低成本、 大范围地普遍推广使 用。数字支付结算这个名称更确切地体现了应用的实质, 并区别于一般的传统电子支付结算。 Payment settlement is the process of transfer transactions. General electronic payment settlement requires high-strength encryption equipment, such as POS machines that use credit cards (or magnetic cards), which requires high-cost purchase of equipment and merchants with a certain degree of credibility, and the increase in interconnection between banks In many aspects, it also increases a lot of costs, and credit card information and passwords are also easy to leak. With the digital payment settlement of the solution of the present invention, as long as the customer provides a one-time digital signature and a second confirmation signature on the payment information, it can be achieved by any communication method for transmitting digital information. Because payment information and one-time digital signatures are both Arabic digital character information, it is extremely convenient to use telephone or Internet communication. One-time digital signature information is not afraid of being stolen and can be used publicly. Any communication method that can transmit Arabic digital character information can be used. Used to achieve payment settlement. In addition, the payment information or payment conditions that need to be encrypted can be locked in a one-time digital signature device. At this time, the locked payment information can only be encrypted and signed with a one-time number password group, and can be automatically used with a simple device. The payment information and the corresponding one-time digital signature are transmitted from the interface to the bank, thereby realizing semi-automatic payment settlement. Digital payment settlement can also be used for online shopping payment. When shopping online, the shopper first submits payment information and a one-time digital signature to indicate the payment intention, and then receives a second one-time digital signature to confirm the payment when the goods are received to achieve settlement. Pay. The digital payment settlement using the scheme of the present invention can truly realize secure and reliable real-time payment settlement at any place and at any time. Since the requirements of the used terminal and communication equipment are relatively simple, it can be widely used at low cost and in a wide range. The name of digital payment settlement more accurately reflects the essence of the application and is different from the traditional traditional electronic payment settlement.
4、 纯数字公开认证取款。 4. Pure digital public authentication withdrawal.
取款过程分为两步, 第一步客户提交取款信息及一次性数字签名, 这时取款信息中绑定 了取款帐号、 取款金额和取款终端信息, 银行对客户身份及取款信息进行认证; 第二步取款 信息确认, 正确完成后可以取到相应现金。 使用本发明方案, 除了本人可以直接进行一次性 数字签名认证外, 你也可以打电话通过家人或者朋友进行信息认证。 你在异地时可以通过打 电话给家人或者朋友取得取款信息以及相应的一次性数字签名, 在某一柜员机或取款终端上 提交, 然后再进行二次签名确认后取到现金。 如果中途有某人同时窃听到所有信息并在另一 终端上操作, 但因为同一签名只能在一个终端上提交成功, 如果窃听者提交成功, 就不可能 得到二次确认签名, 也就不可能取到现金。 实施例三: 开放式环境证券买卖安全交易解决方案 The withdrawal process is divided into two steps. In the first step, the customer submits the withdrawal information and a one-time digital signature. At this time, the withdrawal account is bound with the withdrawal account number, the withdrawal amount, and the withdrawal terminal information. The bank authenticates the client's identity and withdrawal information. Confirm the withdrawal information by step, and you can get the corresponding cash after completing the withdrawal correctly. With the solution of the present invention, in addition to the one-time digital signature verification directly performed by the person, you can also call and verify information through family or friends. When you are away, you can call your family or friends to obtain withdrawal information and the corresponding one-time digital signature, submit it on a teller machine or a withdrawal terminal, and then obtain the cash after confirming the second signature. If someone intercepts all information at the same time and operates on another terminal, but because the same signature can only be successfully submitted on one terminal, if the eavesdropper submits successfully, it is impossible to obtain a second confirmation signature, and it is impossible Get cash. Embodiment 3: Security trading solutions for open environment securities trading
我们确定证券方是服务方, 参与的买方和卖方作为客户方。 其实证券方一直是提供买卖 交易的可信赖服务方, 本方案只是提供交易更加方便和安全的途径。 We have determined that the securities party is the service party and the participating buyers and sellers are the client parties. In fact, the securities party has always been a reliable service provider that provides buying and selling transactions. This solution only provides a more convenient and safe way for transactions.
