WO2009067901A1 - Procédé d'authentification d'accès unidirectionnelle - Google Patents

Procédé d'authentification d'accès unidirectionnelle Download PDF

Info

Publication number
WO2009067901A1
WO2009067901A1 PCT/CN2008/072979 CN2008072979W WO2009067901A1 WO 2009067901 A1 WO2009067901 A1 WO 2009067901A1 CN 2008072979 W CN2008072979 W CN 2008072979W WO 2009067901 A1 WO2009067901 A1 WO 2009067901A1
Authority
WO
WIPO (PCT)
Prior art keywords
entity
key
authentication
packet message
message
Prior art date
Application number
PCT/CN2008/072979
Other languages
English (en)
French (fr)
Inventor
Liaojun Pang
Jun Cao
Manxia Tie
Zhenhai Huang
Original Assignee
China Iwncomm Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Iwncomm Co., Ltd. filed Critical China Iwncomm Co., Ltd.
Priority to JP2010532413A priority Critical patent/JP5399404B2/ja
Priority to KR1020107012237A priority patent/KR101127250B1/ko
Priority to US12/741,567 priority patent/US8578164B2/en
Priority to EP08854091A priority patent/EP2209254A1/en
Publication of WO2009067901A1 publication Critical patent/WO2009067901A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a one-way access authentication method.
  • Radio Frequency Identification Label RFID must effectively solve the problem of secure authentication and key agreement between readers and electronic tags in RFID before performing secure communication.
  • RFID in some applications, the performance of electronic tags is poor, and the computing and communication capabilities are weak. In this case, only one-way authentication of the electronic tags is required.
  • network access points or base stations often only need to authenticate mobile terminals, and a secure one-way authentication protocol is also required.
  • the embodiment of the invention provides a method for one-way access authentication to ensure reliable one-way authentication. Sex.
  • An embodiment of the present invention discloses a one-way access authentication method, where the method includes: according to a system parameter pre-established by a third entity, the second entity sends an authentication request and a key distribution packet message to the first entity, where An entity verifies whether the authentication request and the key distribution packet message are valid; when the authentication request and the key distribution packet message are valid, the first entity generates an authentication and key response packet message, and the authentication and Sending a key response packet message to the second entity, the second entity verifying whether the authentication and key response packet message is valid; when the authentication and key response packet message is valid, the second entity generates The authentication and key confirmation packet message is sent to the first entity, and the first entity verifies whether the authentication and key confirmation packet message is valid; when the authentication and key confirmation packet message is valid, the authentication succeeds. And the key is the negotiated master key.
  • the first entity verifying whether the authentication request and the key distribution packet message are valid comprises: obtaining, by using the authentication request and the secret data SData in the key distribution packet message and the private key of the first entity a decryption key and an integrity check key of the key ciphertext CKey in the authentication request and the key distribution packet message; obtaining a second message integrity check code by using the integrity check key;
  • the second message integrity check code is the same as the first message integrity check code in the authentication request and the key distribution packet message.
  • the determining, by the first entity, whether the authentication and the key acknowledgment packet message is valid comprises: determining whether the random number used by the second entity in the authentication and key acknowledgment packet message is generated by the first entity A random number, if yes, determining whether the third message integrity check code in the authentication and key acknowledgment packet message is valid.
  • the first entity comprises: an electronic tag or a mobile terminal.
  • the second entity comprises: a reader/writer, an access point or a base station.
  • the embodiment of the present invention further discloses a one-way access authentication method, where the method includes: according to a system parameter pre-established by a third entity, the second entity sends an authentication request and a key distribution packet message to the first entity, where The first entity verifies whether the authentication request and the key distribution packet message are valid; when the authentication request and the key distribution packet message are valid, the first entity generates an authentication and key response packet message, and the authentication And the key response packet message is sent to the second entity, the second entity verifies whether the authentication and key response packet message is valid; when the authentication and key response packet message is valid, the second entity Sending an identity authentication request packet message to the third entity, by the The third entity verifies the identity validity of the first entity, and sends the identity authentication response packet message to the second entity; the second entity verifies the first entity according to the identity authentication response packet message Whether the identity is correct; when the identity of the first entity is correct, the second entity generates an authentication and key acknowledgment packet message, and sends the message to the first entity, where the first entity verifies
  • the first entity verifying whether the authentication request and the key distribution packet message are valid comprises: obtaining, by using the authentication request and the secret data SData in the key distribution packet message and the private key of the first entity a decryption key and an integrity check key of the CKey field in the authentication request and the key distribution packet message; obtaining a second message integrity check code by using the integrity check key; determining that the second message is complete
  • the checksum code is the same as the first message integrity check code in the authentication request and the key distribution packet message.
  • the determining, by the first entity, whether the authentication and the key acknowledgment packet message is valid comprises: determining whether the random number used by the second entity in the authentication and key acknowledgment packet message is generated by the first entity A random number, if yes, determining whether the third message integrity check code in the authentication and key acknowledgment packet message is valid.
  • the first entity comprises: an electronic tag or a mobile terminal.
  • the second entity comprises: a reader/writer, an access point or a base station.
  • the authentication between the first entity and the second entity does not need to pass the authentication server, and the third entity and the first entity and the second entity do not need to establish a secure channel, and the first entity and the first entity
  • the second entity can directly complete the one-way authentication.
  • combining the identity-based public key mechanism with WAPI's background identity validity authentication mechanism has the following advantages: 1.
  • the maintenance workload is small.
  • the present invention is based on an identity public key mechanism that does not require maintaining a public key infrastructure PKI like a traditional public key. 2. Save communication overhead. No digital certificates need to be transmitted during the authentication process, saving communication overhead. 3.
  • the identity authentication function combined with the WAPI mechanism can avoid the disadvantages of identity validity verification in the identity-based public key mechanism. 4.
  • FIG. 1 is a schematic flowchart diagram of a one-way access authentication method according to an embodiment of the present invention.
  • the method of the present invention is implemented by a trusted third party TTP, which may be an authentication server or other device capable of implementing an authentication function, and the trusted third party is responsible for physical identification of the identity of the user entity and system parameters. The generation and the establishment of user parameters.
