WO2022133904A1 - 交互认证方法、装置及系统、计算机设备及可读存储介质 - Google Patents

交互认证方法、装置及系统、计算机设备及可读存储介质 Download PDF

Info

Publication number
WO2022133904A1
WO2022133904A1 PCT/CN2020/139027 CN2020139027W WO2022133904A1 WO 2022133904 A1 WO2022133904 A1 WO 2022133904A1 CN 2020139027 W CN2020139027 W CN 2020139027W WO 2022133904 A1 WO2022133904 A1 WO 2022133904A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
identity verification
challenge
authentication
key
Prior art date
Application number
PCT/CN2020/139027
Other languages
English (en)
French (fr)
Inventor
魏祥野
白一鸣
修黎明
Original Assignee
京东方科技集团股份有限公司
北京京东方技术开发有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东方科技集团股份有限公司, 北京京东方技术开发有限公司 filed Critical 京东方科技集团股份有限公司
Priority to PCT/CN2020/139027 priority Critical patent/WO2022133904A1/zh
Priority to CN202080003617.2A priority patent/CN115280813A/zh
Priority to US18/266,690 priority patent/US20240048540A1/en
Publication of WO2022133904A1 publication Critical patent/WO2022133904A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present application relates to the field of communication technologies, and more particularly, to an interactive authentication method, apparatus and system, computer equipment and readable storage medium.
  • M2M machine-to-machine
  • NVM non-volatile memory
  • each device needs to save the IDs of all devices in the network.
  • this number reaches a certain level, the maintenance and management of the entire network will become extremely complicated and inefficient. If a device modifies the ID, everyone in the network needs to be notified.
  • the current ID requires a special protocol to complete identity verification with others, that is, identity verification and data encryption require different functional circuits to complete, which greatly increases the complexity of the system.
  • Embodiments of the present application provide an interactive authentication method, apparatus and system, computer equipment and readable storage medium.
  • the present application provides an interactive authentication method, which is used for a sending end, and the sending end is communicatively connected with a receiving end.
  • the interactive authentication method includes: generating a first challenge and sending the first challenge to the receiving end; receiving a response sent by the receiving end, the response including the first identity verification information and the second challenge, the The first identity verification information and the second challenge are encrypted by the first identity verification key; the second identity verification key and the second identity verification information are generated according to the first challenge; the second identity verification key is used Decrypt the first identity verification information and match the decrypted first identity verification information with the second identity verification information to perform identity authentication.
  • the first identity verification key and the first identity verification information are obtained by the receiving end according to the first challenge based on a time-averaged frequency direct cycle synthesis technology and a physical unclonable technology. generated by the first encryption circuit.
  • the second authentication key and the second authentication information are determined by the sender according to the first challenge based on a time-averaged frequency direct cycle synthesis technique and a physical unclonable technique.
  • the second encryption circuit is generated, and the properties of the first encryption circuit and the second encryption circuit are consistent.
  • the decrypting the first identity verification information using the second identity verification key and matching the decrypted first identity verification information with the second identity verification information for The identity authentication includes: in the case that the decrypted first identity verification information is the same as the second identity verification information, determining that the identity verification of the receiving end has passed and decrypting the second challenge; When the first identity verification information is different from the second identity verification information, it is determined that the identity verification of the receiving end fails, and the transmitting end and the receiving end stop communicating.
  • determining that the identity verification of the receiving end passes and decrypting the second challenge includes: Generate a first information key according to the decrypted second challenge; encrypt the transmission information by using the first information key to obtain encrypted information; and send the encrypted information to the receiving end.
  • the encrypting the transmission information by using the first information key to obtain the encrypted information includes: encrypting the transmission information by using the first information key through a logical operation in a stream encryption manner.
  • the interactive authentication method further includes: receiving first digest information sent by the receiving end, where the first digest information is a second information password generated by the receiving end according to the second challenge
  • the key is obtained by processing a preset algorithm
  • the second digest information is obtained by processing the first information key through a preset algorithm, and the first digest information and the second digest information are matched to perform decoding and authentication.
  • the matching the first digest information and the second digest information for decoding and authentication includes: in the case that the first digest information and the second digest information are the same, It is determined that the decoding authentication is successful and a confirmation signal is sent to the receiving end to end the communication; in the case that the first digest information and the second digest information are different, it is determined that the decoding and authentication fails.
  • the present application also provides an interactive authentication method for a receiving end, where the receiving end is communicatively connected with the transmitting end.
  • the interactive authentication method includes: receiving a first challenge sent by the sender; generating a first identity verification key, first identity verification information and a second challenge according to the first challenge; using the first identity verification key; encrypting the first identity verification information and the second challenge with the key; sending the encrypted first identity verification information and the second challenge as a response to the receiving end for identity authentication.
