WO2013155712A1 - 密钥交换方法及装置、网元 - Google Patents

密钥交换方法及装置、网元 Download PDF

Info

Publication number
WO2013155712A1
WO2013155712A1 PCT/CN2012/074469 CN2012074469W WO2013155712A1 WO 2013155712 A1 WO2013155712 A1 WO 2013155712A1 CN 2012074469 W CN2012074469 W CN 2012074469W WO 2013155712 A1 WO2013155712 A1 WO 2013155712A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
message
key exchange
network element
information
Prior art date
Application number
PCT/CN2012/074469
Other languages
English (en)
French (fr)
Inventor
欧阳逵
夏顺东
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to PCT/CN2012/074469 priority Critical patent/WO2013155712A1/zh
Publication of WO2013155712A1 publication Critical patent/WO2013155712A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Definitions

  • the present invention relates to a key exchange technology, and in particular, to a key exchange method and device, and a network element in an Ethernet Passive Optical Network (EPON) system.
  • EPON Ethernet Passive Optical Network
  • EPON is a new generation broadband passive optical integrated access technology based on IEEE802.3-2005 Section 5 standard.
  • EPON system usually consists of optical line terminal (OLT, Optical Line Terminal) and user-side optical network unit (ONU, Optical Network Unit ) / Optical Network Termination (ONT) and Optical Distribution Network (ODN).
  • ODN Optical Distribution Network
  • the ODN consists of a single-mode fiber and a passive optical device such as an optical splitter or an optical connector, providing an optical transmission medium for the physical connection between the OLT and the ONU.
  • ODNs are usually point-to-multipoint structures, where one OLT connects multiple ONUs.
  • the service traffic is divided into two directions: uplink and downlink:
  • the uplink refers to the direction sent from the ONU to the OLT
  • the downlink refers to the direction sent from the OLT to the ONU.
  • the EPON system is sent in the broadcast direction, so that malicious users can easily intercept the information sent to other users in the system.
  • the triple direction is supported in the downstream direction.
  • the agitation function is: The OLT proposes a key update request, and the ONU provides a 3-byte agitation key, which is used by the OLT to complete the agitation function. After the agitation function is enabled, all data frames and protocol frames are agitated.
  • FIG. 1 is a flow chart of the existing key exchange, which is the implementation process specified in "China Telecom EPON Equipment Technical Requirements V2.1". As shown in Figure 1, the key exchange includes the following steps: 1) The OLT sends a new key request message to the ONU: ⁇ IDXc ⁇ , where IDXc is the index of the currently used key of the OLT;
  • the ONU sends a new key message to the OLT: ⁇ IDXn, KEY ⁇ , where IDXn is the new key index, ie the complement of IDXc, and KEY is the new key;
  • the OLT After receiving the new key message, the OLT encrypts with the new key, and sends the IDXc to the leading part in the frame sent to the ONU to notify the ONU to decrypt using the new key;
  • step 1) If the OLT does not receive the new key message within a certain period of time, it will jump to step 1) to repeat the above process.
  • the key is periodically replaced between the ONU and the OLT. This is a good way to avoid security issues, but it also introduces some unreliability factors, including the following:
  • step 1) the ONU receives the wrong key index for some reason, which causes the key used by the ONU to decrypt the card to be inconsistent with the OLT, causing the ONU to drop;
  • step 3 the OLT may receive the wrong key due to some transmission link factors or due to malicious users.
  • the key used by the ONU is inconsistent, causing the ONU to drop.
  • step 4 the OLT may receive the previous new key message after the timeout, so the OLT will receive two new key messages with the same index, so that the OLT uses the same index twice. Switching the key will cause the ONU key to be inconsistent, causing the ONU to drop.
  • the embodiment of the invention provides a key exchange method and device, and a network element, which can avoid the key inconsistency caused by the delay of the key exchange key, and can also prevent the malicious user from acquiring or transmitting the key.
  • a key exchange method includes:
  • the network element When performing key exchange, the network element adds timestamp information and/or signature information to the key exchange message to be sent.
  • the method further includes:
  • the network element After receiving the key exchange message, the network element determines that the timestamp information/signature information in the received key exchange message satisfies the set condition, or the timestamp information and the signature information satisfy the set condition.
  • the obtained key exchange message is legal, otherwise the received key exchange is discarded, and the setting conditions include:
  • the network element that receives the key exchange message can pass the verification of the signature information.
  • the signature information is a signature of the network element on the timestamp information and the key information by using the private key of the network element;
  • the signature information is a signature of the network element by the network element using its own private key.
  • the network element includes an optical line terminal OLT and an optical network unit ONU.
  • the method further includes:
  • the OLT sends a new key request message to the ONU, where the new key request message carries timestamp information and/or signature information;
  • the ONU verifies the signature in the new key request message, and discards the new key request message when the verification fails; or the ONU determines the time and time when the new key request message is received. Whether the difference in the time indicated by the stamp exceeds the set transmission delay, and the new key request message is discarded.
  • the method further includes:
  • the new key message is sent to the OLT;
  • the new key request message carries new key information, and timestamp information and/or signature information;
  • the OLT verifies the signature in the new key message, and discards the signature when the verification fails. Or the OLT determines whether the difference between the time when the new key message is received and the time indicated by the timestamp exceeds a set transmission delay, and discards the new key message. When the new key message is legal, the new key in the new key message is obtained.
  • a key exchange device the device includes an adding unit and a sending unit, where: an adding unit, configured to add timestamp information and/or signature information to a key exchange message to be sent;
  • a sending unit configured to send the key exchange message.
  • the apparatus also includes a receiving unit and a determining unit, wherein:
  • a receiving unit configured to receive a key exchange message
  • a determining unit configured to determine, when the timestamp information/signature information in the received key exchange message satisfies a set condition, or when the timestamp information and the signature information satisfy a set condition, determine the received key exchange The message is valid, otherwise the received key exchange message is discarded.
  • the setting conditions include:
  • the network element that receives the key exchange message can pass the verification of the signature information.
  • a network element includes the aforementioned key exchange device.
  • the network element includes an OLT and an ONU.
  • the timestamp information and/or the signature information is added to the key exchange message to be sent, so that the key inconsistency in the key interaction process can be avoided. Avoid offline network elements during the interaction process to ensure the stability of communication.
  • Figure 1 is a flow chart of an existing key exchange
  • FIG. 2 is a flowchart of a method for key exchange according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of another method for key exchange according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a device for performing key exchange according to an embodiment of the present invention.
  • the basic idea of the present invention is to: add a timestamp information to a key interaction message between network elements, or use a signature in a key interaction message between network elements to ensure the security of network element interaction. Alternatively, add timestamp information to the key interaction message and use the signature at the same time.
  • the network element mainly includes an OLT and an ONU.
  • the following takes the key exchange exchange between the OLT and the ONU as an example to clarify the essence of the technical solution of the present invention.
  • Step 201 The OLT sends a new key request message to the ONU.
  • the new key request message needs to be extended, and the extended new key request message is: ⁇ IDXc, TimeStampc, X (IDXc, TimsStampc) ⁇ , where TimeStampc is the current time when the OLT sends a new key request message. Poke, X ( IDXc , TimsStampc ) is the signature of the OLT on IDXc and TimeStampc using its own private key.
  • the format of the new key request message is as shown in Table 1.
  • the timestamp information and signature information are added on the basis of the original new key request message.
  • the format of the new key request message is expanded. See China Telecom EPON.
  • the relevant format in the device technical requirement V2.1, the details of the format are not described in the present invention.
  • the timestamp information and the signature information can only achieve the purpose of the present invention by using only one of them, but the implementation effect is not optimal, because the implementation method and the time stamp information and the signature information are simultaneously added in the key interaction message. The way is exactly the same, this example does not give a specific implementation.
  • Step 202 The ONU uses the public key of the OLT to verify whether the signature is consistent with (IDXc, TimeStampc), and discards the new key request message if it is inconsistent, and caches the new key request message when it is consistent; if the new key request message is also carried
  • the timestamp information determines whether the time difference between the time when the new key request message is received and the timestamp is greater than the set transmission delay. If the time difference is greater than the transmission delay, the new key request message is also discarded. It should be noted that if the signature information is not added to the new key request message, it is directly determined whether the time difference between the current time of receiving the new key request message and the timestamp is greater than the set transmission delay.
  • Step 203 The ONU sends a new key message to the OLT.