  • FIG. 1 is a schematic flowchart diagram of a one-way access authentication method according to an embodiment of the present invention.
  • the specific implementation is as follows:
  • Step 1) The system parameters are established by a trusted third party.
  • Step 2) The second entity sends an authentication request and a key distribution packet message to the first entity, and the first entity verifies whether the message sent by the second entity is valid, and if valid, generates an authentication and key response packet message, and sends the message to the first Two entities;
  • the authentication request and the key distribution packet sent by the second entity to the first entity are composed of the following fields:
  • ID1 field identity information of the first entity
  • ID2 field identity information of the second entity
  • N2 field a random number generated by the second entity
  • MIC1 field The message integrity check code is obtained for all fields before the CKey field and its CKey field.
  • the SData field in the message and its own private key are used. And then, by the calculation result, the decryption key and the second integrity check key respectively corresponding to the encryption key and the first integrity check key are derived, and a new MIC1 is recalculated with the second integrity check key. ' field, and compared with MIC1 in the authentication request and key distribution packet message, if not the same, discard the packet; if the same, decrypt the CKey field with the decryption key, obtain the key Key, and derive it with the key Key A new third integrity check key, go to step 3).
  • Step 3 The authentication and key response packet message is generated by the first entity, and sent to the second entity, where the second entity verifies whether the message sent by the first entity is valid, and if valid, the second entity generates the authentication and the key confirmation. Grouping the message and sending it to the first entity;
  • the authentication and key response packet message sent by the first entity to the second entity is composed of the following fields:
  • ID1 field identity information of the first entity
  • ID2 field identity information of the second entity
  • N1 field a random number generated by the first entity
  • N2' field a random number used by the first entity
  • MIC2 field A message integrity check code obtained by using the third integrity check key derived by the key Key to find all fields before the N2 field and its N2 field.
  • Step 4 After the first entity receives the authentication and key confirmation packet message, the first entity verifies whether the message is valid. If yes, the authentication succeeds and the key Key is the negotiated master key.
  • the authentication and key confirmation packet message sent by the second entity to the first entity is The following fields form:
  • ID1 field Brother's identity information of an entity
  • ID2 field The identity information of the second entity
  • ⁇ field Brother. The random number used by the two entities
  • the message integrity check code is obtained for all fields before the N1 field and its N1 field by using the integrity check key 3 derived by the key Key.
  • the first entity After receiving the authentication and key confirmation packet message sent by the second entity, the first entity determines whether the random number used by the second entity in the message is a random number generated by itself, and if not, discards the message, if yes
  • the new integrity check key 3 is used to determine whether the MIC3 field is valid. If invalid, the packet is discarded. If valid, the authentication is successful and the key Key is the negotiated master key.
  • the second entity may perform identity validity verification on the first entity, and after the identity verification of the first entity is passed, An authentication and key confirmation packet message is sent to the first entity. Then between step 3) and step 4):
  • Step 21 The second entity sends an identity authentication request packet message to the trusted third party, and the trusted third party verifies the identity validity of the first entity.
  • the identity authentication request packet message is composed of the following fields:
  • ID2 field identity information of the second entity
  • TTP field A trusted third party responsible for verifying the identity of other devices
  • ID1 field identity information of the first entity
  • N1 field a random number generated by the first entity
  • N2 field A random number generated by the second entity.
  • Step 31 The trusted third party generates an identity authentication response packet message according to the verification result, and sends the message to the second entity, where the second entity verifies whether the identity of the first entity is positive according to the identity authentication response packet message. Indeed, if it is correct, proceed to step 3).
  • the identity authentication response packet message sent by the trusted third party to the second entity is composed of the following fields:
  • ID1 field identity information of the first entity
  • ID2 field identity information of the second entity
  • TTP field A trusted third party responsible for verifying the identity of other devices
  • N1 field a random number generated by the first entity
  • N2 field a random number generated by the second entity
  • RES1 field the validity verification result of the TTP for the identity of the first entity
  • SigTTP field The digital signature of the TTP for all fields before the RES1 field and its RES1 field, which can be a traditional PKI-based signature or an identity-based signature.
  • the trusted third party After receiving the identity authentication request packet message sent by the second entity, the trusted third party verifies the identity of the first entity, and encapsulates the verification result in the identity authentication response packet message, and sends the result to the second entity.
  • the authentication response packet and the identity authentication request are grouped into pairs.
  • the second entity can determine the validity of the identity of the first entity.
  • the second entity is a reader/writer
  • the first entity is an electronic tag to solve the problem of electronic tag authentication by the reader/writer in the RFID network
  • the reader/writer is an electronic tag.
  • Distributing the shared key means that the reader authenticates the electronic tag and generates a shared master key.
  • the second entity is an access point
  • the first entity is a mobile terminal, to solve the problem of the authentication of the mobile terminal in the wireless local area network, and is distributed by the access point for the mobile terminal.
  • the shared key that is, the access point authenticates the mobile terminal and generates a shared master key.
  • the second entity is a base station
  • the first entity is a mobile terminal
  • the base station distributes the mobile terminal.
  • the shared key that is, the base station authenticates the mobile terminal, and generates a shared master key.
  • the authentication between the first entity and the second entity does not need to pass the authentication server, and the third entity and the first entity and the second entity do not need to establish a secure channel, and the first entity and the first entity
  • the second entity can directly complete the one-way authentication.
  • combining the identity-based public key mechanism with WAPI's background identity validity authentication mechanism has the following advantages: 1.
  • the maintenance workload is small.
  • the present invention is based on an identity-based public key mechanism that does not require maintaining a public key infrastructure PKI like a traditional public key. 2. Save communication overhead. No digital certificates need to be transmitted during the authentication process, saving communication overhead. 3.
  • the identity authentication function combined with the WAPI mechanism can avoid the disadvantages of identity validity verification in the identity-based public key mechanism.
  • the traditional public key can be used.
  • the algorithm can also use an identity-based public key algorithm, and the signature implementation is more flexible. 5.
  • the length of the safety data can be shortened without reducing the safety, thereby greatly improving the calculation and communication performance.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