证券买卖交易具有实时性强, 安全性要求高的特点。 根据这些特点, 我们要求证券买卖 交易一次提交完成, 为了增加安全性, 在买卖交易前要求有严格的身份认证。根据以上要求, 我们设置一次性编号密码组, 每组密码组具有一对即两个密码, 一次性编号密码组既可以用
作身份认证, 也可以买卖交易用。 为方便使用, 我们可以将密码的字符集定为阿拉伯数字, 这样几乎任何通讯方式都可以使用, 一次性数字签名采用 8个数字字符, 密码组中的每一个 密码采用 16个数字字符。 算法可以采用 MD5或 SHA-1生成摘要码后再转换为相应长度的 阿拉伯数字字符形式摘要作为一次性数字签名。 Securities trading is characterized by strong real-time performance and high security requirements. Based on these characteristics, we require securities transactions to be submitted at one time. In order to increase security, strict identity authentication is required before the transactions. According to the above requirements, we set up one-time numbered password groups. Each group of password groups has one pair or two passwords. One-time numbered password groups can be used. For identity verification, it can also be used for trading. For ease of use, we can set the character set of the password to Arabic numerals, so that almost any communication method can be used. One-time digital signatures use 8 numeric characters, and each password in the password group uses 16 numeric characters. The algorithm can use MD5 or SHA-1 to generate a digest code and then convert the digest into a form of Arabic numeral characters of corresponding length as a one-time digital signature.
客户方到证券方开立客户号, 并申请一次性编号密码组, 证券方随机生成一次性编号密 码组与客户直接共享, 证券方把一次性编号密码组加密后保存在数据库中, 在客户需要服务 时, 调度出来使用。 客户把密码保存在一次性数字签名装置中, 可随时对一次性数字签名装 置解锁后对信息进行一次性数字签名和认证。另外客户方需要申请登陆密码,在登陆时使用, 以加强安全性。 The client goes to the securities party to open a customer number and applies for a one-time numbering password group. The security party randomly generates a one-time numbering password group and shares it directly with the customer. The security party encrypts the one-time numbering password group and saves it in the database. When the customer needs service Schedule it for use. The customer saves the password in the one-time digital signature device, and can perform one-time digital signature and authentication on the information after unlocking the one-time digital signature device at any time. In addition, the client needs to apply for a login password, which is used during login to enhance security.
客户方每次使用服务时, 必须通过通讯 (使用电话或网络等) 登陆到证券服务方, 使用 登陆密码进行认证, 这是弱认证, 可以进行一般的查询交易。 如果需要进行买卖交易, 还必 须使用一次性编号密码组进行严格身份认证。 严格身份认证时, 可以使用一次性编号密码组 对一段数字信息 (包括身份认证交易码)进行一次性数字签名, 确认签名后方可通过。 Each time the client uses the service, he must log in to the securities service party through communication (using the phone or the Internet, etc.) and use the login password for authentication. This is weak authentication and can be used for general inquiry transactions. If a sale transaction is required, a one-time numbered password set must also be used for strict identity authentication. In strict identity authentication, a one-time numbered password group can be used to perform a one-time digital signature on a piece of digital information (including the identity authentication transaction code). The signature can be passed before it is confirmed.
在进行买卖交易时, 必须使用一次性编号密码组对买卖交易码、 证券代码、 价格进行一 次性数字签名, 客户除了提交买卖的证券信息外, 还必须提供一次性编号密码组的编号以及 一次性数字签名信息。 证券方在收到证券买卖交易信息、 一次性编号密码组和一次性数字签 名信息后, 对该客户的一次性数字签名进行验证, 如果正确, 则将此交易提交, 并返回给客 户正确信息及正确的一次性数字签名, 否则返回出错信息以及失败的一次性数字签名。 When trading, you must use a one-time serial number password group to digitally sign the one-time transaction code, security code, and price. In addition to submitting securities information for trading, you must also provide the serial number and one-time serial number password group. Digital signature information. After receiving the securities trading transaction information, one-time serial number password group and one-time digital signature information, the securities party verifies the one-time digital signature of the customer. If it is correct, it submits the transaction and returns the correct information to the customer and A correct one-time digital signature, otherwise an error message and a failed one-time digital signature are returned.