  • the mutual authentication method further includes: receiving encrypted information sent by a sending end, where the encrypted information is obtained by encrypting the transmission information by the sending end according to a first information key, and the first information The key is generated by the sender according to the second challenge; a second information key is generated according to the second challenge; the encrypted information is decrypted by using the second information key to obtain the transmission information.
  • the decrypting the encrypted information by using the second information key to obtain the transmission information includes: adopting a stream encryption method to perform logical operations on the encrypted information by using the second information key to encrypt.
  • the mutual authentication method further includes: processing the second information key through a preset algorithm to obtain first digest information, and sending the first digest information to the sender for processing Decode authentication.
  • the mutual authentication method further includes: receiving an acknowledgement signal sent by the sending end to end the communication.
  • the present application also provides an interactive authentication sending device, which is used for a sending end, and the sending end is communicatively connected with the receiving end.
  • the interactive authentication sending device includes: a first generating module, a first receiving module, a second generating module and a first authentication module.
  • the first generating module is configured to generate a first challenge and send the first challenge to the receiving end; the first receiving module is configured to receive a response sent by the receiving end, the response including the first identity Verification information and a second challenge, the first identity verification information and the second challenge are encrypted by a first identity verification key; the second generation module is configured to generate a second identity verification key according to the first challenge key and second identity verification information; the first authentication module is used to decrypt the first identity verification information by using the second identity verification key and combine the decrypted first identity verification information with the second identity verification information Authentication information is matched for authentication.
  • the present application also provides an interactive authentication receiving device, which is used for a receiving end, and the receiving end is in communication connection with the transmitting end.
  • the interactive authentication receiving apparatus includes: a second receiving module, a third generating module, an encryption module and a second authentication module.
  • the second receiving module is used for receiving the first challenge sent by the sending end;
  • the third generating module is used for generating a first authentication key, first authentication information and a second challenge according to the first challenge ;
  • the encryption module is used to encrypt the first identity verification information and the second challenge using the first identity verification key;
  • the second authentication module is used to encrypt the first identity
  • the verification information and the second challenge are sent to the receiver as a response for identity authentication.
  • the present application also provides an interactive authentication system.
  • the interactive authentication system includes: a sending end and a receiving end, the sending end is configured to generate a first challenge and send the first challenge to the receiving end; the receiving end is configured to receive the message sent by the sending end; a first challenge, and for generating a first identity verification key, first identity verification information and a second challenge according to the first challenge, and for pairing the first identity verification information and the second challenge with the first identity verification key
  • the challenge is encrypted, and used to send the encrypted first authentication information and the second challenge to the receiving end as a response; the transmitting end is used to generate the second authentication key and the first authentication key according to the first challenge.
  • Second identity verification information and a method for decrypting the first identity verification information by using the second identity verification key and matching the decrypted first identity verification information with the second identity verification information for identity verification Certification.
  • the present application also provides a computer apparatus including a processor and a memory.
  • the memory stores a computer program, the computer program is executed by the processor to generate a first challenge and send the first challenge to the receiver; receive a response sent by the receiver, the response includes the first identity verification information and the second challenge, the first identity verification information and the second challenge are encrypted by the first identity verification key; the second identity verification key and the second identity are generated according to the first challenge Verification information; decrypt the first identity verification information by using the second identity verification key and match the decrypted first identity verification information with the second identity verification information to perform identity authentication.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by one or more processors, generates a first challenge and sends the first challenge to the receiving end; receiving a response sent by the receiving end, the response including first identity verification information and a second challenge, and the first identity verification information and the second challenge are encrypted by a first identity verification key; according to The first challenge generates a second identity verification key and second identity verification information; decrypts the first identity verification information by using the second identity verification key and combines the decrypted first identity verification information with all The second identity verification information is matched to perform identity authentication.
  • the interactive authentication method, device and system, computer equipment and readable storage medium of the present application complete the authentication process through challenge-response pairs, and integrate authentication and data encryption.
  • Both the key and the identity ID are generated by hardware TDP.
  • the generated ID is related to the hardware. It is only generated after power-on operation, and cannot be migrated. It has a high degree of uniqueness, privacy and security, and does not need to be stored, which greatly increases the security of the system.
  • this method has the characteristics of small area, low power consumption, easy integration, etc. It is suitable for FPGA chip system due to its remarkable reconfigurability.
  • FIG. 1 is an exemplary schematic diagram of the time-averaged frequency of some embodiments of the present application.
  • FIG. 2 is a schematic diagram of a circuit structure of an exemplary clock generator according to some embodiments of the present application.