一种单向接入认证方法
本申请要求于 2007年 11月 8日提交中国专利局、 申请号为 200710019023.7、 发明名称为 "一种单向接入认证方法"的中国专利申请的优先权,其全部内容通 过引用结合在本申请中。
技术领域
本发明涉及无线通信技术领域, 特别是涉及一种单向接入认证方法。
背景技术
射频识别标签 RFID在进行安全通信之前, 必须有效地解决 RFID中读写器 和电子标签之间的安全认证及密钥协商问题。 在 RFID中, 由于在一些应用场 合中, 电子标签性能较差, 计算和通信能力弱, 这时只需要对电子标签进行单 向认证即可。 同样, 在无线网络的一些特殊的应用场合中, 网络接入点或基站 往往只需要对移动终端进行认证, 同样需要安全的单向认证协议。
美国 IEEE提出 IEEE802.11标准, 通过釆用 WEP协议来实现无线局域网的 安全性, 随后又提出 802.11i标准以緩解 WEP协议中出现的安全漏洞,并支持接 入点对移动终端的单向认证。 同时, 美国 IEEE提出 IEEE802.16标准, 实现无线 城域网的安全性, 提供了基站对移动终端的单向认证, 随后 IEEE802.16e标准 借鉴 IEEE802.1 li标准也对 IEEE802.16标准进行了改进。
但是,发明人在研究中发现,现有的单向认证方法不能够实现基站或接入 点对移动终端的直接单向认证, 而都是基于认证服务器来实现的。 即, 当基站 或接入点在对移动终端进行单向认证时 ,需要在接入点和认证服务器之间或者 基站和服务器之间借助其它安全协议事先建立一条安全信道,再由认证服务器 来完成基站或接入点与移动终端之间的单向认证。而当安全信道的安全性出现 问题时, 就会影响单向认证的可靠性。 此外, 当网络系统中增加新的基站或接 入点时, 需要手动建立基站或接入点与认证服务器之间的安全信道, 不利于网 络系统的扩展。
发明内容
本发明实施例提供了一种单向接入认证的方法, 以保证单向认证的可靠 性。
本发明实施例公开了一种单向接入认证方法, 所述方法包括: 根据第三实 体预先建立的系统参数,第二实体发送认证请求及密钥分发分组消息给第一实 体, 所述第一实体验证所述认证请求及密钥分发分组消息是否有效; 当所述认 证请求及密钥分发分组消息有效时,所述第一实体生成认证及密钥响应分组消 息, 并将所述认证及密钥响应分组消息发送给所述第二实体, 所述第二实体验 证所述认证及密钥响应分组消息是否有效;当所述认证及密钥响应分组消息有 效时, 所述第二实体生成认证及密钥确认分组消息, 并发给所述第一实体, 所 述第一实体验证所述认证及密钥确认分组消息是否有效;当所述认证及密钥确 认分组消息有效时, 认证成功, 且密钥为协商的主密钥。
优选的,所述第一实体验证所述认证请求及密钥分发分组消息是否有效包 括: 利用所述认证请求及密钥分发分组消息中的秘密数据 SData和所述第一实 体的私钥获得所述认证请求及密钥分发分组消息中密钥密文 CKey的解密密钥 和完整性校验密钥; 通过所述完整性校验密钥得到第二消息完整性校验码; 判 断所述第二消息完整性校验码与所述认证请求及密钥分发分组消息中的第一 消息完整性校验码是否相同。
优选的, 所述第一实体验证所述认证及密钥确认分组消息是否有效包括: 判断所述认证及密钥确认分组消息中,第二实体使用的随机数是否为所述第一 实体产生的随机数,如果是, 判断所述认证及密钥确认分组消息中的第三消息 完整性校验码是否有效。
优选的, 所述第一实体包括: 电子标签或移动终端。
优选的, 所述第二实体包括: 读写器、 接入点或基站。
本发明实施例还公开了一种单向接入认证方法, 所述方法包括: 根据第三 实体预先建立的系统参数,第二实体发送认证请求及密钥分发分组消息给第一 实体, 所述第一实体验证所述认证请求及密钥分发分组消息是否有效; 当所述 认证请求及密钥分发分组消息有效时,所述第一实体生成认证及密钥响应分组 消息, 并将所述认证及密钥响应分组消息发送给所述第二实体, 所述第二实体 验证所述认证及密钥响应分组消息是否有效;当所述认证及密钥响应分组消息 有效时, 所述第二实体发送身份鉴别请求分组消息给所述第三实体, 由所述第 三实体对第一实体的身份有效性进行验证,并将所述身份鉴别响应分组消息发 送给所述第二实体;所述第二实体根据所述身份鉴别响应分组消息验证所述第 一实体的身份是否正确; 当所述第一实体的身份正确时, 第二实体生成认证及 密钥确认分组消息, 并发给所述第一实体, 所述第一实体验证所述认证及密钥 确认分组消息是否有效; 当所述认证及密钥确认分组消息有效时, 认证成功, 且密钥为协商的主密钥。