使用本方案, 有利于提高交易安全性, 并且实施各种交易方式更为简单方便。 比如可以 安全可靠地实现电话交易方式, 设置网络交易方式也更为简单安全, 本方案有利于实施协议 隔离, 只要将 WEB服务器( 或其他连接客户终端的服务器)与认证服务器之间通过自定义 协议进行隔离, 就可以实现高度的安全性。 由于本发明方案不提供保密功能, 在 WEB服务 器与客户端之间可以应用安全套接字协议层(SSL) 安全通讯通道, 以增加安全性和保密功 能, 在 WEB服务器与外面连接的网络间也可以使用防火墙, 以增加安全性。
Using this solution is conducive to improving transaction security, and it is simpler and more convenient to implement various transaction methods. For example, the telephone transaction method can be implemented securely and reliably, and the network transaction method is also more simple and secure. This solution is conducive to the implementation of protocol isolation, as long as a custom protocol is passed between the WEB server (or other server connected to the client terminal) and the authentication server. With isolation, a high degree of security can be achieved. Since the solution of the present invention does not provide a security function, a secure socket protocol layer (SSL) secure communication channel may be applied between the WEB server and the client to increase security and security functions, and also between the WEB server and the externally connected network. A firewall can be used for added security.
Claims
权利要求 、 一种密码设置和使用方法, 是一种映射密码'方法, 其特征是: A method for setting and using a password is a method for mapping a password, which is characterized in that:
密码信息按用途分为两部分: 一部分作为映射的对应法则变化关系, 称作应变密码, 记为集合 B, 另一部分作为密码源, 记为集合丫; 密码源通过应用某种模型或某种对应法 则的转换得到新的信息集合, 记为集合 M; 用映 ¾~方法记作 对于任意一个自变量, 通过结合了应变密码的对应法则, 对应到新集合 M模型中的 某一逻辑位置, 从而对应到集合 M中的某一确定元素, 再一起通过某一法则结合为新密 码, 设自变量的集合为 X, 新密码的集合为!\!, 映射可以记录如下: The password information is divided into two parts according to the purpose: one part is used as the mapping of the corresponding law change relationship, which is called contingency cipher, which is recorded as set B, and the other part is used as the password source, which is recorded as set ya; the password source is applied by some model or some correspondence. A new set of information is obtained through the transformation of the rule, and it is denoted as set M. The mapping method is used to describe any independent variable, which corresponds to a logical position in the new set M model by combining the corresponding rule of the strain code, so that Corresponds to a certain element in the set M, and then combines them into a new password through a certain rule. Let the set of independent variables be X and the set of new passwords be! \ !. The mapping can be recorded as follows:
fB L: X→M, fB-.{X,M)→N 结合起来就是一个复合的映射: fB.-(X,fB L(X))→N ; f B L : X → M, f B- . {X, M) → N combined is a composite mapping: f B .- (X, f B L (X)) → N;
对给定了映射密码的应变密码及密码源,以及给定的对应法则,对于任意一个自变量, 都可以找到唯一确定的新密码与之相对应;通过自变量的映射,结合应变密码的对应法则, 对应到密码源形成的逻辑模型,再通过某一法则形成新的密码;需要结合自变量进行使用; 每次进行信息加密,只与密码信息的一部分间接相关联;每次加密使用的密码信息都几乎 不同。 映射密码组方法: 根据权利要求 1 所述的映射密码方法, 自变量通过映射得到的新密码 信息是唯一确定的密码组, 就是映射密码组, 其特征是: 密码组包涵一个或多个有序的密 码, 密码由映射密码方法生成, 密码组与映射的自变量相关联。 、 映射密码组数字签名方法: 使用自变量生成权利要求 2所述的映射密码组, 应用单向散 列函数法则, 对消息计算消息摘要, 就得到映射密码组数字签名, 其特征是: For the strained password and password source given the mapped password, and the corresponding correspondence rule, for any independent variable, a unique new password can be found to correspond to it; the mapping of the independent variable combined with the correspondence of the strained password The law corresponds to the logical model formed by the password source, and then a new password is formed by a certain law; it needs to be used in combination with independent variables; each time information is encrypted, it is only indirectly related to a part of the password information; the password used for each encryption The information is almost different. Method for mapping cipher groups: According to the method for mapping ciphers according to claim 1, the new password information obtained by mapping the independent variables is the only cipher group determined, which is the mapping cipher group, which is characterized in that the cipher group contains one or more ordered The password is generated by the mapped password method, and the password group is associated with the mapped argument. Method for digitally signing a mapped cipher group: Use the argument to generate the mapped cipher group according to claim 2, apply the one-way hash function rule, calculate the message digest for the message, and obtain a digital signature for the mapped cipher group, which is characterized by:
用单向散列函数并使用映射密码组的密码对消息计算消息摘要; 映射密码组要使用 自变量, 使得数字签名与自变量相关联, 自变量只有效使用一次, 即用自变量生成的映射 密码组对一个或一组信息进行认证后,不能再使用该自变量生成的映射密码组对其他信息 进行认证; 映射密码组的密码有足够长度, 即密码空间足够大, 使得对于特定长度的消息 摘要, 存在足够多的碰撞, 使得碰撞空间接近或大于消息摘要空间, 也就不可能从消息摘 要码通过穷举法攻击达至减少密码的安全性;数字签名使用映射密码组, 密码信息具有使 用长周期特性。 、 信息安全对象方法: 安全对象是一个安全信息存储和处理的主体, 在安全对象形成后, 对象发出的安全信息必须加上对象安全标志,对象接收和处理的安全信息必须带有对方安 全标志,使得发送或接收的安全信息不能被伪造和更改,同时安全信息必须带有事件标志, 其特征如下: 安全对象对自身安全信息进行存储和保密, 秘密信息不直接对外传送; 安全 对象发出或收到的的安全信息必须带有对象安全标志,使得安全信息不可以被伪造,也不 可以被改变,信息被伪造或者信息被改变后信息的安全标志就会不符合规范, 除信赖机构 夕卜,只有该对象才能正确生成自己的信息安全标志; 安全对象发出或收到的带有安全标志
的安全信息必须包涵事件标志,事件标志可以在安全信息中实现, 也可以在安全标志中实 现; 安全信息可以被复制, 但不可以被复用, 也就是一个事件发生的安全信息, 不可能被 另一事件用来重复使用; 这就使得对不同事件, 安全信息不可以重放; 而对于同一事件, 没有相同的安全信息, 也就不可能重放。 、 基于映射密码组数字签名的安全对象方法: 权利要求 4所述的信息安全对象使用如权利 要求 3所述的映射密码组数字签名方法作为安全信息的安全标志,其特征是:包涵对象标 志, 即对象编号信息; 包涵对象密码信息; 包涵映射密码组方法; 对消息映射密码组数字 签名方法;对消息映射密码组数字签名验证方法;对象对外的信息交换符合权利要求 4所 述的信息安全对象的特征。 、 一种信息安全装置方法, 根据权利要求 3的映射密码组数字签名方法及权利要求 5基于 映射密码组数字签名的安全对象方法构造的信息安全装置,其特征是:装置存储对象的信 息, 包括对象编号和密码信息; 使用了映射密码组方法; 实现消息映射密码组数字签名和 验证过程。 、 根据权利要求 1所述的密码设置和使用方法, 当映射法则为最简单时, 为编号密码组, 其特征是- 密码组由一个密码或两个以上有序的密码组成;每个密码组有一个编号,通过此编号 来进行保存、 索引、 査询、 使用密码组; 每一客户同时具有多个密码组, 必须用不同的编 号来区分使用; 所有密码由收集随机信息生成, 具有随机性, 严格来说是伪随机数, 各个 密码具有不同的随机种子; 密码组可以记录各密码的使用次数和使用状态。 、 一次性编号密码组方法: 根据权利要求 7所述的编号密码组方法, 并且密码组的每一个 密码只能用来有效认证信息一次,其特征是: 编号密码组的每一个密码只能有效认证信息 一次, 用一个密码对一组信息进行认证后, 不能再使用该密码对其他信息进行认证。 、 一次性编号密码组数字签名方法: 根据权利要求 3所述的映射密码组数字签名方法, 其 映射的密码组为权利要求 8所述的一次性编号密码组,使用单向散列函数,对一次性密码 和消息一起计算摘要,并以此摘要作为一次性数字签名,以验证消息的完整性,其特征是: 使用单向散列函数对一次性密码和消息一起计算消息摘要作为一次性数字签名;所谓 一次性密码, 是指密码只能用来有效认证信息一次; 对于特定长度的摘要码空间, 使用足 够密码长度的密码空间, 使得在使用的密码空间内, 存在足够多的碰撞, 使得发生碰撞的 密码组成的空间接近或大于消息摘要空间,也就不可能从消息摘要码通过穷举法攻击达至 减少密码的安全性。 0、 根据权利要求 9所述的一次性数字签名方法,其特征在于使用权利要求 8所述的一次 性编号密码组代替一次性密码作为一次性数字签名所使用的密码,并使得一次性数字签名 与一次性编号密码组的编号相关联。 1、 一种信息认证流程方法: 分步绑定处理技术, 其特征是: Use a one-way hash function and use the password of the mapped cipher group to calculate the message digest for the message; Use the independent variable to map the cipher group, so that the digital signature is associated with the independent variable. The independent variable is used only once, that is, the mapping generated by the independent variable After a cipher group authenticates one or a group of information, it is no longer possible to use the mapped cipher group generated by the argument to authenticate other information; the password of the mapped cipher group has a sufficient length, that is, the password space is large enough, so that for a message of a specific length Abstract, there are enough collisions, so that the collision space is close to or larger than the message digest space, and it is impossible to reduce the security of the password from the message digest code through an exhaustive attack; the digital signature uses a mapped cipher group, and the password information has the use of Long cycle characteristics. Method of information security object: The security object is a subject for storing and processing security information. After the security object is formed, the security information sent by the object must be marked with the object security mark, and the security information received and processed by the object must bear the security mark of the other party. The security information sent or received cannot be forged and changed. At the same time, the security information must be marked with an event. Its characteristics are as follows: The security object stores and keeps its own security information, and