WO2011110096A1 - Method and device for realizing trusted network connection through router or switch - Google Patents

Method and device for realizing trusted network connection through router or switch Download PDF

Info

Publication number
WO2011110096A1
WO2011110096A1 PCT/CN2011/071679 CN2011071679W WO2011110096A1 WO 2011110096 A1 WO2011110096 A1 WO 2011110096A1 CN 2011071679 W CN2011071679 W CN 2011071679W WO 2011110096 A1 WO2011110096 A1 WO 2011110096A1
Authority
WO
WIPO (PCT)
Prior art keywords
router
address
data
switch
signature
Prior art date
Application number
PCT/CN2011/071679
Other languages
French (fr)
Chinese (zh)
Inventor
谢建平
南湘浩
林肇
程晓卫
陈六广
Original Assignee
上海通用化工技术研究所
北京易恒信认证科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海通用化工技术研究所, 北京易恒信认证科技有限公司 filed Critical 上海通用化工技术研究所
Publication of WO2011110096A1 publication Critical patent/WO2011110096A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Definitions

  • the present invention relates to a communication connection technology, and more particularly to a communication method and apparatus for implementing a trusted network connection through a router or a switch. Background technique
  • Internet information network security technology is an important measure for computer Internet information units and networked units to protect the Internet and its own safe production, and prevent illegal elements from using the Internet to carry out sabotage activities and disseminate harmful information.
  • Traditional Internet information network security technologies generally have two categories: log auditing and anti-virus and anti-hacking techniques.
  • the Internet log auditing measures are the cornerstone for maintaining the Internet and information security, and are an important basis for public security organs to combat computer crime.
  • the Internet access unit shall provide the network topology and IP address and allocation usage.
  • the log audit focuses on the system clock and operating system logs.
  • the technical indicators mainly include: system startup time, user login account number, login time, user operation, shutdown time, and so on.
  • For each network connection record the source IP address of the connection, the IP address of the destination machine, the time of the connection, and the protocol used.
  • the log auditing system uses products that have passed the test of the public security organs. ISPs and ICP units with strong technical strength can develop their own products.
  • Anti-virus and anti-hacking technical measures are to prevent criminals from using the Internet to carry out sabotage activities and to protect the information security of the Internet and their own units. All units should develop the following security measures for anti-virus and anti-hacker attacks:
  • All computers connected to the Internet should use anti-virus products that have passed the test by the public security organs and regularly download virus signatures to upgrade the anti-virus software to ensure that the computer will not be attacked by the discovered viruses.
  • the networked unit should use firewall, IDS and other equipment to protect the network security.
  • An object of the present invention is to solve the above problems and to provide a method for implementing a trusted network connection through a router or a switch, which can prevent unauthorized access.
  • Another object of the present invention is to provide a device for implementing a trusted network connection, which can prevent illegal access of DOS attacks, prevent resend attacks, prevent malware such as Trojans, and ensure the privacy of routes.
  • the technical solution of the present invention is:
  • the present invention discloses a method for implementing a trusted network connection through a router or a switch, which implements a trusted network connection between network devices of a router or a switch and a network terminal, in a router or a switch.
  • the network device uses the source IP address or the destination IP address in the header, the source hardware address or the destination hardware address, all or part of the specified or randomly defined numbers and characters to be parallel or superimposed as the identifier for mutual signature authentication, in the networked computer Parallel or superimposed as the identification of each other in the header or source IP address, source hardware address or destination hardware address, specified or randomly defined numbers and characters in the header, the method includes:
  • Source and destination computers, routers, or switches all have numeric or character-defined router or switch hardware addresses, IP addresses, specified or randomly defined numbers and characters, computer hardware addresses, IP addresses, specified or randomly defined numbers and characters Provides accurate time proof in whole or in part, and verifies that the time proof has been modified, combined with hardware address, IP address, specified or randomly generated Digitally sign all or part of the digital and character data and generate a time certificate, a lifetime certificate and a hardware address, an IP address, a specified or randomly generated number and all or part of the data of the character for parallel or superimposed hybrid signatures, Delivered to the next hop router or switch along with the data;
  • the router or switch checks the time certificate of the networked computer, the lifetime certificate and hardware address, the IP address, the data signature of the specified or randomly generated numbers and characters, and receives and forwards the data if the verification passes, otherwise discards or data annihilates ;
  • Router or switch for hardware address, IP address, specified or randomly defined numbers and characters, networked computer source hardware address, IP address, specified or randomly defined numbers and characters, all or part of the exact time, lifetime certificate and encryption Or non-encrypted checksum, CPK check authentication data, CA-certified verification authentication data for digital signature, generate time certificate, validity period proof signature and checksum, CPK signature, CA authentication for parallel or superimposed hybrid signature, And handed over to the next hop router along with the forwarding data;
  • the router or switch verifies the signature of the previous hop router or switch.
  • the signature verification is performed step by step. Each layer performs signature verification on the upper layer.
  • the router or switch needs to sign the corresponding object of this layer, and also passes different IP versions.
  • the protocol tunneling route or protocol conversion software or computer of different IP versions sends the signature verification to the destination router or switch to ensure its authenticity. If the verification passes, the forwarding data is forwarded to the next hop router or switch to the destination router. Or switch;
  • the signature verification operation is performed.
  • the destination router or switch decrypts the verified parallel or superimposed mixed signature data into the designed received data, the destination packet is forwarded to the destination computer.
  • the IP address is an address of a plurality of version IP protocols.
  • all or a portion of the designated or randomly defined numbers and characters are mutually authenticated as an identity.
  • a method of implementing a trusted network connection by a router or switch the hardware address is a multi-defined hardware address.
  • An embodiment of a method for implementing a trusted network connection by a router or switch in accordance with the present invention a source or destination networked computer, router or switch defining a router or switch for numbers and characters Hardware address, IP address, specified or randomly defined numbers and characters, source or destination of the networked computer's source hardware address, IP address, specified or randomly defined numbers and characters, all or part of which provide accurate time proof and expiration date And verify that the time certificate and validity period have been modified, the accurate time proof, and verify that the time certificate and validity period have been modified by the digital signature and the verification of the digital signature result is specified or randomly generated All or part of the hardware address, IP address, specified or randomly generated numbers and characters are digitally parallel or superimposed with a mixed signature.
  • the source address and the destination address or the verification content of the additional information are added to the IP header, and the originating router, the transit router, and the destination router are configured for each IP.
  • the header is tested to provide proof of authenticity of the address or additional information.
  • all signatures are stored in an IP header.
  • the present invention also discloses an apparatus for implementing a trusted network connection, including: preventing an illegal access module from determining whether the pair is verified by digital parallel or superimposed hybrid signature in the original IP address header when receiving the forwarded data. Forward data for reception to prevent illegal access;
  • the retransmission attack module Prevent the retransmission attack module from preventing retransmission attacks by the IP address of the connected digital parallel or superimposed hybrid signature and the freshness proof of the time validity period of the signature;
  • the router and switch connected by the trusted network perform digital parallel or superimposed hybrid signature on the router and the switch. If the network data carrying the Trojan is not signed, the destination computer cannot be reached, and the credibility of the routing operation environment is adopted. Prevent Trojan intrusion from non-forwarding destination computers;
  • the de-encryption module ensures the privacy of the route by de-encrypting the forwarded data.
  • An embodiment of an apparatus for implementing a trusted network connection in accordance with the present invention is a switch of a router or circuit network of an IP network.
  • the present invention has the following beneficial effects:
  • the present invention verifies the original address and the destination address by extending the existing IP header on the router, thereby providing the address authenticity certificate and the address lifetime certificate, and preventing the DOS attack.
  • Illegal access provide this connection freshness proof, in routing Prevent resend attacks on the device;
  • Figure 1 is a flow diagram of an embodiment of a method of implementing a trusted network connection by a router or switch of the present invention.
  • FIGS. 2A to 2B are diagrams showing the format of the IPV4 header of the present invention.
  • FIG. 3 is a schematic diagram of an IPV6, IPV9 header format of the present invention.
  • FIG. 4 is a schematic diagram of an embodiment of an apparatus for implementing a trusted network connection of the present invention.
  • FIG. 5 is a schematic illustration of the trusted routing of the present invention compatible with current V4/V6 and future operating modes of the new protocol. Detailed description of the invention
  • Routers in information networks are the basic components of the Internet.
  • This scheme adopts the identification authentication technology for the first time in the router design, providing address authenticity proof and lifetime time proof to prevent illegal access; providing this connection freshness proof to prevent retransmission attacks; first adopting software or hardware
  • the identification authentication technology provides the credibility of the router operating environment and prevents malware such as Trojans from intruding.
  • This design also provides encryption and encryption to ensure privacy. This is a key security requirement for next-generation Internet protocols and future network protocols.
  • This design approach combines new addressing technologies with geolocation addressing to build routers for the next generation of the Internet. This technology is also used in the design of new switches in telecommunications networks.
  • the router works in the network layer of the 0SI seven-layer protocol. Its main function is to connect the network and the network, and forward the data packets between the networks. Routers have become the most important network equipment, so the research of next-generation routers will become the core technology of future Internet research. Due to the IPv4 and IPv6 protocols that the Internet has been running, it does not meet the new requirements for Cyber Security trusted network connections. The TCP/IP protocol does not consider security issues, does not provide proof of address authenticity and lifetime credentials, does not prevent illegal access, and does not resist DOS attacks. Currently, all kinds of malware and spam are rampant on the Internet, serious The environment in which the Internet is polluted directly affects the survival of the Internet. Therefore, countries have carried out research on the future Internet.
  • China has not formally proposed a future Internet plan, but the work is quietly carried out.
  • China's IPv9 has implemented a geographical location addressing method, which solves the problem of real-name address combining IP address and geographic location.
  • South Korea also proposed the idea of geographical location and addressing, becoming the second country to propose a new addressing method.
  • the CPK logo authentication technology is mature and can be used in Internet protocols to implement trusted network connections.
  • Figure 1 shows the flow of this method.
  • a user name for example, pel in FIG. 1
  • a routing address for example, router alf in FIG. 1
  • the IP addresses are used as the identifiers for mutual authentication, and the users are authenticated by the user name as the identifier.
  • the pcl ID is the username of a client
  • AlfalD is the IP address of a router
  • PC1 and ALFA represent their respective public keys (uppercase)
  • pel and alfa represent their respective private keys (lowercase).
  • any router inserts a CPK-card defined as AlfalD, and the router becomes a router identified as BetalD.
  • Mf a ID "China, Beijing, Haidian, Peking University”
  • BetaID “China, Beijing, Haidian, Tsinghua University”.
  • the connection process is shown in Figure 1.
  • the dotted line indicates the path of the packet data using the user Pcl ID to the user Pc2ID via the router.
  • Each router will verify the original address ( The original address in this embodiment is the AlfalDo in Figure 1.
  • the user Pc2ID to authenticate the Pcl ID it belongs to the transaction authentication, and can only be opened after the data packet is opened, which is the task of the user layer.
  • the IP packet of the departure router passes through multiple transit routers (also known as transit routers) and finally reaches the destination router. It is easy to illegally access in the intermediate transit router. Traditional routers only focus on the next hop routing, and don't care where this packet comes from.
  • the router in this embodiment must satisfy the following four conditions: (1) The originating address must give a proof of the sending address, which can be any place. To verify; (2) all path routers verify the original address, if they do not match, refuse to forward; (3) can prevent illegal access, resist DOS attacks; (4) the computing environment inside the router is trusted.
  • the dotted line in Figure 1 indicates that the CPK-card is used and the primary address authentication is performed.
  • Path 1 The following steps are all based on the IPV9 protocol and CPK-card:
  • the client Pel ID signs the time and MAC, and delivers the signature data to the router AlfaID.
  • the router AlfalD checks the time signature and MAC signature of the client Pel ID, and if the authentication passes, it receives, otherwise it rejects.
  • the router AlfalD signs the time, checksum, and forwards it to the next router.
  • routing operations such as GamID, LamID, and BetalD are the same as those of the router AlfalD. That is: the next router verifies the original address signature and the signature of the previous router, and if the verification passes, the data data is forwarded to the next router.
  • the destination router BetalD forwards the data data to the receiving user Pc2ID.
  • Path 2 In the following steps, the client uses the IPV9 protocol but does not use CPK-card:
  • the user Pc3ID does not use the CPK-card but passes the PT conversion (protocol conversion router) to the IPV9 protocol.
  • the data is sent to the user Pc4ID via the router AlfalD.
  • the router AlfalD obtains the source address of the packet as the public key, and verifies the correctness of the source. If the illegal address is found, the data is discarded.
  • Path 3 In the following steps, the client does not use the IPV9 protocol and does not use CPK-card:
  • the user Pc3ID does not use the CPK-card and uses the IPV4/IPV6 protocol to send data to the user Pc4ID via the router AlfalD.
  • the router DeltalD and SigID arrive at the router BetalD and forward the data to the user Pc4ID.
  • Path 4 In the following steps, the client adopts the IPV9 protocol and uses the CPK-card, but the intermediate IPV9 route does not use the CPK-card:
  • the user Pel ID is signed using the local address as the public key, and the data is sent to the user Pc2ID via the router AlfalD.
  • the router AlfalD obtains the source address of the packet as the public key and verifies the correctness of the source. If an illegal address is encountered, the data is discarded. After the source address is verified correctly, the original signature is removed and the local address is used as the public key signature. After the signature, normal routing data is forwarded.
  • the routing GamID does not use the CPK-card, obtain the source address of the data packet as the public key, and verify If the source is correct, the data is discarded if an illegal address is encountered. If it is normal, the normal routing data is forwarded.