优选的,所述第一实体验证所述认证请求及密钥分发分组消息是否有效包 括: 利用所述认证请求及密钥分发分组消息中的秘密数据 SData和所述第一实 体的私钥获得所述认证请求及密钥分发分组消息中 CKey字段的解密密钥和完 整性校验密钥; 通过所述完整性校验密钥得到第二消息完整性校验码; 判断所 述第二消息完整性校验码与所述认证请求及密钥分发分组消息中的第一消息 完整性校验码是否相同。
优选的, 所述第一实体验证所述认证及密钥确认分组消息是否有效包括: 判断所述认证及密钥确认分组消息中,第二实体使用的随机数是否为所述第一 实体产生的随机数,如果是, 判断所述认证及密钥确认分组消息中的第三消息 完整性校验码是否有效。
优选的, 所述第一实体包括: 电子标签或移动终端。
优选的, 所述第二实体包括: 读写器、 接入点或基站。
由上述本发明实施例可以看出,第一实体与第二实体之间的认证不需要通 过认证服务器, 第三实体与第一实体和第二实体不需要建立安全信道, 由第一 实体和第二实体可以直接完成单向认证。此夕卜,将基于身份的公钥机制和 WAPI 的后台身份有效性鉴别机制结合起来, 还具有以下优点: 1、 维护工作量小。 本发明基于身份公钥机制, 不需要像传统公钥那样维护公钥基础设施 PKI。 2、 节约通信开销。在认证过程中无须传送数字证书,节约通信开销。 3、结合 WAPI 机制的身份鉴别功能,能够避免基于身份公钥机制中难以进行身份有效性验证 的缺点; 4、 与 WAPI不同的是, 在身份验证过程的 TTP签名中, 既可以使用传 统公钥算法, 也可以使用基于身份的公钥算法, 签名实现更为灵活。 5、 釆用 椭圓曲线上的双线性对,能够在不降低安全性的基础上,缩短安全数据的长度, 从而大大地提高计算和通信性能。 附图说明 图 1为本发明实施例中一种单向接入认证方法的流程示意图。
具体实施方式 本发明的方法是通过一个可信第三方 TTP来实现, 该可信第三方可以是认 证服务器或其它可实现认证功能的设备,可信第三方负责用户实体身份的物理 鉴别、 系统参数的生成以及用户参数的建立过程。
参照图 1 , 其为本发明实施例中一种单向接入认证方法的流程示意图。 具 体实现方法如下:
步骤 1 ) 由可信第三方建立系统参数, 该系统参数包括: 两个 q阶的循环 群 ( +)和 (G2,')、 的生成元?、 和(¾的双线性变换结果 e, 即 e ^ x — 和随机选取的可信第三方私钥 S E Z 以及对应的公钥 QTTP = STWP 。
这里实体用户 i的身份 IDi为该实体用户的公钥 ,其对应的私钥为 = S^ID, , 其中, i=l , 2。
上述步骤只是在首次应用时执行该步骤, 当建立好系统参数后,在以后的 重复应用中则无须重复执行该步骤。
步骤 2 )第二实体发送认证请求及密钥分发分组消息给第一实体, 由第一 实体验证第二实体发送的消息是否有效,如果有效, 生成认证及密钥响应分组 消息, 并发送给第二实体;
上述步骤 2 ) 中, 第二实体发送给第一实体的认证请求及密钥分发分组由 以下字段构成:
Figure imgf000006_0001
其中:
ID1字段: 第一实体的身份信息;
ID2字段: 第二实体的身份信息;
N2字段: 第二实体产生的随机数;
秘密数据 SData字段:由第二实体通过选取一个秘密随机数 r,并计算 r.P获 密钥密文 CKey字段: 封装有第二实体要传给第一实体的密钥 Key的密文, 即 Ckey = Ek(Key),这里加密密钥 k由 r.^^ ./Dl导出,导出的结果一部分作为加 密密钥, 导出的结果另一部分作为完整性密钥。
MIC1字段: 对 CKey字段及其 CKey字段之前的所有字段求消息完整性 校验码。
当在第一实体收到了第二实体发送的认证请求及密钥分发分组消息后,首 先, 利用消息中的 SData字段和自己的私钥 &
Figure imgf000007_0001
, 然后由计算结果导 出分别与加密密钥和第一完整性校验密钥对应的解密密钥和第二完整性校验 密钥, 用第二完整性校验密钥重新计算一个新的 MIC1'字段, 并与认证请求及 密钥分发分组消息中的 MIC1比较, 如果不相同, 丟弃该分组; 如果相同, 利 用解密密钥对 CKey字段进行解密, 得到密钥 Key, 并用密钥 Key导出一个新 的第三完整性校验密钥, 进入步骤 3 )。
步骤 3 ) 由第一实体生成认证及密钥响应分组消息, 并发送给第二实体, 由第二实体验证第一实体发送的消息是否有效,如果有效, 由第二实体生成认 证及密钥确认分组消息, 并发给第一实体;
上述步骤 3 ) 中, 第一实体发送给第二实体的认证及密钥响应分组消息由 以下字段构成:
Figure imgf000007_0002
其中:
ID1字段: 第一实体的身份信息;
ID2字段: 第二实体的身份信息;
N1字段: 第一实体产生的随机数;
N2'字段: 第一实体使用的随机数;