  • the new key message needs to be extended.
  • the extended new key message is: ⁇ IDXn, KEY, TimeStampn, Y ( IDXn , KEY , TimeStampn ) ⁇ , where TimeStampn is the current timestamp of the ONU, Y (IDXn) , KEY, TimeStampn ) is the signature of the ONU using the private key pair ( IDXn, KEY, TimeStampn ).
  • the format of the new key message extension is shown in Table 2. Among them, based on the original new key message, timestamp information and signature information are added. The format of the new key message extension can be found in China. The relevant format in the technical requirements of the telecommunications EPON equipment V2.1, the details of the format are not described in the present invention. It should be noted that the timestamp information and the signature information can only achieve the purpose of the present invention by using only one of them, but the implementation effect is not optimal, because the implementation method and the time stamp information and the signature information are simultaneously added in the key interaction message. The way is exactly the same, this example does not give a specific implementation.
  • Step 204 The OLT uses the public key of the ONU to verify whether the signature is consistent with (IDXc, TimeStampc), and if the inconsistency, the new key message is discarded, and the new key message is cached if the new key message carries the timestamp information. And determining whether the time difference between the time when the new key request message is received and the timestamp is greater than the set transmission delay. If the time difference is greater than the transmission delay, the new key request message is also discarded. It should be noted that if the signature information is not added in the new key message, it is directly determined whether the time difference between the time and the timestamp of the current new key request message is greater than the set transmission delay.
  • FIG. 3 is a flowchart of another key exchange according to an embodiment of the present invention. As shown in FIG. 3, it is an OLT.
  • the detailed process of key exchange with the ONU, the process of key exchange in this example includes the following steps:
  • Step 301 Start an OLT key update cycle timer key_update_timer.
  • Step 302 Determine whether the key_update_timer expires. If the timer key_update_timer expires, the key update process is started, and step 303 is performed.
  • Step 303 The OLT acquires the local timestamp information TimsStampc, and uses the OLT private key to calculate the signature X (IDXc, TimsStampc) of the key index and the timestamp information.
  • Step 304 The OLT sends a new key request message to the ONU to expand to: ⁇ IDXc, TimeStampc, X (IDXc, TimsStampc) ⁇ .
  • Step 305 The ONU receives the new key request message of the OLT, and uses the OLT public key to verify whether the signature is correct. If the signature authentication fails, step 302 is performed.
  • Step 306 Use the ONU local timestamp ( TimsStampn ) to verify whether the new key request message is sent out. If TimsStampn - TimsStampc > sets the transmission delay, discard the message and go to step 302.
  • Step 307 after the new key request message is verified, the ONU uses the local timestamp.
  • TimsStampn and ONU private keys construct a new key message ⁇ IDXn, KEY, TimeStampn, Y ( IDXn, KEY, TimeStampn ) ⁇ and send it to the OLT.
  • Step 308 After receiving the new key message of the ONU, the OLT first determines whether the signature is correct by using the ONU public key. If the verification fails, step 302 is performed;
  • Step 309 verifying whether the new key message is sent or not, if TimsStampc
  • TimeStampn Set the transmission delay, discard the new key message, and go to step 302. If not exceeded, the new key in the new key message is received and stored.
  • FIG. 4 is a schematic structural diagram of a device for performing key exchange according to an embodiment of the present invention. As shown in FIG. 4, the device for adding a key exchange unit 40 and a sending unit 41 of the present embodiment, wherein:
  • Adding unit 40 configured to add timestamp information and/or sign in the key exchange message to be sent Name information
  • the sending unit 41 is configured to send the key exchange message.
  • the apparatus for key exchange of this embodiment further includes a receiving unit (not shown in Fig. 4) and a determining unit (not shown in Fig. 4), wherein:
  • a receiving unit configured to receive a key exchange message
  • a determining unit configured to determine, when the timestamp information/signature information in the received key exchange message satisfies a set condition, or when the timestamp information and the signature information satisfy a set condition, determine the received key exchange The message is valid, otherwise the received key exchange message is discarded.
  • the above setting conditions include:
  • the network element that receives the key exchange message can pass the verification of the signature information.
  • the present invention also describes a network element, including the apparatus for key exchange shown in FIG.
  • the above network elements mainly include an OLT and an ONU.
  • the key inconsistency between the OLT and the ONU during the key interaction process can be avoided, and the network element is prevented from being offline during the key interaction process, thereby ensuring communication stability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