  • routers such as LamID and BetalD are the same as above.
  • the router BetelD forwards the data to the destination user Pc2 ID.
  • IPV4/IPV6 protocol The working mode of the IPV4/IPV6 protocol is shown in Figure 5.
  • a new IP header format is required.
  • the header includes at least a source address, a transmission time, an address-to-time signature, a destination address, and an address-to-checksum signature (ie, an authentication code).
  • the signature of the address to the checksum (called the authentication code) can be included in the header format or placed after the data.
  • Data encryption only affects the data format and does not affect the IP header format.
  • the header format of IPV4 can be changed, wherein the insertion point of time and the authentication code can be changed, and thus has two formats as shown in Figs. 2A and 2B, and the header format of IPV9 is as shown in Fig. 3.
  • the router needs to be configured with a CPK-card (or a signature algorithm using a similar mechanism and corresponding hardware, exemplified by CPK below), so that it has a digital signature and a key exchange function.
  • CPK CPK-card
  • the CPK system is used to identify the originating address. Assume that the origin is AlfalD, the next router is GammalD, and AlfalD sends data data.
  • the application format is:
  • BetalD is the destination address
  • SIG is the signature function
  • alfa is the signature private key, provided by CPK-card.
  • data is data, from the application layer, data may be plain text, or cipher text. The task of the router is to pass data to the next router.
  • the router encryption and decryption process is as follows.
  • the structure of the data data is defined as follows: Data: ⁇ PcHD, Pc2ID, data, mac ⁇ , where PcHD is the sender and Pc2ID is the receiver.
  • Pc2ID is the username
  • clear-text is the plaintext content
  • mac is the mac address of the router.
  • Data ⁇ Pcl lD, Pc2ID, coded-key, coded-data, mac ⁇ , where coded-key is the password, coded-data is the encrypted content, and mac is the mac address of the router.
  • the encryption function is provided by the router, set Alfa encryption, Beta decryption, then data encryption It can only be done offline, so encryption can only be done with a system key.
  • E key (data) cipher-text
  • E key ( ) is the data encryption function.
  • BetalD When BetalD receives the signal from AlfalD, it automatically enters the de-binding process:
  • BetalD calculates the inverse of the private key: beta- 1
  • D key (cipher-text) data, where D key ( ) is a de-cixing function.
  • the first is the proof of the software code - the manufacturer has a CPK-card that can be used to sign the manufacturer of all system software in the router.
  • the execution software is divided into software identification (codelD) and software ontology (codeBD), which are signed by the manufacturer:
  • SIG is the signature function
  • manufacturer is the private key of the manufacturer
  • codelD is the execution code name
  • codeBD is the HASH value of the execution code ontology. Any execution code in the router has its own proofs sign1 and sign2.
  • the router inserts the CPK-card to have CPK authentication.
  • the TCP/IP protocol does not guarantee a trusted network connection and must be modified.
  • three key technologies for trusted network connection are proposed: a mechanism capable of identifying addresses to prevent illegal connections; a random question and answer mechanism to prevent repeated attacks; The code can identify the mechanism to prevent viruses and Trojans from intruding.
  • the above design method is fully applicable to the trusted network connection of the physical layer.
  • the second is the physical layer defined in the telecommunication network, and the platform supporting the telecommunication network is the information reference point (TRP).
  • TRP information reference point
  • the network layer can guarantee the credibility of the transmission, the security of the physical layer can be replaced by the network layer, and there is no need to work on the physical layer.
  • the physical layer in the telecommunication network cannot be connected to the trusted network without being modified, and the illegal access cannot be prevented.
  • the modification method is exactly the same as that of the router.
  • the method for implementing trusted network connection by signature verification of a router or a switch of the present invention is to implement a trusted network connection between network devices of a router or a switch and a network terminal, and between network devices of a router or a switch
  • the source IP address or destination IP address in the header both source IP address and destination IP address are present in the packet
  • source hardware address or destination hardware address specified or randomly defined numbers and characters are all parallel or superimposed
  • identification mutual signature authentication also known as identification mutual authentication
  • identification mutual authentication also known as identification mutual authentication
  • This method includes the following steps:
  • the source computer and the destination computer, router or switch both define the router or switch hardware address for the number and characters (the hardware address can also be a multi-defined hardware address), IP address (these IP addresses are multiple versions of the IP protocol) Address, specified or randomly defined numbers and characters, computer hardware address, IP address, specified or randomly defined numbers and characters, all or part of which provide accurate proof of time And proof of lifetime, and verify that its time certificate and lifetime certificate have been modified, and digitally signed in combination with hardware addresses, IP addresses, specified or randomly generated numbers and character data (all in the present invention)
  • the signatures are stored in the IP header) and generate time proofs, lifetime certificate signatures and hardware addresses, IP addresses, specified or randomly generated numbers and all or part of the data for parallel or overlay mixed signatures, along with the data Hand over to the next hop router or switch.
  • the router or switch checks the time certificate of the networked computer, the lifetime certificate and hardware address, the IP address, the data signature of the specified or randomly generated numbers and characters, and receives and forwards the data if the verification passes, otherwise discards Or the data is annihilated.
  • the router or switch has a hardware address, an IP address, a specified or randomly defined number and character, a source computer address of a networked computer, an IP address, a specified or randomly defined number and all or part of the exact time, lifetime Proof and encrypted or non-encrypted checksum (derived by the built-in algorithm of the router and client), CPK verification and authentication data, CA-certified verification and authentication data for digital signature, generation of time certificate, proof of validity and verification of validity Parallel or superimposed hybrid signatures with CPK signatures and CA certificates are sent to the next hop router along with the forwarding data. If not, the data is annihilated.
  • the router or switch verifies the signature of the previous hop router or switch.
  • the signature verification is performed step by step.
  • Each layer performs signature verification on the upper layer.
  • the router or switch needs to sign the corresponding object of this layer.
  • Different IP versions of protocol tunnel routing or protocol conversion software or computers of different IP versions send signature verification to the destination router or switch to ensure their authenticity. If the verification passes, the forwarding data is forwarded to the next hop router or switch. Until the destination router or switch (the router needs to sign the corresponding object of this layer to ensure its authenticity).
  • the signature verification will be performed.
  • the destination router or switch decrypts the data that has been verified to pass parallel or superimposed mixed signatures into the designed received data, and then forwards the data packet to the destination. computer.
  • Routers in information networks are the basic components of the Internet.
  • This scheme adopts the identification authentication technology for the first time in the design of the router, and provides the authenticity of the address to prevent illegal access.
  • the first use of the question and answer technology of "random questioning and one signature answer" provides the certificate of freshness of this connection, preventing heavy Attacks;
  • the first use of software identification authentication technology to provide credibility of the router operating environment to prevent intrusion of malware and other malware.
  • This design also provides encryption and encryption to ensure privacy. This is a key security requirement for a new generation of Internet protocols or the future of the Internet.
  • This design method Combine with the new addressing technology of geolocation addressing to build routers for the next generation of the Internet or the future of the Internet.
  • the router accepts packets from a network interface and forwards them to the next destination address.
  • the destination address is provided by the routing table. If the destination address is found, the next MAC address is added before the frame of the packet, and the TTL (time to ive) field of the IP header begins to be decremented, and the checksum is recalculated.
  • the router decomposes the larger data into packets of the appropriate size according to predetermined rules, and then sends the packets through the same and different paths. When these packets arrive at the destination in order, they are restored to the original data format in a certain order.
  • the router runs the corresponding link layer function module, interprets the link layer protocol header of the data packet, and performs data integrity verification, including CRC check and frame length check. .
  • the IP data packet is sent to the corresponding output link layer, encapsulated into a corresponding link layer header, and sent out through the network physical interface.
  • the router 1 implementing the trusted network connection is composed of four modules: an illegal access module 10, a retransmission attack prevention module 12, a Trojan intrusion prevention module 14, and a de-encryption module 16.
  • the illegal access module 10 is prevented from receiving the forwarded data by verifying the digital parallel or superimposed hybrid signature in the original IP address header when receiving the forwarded data to prevent illegal access.
  • the Trojan intrusion prevention module 14 the Trojan intrusion module is prevented, the router and the switch connected by the trusted network perform digital parallel or superimposed hybrid signature on the router and the switch, and if the network data carrying the Trojan is not signed, the destination computer cannot be reached. Routing operation Environmental credibility prevents Trojan intrusion from non-forwarding destination computers.
  • the de-encryption module 16 ensures routing privacy by de-encrypting (ie, decrypting) the forwarding data.
  • the internal structure of the router of the above embodiment may also be the internal structure of the switch.
  • the IP address is used as the identifier of the router, and the guarantee is unique.
  • Alfa be the IP address of a router
  • Beta be the IP address of another router. If a CPK-card defined as Alfa is inserted on any router, then the router becomes the router identified as Alfa. Similarly, any router inserts a CPK-card defined as Beta, and the router becomes a router identified as Beta.
  • Alfa "China Beijing Haidian-Peking University”
  • Beta “China-Beijing-Haidian-Tsinghua University”.
  • the IP packet of the departure router passes through multiple transit routers and finally reaches the destination router. It is easy to illegally access the intermediate transit router. Beta may not know where the accessed data packet comes from, and thus A proof of the departure address and a problem with the place of delivery were generated. The proof of departure can be verified at any forwarding address, but this authentication is redundant, and it can be done at the same time when processing the data data on the destination router, because the authenticity of the two ends must be proved in each hop forwarding. . As can be seen from the working principle of the above router, the previous router only pays attention to the routing of the next hop, and does not care where the data packet comes from. Therefore, if the verification of the sending address is not resolved, the illegal access cannot be overcome.
  • Beta is the recipient, and its public key is public.
  • the router For the anti-illegal access module 10, the router must satisfy: (1) The originating address must be given a proof of the sending address, which can be verified by any place; (2) All path routers verify the original address, if not Then refuse to forward; (3) can prevent illegal access, resist DOS attacks; (4) the computing environment inside the router is trusted.
  • the anti-illegal access module 10 implements the following steps - first, the client Pel ID signs the time and MAC, and delivers the signature data to the router AlfaID. Second, the router AlfalD checks the time signature and MAC signature of the client Pel ID, and if the authentication passes, it receives, otherwise it rejects.
  • the router AlfalD signs the time, checksum, and forwards it to the next router.
  • next router verifies the signature of the originating address and the signature of the previous router. If the verification passes, the data is forwarded to the next router.
  • the destination router BetalD forwards the data data to the receiving user Pc2ID.
  • Verification can (time) sign, indicating.
  • the router is configured with CPK-card to have digital signature and key exchange functions.
  • the contents of CPK-card are as follows: Set the IP address of the router to alfa (Alfa may be the real name of China, Beijing, Haidian, Peking University, etc. Become the code executable by the machine). Take the ID-card of the router alfa as an example.
  • the content is as follows:
  • the sending address is Alfa
  • the receiving address is Gamma
  • the public key of AlfalD is ALFA
  • the private key is alfa.
  • the connection request is issued by Alfa
  • the application format is Msg1:
  • AlfalD is the sending address
  • the destination address of BetalD T is the time
  • signl is the signature of the sender Alfa on time
  • SP: SlG (T) sign1
  • SIG is the signature function
  • SIG_ 1 is a validation function.
  • Sign1 sign1 '
  • Msg3 Alfa ⁇ Gamma, ⁇ sign3, data, sign4,sign5 ⁇
  • Msg2 Gamma ⁇ Alfa, ⁇ r, sign2 ⁇
  • Msg3i Alfa ⁇ Gamma, ⁇ sigr ⁇ , data! , sign sigr ⁇
  • Msg3 2 Alfa ⁇ Gamma, ⁇ data 2 , sign4 2 sign5 2 , ⁇
  • Msg3 3 Alfa ⁇ Gamma, ⁇ data 3 , sign4 3 , sign5 3 ⁇
  • connection process When the connection process is completed, the next hop connection process is entered, and the sender becomes the sender via the address Gamma, and becomes the receiver via the address Lamda.
  • the router forwards and hops, and finally to the terminal router. At this point, all connections to each path are proven. Destination Address Beta last processed data.
  • Beta believes that the sender is Alfa and enters the densification process.
  • Alfa encryption and Beta de-binding are used. Since the communication between Alfa and Beta is multi-hop communication, the encryption can only be implemented by using the split key of CPK, and the key pool size is regarded as Depending on the situation.
  • D new-key (coded-data) data;
  • the present invention provides an extension of the existing IP header on the router to verify the original address and the destination address, thereby providing Proof of address authenticity and lifetime, prevent illegal access by DOS attack; Provide proof of freshness and lifetime of this connection, prevent retransmission attacks on the router; Provide credibility of routing operation environment, prevent Trojans on the router, etc. Malware intrusion; add de-encryption on the router to ensure the privacy of the route, for units, institutions or departments with confidentiality or security needs.
  • the above embodiments are provided to enable a person skilled in the art to implement or use the present invention, and those skilled in the art can make various modifications or changes to the above embodiments without departing from the inventive concept.
  • the scope of protection of the invention is not limited by the embodiments described above, but should be the maximum range of the innovative features mentioned in the claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention discloses a method and device for realizing trusted network connection through a router or a switch, which prevent invalid access of DOS attack, relay attack and invasion of Trojan horse and other malicious software and guarantee routing privacy. The technical solution of the invention is that: through extension of the existed IP header at the router, a source address and a destination address are verified, thereby address authenticity certification and address lifetime certification are provided, and the invalid access of the DOS attack is prevented; the freshness certification of the current connection is provided to prevent the relay attack on the router; the credibility of the routing operating environment is provided to prevent the invasion of the Trojan horse and other malicious software on the router; and the decryption function is added to the router to guarantee the routing privacy. The method and the device are used in the offices, organizations and departments with privacy and safety requirements.