  • FIG. 3 is a schematic structural diagram of an exemplary integrated circuit of some embodiments of the present application.
  • FIG. 4 is a schematic diagram of a scenario in which human bias is introduced in the interactive authentication method of some embodiments of the present application.
  • FIG. 5 is a schematic structural diagram of a TAF-DPS-PUF digital fingerprint generator circuit according to some embodiments of the present application.
  • FIG. 6 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 7 is a schematic structural diagram of an interactive authentication system according to some embodiments of the present application.
  • FIG. 8 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 9 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 10 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 11 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 12 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 13 is a schematic flowchart of an interactive authentication method according to some embodiments of the present application.
  • FIG. 14 is a schematic structural diagram of an interactive authentication sending apparatus according to some embodiments of the present application.
  • FIG. 15 is a schematic structural diagram of a mutual authentication receiving apparatus according to some embodiments of the present application.
  • first and second are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, features defined as “first”, “second” may expressly or implicitly include one or more of said features. In the description of the present application, “plurality” means two or more, unless otherwise expressly and specifically defined.
  • the terms “installed”, “connected” and “connected” should be understood in a broad sense, for example, it may be a fixed connection or a detachable connection connected, or integrally connected. It can be a mechanical connection or an electrical connection. It can be directly connected, or indirectly connected through an intermediate medium, and it can be the internal communication between two elements or the interaction relationship between the two elements.
  • installed should be understood in a broad sense, for example, it may be a fixed connection or a detachable connection connected, or integrally connected. It can be a mechanical connection or an electrical connection. It can be directly connected, or indirectly connected through an intermediate medium, and it can be the internal communication between two elements or the interaction relationship between the two elements.
  • the interactive authentication method of this application integrates identity verification and data encryption, and the key and identity ID are both generated by hardware TDP.
  • the TDP technology can be interpreted as: Time-Average-Frequency Direct Period Synthesis , TAF-DPS) and a combination of physical unclonable function technology (PUF), PUF is a kind of "digital fingerprint" used as the unique identity of semiconductor devices (such as microprocessors). Since the ID generated by the hardware is related to the hardware, it is only generated after the power is turned on and cannot be migrated. It has a high degree of uniqueness, privacy and security, and does not need to be stored, which greatly increases the security of the system. In addition, this method has the characteristics of small area, low power consumption, and easy integration. Due to its remarkable reconfigurability, it is suitable for solutions oriented to Field-Programmable Gate Arrays (FPGA).
  • FPGA Field-Programmable Gate Arrays
  • the time-averaged frequency is mainly composed of multiple cycles to form a pulse, which satisfies the effect of the average frequency within a period of time.
  • TAF time-averaged frequency
  • T TAF (1-r)T A +rT B
  • T TAF is the output pulse of TAF-DPS
  • T A and T B are two kinds of cycles
  • r represents the probability of T B appearing
  • 1-r is the probability of T A appearing.
  • the clock generator may include: a first register R1, a second register R2, a third register R3, a fourth register R4, a first adder J11, a second adder J12, a first adder Selector X1, second selector X2, third selector X3, D flip-flop, first inverter F01 and first inverter F02.
  • FIG. 2 shows a schematic diagram of the circuit structure of an exemplary clock generator (eg, TAF-DPS).
  • TAF-DPS mainly realizes the working principle of TAF, and generates pulses of any frequency through the control word F (control word), the relationship is as follows:
  • T A I ⁇
  • T B (I+1) ⁇
  • the clock delay of the clock signal 108 at the transmission to the TAF-DPS is ⁇ compared to the ideal clock CLK 0 of the TAF-DPS .
  • the clock signal transmitted by the clock signal 108 to the TAF-DPS can be described as:
  • is usually the time delay caused by the long-distance transmission and load of the line.
  • ⁇ 1 , ⁇ 2 , ⁇ 3 . . . ⁇ n are the clock deviations generated by each TAF-DPS due to clock distribution
  • CLK 0 is the ideal clock of the TAF-DPS.
  • the TDP circuit becomes a biased TDP. Since the magnitude of the artificially introduced deviation is much larger than the process deviation, it can be guaranteed that the nature of the biased TDP is consistent, that is, the same challenge is input and the same response is produced. We call this biased TDP BTDP (Biased TDP).
  • the PUF is to design the two lines exactly the same, and then introduce the deviation during production, while the symmetry of the present application
  • the symmetric protocol in the BDTP circuit is based on the biased TAF-DPS-PUF, that is, the deviation is transferred to the design period, and the delays of the two lines are different in the design, such as ⁇ 11 and ⁇ 12 in Fig. 1, if we use If the delay of ⁇ 11 is larger, 0 is generated, and if the delay of ⁇ 11 is made smaller, 1 is generated.