本发明涉及通信领域,公开了一种密钥交换方法及装置、网元,其中,所述方法包括:进行密钥交换时,网元在待发送的密钥交换消息中添加时间戳信息和/或签名信息。本发明实施例中,网元之间进行密钥交换时,在待发送的密钥交换消息中添加时间戳信息和/或签名信息,从而可以避免了在密钥交互过程中的密钥不一致,避免在交互过程中网元离线,从而保证通信的稳定性。

Description

密钥交换方法及装置、 网元 技术领域
本发明涉及密钥交换技术, 特别涉及一种以太无源光网络(EPON, Ethernet Passive Optical Network ) 系统中密钥交换方法及装置、 网元。 背景技术
EPON是基于 IEEE802.3-2005 Section 5标准的新一代宽带无源光综合 接入技术, EPON 系统通常由局侧的光线路终端 ( OLT , Optical Line Terminal )、 用户侧的光网络单元( ONU , Optical Network Unit ) /光网络终 端 (ONT , Optical Network Termination ) 和光分配网络 (ODN, Optical Distribution Network )组成。 ODN由单模光纤和光分路器、 光连接器等无 源光器件组成, 为 OLT和 ONU之间的物理连接提供光传输媒质。 ODN通 常为点到多点结构, 即一个 OLT连接多个 ONU。
EPON系统中业务流量分为上行和下行两个方向: 上行是指从 ONU向 OLT发送的方向, 下行是指从 OLT向 ONU发送的方向。 而 EPON系统下 行方向采用广播方式发送, 这样, 恶意用户很容易就能截获系统中发送给 其他用户的信息。 为了提高用户数据的安全性, 下行方向支持三重搅动功 能。 搅动功能为: 由 OLT提出密钥更新要求, ONU提供 3字节搅动密钥, OLT使用此密钥完成搅动功能。 在启用搅动功能后, 对所有的数据帧和协 议帧进行搅动。
密钥更新过程通过使用新密钥请求帧 ( new— key— request )和密钥通知 帧( new— churning— key )来实现。 图 1为现有密钥交换的流程图, 为 《中国 电信 EPON设备技术要求 V2.1》规定的实现过程, 如图 1所示, 其密钥交 换包括以下步驟: 1 ) OLT向 ONU发送生成新密钥请求消息: {IDXc} ,其中 IDXc是 OLT 当前使用密钥的索引;
2 ) ONU向 OLT发送新密钥消息: {IDXn, KEY} , 其中 IDXn是新密 钥索引, 即 IDXc的补码, KEY是新密钥;
3 ) OLT收到新密钥消息后, 使用新密钥加密, 并在向 ONU发送帧中 的前导部分标记 IDXc , 通知 ONU使用新密钥解密;
4 )若 OLT在一定时间内没收到新密钥消息, 会跳转到步驟 1 )重复前 述流程。
通过上述标准流程, ONU和 OLT之间周期性地更换密钥。这样能很好 地避免安全性问题, 但这也引入了一些不可靠性因素, 主要包括以下几个 方面:
1 )在步驟 1 ) 中, 因某些原因造成 ONU接收到错误密钥索引, 会造 成 ONU用于解密的密钥和 OLT不一致, 导致 ONU掉线;
2 )在步驟 3 ) 中, 因某些传输环节因素或因恶意用户^^冒, OLT可能 会收到错误密钥, 和 ONU实际使用的密钥不一致, 造成 ONU掉线;
3 )在步驟 4 ) 中, 因某种原因可能使 OLT在超时后收到前一次新密钥 消息, 这样 OLT会收到两个带相同索引的新密钥消息, 这样 OLT 两次使 用相同索引切换密钥, 会造成和 ONU密钥不一致, 导致 ONU掉线。 发明内容
本发明实施例提供一种密钥交换方法及装置、 网元, 能避免密钥交换 钥匙因延迟导致的密钥不一致, 也能避免恶意用户获取或发送密钥。
本发明实施例提供的具体技术方案如下:
一种密钥交换方法, 包括:
进行密钥交换时, 网元在待发送的密钥交换消息中添加时间戳信息和 / 或签名信息。 其中, 所述方法还包括:
网元接收到密钥交换消息后, 在所接收到的密钥交换消息中的时间戳 信息 /签名信息满足设定条件时、 或时间戳信息及签名信息均满足设定条件 时, 确定所接收到的密钥交换消息合法, 否则丟弃所接收到的密钥交换消 其中, 所述设定条件包括:
接收到密钥交换消息的时刻与时间戳指示的时刻的差值未超过设定的 传输时延;
和 /或, 接收到密钥交换消息的网元能通过签名信息的验证。
其中, 所述签名信息为网元利用自身的私钥对时间戳信息和密钥信息 进行的签名;
或者, 所述签名信息为网元利用自身的私钥对密钥信息进行的签名。 其中, 所述网元包括光线路终端 OLT和光网络单元 ONU。
其中, 所述方法还包括:
所述 OLT向所述 ONU发送新密钥请求消息, 所述新密钥请求消息中 携带有时间戳信息和 /或签名信息;
所述 ONU对所述新密钥请求消息中的签名进行验证,验证未通过时丟 弃所述新密钥请求消息; 或者, 所述 ONU确定接收到所述新密钥请求消息 的时刻与时间戳指示的时刻的差值是否超过设定的传输时延, 是时丟弃所 述新密钥请求消息。