Description

通过路由器或交换机实现可信网络连接的方法和装置  Method and apparatus for implementing trusted network connection through a router or switch
发明领域  Field of invention
本发明涉及一种通信连接技术, 尤其涉及一种通过路由器或交换机实现可 信网络连接的通信方法和装置。 背景技术  The present invention relates to a communication connection technology, and more particularly to a communication method and apparatus for implementing a trusted network connection through a router or a switch. Background technique
实施互联网信息网络安全技术是各计算机互联网信息单位和联网单位切 实保护互联网和自身安全生产, 防止不法分子利用互联网络进行破坏活动、 传 播有害信息的重要措施。 传统的互联网信息网络安全技术一般有日志审计和防 病毒、 防黑客攻击技术两大类。  The implementation of Internet information network security technology is an important measure for computer Internet information units and networked units to protect the Internet and its own safe production, and prevent illegal elements from using the Internet to carry out sabotage activities and disseminate harmful information. Traditional Internet information network security technologies generally have two categories: log auditing and anti-virus and anti-hacking techniques.
互联网日志审计措施是维护互联网络和信息安全的基石, 是公安机关打击 计算机犯罪的重要依据。互联网接入单位应提供网络拓扑结构和 IP地址及分配 使用情况。 在计算机主机、 网关和防火墙上建立完备的日志审计记录。 日志审 计重点考虑系统吋钟和操作系统日志,其技术指标主要包括:系统的启动时间、 用户登陆帐号、 登陆时间、 用户进行的操作、 关机时间等。 对每一次网络连接 应记录连接的源 IP地址、 目的机器 IP地址、 连接的时间、 使用的协议等信息。 日志审计系统原则上使用经公安机关检测合格的产品, 技术实力较强的 ISP、 ICP单位可以自己开发相应的产品。  Internet log auditing measures are the cornerstone for maintaining the Internet and information security, and are an important basis for public security organs to combat computer crime. The Internet access unit shall provide the network topology and IP address and allocation usage. Establish a complete log audit record on the host computer, gateway, and firewall. The log audit focuses on the system clock and operating system logs. The technical indicators mainly include: system startup time, user login account number, login time, user operation, shutdown time, and so on. For each network connection, record the source IP address of the connection, the IP address of the destination machine, the time of the connection, and the protocol used. In principle, the log auditing system uses products that have passed the test of the public security organs. ISPs and ICP units with strong technical strength can develop their own products.
防病毒、 防黑客攻击技术措施是防止不法分子利用互联网络进行破坏活 动, 保护互联网络和本单位的信息安全的需要。 各单位应制定以下防病毒、 防 黑客攻击的安全技术措施:  Anti-virus and anti-hacking technical measures are to prevent criminals from using the Internet to carry out sabotage activities and to protect the information security of the Internet and their own units. All units should develop the following security measures for anti-virus and anti-hacker attacks:
1、 所有接入互联网的计算机应使用经公安机关检测合格的防病毒产品并 定期下载病毒特征码对杀毒软件升级, 确保计算机不会受到已发现的病毒的攻 击。  1. All computers connected to the Internet should use anti-virus products that have passed the test by the public security organs and regularly download virus signatures to upgrade the anti-virus software to ensure that the computer will not be attacked by the discovered viruses.
2、 确保物理网络安全, 防范因为物理介质、 信号辐射等造成的安全风险。 2. Ensure physical network security and prevent security risks caused by physical media, signal radiation, etc.
3、采用网络安全控制技术, 联网单位应采用防火墙、 IDS等设备对网络安 全进行防护。 3. Using network security control technology, the networked unit should use firewall, IDS and other equipment to protect the network security.
4、 制订系统安全技术措施, 使用漏洞扫描软件扫描系统漏洞, 关闭不必 要的服务端口。 5、 制订口令管理制度, 防止系统口令泄露和被暴力破解。 4. Develop system security technical measures, use vulnerability scanning software to scan for system vulnerabilities, and close unnecessary service ports. 5. Develop a password management system to prevent system passwords from being leaked and hacked.
6、 制定系统补丁的管理制度, 确定系统补丁的更新、 安装、 发布措施, 及时堵住系统漏洞。  6. Develop a system patch management system, determine system patch updates, installations, and release measures to block system vulnerabilities in a timely manner.
综上, 目前现有的网络安全技术大多是使用硬件和软件类的防火墙或杀毒 软件以及常规的安全技术来保障网络安全, 不能起到根本的控制作用且增加成 本。很多防杀木马病毒软件及防火墙是建立在交换机、终端计算机等设备上的, 不能从源头控制木马的攻击和信息的安全性。  In summary, most of the existing network security technologies use hardware and software firewalls or anti-virus software and conventional security technologies to ensure network security, which cannot fundamentally control and increase costs. Many anti-killing Trojans software and firewalls are built on switches, terminal computers, etc., and cannot control the security of Trojan attacks and information from the source.
而以往的路由器只注重下一跳的路由, 并不关心本数据包从何而来也不关 注数据包的生存期和新鲜性。 因此如果不解决数据包出发地址的验证和数据包 的生存期和新鲜性,就无法克服黑客或木马病毒的非法接入和攻击,造成个人、 企业、 保密单位等的网络不安全。 发明概述  In the past, routers only focused on the routing of the next hop, and did not care about where the packet came from or the lifetime and freshness of the packet. Therefore, if the verification of the starting address of the data packet and the lifetime and freshness of the data packet are not solved, the illegal access and attack by the hacker or the Trojan virus cannot be overcome, and the network of the individual, the enterprise, the security unit, and the like is insecure. Summary of invention
本发明的目的是解决上述问题, 提供了一种通过路由器或交换机实现可信 网络连接的方法, 能够防止非法接入。  SUMMARY OF THE INVENTION An object of the present invention is to solve the above problems and to provide a method for implementing a trusted network connection through a router or a switch, which can prevent unauthorized access.
本发明的另一目的在于提供了一种实现可信网络连接的装置, 能够防止 DOS攻击的非法接入, 防止重发攻击、 防止木马等恶意软件的侵扰以及可保证 路由的私密性。  Another object of the present invention is to provide a device for implementing a trusted network connection, which can prevent illegal access of DOS attacks, prevent resend attacks, prevent malware such as Trojans, and ensure the privacy of routes.
本发明的技术方案为: 本发明揭示了一种通过路由器或交换机实现可信网 络连接的方法, 实现路由器或交换机的网络设备之间和网络终端之间的可信网 络连接, 在路由器或交换机的网络设备之间以报头中的源 IP地址或目的 IP地 址、 源硬件地址或目的硬件地址、 指定或随机定义的数字和字符的全部或部分 进行平行或叠加作为标识互相签名认证, 在联网计算机之间以报头中的源 ip地 址或目的 IP地址、 源硬件地址或目的硬件地址、 指定或随机定义的数字和字符 的全部或部分进行平行或叠加作为标识互相签名认证, 该方法包括:  The technical solution of the present invention is: The present invention discloses a method for implementing a trusted network connection through a router or a switch, which implements a trusted network connection between network devices of a router or a switch and a network terminal, in a router or a switch. The network device uses the source IP address or the destination IP address in the header, the source hardware address or the destination hardware address, all or part of the specified or randomly defined numbers and characters to be parallel or superimposed as the identifier for mutual signature authentication, in the networked computer Parallel or superimposed as the identification of each other in the header or source IP address, source hardware address or destination hardware address, specified or randomly defined numbers and characters in the header, the method includes:
源计算机和目的计算机、 路由器或交换机都对数字和字符定义的路由器或 交换机硬件地址、 IP地址、指定或随机定义的数字和字符、计算机的硬件地址、 IP地址、 指定或随机定义的数字和字符的全部或部分提供准确的时间证明, 并 验证其时间证明是否被修改过, 并结合硬件地址、 IP地址、 指定或随机产生的 数字和字符数据的全部或部份进行数字签名并生成时间证明、 生存期证明签名 和硬件地址、 IP地址、 指定或随机产生的数字和字符的全部或部分数据进行平 行或叠加混合签名, 将其连同数据一起交给下一跳路由器或交换机; Source and destination computers, routers, or switches all have numeric or character-defined router or switch hardware addresses, IP addresses, specified or randomly defined numbers and characters, computer hardware addresses, IP addresses, specified or randomly defined numbers and characters Provides accurate time proof in whole or in part, and verifies that the time proof has been modified, combined with hardware address, IP address, specified or randomly generated Digitally sign all or part of the digital and character data and generate a time certificate, a lifetime certificate and a hardware address, an IP address, a specified or randomly generated number and all or part of the data of the character for parallel or superimposed hybrid signatures, Delivered to the next hop router or switch along with the data;
路由器或交换机对联网计算机的时间证明、 生存期证明签名和硬件地址、 IP地址、 指定或随机产生的数字和字符的数据签名进行检査, 如果验证通过则 接收并转发数据, 否则丢弃或数据湮灭;  The router or switch checks the time certificate of the networked computer, the lifetime certificate and hardware address, the IP address, the data signature of the specified or randomly generated numbers and characters, and receives and forwards the data if the verification passes, otherwise discards or data annihilates ;
路由器或交换机对硬件地址、 IP地址、 指定或随机定义的数字和字符、 联 网计算机的源硬件地址、 IP地址、 指定或随机定义的数字和字符的全部或部分 准确的时间、 生存期证明和加密或非加密的校验和、 CPK校验认证数据、 CA认 证的校验认证数据进行数字签名,生成时间证明、有效期的证明签名和校验和、 CPK签名、 CA认证进行平行或叠加混合签名, 并连同转发数据一起交给下一跳 路由器;  Router or switch for hardware address, IP address, specified or randomly defined numbers and characters, networked computer source hardware address, IP address, specified or randomly defined numbers and characters, all or part of the exact time, lifetime certificate and encryption Or non-encrypted checksum, CPK check authentication data, CA-certified verification authentication data for digital signature, generate time certificate, validity period proof signature and checksum, CPK signature, CA authentication for parallel or superimposed hybrid signature, And handed over to the next hop router along with the forwarding data;
路由器或交换机验证上一跳路由器或交换机的相关签名, 其中签名验证是 逐级展开的, 每一层都对上层进行签名验证,同时路由器或交换机需要对本层 相应对象进行签名, 也通过不同 IP版本的协议隧道路由或不同 IP版本的协议转 换软件或计算机将签名验证送至目的路由器或交换机, 来保证自己的真实性, 如果验证通过, 则将转发数据交给下一跳路由器或交换机直至目的路由器或交 换机;  The router or switch verifies the signature of the previous hop router or switch. The signature verification is performed step by step. Each layer performs signature verification on the upper layer. At the same time, the router or switch needs to sign the corresponding object of this layer, and also passes different IP versions. The protocol tunneling route or protocol conversion software or computer of different IP versions sends the signature verification to the destination router or switch to ensure its authenticity. If the verification passes, the forwarding data is forwarded to the next hop router or switch to the destination router. Or switch;
在转发数据到达目的路由器或交换机后, 将进行签名验证工作, 目的路由 器或交换机将经过验证通过的进行平行或叠加混合签名的数据解密成符合设 计的接收数据后, 转发数据包至目的计算机。  After the forwarding data arrives at the destination router or switch, the signature verification operation is performed. After the destination router or switch decrypts the verified parallel or superimposed mixed signature data into the designed received data, the destination packet is forwarded to the destination computer.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 该 IP地址是多个版本 IP协议的地址。  In accordance with an embodiment of the present invention, a method of implementing a trusted network connection by a router or switch, the IP address is an address of a plurality of version IP protocols.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 指定或随机定义的数字和字符的全部或部份作为标识互相认证。  In accordance with an embodiment of the method of implementing a trusted network connection by a router or switch in accordance with the present invention, all or a portion of the designated or randomly defined numbers and characters are mutually authenticated as an identity.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 该硬件地址是多定义的硬件地址。  In accordance with an embodiment of the present invention, a method of implementing a trusted network connection by a router or switch, the hardware address is a multi-defined hardware address.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 源或目的地的联网计算机、 路由器或交换机对数字和字符定义路由器或交换机 的硬件地址、 IP地址、 指定或随机定义的数字和字符、 源或目的地的联网计算 机的源硬件地址、 IP地址、 指定或随机定义的数字和字符的全部或部分提供准 确的时间证明和有效期, 并验证其时间证明和有效期是否曾被人修改过, 准确 的时间证明, 并验证其时间证明和有效期是否曾被人修改过的数字签名和对数 字签名结果的验证是通过指定或随机产生的硬件地址、 IP地址、 指定或随机产 生的数字和字符等数据的全部或部份进行数字平行或叠加混合签名来实现的。 An embodiment of a method for implementing a trusted network connection by a router or switch in accordance with the present invention, a source or destination networked computer, router or switch defining a router or switch for numbers and characters Hardware address, IP address, specified or randomly defined numbers and characters, source or destination of the networked computer's source hardware address, IP address, specified or randomly defined numbers and characters, all or part of which provide accurate time proof and expiration date And verify that the time certificate and validity period have been modified, the accurate time proof, and verify that the time certificate and validity period have been modified by the digital signature and the verification of the digital signature result is specified or randomly generated All or part of the hardware address, IP address, specified or randomly generated numbers and characters are digitally parallel or superimposed with a mixed signature.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 在 IP报头上增加源地址和目的地址或附加信息的验证内容, 出发路由器、 转接 路由器以及目的路由器对每一个 IP报头进行检验, 从而提供地址或附加信息的 真实性证明。  According to an embodiment of the method for implementing a trusted network connection by a router or a switch according to the present invention, the source address and the destination address or the verification content of the additional information are added to the IP header, and the originating router, the transit router, and the destination router are configured for each IP. The header is tested to provide proof of authenticity of the address or additional information.