MIC2字段: 用由密钥 Key导出的第三完整性校验密钥对 N2字段及其 N2字 段之前所有字段求取的消息完整性校验码。
步骤 4 ) 当第一实体收到认证及密钥确认分组消息后, 由第一实体验证所 述消息是否有效, 如果是, 认证成功且密钥 Key为协商的主密钥。
上述步骤 4 ) 中, 第二实体发送给第一实体的认证及密钥确认分组消息由 以下字段构成:
Figure imgf000008_0001
其中:
ID1字段: 弟'一实体的身份信息;
ID2字段: 弟.二实体的身份信息;
ΝΓ字段: 弟.二实体使用的随机数;
MIC3字段:用由密钥 Key导出的完整性校验密钥 3对 N1字段及其 N1字段之 前所有字段求消息完整性校验码。
当第一实体收到第二实体发送的认证及密钥确认分组消息后,判断消息中 第二实体使用的随机数 ΝΓ是否为自己产生的随机数, 如果不是, 则丟弃该消 息, 如果是, 利用新的完整性校验密钥 3判断 MIC3字段是否有效, 如果无效, 则丟弃该分组, 如果有效, 认证成功且密钥 Key为协商的主密钥。
为进一步提高安全性,当第二实体收到第一实体发送的认证及密钥响应分 组消息后,还可以对第一实体进行身份有效性验证, 当对第一实体的身份验证 通过后, 再向第一实体发送认证及密钥确认分组消息。 则在步骤 3 )和步骤 4 ) 之间还包括:
步骤 21 )第二实体发送身份鉴别请求分组消息给可信第三方, 由可信第三 方对第一实体的身份有效性进行验证;
上述步骤 21 ) 中, 身份鉴别请求分组消息由以下字段构成:
Figure imgf000008_0002
其中:
ID2字段: 第二实体的身份信息;
TTP字段: 负责对其他设备身份进行有效性验证的可信第三方;
ID1字段: 第一实体的身份信息;
N1字段: 第一实体产生的随机数;
N2字段: 第二实体产生的随机数。
步骤 31 )可信第三方根据验证结果生成身份鉴别响应分组消息, 并发送给 第二实体, 第二实体根据身份鉴别响应分组消息验证第一实体的身份是否正 确, 正确则进至步骤 3 ) 。
上述步骤 31 )中, 可信第三方发送给第二实体的身份鉴别响应分组消息由 以下字段构成:
Figure imgf000009_0001
其中:
ID1字段: 第一实体的身份信息;
ID2字段: 第二实体的身份信息;
TTP字段: 负责对其他设备身份进行有效性验证的可信第三方
N1字段: 第一实体产生的随机数;
N2字段: 第二实体产生的随机数;
RES1字段: TTP对第一实体身份的有效性验证结果;
SigTTP字段: TTP对 RES1字段及其 RES1字段之前所有字段进行的数字签 名, 可以是传统的基于 PKI的签名, 也可以是基于身份的签名。
当可信第三方收到第二实体发送的身份鉴别请求分组消息后,对第一实体 的身份进行验证, 并将验证结果封装在身份鉴别响应分组消息中,发送给第二 实体。 该份鉴别响应分组和身份鉴别请求分组成对出现。
通过身份鉴别响应分组中 RES1字段, 第二实体可以判断出第一实体的身 份的有效性。
通过以上过程, 实现了第二实体对第一实体的单向认证, 并建立共享的 主密钥 Key。
当本发明应用在在 RFID网络中时, 第二实体即为读写器, 第一实体即为 电子标签, 以解决 RFID网络中读写器对电子标签认证问题, 并由读写器为电 子标签分发共享密钥,即实现读写器对电子标签的认证,并产生共享的主密钥。
当本发明应用在无线局域网中时, 第二实体即为接入点, 第一实体即为移 动终端, 以解决无线局域网中接入点对移动终端认证问题, 并由接入点为移动 终端分发共享密钥, 即实现接入点对移动终端的认证, 并产生共享的主密钥。
本发明应用在无线城域网中时, 第二实体即为基站, 第一实体即为移动终 端, 以解决无线城域网中基站对移动终端认证问题, 并由基站为移动终端分发 共享密钥, 即实现基站对移动终端的认证, 并产生共享的主密钥。
由上述本发明实施例可以看出,第一实体与第二实体之间的认证不需要通 过认证服务器, 第三实体与第一实体和第二实体不需要建立安全信道, 由第一 实体和第二实体可以直接完成单向认证。此夕卜,将基于身份的公钥机制和 WAPI 的后台身份有效性鉴别机制结合起来, 还具有以下优点: 1、 维护工作量小。 本发明基于身份的公钥机制,不需要像传统公钥那样维护公钥基础设施 PKI。 2、 节约通信开销。在认证过程中无须传送数字证书,节约通信开销。 3、结合 WAPI 机制的身份鉴别功能,能够避免基于身份公钥机制中难以进行身份有效性验证 的缺点; 4、 与 WAPI不同的是, 在身份验证过程的 TTP签名中, 既可以使用传 统公钥算法, 也可以使用基于身份的公钥算法, 签名实现更为灵活。 5、 釆用 椭圓曲线上的双线性对,能够在不降低安全性的基础上,缩短安全数据的长度, 从而大大地提高计算和通信性能。