  • system circuits of the transmitting end and the receiving end in the mutual authentication method of the present application contain a time-averaged frequency direct cycle synthesis technology and a physical unclonable function (BTDP circuit) with the same specification of offset.
  • BTDP circuit physical unclonable function
  • the present application is an interactive authentication method based on biased TAF-DPS-PUF (TDP) technology.
  • TAF-DPS-PUF biased TAF-DPS-PUF
  • the clock period of TAF-DPS1 can be expressed as:
  • T DPS1 ⁇ x + F - ⁇ x
  • the clock period of TAF-DPS2 can be expressed as:
  • T DPS2 ⁇ ′ x+F - ⁇ ′ x
  • T DPS1 and T DPS2 are exactly the same in design, but manufacturing deviations are introduced in production, resulting in inconsistent T DPS1 and T DPS2 , so we define:
  • the digital fingerprint may refer to the identity verification key and the identity verification information of the present application.
  • the interactive authentication method of the embodiment of the present application is described below with reference to specific embodiments.
  • the interactive authentication method of the embodiment of the present application wherein the implementation system corresponding to the interactive authentication method of the embodiment of the present application is a multi-party interaction process. Therefore, , for the convenience of description, firstly focus on the sending end for description, the description is as follows:
  • FIG. 6 is an exemplary flowchart of an interactive authentication method focused on the sender side, where the sender and the receiver are communicatively connected (as shown in FIG. 7 ), and the interactive authentication method includes:
  • S101 Generate a first challenge and send the first challenge to a receiver
  • S102 Receive a response sent by the receiver, where the response includes the first identity verification information and the second challenge, and the first identity verification information and the second challenge are encrypted by the first identity verification key;
  • S104 Decrypt the first identity verification information by using the second identity verification key, and match the decrypted first identity verification information with the second identity verification information to perform identity authentication.
  • the sender may refer to terminal A
  • the receiver may refer to terminal B.
  • Terminal A starts communication, and terminal A randomly generates a first challenge F and sends it to terminal B after encrypting the first challenge F.
  • Subsequent embodiments of the present application are all described with the sending end A and the receiving end B.
  • the receiving end B After receiving the first challenge F from the sender A, the receiving end B will generate a corresponding response according to the first challenge F.
  • the response includes the first authentication key and the first authentication information.
  • BTDP B F, SARD(0)
  • the ID for authentication is the first authentication information.
  • the receiver B will generate a new second challenge F new , and the second challenge F new is the same as the first challenge F .
  • the second challenge F new is generated by intercepting the number in the response according to the response generated by the first challenge F according to the preset protocol relationship between the sender A and the receiver B.
  • the first challenge F is 308, according to the first challenge F
  • the number of the generated response is 12344308.
  • the second challenge F new is 308, which is the same as the first challenge F. It should be noted that 308 for the first challenge F and the second challenge F new is only a simple example for explaining the interactive authentication method of the present application, and the first challenge F and the second challenge F new in practical applications may be other more complex ones. The numbers are not explained one by one here.
  • the first authentication information will be verified according to the first authentication key BTDP B (F, SARD(0)).
  • the second challenge F new encryption the encryption method is simple and high security. And send the encrypted ID and the new second challenge F new to the sender A.
  • the ID needs to be encrypted. If it is not encrypted, it will be stolen during the transmission of the ID.
  • the ID is encrypted by using a key, and the encryption method may be stream encryption, which is not limited to encryption by stream encryption, and may also be encrypted by other encryption methods, which is not limited here.
  • the stream encryption method can perform XOR processing on the first identity verification information, that is, perform XOR logical operation: to obtain the encrypted first authentication information.
  • exclusive or (xor) is a mathematical operator. It applies to logical operations.
  • the mathematical notation for XOR is The computer symbol is "xor". Its algorithm is: If the two values of a and b are not the same, the XOR result is 1. If the values of a and b are the same, the XOR result is 0.
  • XOR is also called half addition, and its algorithm is equivalent to binary addition without carry: in binary, 1 is used to represent true, and 0 is used to represent false, then the algorithm of XOR is: (The same is 0, the difference is 1).
  • the second identity verification information (ID) encrypted according to the first identity verification key 010101 is based on the exclusive OR logic operation, the first identity verification key and the first identity verification information are calculated bit by bit, and the encrypted first identity verification information (ID) can be obtained as 111100.
  • the method of performing logical operation processing on the first identity verification information here is not limited to the exclusive OR operation method, and may also be other methods, such as "AND”, “NOT” operation, etc., which is not limited here.