根据本发明的通过路由器或交换机实现可信网络连接的方法的一实施例, 所有的签名都存入 IP报头中。  In accordance with an embodiment of the method of implementing a trusted network connection by a router or switch in accordance with the present invention, all signatures are stored in an IP header.
本发明还揭示了一种实现可信网络连接的装置, 包括- 防止非法接入模块, 在接收转发数据的时候通过对原发 IP地址报头中的数 字平行或叠加混合签名的验证来判断是否对转发数据进行接收, 以防止非法接 入;  The present invention also discloses an apparatus for implementing a trusted network connection, including: preventing an illegal access module from determining whether the pair is verified by digital parallel or superimposed hybrid signature in the original IP address header when receiving the forwarded data. Forward data for reception to prevent illegal access;
防止重发攻击模块, 通过连接的数字平行或叠加混合签名中的 IP地址及签 名的时间有效期的新鲜性证明来防止重发攻击;  Prevent the retransmission attack module from preventing retransmission attacks by the IP address of the connected digital parallel or superimposed hybrid signature and the freshness proof of the time validity period of the signature;
防止木马侵扰模块, 可信网络连接的路由器和交换机对路由器和交换机进 行数字平行或叠加混合签名, 如果携带木马程序的网络数据没有得到签名, 则 无法到达目的地计算机, 通过路由操作环境可信性防止非转发目的地计算机的 木马侵扰;  To prevent the Trojan intrusion module, the router and switch connected by the trusted network perform digital parallel or superimposed hybrid signature on the router and the switch. If the network data carrying the Trojan is not signed, the destination computer cannot be reached, and the credibility of the routing operation environment is adopted. Prevent Trojan intrusion from non-forwarding destination computers;
脱加密模块, 通过对转发数据的脱加密过程保证路由私密性。  The de-encryption module ensures the privacy of the route by de-encrypting the forwarded data.
根据本发明的实现可信网络连接的装置的一实施例, 该装置是 IP网络的路 由器或电路网络的交换机。 本发明对比现有技术有如下的有益效果: 本发明通过在路由器上对现有 IP 报头进行扩展, 对原地址和目的地址进行验证, 从而提供地址真实性证明和地 址生存期证明, 防止 DOS攻击的非法接入; 提供本次连接新鲜性证明, 在路由 器上防止重发攻击; 提供路由操作环境的可信性, 在路由器上防止木马等恶意 软件的侵扰; 在路由器上增加脱加密功能, 保证了路由的私密性, 用于有保密 或安全需要的单位、 机构或部门。 附图说明 An embodiment of an apparatus for implementing a trusted network connection in accordance with the present invention is a switch of a router or circuit network of an IP network. Compared with the prior art, the present invention has the following beneficial effects: The present invention verifies the original address and the destination address by extending the existing IP header on the router, thereby providing the address authenticity certificate and the address lifetime certificate, and preventing the DOS attack. Illegal access; provide this connection freshness proof, in routing Prevent resend attacks on the device; Provide credibility of the routing operation environment, prevent malware such as Trojans from invading the router; Add de-encryption on the router to ensure the privacy of the route, for confidentiality or security needs Unit, institution or department. DRAWINGS
图 1是本发明的通过路由器或交换机实现可信网络连接的方法的一实施例 的流程示意图。  BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a flow diagram of an embodiment of a method of implementing a trusted network connection by a router or switch of the present invention.
图 2A〜2B是本发明的 IPV4报头格式的示意图。  2A to 2B are diagrams showing the format of the IPV4 header of the present invention.
图 3是本发明的 IPV6、 IPV9报头格式的示意图。  3 is a schematic diagram of an IPV6, IPV9 header format of the present invention.
图 4是本发明的实现可信网络连接的装置的一实施例的原理图。  4 is a schematic diagram of an embodiment of an apparatus for implementing a trusted network connection of the present invention.
图 5是本发明的可信路由兼容目前 V4/V6及今后新的协议的工作模式的示 意图。 发明的详细说明  Figure 5 is a schematic illustration of the trusted routing of the present invention compatible with current V4/V6 and future operating modes of the new protocol. Detailed description of the invention
下面结合附图和下述的具体实施例对本发明作进一步的描述。 信息网络中的路由器是互联网的基本部件。 本方案在路由器设计中第一次采 用标识鉴别技术, 提供地址真实性证明和生存期时间证明, 防止非法接入; 提供本 次连接新鲜性证明, 防止重发攻击; 第一次采用软件或硬件标识鉴别技术, 提供路 由器操作环境的可信性, 防止木马等恶意软件的侵扰。 本设计还提供加脱密功能, 保证私密性。这是新一代互联网协议和未来网络协议的关键的安全需求。本设计方 法将与地理位置编址的新型寻址技术相结合,可构建下一代互联网的路由器。本技 术也使用于电讯网络中的新型交换机的设计。  The invention will now be further described with reference to the drawings and specific embodiments set forth below. Routers in information networks are the basic components of the Internet. This scheme adopts the identification authentication technology for the first time in the router design, providing address authenticity proof and lifetime time proof to prevent illegal access; providing this connection freshness proof to prevent retransmission attacks; first adopting software or hardware The identification authentication technology provides the credibility of the router operating environment and prevents malware such as Trojans from intruding. This design also provides encryption and encryption to ensure privacy. This is a key security requirement for next-generation Internet protocols and future network protocols. This design approach combines new addressing technologies with geolocation addressing to build routers for the next generation of the Internet. This technology is also used in the design of new switches in telecommunications networks.
路由器工作在 0SI七层协议中的网络层, 其主要功能是将网络和网络连接起 来, 在网间进行数据包的转发。 路由器已成为最重要的网络设备, 因此, 新一代路 由器的研究将成为未来互联网研究的核心技术。 由于已往的互联网运行的 IPv4, IPv6协议, 不满足 Cyber Security (网际安全) 可信网络连接的新要求。 TCP/IP 协议没有考虑安全问题,不能提供地址真实性证明和生存期证明,不能防止非法接 入, 也不能抵抗 DOS攻击。 目前, 在互联网上横行各种恶意软件和垃圾信息, 严重 污染互联网的使用环境, 直接影响到互联网的生存。 因此, 各国纷纷开展未来互联 网的研究。 2008年欧盟 65个科研机构联合发表了布莱德宣言, 呼吁开发新一代互 联网。 欧盟筹集了 91亿欧元支持未来互联网的研发。 美国奥巴马政府今年刚刚把 标识认证 (identity authentication) 和地址编码系统 (Addressing system) 作 为主要科研任务提出来, 并强调了国际间的合作。 国际标准组织 ISO在 2007年提 出未来网络计划。 The router works in the network layer of the 0SI seven-layer protocol. Its main function is to connect the network and the network, and forward the data packets between the networks. Routers have become the most important network equipment, so the research of next-generation routers will become the core technology of future Internet research. Due to the IPv4 and IPv6 protocols that the Internet has been running, it does not meet the new requirements for Cyber Security trusted network connections. The TCP/IP protocol does not consider security issues, does not provide proof of address authenticity and lifetime credentials, does not prevent illegal access, and does not resist DOS attacks. Currently, all kinds of malware and spam are rampant on the Internet, serious The environment in which the Internet is polluted directly affects the survival of the Internet. Therefore, countries have carried out research on the future Internet. In 2008, 65 scientific research institutions in the European Union jointly issued the Brad Declaration, calling for the development of a new generation of the Internet. The EU has raised 9.1 billion euros to support future Internet research and development. The Obama administration of the United States has just proposed identification and addressing systems as its main research tasks this year, and has emphasized international cooperation. The International Standards Organization ISO proposed a future network plan in 2007.
在中国还没有正式提出未来互联网计划,但是各项工作在悄悄进行。我国 IPv9 已实现了地理位置寻址方法, 解决了 IP地址与地理位置相结合的实名地址问题。 后来韩国也提出地理位置编址和寻址的思路, 成为第二个提出新的寻址方式的国 家。 CPK标识认证技术已成熟, 可用于互联网协议中, 实现可信网络连接。  In the future, China has not formally proposed a future Internet plan, but the work is quietly carried out. China's IPv9 has implemented a geographical location addressing method, which solves the problem of real-name address combining IP address and geographic location. Later, South Korea also proposed the idea of geographical location and addressing, becoming the second country to propose a new addressing method. The CPK logo authentication technology is mature and can be used in Internet protocols to implement trusted network connections.
对于通过路由器或交换机实现可信网络连接的方法来说, 图 1 示出了这种方 法的流程。 为了实现路由器之间和用户之间的可信网络连接, 在用户名 (例如图 1 中的 pel )和路由地址(例如图 1中的路由器 alfa)作标识进行标识认证。 在路由 器之间, 以 IP地址作为标识互相认证, 在用户之间以用户名作为标识互相认证。 假设 pcl ID是一个客户端的用户名, AlfalD是一个路由器的 IP地址, 那么 PC1、 ALFA分别表示各自的公钥 (大写) , pel和 alfa分别表示各自的私钥 (小写) 。 如果在任意路由器上插入定义为 AlfalD的 CPK-card,那么这个路由器就变为标识 为 AlfalD的路由器。 同理, 任意路由器插入定义为 BetalD的 CPK-card, 该路由 器就变为标识为 BetalD的路由器。 作为例子, 可假设 MfaID= "中国一北京一海 淀一北京大学" , BetaID= "中国一北京一海淀一清华大学" 。 For the method of implementing a trusted network connection through a router or switch, Figure 1 shows the flow of this method. In order to implement a trusted network connection between routers and users, a user name (for example, pel in FIG. 1) and a routing address (for example, router alf in FIG. 1) are identified for identity authentication. Between the routers, the IP addresses are used as the identifiers for mutual authentication, and the users are authenticated by the user name as the identifier. Assuming that the pcl ID is the username of a client, AlfalD is the IP address of a router, then PC1 and ALFA represent their respective public keys (uppercase), and pel and alfa represent their respective private keys (lowercase). If a CPK-card defined as AlfalD is inserted on any router, then the router becomes the router identified as AlfalD. Similarly, any router inserts a CPK-card defined as BetalD, and the router becomes a router identified as BetalD. As an example, assume that Mf a ID = "China, Beijing, Haidian, Peking University", BetaID = "China, Beijing, Haidian, Tsinghua University".
现假设出发地址为 AlfalD, 目的地址为 BetalD, 其连接过程如图 1, 虚线表 示使用了用户 Pcl ID的数据包 data经由路由器最后到达用户 Pc2ID的路径, 其中 每一个路由器都会原发地址进行验证 (本实施例中的原发地址就是图 1 中的 AlfalDo 至于用户 Pc2ID对 Pcl ID的认证, 属于交易认证, 只能打开数据包 data 以后进行, 是用户层的任务。  Now assume that the starting address is AlfalD and the destination address is BetalD. The connection process is shown in Figure 1. The dotted line indicates the path of the packet data using the user Pcl ID to the user Pc2ID via the router. Each router will verify the original address ( The original address in this embodiment is the AlfalDo in Figure 1. As for the user Pc2ID to authenticate the Pcl ID, it belongs to the transaction authentication, and can only be opened after the data packet is opened, which is the task of the user layer.
出发路由器的 IP包通过多个转接路由器(又称为转接路由器) , 最后到达目 的路由器,在中间转接路由器中很容易发生非法接入。传统的路由器只注重下一跳 的路由, 并不关心本数据包从何而来。 为了实现可信网络连接, 本实施例中的路由 器必须满足以下四个条件: (1 ) 原发地址必须给出发送地址证明, 可由任何一地 来验证; (2 ) 所有路径路由器均对原发地址进行验证, 如不符则拒绝转发; (3 ) 能防止非法接入, 抵抗 DOS攻击; (4 ) 路由器内部的计算环境是可信的。 The IP packet of the departure router passes through multiple transit routers (also known as transit routers) and finally reaches the destination router. It is easy to illegally access in the intermediate transit router. Traditional routers only focus on the next hop routing, and don't care where this packet comes from. In order to implement a trusted network connection, the router in this embodiment must satisfy the following four conditions: (1) The originating address must give a proof of the sending address, which can be any place. To verify; (2) all path routers verify the original address, if they do not match, refuse to forward; (3) can prevent illegal access, resist DOS attacks; (4) the computing environment inside the router is trusted.
对于出发地址为 AlfalD, 目的地址为 BetalD的连接过程而言, 其中图 1中的 虚线表示使用了 CPK-card并进行了原发地址鉴别。  For the connection process where the destination address is AlfalD and the destination address is BetalD, the dotted line in Figure 1 indicates that the CPK-card is used and the primary address authentication is performed.
路径 1 : 以下歩骤是全部采用 IPV9协议和 CPK-card:  Path 1 : The following steps are all based on the IPV9 protocol and CPK-card:
首先, 客户端 Pel ID对 time和 MAC签名, 将签名数据交付路由器 AlfaID。 其次, 路由器 AlfalD对客户端 Pel ID的 time签名和 MAC签名进行检査, 如 果验证通过则接收, 否则拒收。  First, the client Pel ID signs the time and MAC, and delivers the signature data to the router AlfaID. Second, the router AlfalD checks the time signature and MAC signature of the client Pel ID, and if the authentication passes, it receives, otherwise it rejects.
然后, 路由器 AlfalD对 time、 checksum签名, 转给下一个路由器。  Then, the router AlfalD signs the time, checksum, and forwards it to the next router.
在路由器 AlfalD之后, 经由路由器 GamID、 LamID、 BetalD等路由操作方式 和路由器 AlfalD相同。即:下一个路由器验证原发地址签名和上一路由器的签名, 如果验证通过则将数据 data转发给下一路由器。  After the router AlfalD, routing operations such as GamID, LamID, and BetalD are the same as those of the router AlfalD. That is: the next router verifies the original address signature and the signature of the previous router, and if the verification passes, the data data is forwarded to the next router.
最后, 目的路由器 BetalD将数据 data转送至接收用户 Pc2ID。  Finally, the destination router BetalD forwards the data data to the receiving user Pc2ID.