the secret information is not directly transmitted to the outside. The security object sends or receives it. The security information must be marked with an object security mark, so that the security information cannot be forged or changed. After the information is forged or the information is changed, the security mark of the information will not conform to the specifications. This object can correctly generate its own information security signs; security objects sent or received with security signs The security information must include the event flag. The event flag can be implemented in the security information or in the security flag. The security information can be copied, but cannot be reused, that is, the security information of an event cannot be changed. Another event is used repeatedly; this makes it impossible to replay security information for different events; and it is impossible to replay the same event without the same security information. A secure object method based on a digital signature of a mapped cipher group: The information security object described in claim 4 uses the digital signature method of a mapped cipher group according to claim 3 as a security mark of security information, which is characterized by including an object mark, That is, object number information; contains object password information; contains mapping cipher group method; digital signature method for message mapping cipher group; digital signature verification method for message mapping cipher group; external information exchange of the object is in accordance with the information security object of claim 4 Characteristics. An information security device method, according to the mapping cipher group digital signature method of claim 3 and claim 5 based on the security object method of mapping cipher group digital signature, the information security device is characterized in that the device stores object information, including: Object number and password information; the method of mapping cipher group is used; the digital signature and verification process of message mapping cipher group is implemented. 7. The password setting and using method according to claim 1, when the mapping rule is the simplest, it is a numbered password group, characterized in that-the password group consists of one password or two or more ordered passwords; each password group There is a number, which is used to save, index, query, and use password groups; each customer has multiple password groups at the same time, and must be distinguished by different numbers; all passwords are generated by collecting random information and have randomness Strictly speaking, it is a pseudo-random number, and each password has a different random seed; a password group can record the number of times and use status of each password. A one-time numbered password group method: The numbered password group method according to claim 7, and each password of the password group can only be used for valid authentication information once, characterized in that each password of the numbered password group can only be valid After the authentication information is used to authenticate a group of information with one password, the password cannot be used to authenticate other information. A one-time numbered cipher group digital signature method: The method for mapping a cipher group digital signature according to claim 3, wherein the mapped cipher group is the one-time numbered cipher group according to claim 8, using a one-way hash function, A one-time password is used to calculate the digest with the message, and this digest is used as a one-time digital signature to verify the integrity of the message. It is characterized by using a one-way hash function to calculate the message digest together with the one-time password as a one-time number. Signature; the so-called one-time password means that the password can only be used to effectively authenticate the information once; for a digest code space of a certain length, use a password space of sufficient password length so that there are enough collisions in the used password space, making The space composed of the colliding passwords is close to or larger than the message digest space, and it is impossible to reduce the security of the password from the message digest code through an exhaustive attack. 