  • the sender A can generate the second identity verification key and the second identity verification information according to the first challenge F. That is, the second identity verification key and the second identity verification information refer to the response generated by the sender A according to the first challenge F. Then, the sender A decrypts the first identity verification information using the second identity verification key and matches the decrypted first identity verification information with the second identity verification information generated by itself to perform identity authentication.
  • the first identity verification information is decrypted using the second identity verification key and the decrypted first identity verification information is matched with the second identity verification information to perform identity authentication (ie step S104) including :
  • the sender A receives the first identity verification information from the receiver B And use its own BTDP A to generate the second authentication key BTDP A (F, SARD(0)) through the first challenge F and the second authentication information is At this time, the sender A can decrypt the ID information of the receiver B. and will decrypt the first authentication information
  • the second authentication information generated by the sender A itself Compare, if the two are consistent, complete the authentication of the receiving end B, if the two are inconsistent, stop the communication.
  • the first authentication information with second authentication information All are responses generated according to the first challenge F. Therefore, if the first identity verification information and the second identity verification information are the same, it means that the identities of the sender A and the receiver B are the same, and the verification is passed. If the first identity verification information and the second identity verification information are not the same, it means that the first identity verification key is incorrect or the first identity verification information is incorrect, the identities of the sender A and the receiver B are inconsistent, and the verification fails, then stop sending Communication between End A and Receiver B.
  • the first authentication key BTDP B (F, SARD(0)) and the first authentication information It can be generated by the first encryption circuit (as shown in FIG. 5 ) BTDP B of the receiver B according to the first challenge F based on the bias-based time-average frequency direct period synthesis (TAF-DPS) and the physical unclonable technology (PUF).
  • TAF-DPS bias-based time-average frequency direct period synthesis
  • PEF physical unclonable technology
  • the second authentication key BTDP A (F, SARD(0)) and the second authentication information It can be generated by the second encryption circuit BTDP A of the time-average frequency direct cycle synthesis technology (TAF-DPS) and the physical unclonable technology (PUF) based on the bias based on the first challenge F by the transmitting end A, the first encryption circuit BTDP B and The properties of the second encryption circuit BTDP A remain the same, that is, the same challenge is input and the same response is generated, so that the encryption and decryption methods of the sender A and the receiver B are consistent.
  • TAF-DPS time-average frequency direct cycle synthesis technology
  • PAF physical unclonable technology
  • determining that the identity verification of the receiving end is passed and decrypting the second challenge includes: :
  • S10411 Generate a first information key according to the decrypted second challenge
  • S10412 Use the first information key to encrypt the transmission information to obtain encrypted information
  • S10413 Send the encrypted information to the receiving end.
  • the transmitting end A will decode the second challenge F new .
  • PT encrypts the ciphertext
  • the plaintext PT is the information content that the sender A wants to transmit to the receiver B, and the ciphertext CT is sent to the receiver B.
  • encrypting the transmission information by using the first information key to obtain the encrypted information includes: encrypting the transmission information by using the first information key through a logical operation in a stream encryption manner.
  • the logical operation is an exclusive OR operation.
  • stream encryption may be used for both encryption and decryption, that is, encryption is performed according to the number of bits.
  • other encryption methods may also be used, which are not limited herein.
  • the embodiments of this application all adopt XOR encryption and decryption, and the encryption process is consistent with the decryption process, as follows:
  • the interactive authentication method of the present application integrates data encryption and identity verification into one, and the method of stream encryption (bit encryption) increases the complexity of the key, which brings great challenges for external saboteurs to invade the system.
  • the symmetrical BDTP circuit provides an authentication method for two terminals. The two terminals have the same circuit, that is, have the same ID, and can simply complete the authentication process through a challenge-response pair.
  • the interactive authentication method further includes:
  • S105 Receive the first digest information sent by the receiving end, where the first digest information is obtained by processing the second information key generated by the receiving end according to the second challenge through a preset algorithm;
  • S106 Process the first information key through a preset algorithm to obtain second digest information, and match the first digest information with the second digest information to perform decoding and authentication.
  • step S60 further includes:
  • the preset algorithm may be a hash algorithm, or may be other algorithms for reducing the first information key to the second digest information and reducing the second information key to the first digest information.
  • the preset algorithm is used as the hash algorithm for description. Referring to FIG. 7 , the receiving end B reduces all the second information keys KB through a hash algorithm to obtain the first digest information hash( KB ), and sends it to the sending end A.
  • the sender A reduces all the first information keys KA to the second digest information hash(K A ) through a hash algorithm, and combines the second digest information hash(K A ) with the first digest information sent by the receiver B.
  • the hash( KB ) is compared, if the two are consistent, it proves that the decoding is correct, and if the two are inconsistent, it proves that the decoding is wrong.