路径 2 : 以下步骤中客户端采用了 IPV9协议但不使用 CPK-card:  Path 2: In the following steps, the client uses the IPV9 protocol but does not use CPK-card:
用户 Pc3ID不使用 CPK-card但通过 PT转换(协议转换路由器)成 IPV9协议 经由路由器 AlfalD发送数据给用户 Pc4ID。路由器 AlfalD获取数据包源地址作为 公钥, 并验证来源的正确性, 发现不合法地址就丢弃数据。  The user Pc3ID does not use the CPK-card but passes the PT conversion (protocol conversion router) to the IPV9 protocol. The data is sent to the user Pc4ID via the router AlfalD. The router AlfalD obtains the source address of the packet as the public key, and verifies the correctness of the source. If the illegal address is found, the data is discarded.
路径 3 : 以下歩骤中客户端不采用 IPV9协议且不使用 CPK-card:  Path 3: In the following steps, the client does not use the IPV9 protocol and does not use CPK-card:
用户 Pc3ID不使用 CPK-card并采用 IPV4/IPV6协议经由路由器 AlfalD发送 数据给用户 Pc4ID。经过路由器 DeltalD和 SigID到达路由器 BetalD,并转发数据 给用户 Pc4ID。  The user Pc3ID does not use the CPK-card and uses the IPV4/IPV6 protocol to send data to the user Pc4ID via the router AlfalD. The router DeltalD and SigID arrive at the router BetalD and forward the data to the user Pc4ID.
路径 4: 以下步骤中客户端采用 IPV9协议, 且使用 CPK-card, 但中间 IPV9 路由不使用 CPK-card:  Path 4: In the following steps, the client adopts the IPV9 protocol and uses the CPK-card, but the intermediate IPV9 route does not use the CPK-card:
( 1 ) 用户 Pel ID使用本机地址作为公钥进行签名, 经由路由器 AlfalD发送 数据给用户 Pc2ID。  (1) The user Pel ID is signed using the local address as the public key, and the data is sent to the user Pc2ID via the router AlfalD.
(2 ) 路由器 AlfalD获取数据包源地址作为公钥, 并验证来源的正确性, 如 遇到不合法地址则丢弃数据。来源地址验证正确后,去除原先签名后再使用本机地 址作为公钥签名。 签名之后, 进行正常的路由数据转发。  (2) The router AlfalD obtains the source address of the packet as the public key and verifies the correctness of the source. If an illegal address is encountered, the data is discarded. After the source address is verified correctly, the original signature is removed and the local address is used as the public key signature. After the signature, normal routing data is forwarded.
(3 )路由 GamID没有使用 CPK-card, 获取数据包源地址作为公钥, 并验证来 源的正确性, 如遇到不合法地址则丢弃数据, 如正常则进行正常的路由数据转发。(3) The routing GamID does not use the CPK-card, obtain the source address of the data packet as the public key, and verify If the source is correct, the data is discarded if an illegal address is encountered. If it is normal, the normal routing data is forwarded.
(4 ) 路由器 LamID、 BetalD等的路由操作方式同上。 (4) The routing operations of routers such as LamID and BetalD are the same as above.
( 5 ) 路由器 BetelD将数据转发至目的地用户 Pc2 ID。  (5) The router BetelD forwards the data to the destination user Pc2 ID.
可信路由兼容 IPV4/IPV6协议的工作模式如图 5所示。 为了实现可信网络连 接要求制定新的 IP报头格式, 报头中至少包括源地址、 发送时间、 地址对时间的 签名、 目的地址、 地址对校验和的签名 (亦即鉴别码) 。 地址对校验和的签名 (称 为鉴别码)可以包括在报头格式中, 也可以放置在数据之后。数据加密只影响数据 格式, 不影响 IP报头格式。 IPV4的报头格式可变化, 其中 time和鉴别码的插入 点可改变, 因而具有如图 2A和 2B所示的两种格式, IPV9的报头格式如图 3所示。  Trusted Route Compatible The working mode of the IPV4/IPV6 protocol is shown in Figure 5. In order to implement a trusted IP network connection, a new IP header format is required. The header includes at least a source address, a transmission time, an address-to-time signature, a destination address, and an address-to-checksum signature (ie, an authentication code). The signature of the address to the checksum (called the authentication code) can be included in the header format or placed after the data. Data encryption only affects the data format and does not affect the IP header format. The header format of IPV4 can be changed, wherein the insertion point of time and the authentication code can be changed, and thus has two formats as shown in Figs. 2A and 2B, and the header format of IPV9 is as shown in Fig. 3.
为了本实施例方法的顺利实现, 其中的路由器需要配置 CPK-card (或采用类 似机理的签名算法和相应硬件, 下文以 CPK为例阐述), 使其具有数字签名和密钥 交换功能。 借助 CPK系统实现原发地址的鉴别, 假设原发地为 AlfalD , 下一路由 器为 GammalD , AlfalD发出数据 data , 其中申请格式为:  For the smooth implementation of the method in this embodiment, the router needs to be configured with a CPK-card (or a signature algorithm using a similar mechanism and corresponding hardware, exemplified by CPK below), so that it has a digital signature and a key exchange function. The CPK system is used to identify the originating address. Assume that the origin is AlfalD, the next router is GammalD, and AlfalD sends data data. The application format is:
Mas1 AlfalD→GammalD: { Alfa, signl, Beta, time data , checksum}  Mas1 AlfalD→GammalD: { Alfa, signl, Beta, time data , checksum}
其中 AlfalD是原发地址, signl是对原发地址的签名, 即 sign^ G^ me;) , Where AlfalD is the original address, signl is the signature of the original address, ie sign^ G^ me;) ,
BetalD是目的地址, SIG是签名函数, alfa是签名私钥, 由 CPK-card提供。其中 data是数据, 来自应用层, data也许是明文, 也可能是密文。 路由器的任务是将 data传送给下一路由器。 BetalD is the destination address, SIG is the signature function, and alfa is the signature private key, provided by CPK-card. Where data is data, from the application layer, data may be plain text, or cipher text. The task of the router is to pass data to the next router.
GammalD验证原发地的签名: SIGKtime) = signV ,  GammalD verifies the signature of the origin: SIGKtime) = signV ,
其中 SIG— 1是验证函数, ALFA是公钥。 如果 s ignl=s ignl ' , 则允许本次连接, 转发 Msgl, 并审计。 以对照时间的方式识别重放攻击。 Where SIG- 1 is the verification function and ALFA is the public key. If si g nl=s ignl ' , then this connection is allowed, Msgl is forwarded, and audited. The replay attack is identified in a time-dependent manner.
路由器加密和脱密过程如下。  The router encryption and decryption process is as follows.
数据 data的结构定义如下: Data: { PcHD, Pc2ID, data, mac}, 其中 PcHD 是发信方, Pc2ID是收信方。  The structure of the data data is defined as follows: Data: { PcHD, Pc2ID, data, mac}, where PcHD is the sender and Pc2ID is the receiver.
当数据为明文时, Data={ PcHD, Pc2ID, clear-text, mac}, 这里的 Pcl lD和 When the data is plain text, Data={ PcHD, Pc2ID, clear-text, mac}, where Pcl lD and
Pc2ID都是用户名, clear-text是明文内容, mac是路由器的 mac地址。 Pc2ID is the username, clear-text is the plaintext content, and mac is the mac address of the router.
当数据为密文时, Data= { Pcl lD, Pc2ID, coded-key, coded-data, mac} , 这 里的 coded-key是密码, coded-data是加密后的内容, mac是路由器的 mac地址。  When the data is cipher text, Data= { Pcl lD, Pc2ID, coded-key, coded-data, mac} , where coded-key is the password, coded-data is the encrypted content, and mac is the mac address of the router.
如果加脱密功能是由路由器提供的, 设 Alfa加密, Beta脱密, 那么数据加密 只能以非在线方式进行, 所以加密也只能用系统密钥实现。 If the encryption function is provided by the router, set Alfa encryption, Beta decryption, then data encryption It can only be done offline, so encryption can only be done with a system key.
如果路由器承担加脱密功能, 而本次数据 data是加密数据, 则需要解释 coded-key和 coded-data, 并执行系列步骤:  If the router assumes the encryption and decryption function, and the data data is encrypted data, you need to interpret coded-key and coded-data, and perform a series of steps:
1) 产生随机数 R3, AlfalD计算密钥: key=R3 χ (G); 其中 G 是椭圆曲线的 基点, key将用于数据的加密;  1) Generate a random number R3, AlfalD calculates the key: key=R3 χ (G); where G is the base point of the elliptic curve, and key will be used for data encryption;
2) 计算发送用密钥: R3x (BETA) =coded-key, 其中 BETA是 BetalD 的公 钥, 将 coded-key发送给 BetalD;  2) Calculate the sending key: R3x (BETA) = coded-key, where BETA is the public key of BetalD, and send the coded-key to BetalD;
3) 对数据加密: Ekey (data) =cipher-text, 其中 Ekey ( ) 是数据加密函数。 将密文 cipher-text禾口 coded-key发送给 BetalD。 3) Encrypt data: E key (data) = cipher-text, where E key ( ) is the data encryption function. Send the ciphertext cipher-text and coded-key to BetalD.
BetalD接到 AlfalD的信号便自动进入脱密过程:  When BetalD receives the signal from AlfalD, it automatically enters the de-binding process:
1) BetalD 计算私钥的逆: beta—1 1) BetalD calculates the inverse of the private key: beta- 1
2) BetalD 计算会话密钥: beta— 1 (coded-key) = key 2) BetalD compute session key: beta- 1 (coded-key) = key
3) 数据脱密: Dkey(cipher-text)= data, 其中 Dkey ( ) 是脱密函数。 3) Data decryption: D key (cipher-text)= data, where D key ( ) is a de-cixing function.
为了保证路由器运行的可信性, 路由器中的所有执行代码, 必须通过厂家认 证(一级认证) , 即出场时由厂家对所有执行代码签名。每一台路由器均有鉴别功 能 (由 CPK-card提供) 。  In order to ensure the credibility of the router operation, all execution code in the router must pass the manufacturer's certification (level 1 certification), that is, all the execution code is signed by the manufacturer when the game is played. Each router has an authentication function (provided by CPK-card).
首先是软件代码的证明- 厂家具有 CPK-card, 可对路由器中的所有系统软件进行厂家 (manufacturer) 签名。 执行软件分为软件标识 (codelD) 和软件本体 (codeBD), 厂家对此分别签 名:  The first is the proof of the software code - the manufacturer has a CPK-card that can be used to sign the manufacturer of all system software in the router. The execution software is divided into software identification (codelD) and software ontology (codeBD), which are signed by the manufacturer:
一 (codelD)=sign1  One (codelD)=sign1
(codeBD)=sign2  (codeBD)=sign2
其中, SIG是签名函数, manufacturer是厂家的私钥, codelD是执行代码名, codeBD是执行代码本体的 HASH值。 路由器中的任何一个执行代码均具有自身 的证明码 signl和 sign2。  Among them, SIG is the signature function, manufacturer is the private key of the manufacturer, codelD is the execution code name, and codeBD is the HASH value of the execution code ontology. Any execution code in the router has its own proofs sign1 and sign2.
然后是软件代码的鉴别- 路由器插入 CPK-card, 使其具有 CPK认证功能。 路由器的验证方法可由两 种: 一种是当开机时统一验证, 没有通过验证的代码统一删除, 保证路由器的系统 恢复到原始状态; 另一种是当调用软件代码时, 先行验证后执行。 对 signl禾口 sign2分另 J验证: Then there is the authentication of the software code - the router inserts the CPK-card to have CPK authentication. There are two ways to verify the router: one is unified verification when booting, the code that has not passed the verification is uniformly deleted, and the system of the router is restored to the original state; the other is when the software code is called, the first verification is performed. For the signl and sign2, another J verification:
SlG^NUFAC„(codelD)=sign1 ' SlG^ NUFAC „(codelD)=sign1 '
SIG^™™ (codeBD)=sign2'  SIG^TMTM (codeBD)=sign2'
其中 MANUFACTURER是厂家的公钥, 如果 sign1 =sign1 '禾卩 sign2=sign2', 则允许执行,否则拒绝执行。以此保证在本路由器中执行的代码均为厂家认证的代 码, 除此以外的代码一律不执行, 免受病毒、 木马的攻击。  Where MANUFACTURER is the manufacturer's public key. If sign1 =sign1 'and sign2=sign2', execution is allowed, otherwise execution is refused. This ensures that the code executed in this router is a factory-certified code, and all other codes are not executed, and are protected from viruses and Trojans.
TCP/IP协议不能保证可信网络连接, 因此必须加以改造。 本实施例在以地理 位置编址和寻址的基础上,提出了可信网络连接的三个关键技术:采用地址能够鉴 别的机制, 防止非法连接; 采用随机的问答机制, 防止重复攻击; 软件代码能够鉴 别的机制, 防止病毒、 木马的侵扰。  The TCP/IP protocol does not guarantee a trusted network connection and must be modified. In this embodiment, based on geographic location addressing and addressing, three key technologies for trusted network connection are proposed: a mechanism capable of identifying addresses to prevent illegal connections; a random question and answer mechanism to prevent repeated attacks; The code can identify the mechanism to prevent viruses and Trojans from intruding.
以上设计方法, 完全适用于物理层的可信网络连接。 物理层有两种: 一种是 信息网络七层协议中定义的物理层, 支持信息网络的平台是应用程序接口(API)。 第二种是电信网络中定义的物理层, 支持电信网络的平台是信参考点 (TRP) 。 在 信息网络中,如果网络层能够保证传输的可信性,物理层的安全可以由网络层替代, 无需再作物理层的工作。但是电信网络中的物理层, 如果不作改造, 就无法实现可 信网络连接, 无法防止非法接入, 其改造的方法与路由器完全相同。  The above design method is fully applicable to the trusted network connection of the physical layer. There are two physical layers: one is the physical layer defined in the seven-layer protocol of the information network, and the platform supporting the information network is the application program interface (API). The second is the physical layer defined in the telecommunication network, and the platform supporting the telecommunication network is the information reference point (TRP). In the information network, if the network layer can guarantee the credibility of the transmission, the security of the physical layer can be replaced by the network layer, and there is no need to work on the physical layer. However, the physical layer in the telecommunication network cannot be connected to the trusted network without being modified, and the illegal access cannot be prevented. The modification method is exactly the same as that of the router.
本发明的通过路由器或交换机的签名验证实现可信网络连接的方法, 是实现 了路由器或交换机的网络设备之间和网络终端之间的可信网络连接,在路由器或交 换机的网络设备之间以报头中的源 IP地址或目的 IP地址 (源 IP地址和目的 IP 地址都存在于数据包中)、源硬件地址或目的硬件地址、指定或随机定义的数字和 字符的全部或部分进行平行或叠加作为标识互相签名认证(也称为标识互相认证), 在联网计算机之间以报头中的源 IP地址或目的 IP地址、源硬件地址或目的硬件地 址、指定或随机定义的数字和字符的全部或部分进行平行或叠加作为标识互相签名 认证。  The method for implementing trusted network connection by signature verification of a router or a switch of the present invention is to implement a trusted network connection between network devices of a router or a switch and a network terminal, and between network devices of a router or a switch The source IP address or destination IP address in the header (both source IP address and destination IP address are present in the packet), source hardware address or destination hardware address, specified or randomly defined numbers and characters are all parallel or superimposed As identification mutual signature authentication (also known as identification mutual authentication), between the networked computers with the source IP address or destination IP address in the header, the source hardware address or the destination hardware address, the specified or randomly defined numbers and characters all or Partially parallel or superimposed as identification mutual signature authentication.