Claims

OP080835 WO 2009/067901 PCT/CN2008/072979 -9- 权 利 要 求
1、 一种单向接入认证方法, 其特征在于, 所述方法包括:
根据第三实体预先建立的系统参数,第二实体发送认证请求及密钥分发分 组消息给第一实体,所述第一实体验证所述认证请求及密钥分发分组消息是否 有效
当所述认证请求及密钥分发分组消息有效时,所述第一实体生成认证及密 钥响应分组消息, 并将所述认证及密钥响应分组消息发送给所述第二实体, 所 述第二实体验证所述认证及密钥响应分组消息是否有效;
当所述认证及密钥响应分组消息有效时,所述第二实体生成认证及密钥确 认分组消息, 并发给所述第一实体, 所述第一实体验证所述认证及密钥确认分 组消息是否有效;
当所述认证及密钥确认分组消息有效时,认证成功, 且密钥为协商的主密 钥。
2、 根据权利要求 1所述的方法, 其特征在于, 所述第一实体验证所述认证 请求及密钥分发分组消息是否有效包括:
利用所述认证请求及密钥分发分组消息中的秘密数据 SData字段和所述第 一实体的私钥获得所述认证请求及密钥分发分组消息中密钥密文 CKey字段的 解密密钥和完整性校验密钥;
通过所述完整性校验密钥得到第二消息完整性校验码;
判断所述第二消息完整性校验码与所述认证请求及密钥分发分组消息中 的第一消息完整性校验码是否相同。
3、 根据权利要求 1所述的方法, 其特征在于, 所述第一实体验证所述认证 及密钥确认分组消息是否有效包括:
判断所述认证及密钥确认分组消息中,第二实体使用的随机数是否为所述 第一实体产生的随机数, 如果是, 判断所述认证及密钥确认分组消息中的第三 消息完整性校验码是否有效。
4、 根据权利要求 1-3任意一项所述的方法, 其特征在于, 所述第一实体包 括:
电子标签或移动终端。 OP080835
WO 2009/067901 PCT/CN2008/072979
- 10-
5、 根据权利要求 1-3任意一项所述的方法, 其特征在于, 所述第二实体包 括:
读写器、 接入点或基站。
6、 一种单向接入认证方法, 其特征在于, 所述方法包括:
根据第三实体预先建立的系统参数,第二实体发送认证请求及密钥分发分 组消息给第一实体,所述第一实体验证所述认证请求及密钥分发分组消息是否 有效;
当所述认证请求及密钥分发分组消息有效时,所述第一实体生成认证及密 钥响应分组消息, 并将所述认证及密钥响应分组消息发送给所述第二实体, 所 述第二实体验证所述认证及密钥响应分组消息是否有效;
当所述认证及密钥响应分组消息有效时,所述第二实体发送身份鉴别请求 分组消息给所述第三实体, 由所述第三实体对第一实体的身份有效性进行验 证, 并将所述身份鉴别响应分组消息发送给所述第二实体;
所述第二实体根据所述身份鉴别响应分组消息验证所述第一实体的身份 是否正确;
当所述第一实体的身份正确时, 第二实体生成认证及密钥确认分组消息, 并发给所述第一实体,所述第一实体验证所述认证及密钥确认分组消息是否有 效;
当所述认证及密钥确认分组消息有效时,认证成功, 且密钥为协商的主密 钥。
7、 根据权利要求 4所述的方法, 其特征在于, 所述第一实体验证所述认证 请求及密钥分发分组消息是否有效包括:
利用所述认证请求及密钥分发分组消息中的秘密数据 SData字段和所述第 一实体的私钥获得所述认证请求及密钥分发分组消息中密钥密文 CKey字段的 解密密钥和完整性校验密钥;
通过所述完整性校验密钥得到第二消息完整性校验码;
判断所述第二消息完整性校验码与所述认证请求及密钥分发分组消息中 的第一消息完整性校验码是否相同。
8、 根据权利要求 4所述的方法, 其特征在于, 所述第一实体验证所述认证 OP080835
WO 2009/067901 PCT/CN2008/072979
- 11 - 及密钥确认分组消息是否有效包括:
判断所述认证及密钥确认分组消息中,第二实体使用的随机数是否为所述 第一实体产生的随机数, 如果是, 判断所述认证及密钥确认分组消息中的第三 消息完整性校验码是否有效。
9、 根据权利要求 6-8任意一项所述的方法, 其特征在于, 所述第一实体包 括:
电子标签或移动终端。
10、 根据权利要求 6-8任意一项所述的方法, 其特征在于, 所述第二实体 包括:
读写器、 接入点或基站。
PCT/CN2008/072979 2007-11-08 2008-11-07 Procédé d'authentification d'accès unidirectionnelle WO2009067901A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2010532413A JP5399404B2 (ja) 2007-11-08 2008-11-07 一方向アクセス認証の方法
KR1020107012237A KR101127250B1 (ko) 2007-11-08 2008-11-07 일-방향 액세스 인증 방법
US12/741,567 US8578164B2 (en) 2007-11-08 2008-11-07 Method of one-way access authentication
EP08854091A EP2209254A1 (en) 2007-11-08 2008-11-07 A method of one-way access authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710019023A CN101159639B (zh) 2007-11-08 2007-11-08 一种单向接入认证方法
CN200710019023.7 2007-11-08