  • the sender A sends an acknowledgement signal to the receiver B, and the acknowledgement signal may be an ACK signal, which proves that the entire communication process is completed correctly, and the communication ends.
  • the receiver B can be controlled to re-send the first digest information, and the first digest information and the second digest information can be compared again to prove again whether the decoding is correct. .
  • the interactive authentication method of the present application first generates a symmetric key automatically through a symmetric BTDP circuit, and does not need to transmit the key, which effectively solves the problem of how to transmit the key when the length of the key and the original text are the same when the stream encryption method is used. The problem. Secondly, since the ID and key are put into non-volatile storage, there is a risk of being stolen. The interactive authentication method of the present application will generate the corresponding key and ID only when the BTDP circuit is loaded, without any storage. , increase the difficulty of cracking. In addition, the interactive authentication method of the present application can complete identity verification and data transmission through a single circuit, which increases the circuit reusability and reduces the overall overhead of the interactive authentication system.
  • the following describes the interactive authentication method of the embodiment of the present application by focusing on the receiving end side.
  • FIG. 12 is an exemplary flowchart of an interactive authentication method focused on the receiving end B, the receiving end B is in communication connection with the sending end A (as shown in FIG. 7 ), and the method includes:
  • S202 Generate a first identity verification key, first identity verification information and a second challenge according to the first challenge;
  • S203 Encrypt the first identity verification information and the second challenge with the first identity verification key
  • S204 Send the encrypted first identity verification information and the second challenge as a response to the receiving end for identity authentication.
  • the receiving end B will generate a corresponding response according to the first challenge F.
  • the response includes: BTDP B (F,SARD(0)) and Among them, BTDP B (F, SARD(0)) is used as the first authentication key for authentication, The ID used as identity verification is the first identity verification information, and a new second challenge F new is generated, and the first identity verification information is verified by the first identity verification key BTDP B (F, SARD(0)).
  • the second challenge F new encryption the encryption method is simple and high security. And send the encrypted ID and new challenge to sender A.
  • the interactive authentication method further includes:
  • S205 Receive the encrypted information sent by the sending end, the encrypted information is obtained by encrypting the transmission information by the sending end according to the first information key, and the first information key is generated by the sending end according to the second challenge;
  • S207 Decrypt the encrypted information by using the second information key to obtain the transmission information.
  • the encrypted information may be encrypted by using the second information key through a logical operation in a stream encryption manner.
  • the logical operation may be an exclusive OR operation.
  • the interactive authentication method further includes:
  • S208 Process the second information key through a preset algorithm to obtain first digest information, and send the first digest information to the sender for decoding and authentication.
  • the preset algorithm may be a hash algorithm, or may be other algorithms for reducing the second information key to the first digest information.
  • the mutual authentication method further includes: receiving an acknowledgement signal sent by the sender to end the communication.
  • the interactive authentication method of the present application first generates a symmetric key automatically through a symmetric BTDP circuit, and does not need to transmit the key, which effectively solves the problem of how to transmit the key when the length of the key is the same as the original text when the stream encryption method is used. question.
  • the interactive authentication method of this application will generate the corresponding key and ID only when the circuit is loaded, without any storage. Increase the difficulty of cracking.
  • the mutual authentication method of the present application completes identity verification and data transmission through a single circuit, which increases the circuit reusability and reduces the overall overhead of the interactive authentication system.
  • the present application further provides an interactive authentication sending apparatus 100 , which is used for a sending end, and the sending end is communicatively connected with the receiving end.
  • the interactive authentication sending apparatus 100 includes: a first generating module 101 , a first receiving module 102 , a second generating module 103 and a first authentication module 104 .
  • the first generating module 101 is configured to generate a first challenge and send the first challenge to the receiving end B.
  • the first receiving module 102 is configured to receive a response sent by the receiving end B, where the response includes first identity verification information and a second challenge, and the first identity verification information and the second challenge are encrypted by the first identity verification key.
  • the second generation module 103 is configured to generate the second authentication key and the second authentication information according to the first challenge.
  • the first authentication module 104 is configured to decrypt the first identity verification information by using the second identity verification key and match the decrypted first identity verification information with the second identity verification information to perform identity authentication.
  • the interactive authentication sending device 100 of the present application completes the identity verification process through the challenge response pair, which integrates identity verification and data encryption.
  • the key and the identity ID are both generated by the hardware TDP. , which is only generated after power-on operation and cannot be migrated. It has a high degree of uniqueness, privacy and security, and does not need to be stored, which greatly increases the security of the system.
  • the present application further provides an interactive authentication receiving apparatus 200 , which is used for a receiving end, and the receiving end is communicatively connected with the transmitting end.