这一方法包括了如下的步骤:  This method includes the following steps:
( 1 )源计算机和目的计算机、 路由器或交换机都对数字和字符定义的路由器 或交换机硬件地址 (硬件地址也可以是多定义的硬件地址) 、 IP地址(这些 IP地 址是多个版本的 IP协议的地址) 、 指定或随机定义的数字和字符、 计算机的硬件 地址、 IP地址、 指定或随机定义的数字和字符的全部或部分提供准确的时间证明 和生存期证明, 并验证其时间证明和生存期证明是否被修改过, 并结合硬件 地址、 IP地址、指定或随机产生的数字和字符数据的全部或部份进行数字签名(在 本发明中所有的签名都存入 IP报头中)并生成时间证明、生存期证明签名和硬 件地址、 IP 地址、 指定或随机产生的数字和字符的全部或部分数据进行平行或叠 加混合签名, 将其连同数据一起交给下一跳路由器或交换机。 (1) The source computer and the destination computer, router or switch both define the router or switch hardware address for the number and characters (the hardware address can also be a multi-defined hardware address), IP address (these IP addresses are multiple versions of the IP protocol) Address, specified or randomly defined numbers and characters, computer hardware address, IP address, specified or randomly defined numbers and characters, all or part of which provide accurate proof of time And proof of lifetime, and verify that its time certificate and lifetime certificate have been modified, and digitally signed in combination with hardware addresses, IP addresses, specified or randomly generated numbers and character data (all in the present invention) The signatures are stored in the IP header) and generate time proofs, lifetime certificate signatures and hardware addresses, IP addresses, specified or randomly generated numbers and all or part of the data for parallel or overlay mixed signatures, along with the data Hand over to the next hop router or switch.
(2)路由器或交换机对联网计算机的时间证明、生存期证明签名和硬件地址、 IP地址、 指定或随机产生的数字和字符的数据签名进行检査, 如果验证通过则接 收并转发数据, 否则丢弃或数据湮灭。  (2) The router or switch checks the time certificate of the networked computer, the lifetime certificate and hardware address, the IP address, the data signature of the specified or randomly generated numbers and characters, and receives and forwards the data if the verification passes, otherwise discards Or the data is annihilated.
(3 ) 路由器或交换机对硬件地址、 IP地址、 指定或随机定义的数字和字符、 联网计算机的源硬件地址、 IP地址、 指定或随机定义的数字和字符的全部或部分 准确的时间、 生存期证明和加密或非加密的校验和 (由路由器和客户端的内置算 法得出)、 CPK校验认证数据、 CA认证的校验认证数据进行数字签名, 生成时间 证明、 有效期的证明签名和校验和、 CPK签名、 CA认证进行平行或叠加混合签 名, 并连同转发数据一起交给下一跳路由器, 不通过则将数据湮灭。  (3) The router or switch has a hardware address, an IP address, a specified or randomly defined number and character, a source computer address of a networked computer, an IP address, a specified or randomly defined number and all or part of the exact time, lifetime Proof and encrypted or non-encrypted checksum (derived by the built-in algorithm of the router and client), CPK verification and authentication data, CA-certified verification and authentication data for digital signature, generation of time certificate, proof of validity and verification of validity Parallel or superimposed hybrid signatures with CPK signatures and CA certificates are sent to the next hop router along with the forwarding data. If not, the data is annihilated.
(4)路由器或交换机验证上一跳路由器或交换机的相关签名,其中签名验证 是逐级展开的,每一层都对上层进行签名验证,同时路由器或交换机需要对本层 相应对象进行签名, 也通过不同 IP版本的协议隧道路由或不同 IP版本的协议 转换软件或计算机将签名验证送至目的路由器或交换机, 来保证自己的真实 性, 如果验证通过, 则将转发数据交给下一跳路由器或交换机直至目的路由器或 交换机 (路由器需要对本层相应对象进行签名, 来保证自己的真实性) 。  (4) The router or switch verifies the signature of the previous hop router or switch. The signature verification is performed step by step. Each layer performs signature verification on the upper layer. At the same time, the router or switch needs to sign the corresponding object of this layer. Different IP versions of protocol tunnel routing or protocol conversion software or computers of different IP versions send signature verification to the destination router or switch to ensure their authenticity. If the verification passes, the forwarding data is forwarded to the next hop router or switch. Until the destination router or switch (the router needs to sign the corresponding object of this layer to ensure its authenticity).
(5 )在转发数据到达目的路由器或交换机后, 将进行签名验证工作, 目的路 由器或交换机将经过验证通过的进行平行或叠加混合签名的数据解密成符合设计 的接收数据后, 转发数据包至目的计算机。  (5) After forwarding the data to the destination router or switch, the signature verification will be performed. The destination router or switch decrypts the data that has been verified to pass parallel or superimposed mixed signatures into the designed received data, and then forwards the data packet to the destination. computer.
图 4示出了本发明的实现可信网络连接的路由器的实施例。 信息网络中的路 由器是互联网的基本部件。本方案在路由器设计中第一次采用标识鉴别技术,提供 地址真实性证明, 防止非法接入;第一次采用"随机发问一签名回答 "的问答技术, 提供本次连接新鲜性证明, 防止重放攻击; 第一次采用软件标识鉴别技术, 提供路 由器操作环境的可信性, 防止木马等恶意软件的侵扰。 本设计还提供加脱密功能, 保证私密性。这是新一代互联网协议或未来互联网的关键的安全需求。本设计方法 将与地理位置编址的新型寻址技术相结合,可构建下一代互联网或未来互联网的路 由器。 4 illustrates an embodiment of a router of the present invention that implements a trusted network connection. Routers in information networks are the basic components of the Internet. This scheme adopts the identification authentication technology for the first time in the design of the router, and provides the authenticity of the address to prevent illegal access. The first use of the question and answer technology of "random questioning and one signature answer" provides the certificate of freshness of this connection, preventing heavy Attacks; The first use of software identification authentication technology to provide credibility of the router operating environment to prevent intrusion of malware and other malware. This design also provides encryption and encryption to ensure privacy. This is a key security requirement for a new generation of Internet protocols or the future of the Internet. This design method Combine with the new addressing technology of geolocation addressing to build routers for the next generation of the Internet or the future of the Internet.
路由器接受来自一个网络接口的数据包, 并转发到下一个目的地址。 目的地 址由路由表提供。如果找到了目的地址,就在数据包的帧格前添加下一个 MAC地址, 同时 IP包头的 TTL ( time to l ive ) 域开始减数, 并重新计算校验和。 当数据包 被送到输出端口时, 需要按顺序等待, 以便传送到输出链路上。路由器按预定规则 把较大的数据分解成适当大小的数据包,再将这些数据包分别通过相同和不同路径 发送出去。当这些数据包按先后顺序到达目的地后,再按一定的顺序恢复成原有数 据形式。  The router accepts packets from a network interface and forwards them to the next destination address. The destination address is provided by the routing table. If the destination address is found, the next MAC address is added before the frame of the packet, and the TTL (time to ive) field of the IP header begins to be decremented, and the checksum is recalculated. When a packet is sent to the output port, it needs to wait in order for transmission to the output link. The router decomposes the larger data into packets of the appropriate size according to predetermined rules, and then sends the packets through the same and different paths. When these packets arrive at the destination in order, they are restored to the original data format in a certain order.
其数据包的存储转发过程如下:  The process of storing and forwarding its data packets is as follows:
1 ) 当数据包到达路由器, 根据网络物理接口类型, 路由器运行相应的链路层 功能模块, 解释数据包的链路层协议报头, 并进行数据完整性验证, 包括 CRC校验 和帧长度检査。  1) When the data packet arrives at the router, according to the physical interface type of the network, the router runs the corresponding link layer function module, interprets the link layer protocol header of the data packet, and performs data integrity verification, including CRC check and frame length check. .
2 ) 根据帧中 IP包头的目的 IP地址, 在路由表中査找下一跳的 IP地址, 同 时 IP数据包头的 TTL域开始减数, 并重新计算校验和 (chechsum) .  2) According to the destination IP address of the IP header in the frame, look up the IP address of the next hop in the routing table, and at the same time, the TTL field of the IP packet header starts to be decremented, and the checksum is recalculated.
3 )根据下一跳 IP地址, 将 IP数据包送往相应的输出链路层, 封装成相应的 链路层包头, 通过网络物理接口发送出去。  3) According to the next hop IP address, the IP data packet is sent to the corresponding output link layer, encapsulated into a corresponding link layer header, and sent out through the network physical interface.
以上是路由器的简单工作过程, 没有说明其他附加功能, 例如访问控制、 网 络地址转换、排队优先级等。 因为有些工作与认证系统无关, 或者将包括在下面讨 论的基于 ID的路由器可信网络连接 (trusted connecting) 中。  The above is a simple working process of the router, and does not describe other additional functions, such as access control, network address translation, queuing priority, and so on. Because some work is not related to the authentication system, it will be included in the ID-based router trusted connection discussed below.
在本实施例中, 实现可信网络连接的路由器 1 由四个模块组成: 防止非法接 入模块 10、 防止重发攻击模块 12、 防止木马侵扰模块 14和脱加密模块 16。 防止 非法接入模块 10在接收转发数据的时候通过对原发 IP地址报头中的数字平行或叠 加混合签名的验证来判断是否对转发数据进行接收, 以防止非法接入。防止重发攻 击模块 12通过连接的数字平行或叠加混合签名中特有的 IP地址及签名的时间有效 期的新鲜性和 IP地址的生存期 (所谓新鲜性就是数据包发出时间和到达时间基本 一致) 证明来防止重发攻击。 防止木马侵扰模块 14中, 防止木马侵扰模块, 可信 网络连接的路由器和交换机对路由器和交换机进行数字平行或叠加混合签名,如果 携带木马程序的网络数据没有得到签名,则无法到达目的地计算机,通过路由操作 环境可信性防止非转发目的地计算机的木马侵扰。 脱加密模块 16通过对转发数据 的脱加密 (也就是解密) 过程保证路由私密性。 In this embodiment, the router 1 implementing the trusted network connection is composed of four modules: an illegal access module 10, a retransmission attack prevention module 12, a Trojan intrusion prevention module 14, and a de-encryption module 16. The illegal access module 10 is prevented from receiving the forwarded data by verifying the digital parallel or superimposed hybrid signature in the original IP address header when receiving the forwarded data to prevent illegal access. Preventing the retransmission attack module 12 from the unique IP address of the connected digital parallel or superimposed hybrid signature and the freshness of the time validity period of the signature and the lifetime of the IP address (so-called freshness is basically the same as the time and arrival time of the data packet) To prevent resend attacks. In the Trojan intrusion prevention module 14, the Trojan intrusion module is prevented, the router and the switch connected by the trusted network perform digital parallel or superimposed hybrid signature on the router and the switch, and if the network data carrying the Trojan is not signed, the destination computer cannot be reached. Routing operation Environmental credibility prevents Trojan intrusion from non-forwarding destination computers. The de-encryption module 16 ensures routing privacy by de-encrypting (ie, decrypting) the forwarding data.
上述实施例的路由器的内部结构也可以是交换机的内部结构。  The internal structure of the router of the above embodiment may also be the internal structure of the switch.
为了实现路由器之间的可信网络连接, 将 IP地址作为路由器的标识, 并保证 器唯一性。 设 Alfa是一个路由器的 IP地址, Beta是另一个路由器的 IP地址。 如 果在任意路由器上插入定义为 Alfa 的 CPK-card, 那么这个路由器就变为标识为 Alfa的路由器。 同理, 任何路由器插入定义为 Beta的 CPK-card, 该路由器就变为 标识为 Beta的路由器。 作为例子, 假设 Alfa= "中国 北京一海淀一北京大学", Beta= "中国一北京一海淀一清华大学" 。  In order to achieve a trusted network connection between routers, the IP address is used as the identifier of the router, and the guarantee is unique. Let Alfa be the IP address of a router and Beta be the IP address of another router. If a CPK-card defined as Alfa is inserted on any router, then the router becomes the router identified as Alfa. Similarly, any router inserts a CPK-card defined as Beta, and the router becomes a router identified as Beta. As an example, suppose Alfa = "China Beijing Haidian-Peking University", Beta = "China-Beijing-Haidian-Tsinghua University".
出发路由器的 IP包通过多个转接路由器, 最后到达目的路由器, 在中间转接 路由器中很容易发生非法接入, Beta很可能不知道所接入的数据包是从何而来, 由此便产生了出发地址的证明和发送地的问题。出发地证明在任何转发地址上都可 以验证, 但这种认证是多余的, 而在目的路由器上处理数据 data时同时完成就可 以了, 因为在每一跳转发中必须证明收发两端的真实性。从上面路由器的工作原理 中可看出, 以往的路由器只注重下一跳的路由, 并不关心本数据包从何而来。 因此 如果不解决发送地址的验证, 就无法克服非法接入。  The IP packet of the departure router passes through multiple transit routers and finally reaches the destination router. It is easy to illegally access the intermediate transit router. Beta may not know where the accessed data packet comes from, and thus A proof of the departure address and a problem with the place of delivery were generated. The proof of departure can be verified at any forwarding address, but this authentication is redundant, and it can be done at the same time when processing the data data on the destination router, because the authenticity of the two ends must be proved in each hop forwarding. . As can be seen from the working principle of the above router, the previous router only pays attention to the routing of the next hop, and does not care where the data packet comes from. Therefore, if the verification of the sending address is not resolved, the illegal access cannot be overcome.