0. The one-time digital signature method according to claim 9, characterized in that the one-time number password set of claim 8 is used instead of the one-time password as the password used for the one-time digital signature, and the one-time digital signature is made Associated with the number of a one-time numbered password group. 1. An information authentication process method: Step-by-step binding processing technology, which is characterized by:
对于每一信息任务, 可分成两个以上步骤来完成, 其分步标志是, 每一个步骤有与 其他步骤所使用的不同的密码, 用来生成该步骤所关联的信息的校验; 分步骤按序完成, 完成了上一步骤才能进行下一步骤。
2、 可控加密技术方法, 其特征是: For each information task, it can be divided into two or more steps to complete. The step sign is that each step has a different password from the other steps used to generate the verification of the information associated with the step. Complete in order, the previous step can be completed before the next step. 2. Controllable encryption technology method, which is characterized by:
密码信息经保存后,只有进行加密的软件或硬件可以读取;加密过程及加密内容可以 人工控制, 或者可根据需要, 部分进行人工控制, 其过程不可能是全自动的, 对加密次数 必须进行人工控制,加密内容必须有全部或部分实施人工控制或进行人工监督,加密内容 在加密前或加密后必须全部或必要部分得到确认。 After the password information is saved, only the encrypted software or hardware can read it; the encryption process and the encrypted content can be manually controlled, or can be partially controlled manually as required. The process cannot be fully automatic, and the number of encryption must be performed. Manual control. Encrypted content must be fully or partially subject to manual control or supervision. Encrypted content must be confirmed in whole or in part before or after encryption.
13、 一种加密装置方法, 根据权利要求 12可控加密技术方法进行构造出可控加密装置, 其特征是- 密码保存在装置中, 可对密码进行更新或补充, 密码保存后, 密码信息不再对装置 外进行直接交换, 只有装置中进行加密的软件或硬件可以读取; 在装置中实现加密算法, 可以提取密码对输入或锁定的信息进行加密或验证; 加密装置带有显示装置, 可以显示 被加密的全部或部分信息, 以便于进行人工控制或者人工监控; 加密次数可以控制, 必 须在按需控制加密次数后加密操作才可以进行。 14、 根据权利要求 13的加密装置方法, 并使用了权利要求 11 的分步绑定处理技术, 其 特征是- 加密装置保存有二个以上的密码, 每个步骤使用不同的密码; 加密装置按既定的步 骤流程操作, 只有前一步骤的信息加密或验证正确, 相应密码被有效使用后, 下一步的 信息加密验证才能进行, 该步骤需使用的密码才能被启用。 13. An encryption device method, according to claim 12, the controllable encryption technology method is used to construct a controllable encryption device, characterized in that-the password is stored in the device, and the password can be updated or supplemented. After the password is saved, the password information is not Direct exchange is performed outside the device, only the software or hardware encrypted in the device can be read; the encryption algorithm is implemented in the device, and the password can be extracted to encrypt or verify the input or locked information; the encryption device with a display device can Display all or part of the encrypted information for manual control or manual monitoring; the number of encryptions can be controlled, and the encryption operation can only be performed after the number of encryptions is controlled as needed. 14. The encryption device method according to claim 13, and using the step-by-step binding processing technology of claim 11, characterized in that-the encryption device stores more than two passwords, each step using a different password; the encryption device according to For the established steps and procedures, the information encryption and verification of the next step can be performed only after the information of the previous step is correctly encrypted or verified, and the corresponding password is effectively used, and the password used in this step can be enabled.