  • the interactive authentication apparatus 200 includes: a second receiving module 201 , a third generating module 202 , an encryption module 203 and a second authentication module 204 .
  • the second receiving module 201 is configured to receive the first challenge sent by the sending end.
  • the third generation module 202 is configured to generate the first authentication key, the first authentication information and the second challenge according to the first challenge.
  • the encryption module 203 is configured to encrypt the first authentication information and the second challenge by using the first authentication key.
  • the second authentication module 204 is configured to send the encrypted first identity verification information and the second challenge as a response to the receiving end for identity authentication.
  • the interactive authentication receiving device 200 of the present application completes the identity verification process through the challenge response pair, which integrates identity verification and data encryption.
  • the key and the identity ID are both generated by hardware TDP, because the ID generated by hardware is related to hardware. , which is only generated after power-on operation and cannot be migrated. It has a high degree of uniqueness, privacy and security, and does not need to be stored, which greatly increases the security of the system.
  • the present application further provides an interactive authentication system 1000 .
  • the interactive authentication system 1000 includes: a sender A and a receiver B.
  • the sender A is used to generate the first challenge F and send the first challenge to the receiver B.
  • the receiving end B is used for receiving the first challenge F sent by the sending end A, and is used for generating the first identity verification key, the first identity verification information and the second challenge according to the first challenge F, and for utilizing the first identity verification
  • the key encrypts the first identity verification information and the second challenge F new , and is used to send the encrypted first identity verification information and the second challenge to the receiving end B as a response.
  • the sending end A is used to generate the second identity verification key and the second identity verification information according to the first challenge, and is used to decrypt the first identity verification information by using the second identity verification key and decrypt the decrypted first identity verification information.
  • the information is matched with the second identity verification information for identity authentication.
  • the interactive authentication system 1000 of the present application completes the authentication process of the sender and the receiver through the challenge response pair, and integrates the authentication and data encryption.
  • the key and the ID are both generated by the hardware TDP. Related, it is only generated after power-on and running, and cannot be migrated. It has a high degree of uniqueness, privacy and security, and does not need to be stored, which greatly increases the security of the system. In addition, this method has the characteristics of small area, low power consumption, and easy integration. Due to its remarkable reconfigurability, it is suitable for solutions oriented to Field-Programmable Gate Arrays (FPGA).
  • FPGA Field-Programmable Gate Arrays
  • the present application also provides a computer device, including a memory and a processor, where a computer program is stored in the memory, and when the computer program is executed by the processor, the interactive authentication method of any of the foregoing embodiments is implemented.