有些人尝试能否用加密的方法解决非法接入问题, 但在公钥体制条件下, 这 是徒劳的。比如 Beta是接受方,而它的公钥是公开的,任何人都可以给 Beta加密, 因此 Beta仍然无从知晓发方是谁。  Some people try to solve the illegal access problem by encryption, but in the case of public key system, this is futile. For example, Beta is the recipient, and its public key is public. Anyone can encrypt Beta, so Beta still has no way of knowing who the sender is.
对于防止非法接入模块 10来说, 路由器必须满足: (1 ) 原发地址必须给出 发送地址证明, 可由任何一地来验证; (2 ) 所有路径路由器均对原发地址进行验 证, 如不符则拒绝转发; (3 ) 能防止非法接入, 抵抗 DOS攻击; (4)路由器内部 的计算环境是可信的。  For the anti-illegal access module 10, the router must satisfy: (1) The originating address must be given a proof of the sending address, which can be verified by any place; (2) All path routers verify the original address, if not Then refuse to forward; (3) can prevent illegal access, resist DOS attacks; (4) the computing environment inside the router is trusted.
防止非法接入模块 10实现了以下几个步骤- 首先, 客户端 Pel ID对 time和 MAC签名, 将签名数据交付路由器 AlfaID。 其次, 路由器 AlfalD对客户端 Pel ID的 time签名和 MAC签名进行检査, 如 果验证通过则接收, 否则拒收。  The anti-illegal access module 10 implements the following steps - first, the client Pel ID signs the time and MAC, and delivers the signature data to the router AlfaID. Second, the router AlfalD checks the time signature and MAC signature of the client Pel ID, and if the authentication passes, it receives, otherwise it rejects.
然后, 路由器 AlfalD对 time、 checksum签名, 转给下一个路由器。  Then, the router AlfalD signs the time, checksum, and forwards it to the next router.
在路由器 AlfalD之后, 经由路由器 GamID、 LamID、 BetalD等路由操作方式 和路由器 AlfalD相同。 SP :下一个路由器验证原发地址签名和上一路由器的签名, 如果验证通过则将数据 data转发给下一路由器。 After the router AlfalD, routing operations via routers GamID, LamID, BetalD, etc. Same as router AlfalD. SP: The next router verifies the signature of the originating address and the signature of the previous router. If the verification passes, the data is forwarded to the next router.
最后, 目的路由器 BetalD将数据 data转送至接收用户 Pc2ID。  Finally, the destination router BetalD forwards the data data to the receiving user Pc2ID.
这当中利用到了 CPK密码体制。 在 CPK密码体制中, 实体标识 EentitylD映 射到以 T={a,b,G,n,p}为参数的椭圆曲线 E:y2=x3+ax+b (mod p)上的点 ENTITY,且 有整数满足 ENTITY=(entity)G, 那么 ENTITY是公钥, eintity是私钥, 公钥可由 任何人计算, 私钥则由 ID-card提供。 因此, 一般地, 任何 IdentitylD映射到公私 钥对 IDENTITY和 identity: This uses the CPK cryptosystem. In the CPK cryptosystem, the entity identifier EentitylD is mapped to the point ENTITY on the elliptic curve E:y 2 =x 3 +ax+b (mod p) with T={a,b,G,n,p} as the parameter, And an integer satisfies ENTITY=(entity)G, then ENTITY is the public key, eintity is the private key, the public key can be calculated by anyone, and the private key is provided by ID-card. Therefore, in general, any IdentitylD maps to public and private key pairs IDENTITY and identity:
签名可以 SiG,.&„ (time)=sign表示; The signature can be expressed by SiG,. & „ (time)=sign;
验证可以
Figure imgf000016_0001
(time)=sign,表示。
Verification can
Figure imgf000016_0001
(time)=sign, indicating.
路由器配置 CPK-card, 使其具有数字签名和密钥交换功能, CPK-card的内容 如下: 设路由器的 IP地址为 alfa (Alfa可能是中国.北京.海淀.北京大学等实名, 经统一译名后变为机器可执行的代码) 。 以路由器 alfa的 ID-card为例, 其内容如 下:  The router is configured with CPK-card to have digital signature and key exchange functions. The contents of CPK-card are as follows: Set the IP address of the router to alfa (Alfa may be the real name of China, Beijing, Haidian, Peking University, etc. Become the code executable by the machine). Take the ID-card of the router alfa as an example. The content is as follows:
Figure imgf000016_0002
Figure imgf000016_0002
关于地址鉴别这一块,假设发送地址为 Alfa, 接收地址为 Gamma, AlfalD的 公钥是 ALFA, 私钥是 alfa, 由 Alfa发出连接申请, 其申请格式如 Msg1 :  Regarding the address authentication block, it is assumed that the sending address is Alfa, the receiving address is Gamma, the public key of AlfalD is ALFA, and the private key is alfa. The connection request is issued by Alfa, and the application format is Msg1:
Mas1: Alfa→Gamma, { AlfalD, BetalD, T, signl }  Mas1: Alfa→Gamma, { AlfalD, BetalD, T, signl }
其中 AlfalD是发送地址, BetalD时目的地址, T是时间, signl是发送方 Alfa 对时间的签名, SP : SlG (T)=sign1, 其中 SIG是签名函数。 接收方 Gamma是 经由地址, 验证发送方的签名: SiG FA (T)=sign1 ' , SIG_1 是验证函数。 如果 sign1 =sign1 ', Gamma认为发送方是 Alfa, 如果 Alfa是合法用户 (查表), 则发送 一个随机数 r并对 (T-1 )的签名: SIGw (T-1 )=sign2, 将 sign2发送给 Alfa: Where AlfalD is the sending address, the destination address of BetalD, T is the time, signl is the signature of the sender Alfa on time, SP: SlG (T)=sign1, where SIG is the signature function. Gamma recipient via address, verifies the signature of the sender: SiG FA (T) = sign1 ', SIG_ 1 is a validation function. in case Sign1 =sign1 ', Gamma thinks that the sender is Alfa, if Alfa is a legitimate user (check table), then send a random number r and sign the (T-1): SIGw (T-1)=sign2, send sign2 To Alfa:
Msg2 : Gamma→Alfa, {r, sign2}  Msg2 : Gamma→Alfa, {r, sign2}
Alfa验证 sign2: SIG^AMMA (T-1 )=sign2' , 如果 sign2=sign2' , Alfa确定接收 方是经由地址 Gamma, 如果接收方是合法的 (査表), 则对 r和 (T+1 )签名, 同时发 送数据 data和对校验 checksum的签名: Alfa verifies sign2: SIG^ AMMA (T-1)=sign2', if sign2=sign2', Alfa determines that the receiver is via address Gamma, and if the receiver is legal (check table), then r and (T+1) Signature, send data data and signature to checksum:
SlGo;/fl (r)=sign3 SlG o;/fl (r)=sign3
SIG咖 (T+1 )=sign4  SIG coffee (T+1)=sign4
SiGa!fa (checksum)=sign5 SiG a!fa (checksum)=sign5
Msg3: Alfa→Gamma, {sign3, data, sign4,sign5}  Msg3: Alfa→Gamma, {sign3, data, sign4,sign5}
Gamma检查签名: Gamma check signature:
Figure imgf000017_0001
Figure imgf000017_0001
SlG FA (T+1 )=sign4', SlG FA (T+1 )=sign4',
SIGALFA (checksum)=sign5' SIG ALFA (checksum)=sign5'
如果 sign3=sign3',则证明发送方为 Alfa,允许本次连接,如果 sign4=sign4', 则证明了本次数据是来自 Alfa, 且接收无误, 发送回执信息, 即 Gamma对校验码 的签名- If sign3=sign3', the sender is Alfa, and the connection is allowed. If sign4=sign4', it proves that the data is from Alfa, and the receipt is correct, and the receipt information is sent, that is, the signature of Gamma on the check code. -
SU ecksum)=sign6, SU ecksum)=sign6,
Mag4: Gamma→Alfa, {sign6}  Mag4: Gamma→Alfa, {sign6}
Alfa验证 sign5:
Figure imgf000017_0002
(checksum)=sign6', 如果 sign6=sign6', 证明数据 data送到了 Gamma。
Alfa verification sign5:
Figure imgf000017_0002
(checksum)=sign6', if sign6=sign6', the proof data is sent to Gamma.
在很多情况下数据可能划分为若干段: data = data0 // data II data2 // ... datan, 分段数据的发送可能出现两种情况: 一是在已建立连接的两端路由器之间 发生, 二是没有建立连接的两端路由器之间发生。 假设 data 走 Alfa→Gamma, 而 data2走 Alfa→Delta。但是第二种情况是不可能发生的, 因为还没有建立可信网 络连接过程。如果要走第二条路, 首先必须建立可信网络连接。 因此所有问题都归 到第一种情况, 即已建立连接的情况下, 怎样发送分段数据的问题。 In many cases, the data may be divided into several segments: data = data 0 // data II data 2 // ... data n , there may be two cases in the segment data transmission: First, the router at both ends of the established connection Between the two, the second is that there is no connection between the two ends of the router. Suppose data goes Alfa→Gamma, and data 2 goes Alfa→Delta. But the second case is impossible because there is no trusted network connection process yet. If you want to take the second road, you must first establish a trusted network connection. Therefore, all problems fall into the first case, that is, how to send segmentation data in the case where a connection has been established.
在申请连接的同时已经发送了 data^ 怎样发送 data2。 如果将发送 data2的过 程作为独立过程, 走完申请过程也可以, 但是现在情况是 Alafa和 Gamma都互相 认定的基础上进行, 因此, 除第一阶段外, 只将上述 Msg3和 Msg4重复就可以: 第一段: Mas1 : Alfa→Gamma, { Alfa, Beta, T, sign 1 } While the connection request has been transmitted data ^ how transmission data 2. If the process of sending data 2 is taken as an independent process, it is OK to go through the application process, but now the situation is that both Alafa and Gamma are mutually On the basis of the determination, therefore, except for the first stage, only the above Msg3 and Msg4 can be repeated: First paragraph: Mas1: Alfa→Gamma, { Alfa, Beta, T, sign 1 }
Msg2: Gamma→Alfa, {r, sign2}  Msg2: Gamma→Alfa, {r, sign2}
Msg3i : Alfa→Gamma, {sigr^ , data! , sign sigr^}  Msg3i : Alfa→Gamma, {sigr^ , data! , sign sigr^}
Mag41 : Gamma→Alfa, {sigr^} Mag4 1 : Gamma→Alfa, {sigr^}
第二段: Msg32: Alfa→Gamma, {data2, sign42 sign52,} Second paragraph: Msg3 2 : Alfa→Gamma, {data 2 , sign4 2 sign5 2 ,}
Mag42: Gamma→Alfa, {sign62}; Mag4 2 : Gamma→Alfa, {sign6 2 };
第三段: Msg33: Alfa→Gamma, { data3, sign43, sign53} Third paragraph: Msg3 3 : Alfa→Gamma, { data 3 , sign4 3 , sign5 3 }
Mag43: Gamma→Alfa, {sign63}; 其中, sign4i= SlG。r。(T+i), (i=1 ,2,...), 因为 (T+i)是变化中的因素, 且 Alfa和 Gamma签了名, 可继续保持互信的连接状态。 Mag4 3 : Gamma→Alfa, {sign6 3 }; where sign4i= SlG. r . (T+i), (i=1,2,...), because (T+i) is a changing factor, and Alfa and Gamma are signed, they can continue to maintain the connection state of mutual trust.
本次连接过程结束, 则进入下一跳连接过程, 则经由地址 Gamma变为发送 方, 经由地址 Lamda成为接受方。 类推, 路由器一跳一跳地转发, 最后到终端路 由器。 至此, 每一路径的所有连接都得到了证明。 目的地址 Beta最后处理 data。  When the connection process is completed, the next hop connection process is entered, and the sender becomes the sender via the address Gamma, and becomes the receiver via the address Lamda. By analogy, the router forwards and hops, and finally to the terminal router. At this point, all connections to each path are proven. Destination Address Beta last processed data.
在脱加密模块 16中,数据 data的结构定义如下: Data= { Alfa, Beta, time, sign, data}, 其中 Alfa是发信方, Beta是收信方, sigr^ SK^ time  In the de-encryption module 16, the structure of the data data is defined as follows: Data = { Alfa, Beta, time, sign, data}, where Alfa is the sender, Beta is the receiver, sigr^ SK^ time
当数据为明文时, Data={Alfa, Beta, time, sign, clear-text}  When the data is in plain text, Data={Alfa, Beta, time, sign, clear-text}
当数据为密文时, Data= { Alfa, Beta, time, sign, coded-key, coded-data} 目的路由器首先认证发信方的真实性: SIG^FA (; time^sign',如果 sign=sign',When the data is ciphertext, Data= { Alfa, Beta, time, sign, coded-key, coded-data} The destination router first authenticates the authenticity of the sender: SIG^ FA (; time^sign', if sign= Sign',
Beta认为发信方是 Alfa, 则进入脱密过程。 Beta believes that the sender is Alfa and enters the densification process.
如果加脱密功能是由路由器提供的, 设 Alfa加密, Beta脱密, 由于 Alfa和 Beta之间的通信是多跳通信, 因此加密只能用 CPK的分割密钥实现, 其密钥池大 小视情况而定。  If the encryption and decryption function is provided by the router, Alfa encryption and Beta de-binding are used. Since the communication between Alfa and Beta is multi-hop communication, the encryption can only be implemented by using the split key of CPK, and the key pool size is regarded as Depending on the situation.
如果本次数据 data是需要加密的数据:  If this data data is data that needs to be encrypted:
1) 产生随机数 r, Alfa计算 key=r(G); 其中 G 是楠圆曲线的基点;  1) Generate a random number r, Alfa calculates key=r(G); where G is the base point of the round curve;
2) 用对方公钥将 key加密: ENCBETA(key)=coded-key; 2) Encrypt the key with the other party's public key: ENC BETA (key)=coded-key;
3) key 与用户的角色密钥 role-key模 2相加得到 new-key, 其中 role-key由 ID-card提供。 key erole-key= new-key; 4) 对数据加密: Enew-key (data) =coded-data; 3) The key is added to the user's role key role-key modulo 2 to get new-key, where role-key is provided by ID-card. Key erole-key= new-key; 4) Encrypt data: E new-key (data) =coded-data;
将密文 cipher=text和 coded-key发送给 Beta。  Send ciphertext cipher=text and coded-key to Beta.
Beta接到 Alfa的信号便自动进入脱密过程。  The signal that Beta receives from Alfa will automatically enter the de-binding process.
1) Beta计算私钥脱密: DECteto (coded-key)=key其中私钥 beta由 ID-card 提供 1) Beta calculation private key decryption : DEC teto (coded-key)=key where private key beta is provided by ID-card
2) 密钥 Key与角色密钥模 2加的 new-key:  2) Key Key and role key modulo 2 plus new-key:
key㊉ role-key=new-key;  Key ten role-key=new-key;
3) 数据脱密: Dnew-key(coded-data)= data; 基于上述的具体实施方式, 本发明通过在路由器上对现有 IP报头进行扩展, 对原地址和目的地址进行验证,从而提供地址真实性和生存期证明, 防止 DOS攻击 的非法接入; 提供本次连接新鲜性和生存期证明, 在路由器上防止重发攻击; 提供 路由操作环境的可信性,在路由器上防止木马等恶意软件的侵扰;在路由器上增加 脱加密功能, 保证了路由的私密性, 用于有保密或安全需要的单位、 机构或部门。 上述实施例是提供给本领域普通技术人员来实现或使用本发明的, 本领域普 通技术人员可在不脱离本发明的发明思想的情况下,对上述实施例做出种种修改或 变化, 因而本发明的保护范围并不被上述实施例所限,而应该是符合权利要求书提 到的创新性特征的最大范围。 3) Data decryption: D new-key (coded-data)= data; Based on the above specific implementation, the present invention provides an extension of the existing IP header on the router to verify the original address and the destination address, thereby providing Proof of address authenticity and lifetime, prevent illegal access by DOS attack; Provide proof of freshness and lifetime of this connection, prevent retransmission attacks on the router; Provide credibility of routing operation environment, prevent Trojans on the router, etc. Malware intrusion; add de-encryption on the router to ensure the privacy of the route, for units, institutions or departments with confidentiality or security needs. The above embodiments are provided to enable a person skilled in the art to implement or use the present invention, and those skilled in the art can make various modifications or changes to the above embodiments without departing from the inventive concept. The scope of protection of the invention is not limited by the embodiments described above, but should be the maximum range of the innovative features mentioned in the claims.