15、 一次性数字签名装置的方法, 根据权利要求 14所述的加密装置方法, 其密码使用权 利要求 8所述的一次性编号密码组,加密算法使用权利要求 4所述的一次性数字签名方法 的算法, 其特征是: 15. A method of a one-time digital signature device, according to the encryption device method of claim 14, wherein the password uses the one-time numbered password set of claim 8 and the encryption algorithm uses the one-time digital signature method of claim 4. The algorithm is characterized by:
装置可以保存多组一次性编号密码组, 根据编号进行保存、 索引和使用一次性编号 . 密码组, 并且一次性编号密码组可以随时更新和补充; 一次性编号密码组保存后不再与 装置外进行直接信息交换, 只提供装置内加密的软件或硬件使用; 签名装置实现一次性 数字签名算法, 可以对输入的信息进行计算和验证一次性数字签名; 多步签名按既定顺 序执行, 只有完成了上一步骤的一次性数字签名计算或验证才进行下一步骤的签名运算。
The device can save multiple sets of one-time numbered password groups, and save, index and use one-time numbering according to the number. Password groups, and one-time numbered password groups can be updated and supplemented at any time; once the one-time numbered password groups are saved, they are no longer with the device. For direct information exchange, only the use of encrypted software or hardware in the device is provided; the signing device implements a one-time digital signature algorithm, which can calculate and verify the one-time digital signature on the input information; multi-step signatures are performed in a predetermined order and only completed The one-time digital signature calculation or verification of the previous step is performed before the signature operation of the next step.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN03134683.9 | 2003-09-26 | ||
CN 03134683 CN1601490A (en) | 2003-09-26 | 2003-09-26 | Information security authentication and method for its encrypting device |
CN200410051602.6 | 2004-09-24 | ||
CN 200410051602 CN1713567B (en) | 2004-09-24 | 2004-09-24 | Setting and usage method of mapping cipher |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005031619A2 true WO2005031619A2 (en) | 2005-04-07 |
Family
ID=34394989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2004/001101 WO2005031619A2 (en) | 2003-09-26 | 2004-09-27 | Setup and application of mapping cryptogram and device and method thereof |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2005031619A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789866B (en) * | 2010-02-03 | 2012-06-13 | 国家保密科学技术研究所 | High-reliability safety isolation and information exchange method |
CN102083069B (en) * | 2009-11-26 | 2015-09-16 | 中兴通讯股份有限公司 | A kind of method and apparatus detecting integrity of mobile terminal memory data |
-
2004
- 2004-09-27 WO PCT/CN2004/001101 patent/WO2005031619A2/en active Application Filing
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102083069B (en) * | 2009-11-26 | 2015-09-16 | 中兴通讯股份有限公司 | A kind of method and apparatus detecting integrity of mobile terminal memory data |
CN101789866B (en) * | 2010-02-03 | 2012-06-13 | 国家保密科学技术研究所 | High-reliability safety isolation and information exchange method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111008836B (en) | Privacy security transfer payment method, device, system and storage medium | |
RU2710897C2 (en) | Methods for safe generation of cryptograms | |
US5615268A (en) | System and method for electronic transmission storage and retrieval of authenticated documents | |
US6138239A (en) | Method and system for authenticating and utilizing secure resources in a computer system | |
Kou | Payment technologies for E-commerce | |
US6708893B2 (en) | Multiple-use smart card with security features and method | |
US20070162961A1 (en) | Identification authentication methods and systems | |
NO332206B1 (en) | Document authentication method and device | |
CN101216923A (en) | A system and method to enhance the data security of e-bank dealings | |
EP3652887A1 (en) | Method and system for data security within independent computer systems and digital networks | |
GB2434724A (en) | Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
WO2008031301A1 (en) | A method for the point to point online identity authenticaiton | |
EP2127199A2 (en) | Method and device for mutual authentication | |
CN107612680A (en) | A kind of national secret algorithm in mobile network's payment | |
Iwasokun et al. | Encryption and tokenization-based system for credit card information security | |
CN107615797B (en) | Device, method and system for hiding user identification data | |
Sharma et al. | Enhancing online banking authentication using hybrid cryptographic method | |
Mohammadi et al. | ECC-based biometric signature: A new approach in electronic banking security | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) | |
Nashwan et al. | Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking | |
WO2005031619A2 (en) | Setup and application of mapping cryptogram and device and method thereof | |
Dalai | Cryptography & Network Security | |
KR20200057985A (en) | A solution that combines hybrid block chains with enterprise-grade hadware key archival systems | |
CN1713567B (en) | Setting and usage method of mapping cipher |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
122 | Ep: pct app. not ent. europ. phase |