其中, 所述方法还包括:
所述 ONU确定所接收到的密钥交换消息合法时, 向所述 OLT发送新 密钥消息; 所述新密钥请求消息中携带有新密钥信息、 以及时间戳信息和 / 或签名信息;
所述 OLT对所述新密钥消息中的签名进行验证, 验证未通过时丟弃所 述新密钥消息; 或者, 所述 OLT确定接收到所述新密钥消息的时刻与时间 戳指示的时刻的差值是否超过设定的传输时延, 是时丟弃所述新密钥消息; 在所述新密钥消息合法时, 获取所述新密钥消息中的新密钥。
一种密钥交换装置, 所述装置包括添加单元和发送单元, 其中: 添加单元, 用于在待发送的密钥交换消息中添加时间戳信息和 /或签名 信息;
发送单元, 用于发送所述密钥交换消息。
所述装置还包括接收单元和确定单元, 其中:
接收单元, 用于接收密钥交换消息;
确定单元, 用于在所接收到的密钥交换消息中的时间戳信息 /签名信息 满足设定条件时、 或时间戳信息及签名信息均满足设定条件时, 确定所接 收到的密钥交换消息合法, 否则丟弃所接收到的密钥交换消息。
其中, 所述设定条件包括:
接收到密钥交换消息的时刻与时间戳指示的时刻的差值未超过设定的 传输时延;
和 /或, 接收到密钥交换消息的网元能通过签名信息的验证。
一种网元, 包括前述的密钥交换装置。
其中, 所述网元包括 OLT和 ONU。
本发明实施例中, 网元之间进行密钥交换时, 在待发送的密钥交换消 息中添加时间戳信息和 /或签名信息, 从而可以避免了在密钥交互过程中的 密钥不一致, 避免在交互过程中网元离线, 从而保证通信的稳定性。 附图说明
图 1为现有密钥交换的流程图;
图 2为本发明实施例密钥交换的方法的流程图;
图 3为本发明实施例的另一密钥交换的方法流程图; 图 4为本发明实施例密钥交换的装置的组成结构示意图。 具体实施方式 本发明的基本思想为: 在网元间的密钥交互消息中加入时间戳信息, 或者在网元间的密钥交互消息中使用签名, 以保证网元交互的安全性。 或 者, 在密钥交互消息中加入时间戳信息且同时使用签名。
本发明中, 网元主要包括 OLT和 ONU。 以下以 OLT和 ONU之间的密 钥交互交换为例, 阐明本发明技术方案的实质。
步驟 201 , OLT向 ONU发送新密钥请求消息。
本发明中, 需要对新密钥请求消息进行扩展, 扩展后的新密钥请求消 息为: {IDXc , TimeStampc, X ( IDXc , TimsStampc ) } ,其中 TimeStampc 是 OLT发送新密钥请求消息的当前时间戳, X ( IDXc , TimsStampc )是 OLT使用自身私钥对 IDXc和 TimeStampc的签名。
新密钥请求消息扩展后的格式如表 1 所示, 其中, 在原新密钥请求消 息的基础上, 增设了时间戳信息和签名信息, 新密钥请求消息扩展后的格 式可参见中国电信 EPON设备技术要求 V2.1》 中的相关格式, 本发明不再 赘述其格式细节。 需要说明的是, 时间戳信息和签名信息仅使用其一也能 实现本发明的目的, 只是实现效果非最佳而已, 由于实现方式与在密钥交 互消息中同时添加时间戳信息和签名信息的方式完全相同, 本示例不再给 出具体的实现方式。
Octets
6 Destination Address=01 -80-C2-00-00-02
6 Source Address
2 Length/Type=0x8809[Slow Protocol]
1 Subtype=0x03[OAM]
2 Flags
1 Code=0xFE
3 OUI
1 Ext. Opcode=0x09
1 Churning code=OxOO(new_key_req uest)
1 ln-use— Key Index
36 Pad
4 FCS 表 1
步驟 202, ONU使用 OLT的公钥验证签名是否与( IDXc, TimeStampc ) 一致, 不一致则丟弃新密钥请求消息, 一致时緩存该新密钥请求消息; 如 果新密钥请求消息中还携带有时间戳信息, 则确定当前接收新密钥请求消 息时间与时间戳之间的时差是否大于设定的传输时延, 如果大于传输时延, 也丟弃该新密钥请求消息不处理。 需要说明的是, 如果新密钥请求消息中 未添加签名信息, 则直接确定当前接收新密钥请求消息时间与时间戳之间 的时差是否大于设定的传输时延。
步驟 203 , ONU向 OLT发送新密钥消息。 本发明中, 需要对新密钥消 息进行扩展, 扩展后的新密钥消息为: { IDXn, KEY, TimeStampn, Y ( IDXn , KEY , TimeStampn ) }, 其中 TimeStampn是 ONU当前时间戳, Y( IDXn, KEY, TimeStampn )是 ONU使用私钥对( IDXn, KEY, TimeStampn ) 的签名。