Claims

权 利 要 求 书 Claim
1、一种通过路由器或交换机实现可信网络连接的方法, 实现路由器或交换机 的网络设备之间和网络终端之间的可信网络连接,在路由器或交换机的网络设备之 间以报头中的源 IP地址或目的 IP地址、源硬件地址或目的硬件地址、指定或随机 定义的数字和字符的全部或部分进行平行或叠加作为标识互相签名认证,在联网计 算机之间以报头中的源 IP地址或目的 IP地址、源硬件地址或目的硬件地址、指定 或随机定义的数字和字符的全部或部分进行平行或叠加作为标识互相签名认证,该 方法包括: 1. A method for implementing a trusted network connection through a router or a switch, implementing a trusted network connection between network devices of a router or a switch and a network terminal, and a source in a header between network devices of a router or a switch IP address or destination IP address, source hardware address or destination hardware address, all or part of specified or randomly defined numbers and characters are parallel or superimposed as identification mutual signature authentication, between the networked computers with the source IP address in the header or The destination IP address, the source hardware address or the destination hardware address, all or part of the specified or randomly defined numbers and characters are parallel or superimposed as the identification mutual signature authentication, and the method includes:
源计算机和目的计算机、 路由器或交换机都对数字和字符定义的路由器或交 换机硬件地址、 IP 地址、 指定或随机定义的数字和字符、 计算机的硬件地址、 IP 地址、 指定或随机定义的数字和字符的全部或部分提供准确的时间证明, 并验证 其时间证明是否被修改过, 并结合硬件地址、 IP地址、 指定或随机产生的数字 和字符数据的全部或部份进行数字签名并生成时间证明、 生存期证明签名和硬 件地址、 IP 地址、 指定或随机产生的数字和字符的全部或部分数据进行平行或叠 加混合签名, 将其连同数据一起交给下一跳路由器或交换机;  Source and destination computers, routers, or switches all have numeric or character-defined router or switch hardware addresses, IP addresses, specified or randomly defined numbers and characters, computer hardware addresses, IP addresses, specified or randomly defined numbers and characters Provides accurate time proof in whole or in part, and verifies that the time proof has been modified, and digitally signs and generates time proofs in combination with hardware addresses, IP addresses, specified or randomly generated numbers and character data, all or part of it. The lifetime proof signature and the hardware address, IP address, all or part of the data of the specified or randomly generated numbers and characters are parallel or superimposed, and are handed over to the next hop router or switch along with the data;
路由器或交换机对联网计算机的时间证明、 生存期证明签名和硬件地址、 IP 地址、指定或随机产生的数字和字符的数据签名进行检查,如果验证通过则接收并 转发数据, 否则丢弃或数据湮灭;  The router or switch checks the time certificate of the networked computer, the lifetime certificate and the hardware address, the IP address, the data signature of the specified or randomly generated numbers and characters, and receives and forwards the data if the verification passes, otherwise discards or annihilates the data;
路由器或交换机对硬件地址、 IP地址、 指定或随机定义的数字和字符、 联网 计算机的源硬件地址、 ip地址、 指定或随机定义的数字和字符的全部或部分准确 的时间、 生存期证明和加密或非加密的校验和、 CPK校验认证数据、 CA认证的 校验认证数据进行数字签名, 生成吋间证明、 有效期的证明签名和校验和、 CPK 签名、 CA认证进行平行或叠加混合签名,并连同转发数据一起交给下一跳路由器; 路由器或交换机验证上一跳路由器或交换机的相关签名, 其中签名验证是逐 级展开的,每一层都对上层进行签名验证,同时路由器或交换机需要对本层相应 对象进行签名, 也通过不同 IP版本的协议隧道路由或不同 IP版本的协议转换 软件或计算机将签名验证送至目的路由器或交换机, 来保证自己的真实性, 如 果验证通过, 则将转发数据交给下一跳路由器或交换机直至目的路由器或交换机; 在转发数据到达目的路由器或交换机后, 将进行签名验证工作, 目的路由器 或交换机将经过验证通过的进行平行或叠加混合签名的数据解密成符合设计的接 收数据后, 转发数据包至目的计算机。 Router or switch for hardware address, IP address, specified or randomly defined numbers and characters, networked computer source hardware address, ip address, specified or randomly defined numbers and characters, all or part of the exact time, lifetime certificate and encryption Or non-encrypted checksum, CPK verification authentication data, CA-certified verification authentication data for digital signature, generation of diurnal certificate, validity period certification signature and checksum, CPK signature, CA authentication for parallel or superimposed hybrid signature And forwarded to the next hop router along with the forwarding data; the router or switch verifies the signature of the previous hop router or switch, where the signature verification is performed step by step, each layer performs signature verification on the upper layer, and the router or switch It is necessary to sign the corresponding object of this layer, and also send the signature verification to the destination router or switch through protocol tunnel routing of different IP versions or protocol conversion software or computer of different IP versions to ensure the authenticity of the layer. If the verification is passed, Forward data to the next hop router or exchange Until the destination router or switch; when forwarding the data reaches the destination router or switch, the signature verification work, the destination router Or the switch forwards the data to the destination computer after decrypting the verified parallel or superimposed mixed signature data into the designed received data.
2、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于, 该 IP地址是多个版本 IP协议的地址。 2. A method of implementing a trusted network connection by a router or switch according to claim 1, wherein the IP address is an address of a plurality of version IP protocols.
3、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于, 指定或随机定义的数字和字符的全部或部份作为标识互相认证。 A method of implementing a trusted network connection by a router or a switch according to claim 1, wherein all or part of the designated or randomly defined numbers and characters are mutually authenticated as the identification.
4、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于, 该硬件地址是多定义的硬件地址。 4. A method of implementing a trusted network connection by a router or switch according to claim 1, wherein the hardware address is a multi-defined hardware address.
5、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于,源或目的地的联网计算机、路由器或交换机对数字和字符定义路由器或 交换机的硬件地址、 IP 地址、 指定或随机定义的数字和字符、 源或目的地的联网 计算机的源硬件地址、 IP地址、 指定或随机定义的数字和字符的全部或部分提供 准确的时间证明和有效期, 并验证其时间证明和有效期是否曾被人修改过, 准 确的时间证明, 并验证其时间证明和有效期是否曾被人修改过的数字签名和对 数字签名结果的验证是通过指定或随机产生的硬件地址、 IP地址、 指定或随机产 生的数字和字符等数据的全部或部份进行数字平行或叠加混合签名来实现的。 5. A method of implementing a trusted network connection by a router or switch according to claim 1 wherein the source or destination networked computer, router or switch defines the hardware address and IP address of the router or switch for numbers and characters. , specified or randomly defined numbers and characters, source or destination networked computer source hardware addresses, IP addresses, specified or randomly defined numbers and characters, all or part of which provide accurate time proof and expiration date, and verify their time proof And whether the validity period has been modified, the accurate time proof, and the verification of the time certificate and the validity period have been modified by the digital signature and the verification of the digital signature result is through the specified or randomly generated hardware address, IP address, All or part of the specified or randomly generated numbers and characters are digitally parallel or superimposed with a mixed signature.
6、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于, 在 IP报头上增加源地址和目的地址或附加信息的验证内容, 出发路由 器、 转接路由器以及目的路由器对每一个 IP报头进行检验, 从而提供地址或附加 信息的真实性证明。 6. The method for implementing a trusted network connection by a router or a switch according to claim 1, wherein the source address and the destination address or the verification content of the additional information are added to the IP header, the departure router, the transit router, and the destination. The router verifies each IP header to provide proof of authenticity of the address or additional information.
7、根据权利要求 1所述的通过路由器或交换机实现可信网络连接的方法, 其 特征在于, 所有的签名都存入 IP报头中。 7. A method of implementing a trusted network connection by a router or switch according to claim 1, wherein all signatures are stored in an IP header.
8、 一种实现可信网络连接的装置, 包括: 8. A device for implementing a trusted network connection, comprising:
防止非法接入模块,在接收转发数据的时候通过对原发 IP地址报头中的数字 平行或叠加混合签名的验证来判断是否对转发数据进行接收, 以防止非法接入; 防止重发攻击模块, 通过连接的数字平行或叠加混合签名中的 IP地址及签名 的时间有效期的新鲜性证明来防止重发攻击;  Preventing the illegal access module from determining whether to forward the forwarded data by detecting the digital parallel or superimposed mixed signature in the original IP address header when receiving the forwarded data to prevent illegal access; preventing the retransmission attack module from being Prevent retransmission attacks by the IP address of the connected digital parallel or superimposed hybrid signature and the freshness of the time validity of the signature;
防止木马侵扰模块, 可信网络连接的路由器和交换机对路由器和交换机进行 数字平行或叠加混合签名,如果携带木马程序的网络数据没有得到签名,则无法到 达目的地计算机, 通过路由操作环境可信性防止非转发目的地计算机的木马侵扰; 脱加密模块, 通过对转发数据的脱加密过程保证路由私密性。  To prevent Trojan intrusion module, the router and switch connected by trusted network perform digital parallel or superimposed hybrid signature on router and switch. If the network data carrying Trojan is not signed, it cannot reach the destination computer, and the credibility of routing operation environment Prevent Trojan intrusion from non-forwarding destination computers; De-encryption module ensures routing privacy by de-encrypting the forwarding data.
9、 根据权利要求 8所述的实现可信网络连接的装置, 其特征在于, 该装置是 IP网络的路由器或电路网络的交换机。 9. Apparatus for implementing a trusted network connection according to claim 8, wherein the apparatus is a router of a IP network or a switch of a circuit network.
PCT/CN2011/071679 2010-03-10 2011-03-10 Method and device for realizing trusted network connection through router or switch WO2011110096A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010120869.1A CN101808142B (en) 2010-03-10 2010-03-10 Method and device for realizing trusted network connection through router or switch
CN201010120869.1 2010-03-10

Publications (1)

Publication Number Publication Date
WO2011110096A1 true WO2011110096A1 (en) 2011-09-15

Family

ID=42609761

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/071679 WO2011110096A1 (en) 2010-03-10 2011-03-10 Method and device for realizing trusted network connection through router or switch

Country Status (2)

Country Link
CN (1) CN101808142B (en)
WO (1) WO2011110096A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618607A (en) * 2013-11-29 2014-03-05 北京易国信科技发展有限公司 Method for data security transmission and key exchange
CN106341396A (en) * 2016-08-24 2017-01-18 北京匡恩网络科技有限责任公司 Industrial control system with intrusion tolerance and security protection method
CN116614315A (en) * 2023-07-19 2023-08-18 国家计算机网络与信息安全管理中心江西分中心 IPv6 security protection method for realizing application cloud security hosting

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808142B (en) * 2010-03-10 2013-03-27 上海十进制网络信息技术有限公司 Method and device for realizing trusted network connection through router or switch
CN105812137A (en) * 2014-12-29 2016-07-27 中兴通讯股份有限公司 Signature method and signature device
CN106534070B (en) * 2016-10-09 2019-06-28 清华大学 It is a kind of to resist counterfeit low overhead Router Distinguisher generation method
CN106911428B (en) * 2017-02-23 2020-08-28 北京龙鼎源科技股份有限公司 Information transmission method and device
CN107241339B (en) * 2017-06-29 2020-03-03 北京小米移动软件有限公司 Identity authentication method, identity authentication device and storage medium
EP3439210B1 (en) * 2017-07-31 2019-12-25 Mitsubishi Electric R&D Centre Europe B.V. Reliable cut-through switching for ieee 802.1 time sensitive networking standards
CN112910882B (en) * 2021-01-28 2022-08-12 山东有人物联网股份有限公司 Network management method, device, system and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482549A (en) * 2002-09-09 2004-03-17 中国科学院研究生院 Identity authentication device and method for network equipment
CN1503525A (en) * 2002-11-26 2004-06-09 华为技术有限公司 IP network system for realizing safety verification and method thereof
WO2005015827A1 (en) * 2003-08-08 2005-02-17 T.T.T.Kabushikikaisha Communication system, communication device, communication method, and communication program for realizing the same
CN101808142A (en) * 2010-03-10 2010-08-18 上海十进制网络信息技术有限公司 Method and device for realizing trusted network connection through router or switch

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101156349B (en) * 2005-01-21 2013-01-02 日本电气株式会社 Signing device, verifying device, certifying device, encrypting device, and decrypting device
CN100452799C (en) * 2006-09-19 2009-01-14 清华大学 Method for preventing forgery of source address based on signature authentication inside IPv6 sub network
CN100364306C (en) * 2006-09-19 2008-01-23 清华大学 Identifying method for IPv6 actual source address between autonomy systems based on signature

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482549A (en) * 2002-09-09 2004-03-17 中国科学院研究生院 Identity authentication device and method for network equipment
CN1503525A (en) * 2002-11-26 2004-06-09 华为技术有限公司 IP network system for realizing safety verification and method thereof
WO2005015827A1 (en) * 2003-08-08 2005-02-17 T.T.T.Kabushikikaisha Communication system, communication device, communication method, and communication program for realizing the same
CN101808142A (en) * 2010-03-10 2010-08-18 上海十进制网络信息技术有限公司 Method and device for realizing trusted network connection through router or switch

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618607A (en) * 2013-11-29 2014-03-05 北京易国信科技发展有限公司 Method for data security transmission and key exchange
CN103618607B (en) * 2013-11-29 2016-07-06 北京信长城技术研究院 A kind of Security Data Transmission and key exchange method
CN106341396A (en) * 2016-08-24 2017-01-18 北京匡恩网络科技有限责任公司 Industrial control system with intrusion tolerance and security protection method
CN116614315A (en) * 2023-07-19 2023-08-18 国家计算机网络与信息安全管理中心江西分中心 IPv6 security protection method for realizing application cloud security hosting
CN116614315B (en) * 2023-07-19 2023-10-27 国家计算机网络与信息安全管理中心江西分中心 IPv6 security protection method for realizing application cloud security hosting

Also Published As

Publication number Publication date
CN101808142B (en) 2013-03-27
CN101808142A (en) 2010-08-18

Similar Documents

Publication Publication Date Title
Ahmed et al. IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey
WO2011110096A1 (en) Method and device for realizing trusted network connection through router or switch
US7069438B2 (en) Establishing authenticated network connections
CN1578218B (en) Reducing network configuration complexity with transparent virtual private networks
CN103765846B (en) System and method for interlocking main frame and gateway
US9602485B2 (en) Network, network node with privacy preserving source attribution and admission control and device implemented method therfor
Liu et al. A lightweight authentication scheme based on self‐updating strategy for space information network
WO2018075965A1 (en) Dark virtual private networks and secure services
WO2015174100A1 (en) Packet transfer device, packet transfer system, and packet transfer method
Jiang et al. Secure DHCPv6 Using CGAs
JP4783340B2 (en) Protecting data traffic in a mobile network environment
Joshi Network security: know it all
WO2011035618A1 (en) Method and system for route address secure processing
EP1836559B1 (en) Apparatus and method for traversing gateway device using a plurality of batons
Anderson Securing embedded linux
Oberoi et al. ARCN: Authenticated routing on cloud network to mitigate insider attacks on infrastructure as a service
David et al. A framework for secure single sign-on
Sharp Network Security
Jiang et al. Security‐Oriented Network Architecture
Dolnák Secure mutual exchange of messages between network nodes inspired by security technologies for electronic mail exchange
Luna Man-in-the–Middle Attack
Ganguly Network and application security: fundamentals and practices
Kotzanikolaou et al. Computer network security: Basic background and current issues
Garimella et al. Secure Shell-Its significance in Networking (SSH)
Jeelani An insight of ssl security attacks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11752839

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11752839

Country of ref document: EP

Kind code of ref document: A1