Publications (1)

Publication Number Publication Date
WO2009067901A1 true WO2009067901A1 (fr) 2009-06-04

Family

ID=39307566

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/072979 WO2009067901A1 (fr) 2007-11-08 2008-11-07 Procédé d'authentification d'accès unidirectionnelle

Country Status (7)

Country Link
US (1) US8578164B2 (zh)
EP (1) EP2209254A1 (zh)
JP (1) JP5399404B2 (zh)
KR (1) KR101127250B1 (zh)
CN (1) CN101159639B (zh)
RU (1) RU2454811C2 (zh)
WO (1) WO2009067901A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011135464A (ja) * 2009-12-25 2011-07-07 Nec Corp 認証システム、認証装置、端末装置、認証方法、及びプログラム
JP2012019511A (ja) * 2010-07-09 2012-01-26 Tata Consultancy Services Ltd 無線通信機器とサーバとの間でのデータの安全なトランザクションのためのシステムおよび方法

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159639B (zh) 2007-11-08 2010-05-12 西安西电捷通无线网络通信有限公司 一种单向接入认证方法
CN100495964C (zh) * 2007-12-03 2009-06-03 西安西电捷通无线网络通信有限公司 一种轻型接入认证方法
CN102006671B (zh) * 2009-08-31 2014-06-18 中兴通讯股份有限公司 一种实现来电转接的系统及方法
DE102010011022A1 (de) * 2010-03-11 2012-02-16 Siemens Aktiengesellschaft Verfahren zur sicheren unidirektionalen Übertragung von Signalen
CN101925060A (zh) 2010-08-27 2010-12-22 西安西电捷通无线网络通信股份有限公司 一种资源受限网络的实体鉴别方法及系统
JP5664637B2 (ja) * 2012-12-07 2015-02-04 トヨタ自動車株式会社 車体前部構造
CN104954130B (zh) * 2014-03-31 2019-08-20 西安西电捷通无线网络通信股份有限公司 一种实体鉴别方法及装置
JP2017004133A (ja) * 2015-06-08 2017-01-05 株式会社リコー サービス提供システム、情報処理システム、情報処理装置、サービス提供方法、及びプログラム
US9979711B2 (en) * 2015-06-26 2018-05-22 Cisco Technology, Inc. Authentication for VLAN tunnel endpoint (VTEP)
EP3386140B1 (en) * 2015-12-31 2020-08-26 Huawei Technologies Co., Ltd. Data transmission method, apparatus and device
CN111523154B (zh) * 2020-03-20 2021-03-02 北京元心科技有限公司 用于取得硬件唯一标识的方法、系统及相应计算机设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005006629A2 (en) * 2003-06-24 2005-01-20 Arraycomm, Inc. Terminal authentication in a wireless network
CN1767429A (zh) * 2004-10-29 2006-05-03 大唐移动通信设备有限公司 移动通信用户认证与密钥协商方法
CN1777102A (zh) * 2005-11-25 2006-05-24 中国移动通信集团公司 软件终端接入ip多媒体子系统的装置及方法
CN101159639A (zh) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 一种单向接入认证方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2870163B2 (ja) 1990-09-07 1999-03-10 松下電器産業株式会社 認証機能付き鍵配送方式
JP3890510B2 (ja) * 1996-09-13 2007-03-07 アトメル ジャーマニー ゲゼルシヤフト ミット ベシュレンクテル ハフツング 無線周波数識別システムにおける暗号学的な認証を行なう方法
US6986040B1 (en) * 2000-11-03 2006-01-10 Citrix Systems, Inc. System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
KR20010079161A (ko) 2001-06-19 2001-08-22 김영진 무선통신환경에서 인증서를 사용한 장치 인증 및 통신암호 키 분배 방법
US7698550B2 (en) * 2002-11-27 2010-04-13 Microsoft Corporation Native wi-fi architecture for 802.11 networks
US20060155993A1 (en) * 2003-02-21 2006-07-13 Axel Busboon Service provider anonymization in a single sign-on system
JP2006025298A (ja) 2004-07-09 2006-01-26 Oki Electric Ind Co Ltd 相互認証方法、相互認証装置、及び相互認証システム
US8099607B2 (en) * 2005-01-18 2012-01-17 Vmware, Inc. Asymmetric crypto-graphy with rolling key security
CN100389555C (zh) * 2005-02-21 2008-05-21 西安西电捷通无线网络通信有限公司 一种适合有线和无线网络的接入认证方法
US9660808B2 (en) * 2005-08-01 2017-05-23 Schneider Electric It Corporation Communication protocol and method for authenticating a system
US8312523B2 (en) * 2006-03-31 2012-11-13 Amazon Technologies, Inc. Enhanced security for electronic communications
CN100488305C (zh) * 2006-09-23 2009-05-13 西安西电捷通无线网络通信有限公司 一种网络接入鉴别与授权方法以及授权密钥更新方法
CN101640893B (zh) * 2009-09-09 2011-12-21 中国电信股份有限公司 解决高层建筑码分多址信号导频污染的方法和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005006629A2 (en) * 2003-06-24 2005-01-20 Arraycomm, Inc. Terminal authentication in a wireless network
CN1767429A (zh) * 2004-10-29 2006-05-03 大唐移动通信设备有限公司 移动通信用户认证与密钥协商方法
CN1777102A (zh) * 2005-11-25 2006-05-24 中国移动通信集团公司 软件终端接入ip多媒体子系统的装置及方法
CN101159639A (zh) * 2007-11-08 2008-04-09 西安西电捷通无线网络通信有限公司 一种单向接入认证方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011135464A (ja) * 2009-12-25 2011-07-07 Nec Corp 認証システム、認証装置、端末装置、認証方法、及びプログラム
JP2012019511A (ja) * 2010-07-09 2012-01-26 Tata Consultancy Services Ltd 無線通信機器とサーバとの間でのデータの安全なトランザクションのためのシステムおよび方法