新密钥消息扩展后的格式如表 2所示, 其中, 在原新密钥消息的基础 上, 增设了时间戳信息和签名信息, 新密钥消息扩展后的格式可参见中国 电信 EPON设备技术要求 V2.1》 中的相关格式, 本发明不再赘述其格式细 节。 需要说明的是, 时间戳信息和签名信息仅使用其一也能实现本发明的 目的, 只是实现效果非最佳而已, 由于实现方式与在密钥交互消息中同时 添加时间戳信息和签名信息的方式完全相同, 本示例不再给出具体的实现 方式。
Octets
6 Destination Address=01-80-c2-00-00-02
6 Source Address
2 Length/Type=0x8809[Slow Protocol]
1 Subtype=0x03[OAM]
2 Flags
1 Code=0xFE
3 OUI
1 Ext. Opcode=0x09
1 Churning∞de=0x00(new— key— request)
1 ln-use_Key Index
4 TimeStamp
4 Signature
28 Pad
4 FCS 表 2
步驟 204, OLT使用 ONU的公钥验证签名是否与( IDXc, TimeStampc ) 一致, 不一致则丟弃新密钥消息, 一致时緩存该新密钥消息; 如果新密钥 消息中还携带有时间戳信息, 则确定当前接收新密钥请求消息时间与时间 戳之间的时差是否大于设定的传输时延, 如果大于传输时延, 也丟弃该新 密钥请求消息不处理。 需要说明的是, 如果新密钥消息中未添加签名信息, 则直接确定当前接收新密钥请求消息时间与时间戳之间的时差是否大于设 定的传输时延。
图 3为本发明实施例的另一密钥交换的流程图, 如图 3所示, 为 OLT 与 ONU之间的密钥交换的详细处理过程,本示例的密钥交换的流程包括以 下步驟:
步驟 301 , 启动 OLT密钥更新周期定时器 key— update— timer。
步驟 302 , 判断 key— update— timer 是否超时, 如果定时器 key— update— timer超时, 启动密钥更新过程, 执行步驟 303。
步驟 303 , OLT获取本地时间戳信息 TimsStampc, 同时使用 OLT私钥 计算密钥索引和时间戳信息的签名 X ( IDXc, TimsStampc )。
步驟 304 , OLT 向 ONU 发送新密钥请求消息扩展为: {IDXc , TimeStampc, X ( IDXc, TimsStampc ) }。
步驟 305 , ONU接收到 OLT的新密钥请求消息,使用 OLT公钥验证签 名是否正确。 如果签名认证失败, 则执行步驟 302。
步驟 306, 使用 ONU本地时间戳 ( TimsStampn )验证新密钥请求消息 发送是否超时。 如果 TimsStampn - TimsStampc >设定传输延时, 则丟弃该 消息, 执行步驟 302。
步驟 307 , 新密钥请求消息验证通过后, ONU 使用本地时间戳
TimsStampn和 ONU私钥, 构造新密钥消息 { IDXn, KEY, TimeStampn, Y ( IDXn, KEY, TimeStampn ) } , 并发送给 OLT。
步驟 308, OLT接收到 ONU的新密钥消息后, 首先使用 ONU公钥判 断签名是否正确。 如果验证失败, 则执行步驟 302;
步驟 309 , 验证新密钥消息发送是否超时, 如果 TimsStampc
TimeStampn >设定传输时延, 则丟弃新密钥消息, 执行步驟 302。 如果未超 时则接收新密钥消息中新密钥并存储。
图 4为本发明实施例密钥交换的装置的组成结构示意图, 如图 4所示, 本实施例密钥交换的装置添加单元 40和发送单元 41 , 其中:
添加单元 40, 用于在待发送的密钥交换消息中添加时间戳信息和 /或签 名信息;
发送单元 41 , 用于发送所述密钥交换消息。
在图 4所示密钥交换的装置的基础上, 本实施例密钥交换的装置还包 括接收单元(图 4中未示出)和确定单元(图 4中未示出), 其中:
接收单元, 用于接收密钥交换消息;
确定单元, 用于在所接收到的密钥交换消息中的时间戳信息 /签名信息 满足设定条件时、 或时间戳信息及签名信息均满足设定条件时, 确定所接 收到的密钥交换消息合法, 否则丟弃所接收到的密钥交换消息。
其中, 上述设定条件包括:
接收到密钥交换消息的时刻与时间戳指示的时刻的差值未超过设定的 传输时延;
和 /或, 接收到密钥交换消息的网元能通过签名信息的验证。
本领域技术人员应当理解, 图 4 中所示的密钥交换的装置中的各处理 单元的实现功能可参照前述密钥交换的方法的相关描述而理解。 本领域技 术人员应当理解, 图 4所示的密钥交换的装置中各处理单元的功能可通过 运行于处理器上的程序而实现, 也可通过具体的逻辑电路而实现。
本发明还记载了一种网元, 包括图 4所示的密钥交换的装置。
上述网元主要包括 OLT和 ONU。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。
工业实用性
通过本发明的实施例中, 可以避免 OLT和 ONU在密钥交互过程中的 密钥不一致, 避免在密钥交互过程中网元离线, 从而保证通信的稳定性。

Claims

权利要求书
1、 一种密钥交换方法, 其中, 所述方法包括:
进行密钥交换时, 网元在待发送的密钥交换消息中添加时间戳信息和 / 或签名信息。
2、 根据权利要求 1所述的方法, 其中, 所述方法还包括:
网元接收到密钥交换消息后, 在所接收到的密钥交换消息中的时间戳 信息 /签名信息满足设定条件时、 或时间戳信息及签名信息均满足设定条件 时, 确定所接收到的密钥交换消息合法, 否则丟弃所接收到的密钥交换消
3、 根据权利要求 2所述的方法, 其中, 所述设定条件包括:
接收到密钥交换消息的时刻与时间戳指示的时刻的差值未超过设定的 传输时延;
和 /或, 接收到密钥交换消息的网元能通过签名信息的验证。
4、 根据权利要求 2或 3所述的方法, 其中, 所述签名信息为网元利用 自身的私钥对时间戳信息和密钥信息进行的签名;
或者, 所述签名信息为网元利用自身的私钥对密钥信息进行的签名。
5、 根据权利要求 1至 4中任一项所述的方法, 其中, 所述网元包括光 线路终端 OLT和光网络单元 ONU。
6、 根据权利要求 5所述的方法, 其中, 所述方法还包括:
所述 OLT向所述 ONU发送新密钥请求消息, 所述新密钥请求消息中 携带有时间戳信息和 /或签名信息;
所述 ONU对所述新密钥请求消息中的签名进行验证,验证未通过时丟 弃所述新密钥请求消息; 或者, 所述 ONU确定接收到所述新密钥请求消息 的时刻与时间戳指示的时刻的差值是否超过设定的传输时延, 是时丟弃所 述新密钥请求消息。
7、 根据权利要求 6所述的方法, 其中, 所述方法还包括: 所述 ONU确定所接收到的密钥交换消息合法时, 向所述 OLT发送新 密钥消息; 所述新密钥请求消息中携带有新密钥信息、 以及时间戳信息和 / 或签名信息;
所述 OLT对所述新密钥消息中的签名进行验证, 验证未通过时丟弃所 述新密钥消息; 或者, 所述 OLT确定接收到所述新密钥消息的时刻与时间 戳指示的时刻的差值是否超过设定的传输时延, 是时丟弃所述新密钥消息; 在所述新密钥消息合法时, 获取所述新密钥消息中的新密钥。
8、 一种密钥交换装置, 所述装置包括添加单元和发送单元, 其中: 添加单元, 用于在待发送的密钥交换消息中添加时间戳信息和 /或签名 信息;
发送单元, 用于发送所述密钥交换消息。
9、根据权利要求 8所述的装置,所述装置还包括接收单元和确定单元, 其中:
接收单元, 用于接收密钥交换消息;
确定单元, 用于在所接收到的密钥交换消息中的时间戳信息 /签名信息 满足设定条件时、 或时间戳信息及签名信息均满足设定条件时, 确定所接 收到的密钥交换消息合法, 否则丟弃所接收到的密钥交换消息。
10、 根据权利要求 9所述的装置, 其中, 所述设定条件包括: 接收到密钥交换消息的时刻与时间戳指示的时刻的差值未超过设定的 传输时延;
和 /或, 接收到密钥交换消息的网元能通过签名信息的验证。
11、 一种网元, 其中, 所述网元包括前述权利要求 8至 10任一项所述 的密钥交换装置。
12、 根据权利要求 11所述的网元, 其中, 所述网元包括 OLT和 ONU。
PCT/CN2012/074469 2012-04-20 2012-04-20 密钥交换方法及装置、网元 WO2013155712A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/074469 WO2013155712A1 (zh) 2012-04-20 2012-04-20 密钥交换方法及装置、网元