Also Published As

Publication number Publication date
RU2454811C2 (ru) 2012-06-27
JP5399404B2 (ja) 2014-01-29
RU2010122598A (ru) 2011-12-20
KR20100076058A (ko) 2010-07-05
CN101159639A (zh) 2008-04-09
CN101159639B (zh) 2010-05-12
EP2209254A1 (en) 2010-07-21
US20100268954A1 (en) 2010-10-21
US8578164B2 (en) 2013-11-05
JP2011504318A (ja) 2011-02-03
KR101127250B1 (ko) 2012-03-29

Similar Documents

Publication Publication Date Title
WO2009067901A1 (fr) Procédé d'authentification d'accès unidirectionnelle
JP5318879B2 (ja) 2ウェイのアクセス認証方法
KR100832893B1 (ko) 무선 근거리 통신망으로 이동 단말의 보안 접근 방법 및 무선 링크를 통한 보안 데이터 통신 방법
US7734280B2 (en) Method and apparatus for authentication of mobile devices
CA2255285C (en) Enhanced subscriber authentication protocol
WO2012048501A1 (zh) 一种基于对称密码算法的实体鉴别方法及系统
WO2010020186A1 (zh) 基于单播会话密钥的组播密钥分发方法、更新方法及基站
EP3469763B1 (en) A method for unified network and service authentication based on id-based cryptography
WO2010078755A1 (zh) 电子邮件的传送方法、系统及wapi终端
WO2011076008A1 (zh) 一种wapi终端与应用服务器传输文件的系统及方法
WO2007028328A1 (fr) Procede, systeme et dispositif de negociation a propos d'une cle de chiffrement partagee par equipement utilisateur et equipement externe
WO2010135890A1 (zh) 基于对称加密算法的双向认证方法及系统
CN110087240B (zh) 基于wpa2-psk模式的无线网络安全数据传输方法及系统
WO2011109960A1 (zh) 基于身份的双向认证方法及系统
WO2012075825A1 (zh) 无线局域网中端站的安全配置方法、ap、sta、as及系统
WO2009074092A1 (fr) Procédé et système allégés d'authentification d'accès
CN112333705B (zh) 一种用于5g通信网络的身份认证方法及系统
WO2012040949A1 (zh) 一种移动WiMAX网络中EAP认证快速切换方法
Zhu et al. Research on authentication mechanism of cognitive radio networks based on certification authority
CN112822018B (zh) 一种基于双线性对的移动设备安全认证方法及系统
WO2009129683A1 (zh) 微波接入全球互操作系统的接入鉴权方法、装置及系统
CN113242548B (zh) 5g网络环境下的无线物联网设备通信密钥交换方法
CN118157859A (zh) 一种基于国密安全芯片的设备安全通信方法和设备
WO2011063557A1 (zh) 一种无线城域网组播密钥管理方法及系统
Low et al. Fast Re-Authentication Protocols for Mobile and Wireless Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08854091

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12741567

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2010532413

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008854091

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20107012237

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2010122598

Country of ref document: RU