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/074469 WO2013155712A1 (zh) 2012-04-20 2012-04-20 密钥交换方法及装置、网元

Publications (1)

Publication Number Publication Date
WO2013155712A1 true WO2013155712A1 (zh) 2013-10-24

Family

ID=49382825

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/074469 WO2013155712A1 (zh) 2012-04-20 2012-04-20 密钥交换方法及装置、网元

Country Status (1)

Country Link
WO (1) WO2013155712A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684738B (zh) * 2013-12-31 2017-06-13 曙光信息产业股份有限公司 一种防原消息干扰的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247394A (zh) * 2008-01-10 2008-08-20 赵运磊 一种改进的密钥交换协议
EP2173058A1 (en) * 2008-10-01 2010-04-07 Sap Ag Context free and context sensitive XML digital signatures for SOAP messages
CN102025488A (zh) * 2010-12-06 2011-04-20 电子科技大学 一种一轮密钥交换方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247394A (zh) * 2008-01-10 2008-08-20 赵运磊 一种改进的密钥交换协议
EP2173058A1 (en) * 2008-10-01 2010-04-07 Sap Ag Context free and context sensitive XML digital signatures for SOAP messages
CN102025488A (zh) * 2010-12-06 2011-04-20 电子科技大学 一种一轮密钥交换方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684738B (zh) * 2013-12-31 2017-06-13 曙光信息产业股份有限公司 一种防原消息干扰的方法及装置

Similar Documents

Publication Publication Date Title
AU2017423732B2 (en) Network security management method, and apparatus
JP5288210B2 (ja) ネットワークでのユニキャスト鍵の管理方法およびマルチキャスト鍵の管理方法
WO2011091751A1 (zh) 对mtc设备的认证方法、mtc网关及相关设备
KR100605846B1 (ko) 이더넷 수동형광가입자망에서 루프백 절차 제어 방법
WO2008098456A1 (fr) Procédé, dispositif et système de distribution de service
WO2010031338A1 (zh) 业务激活的方法和业务提供的方法以及终端设备和服务器
WO2011017986A1 (zh) 一种无源光网络中ploam消息的传输方法及组装方法
CN105610590B (zh) 一种组播报文传输方法和装置
JP2010183494A (ja) 光ネットワークシステムおよび暗号化鍵の切り替え方法
JP2011160210A (ja) 通信端末及び通信システム
US9900100B2 (en) Optical line terminal, communication control method, and communication control program
WO2011026335A1 (zh) 一种广播包/组播控制报文处理方法和装置
CN102571353B (zh) 无源光网络中验证家庭网关合法性的方法
WO2012122730A1 (zh) 基于Tr069协议获取设备状态的方法、ACS及系统
JP2015088815A (ja) 宅側装置、ponシステムおよび宅側装置の制御方法
WO2008037178A1 (fr) Unite de reseau optique et procede d'acces a ladite unite, terminal de ligne optique et systeme de reseau optique passif
WO2011015072A1 (zh) 一种开启/关闭前向纠错编码功能的指示方法及系统
CN109962781A (zh) 一种数字证书分发装置
WO2014177111A1 (zh) 光网络单元onu数据处理方法、装置及系统
JP4739419B2 (ja) イーサネットポンにおける保安チャネルの制御方法及び装置
JP5670933B2 (ja) 認証情報変換装置及び認証情報変換方法
CN103634744A (zh) 一种集群组呼端到端加密的实现方法
WO2013155712A1 (zh) 密钥交换方法及装置、网元
WO2011057544A1 (zh) 一种基于802.3ah协议实现点到多点OAM的方法及系统
JP2017092556A (ja) 局側装置、情報管理装置、端末認証方法および情報管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12874638

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12874638

Country of ref document: EP

Kind code of ref document: A1