  • Embodiments of the present application further provide a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by one or more processors, the interactive authentication method in any of the foregoing embodiments is implemented.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or the like.
  • a first feature "on” or “under” a second feature may include direct contact between the first and second features, or may include the first and second features Not directly but through additional features between them.
  • the first feature being “above”, “over” and “above” the second feature includes the first feature being directly above and obliquely above the second feature, or simply means that the first feature is level higher than the second feature.
  • the first feature is “below”, “below” and “below” the second feature includes the first feature being directly below and diagonally below the second feature, or simply means that the first feature has a lower level than the second feature.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种交互认证方法,用于发送端(A),发送端(A)与接收端(B)通信连接。交互认证方法包括:生成第一挑战并将第一挑战发送至接收端(B)(S101);接收接收端(B)发送的响应,响应包括第一身份验证信息和第二挑战;第一身份验证信息和第二挑战由第一身份验证密钥进行加密(S102);根据第一挑战生成第二身份验证密钥和第二身份验证信息(S103);利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与第二身份验证信息进行匹配以进行身份认证(S104)。此外,还公开了一种交互认证装置及系统、计算机设备及可读存储介质。

Description

交互认证方法、装置及系统、计算机设备及可读存储介质 技术领域
本申请涉及通信技术领域,更具体而言,涉及一种交互认证方法、装置及系统、计算机设备及可读存储介质。
背景技术
随着物联网的快速发展,终端设备数量呈指数上升,未来百分之五十以上的通信都来自于机器对机器(M2M),具有智能化的设备需要对来自于其他设备的通信请求完成身份判断。
当网络中的设备的数量达到一定程度时,ID存储在非易失性存储器(NVM)中,这种设备可以通过各种手段窃取内部信息,即间接会泄露网络中他人的ID,当被入侵者窃取后,便可以模仿ID本人与该设备进行通信,安全性能低。
此外,当网络中的设备的数量达到一定程度时,每个设备需要保存网络中所有设备的ID,当这个数量达到一定程度时,整个网络的维护和管理将会变得异常复杂和低效,如某一设备修改了ID,需要通知网络中的所有人。另外,目前的ID需要特殊的协议与他人完成身份验证,即身份验证和数据加密需要不同的功能电路来完成,大大增加了系统的复杂度。
发明内容
本申请的实施方式提供一种交互认证方法、装置及系统、计算机设备及可读存储介质。
本申请提供一种交互认证方法,用于发送端,所述发送端与接收端通信连接。所述交互认证方法包括:生成第一挑战并将所述第一挑战发送至所述接收端;接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;根据所述第一挑战生成第二身份验证密钥和第二身份验证信息;利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
在某些实施方式中,所述第一身份验证密钥和所述第一身份验证信息由所述接收端根据所述第一挑战基于偏置的时间平均频率直接周期合成技术与物理不可克隆技术的第一加密电路生成。
在某些实施方式中,所述第二身份验证密钥和所述第二身份验证信息由所述发送 端根据所述第一挑战基于偏置的时间平均频率直接周期合成技术与物理不可克隆技术的第二加密电路生成,所述第一加密电路和所述第二加密电路的性质保持一致。
在某些实施方式中,所述利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证包括:在解密后的所述第一身份验证信息与所述第二身份验证信息相同的情况下,确定所述接收端的身份验证通过并对第二挑战进行解密;在解密后的所述第一身份验证信息与所述第二身份验证信息不相同的情况下,确定所述接收端的身份验证失败,所述发送端与所述接收端停止通信。
在某些实施方式中,所述在解密后的所述第一身份验证信息与所述第二身份验证信息相同的情况下,确定所述接收端的身份验证通过并对第二挑战进行解密包括:根据解密后的第二挑战生成第一信息密钥;利用所述第一信息密钥对传输信息进行加密得到加密信息;将所述加密信息发送至所述接收端。
在某些实施方式中,所述利用所述第一信息密钥对传输信息进行加密得到加密信息包括:采用流加密方式通过逻辑运算利用所述第一信息密钥对传输信息进行加密。
在某些实施方式中,所述交互认证方法还包括:接收所述接收端发送的第一摘要信息,所述第一摘要信息为所述接收端根据所述第二挑战生成的第二信息密钥经过预设算法处理得到;将所述第一信息密钥经过预设算法处理得到第二摘要信息,将所述第一摘要信息和所述第二摘要信息进行匹配以进行解码认证。
在某些实施方式中,所述将所述第一摘要信息和所述第二摘要信息进行匹配以进行解码认证包括:在所述第一摘要信息和所述第二摘要信息相同的情况下,确定解码认证成功并向所述接收端发送确认信号以结束通信;在所述第一摘要信息和所述第二摘要信息不相同的情况下,确定解码认证失败。
本申请还提供一种交互认证方法,用于接收端,所述接收端与发送端通信连接。所述交互认证方法包括:接收所述发送端发送的第一挑战;根据所述第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战;利用所述第一身份验证密钥对所述第一身份验证信息和所述第二挑战进行加密;将加密后的所述第一身份验证信息和所述第二挑战作为响应发送至所述接收端以进行身份认证。
在某些实施方式中,所述交互认证方法还包括:接收发送端发送的加密信息,所述加密信息由所述发送端根据第一信息密钥对传输信息进行加密得到,所述第一信息密钥由所述发送端根据所述第二挑战生成;根据所述第二挑战生成第二信息密钥;利用所述第二信息密钥对所述加密信息进行解密以得到所述传输信息。
在某些实施方式中,所述利用所述第二信息密钥对所述加密信息进行解密以得到所述 传输信息包括:采用流加密方式通过逻辑运算利用所述第二信息密钥对加密信息进行加密。
在某些实施方式中,所述交互认证方法还包括:将所述第二信息密钥经过预设算法处理得到第一摘要信息,并将所述第一摘要信息发送至所述发送端以进行解码认证。
在某些实施方式中,所述交互认证方法还包括:接收所述发送端发送的确认信号以结束通信。
本申请提供还一种交互认证发送装置,用于发送端,所述发送端与接收端通信连接。所述交互认证发送装置包括:第一生成模块、第一接收模块、第二生成模块和第一认证模块。所述第一生成模块用于生成第一挑战并将所述第一挑战发送至所述接收端;所述第一接收模块用于接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;所述第二生成模块用于根据所述第一挑战生成第二身份验证密钥和第二身份验证信息;所述第一认证模块用于利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
本申请提供还一种交互认证接收装置,用于接收端,所述接收端与发送端通信连接。所述交互认证接收装置包括:第二接收模块、第三生成模块、加密模块和第二认证模块。所述第二接收模块用于接收所述发送端发送的第一挑战;所述第三生成模块用于根据所述第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战;所述加密模块用于利用所述第一身份验证密钥对所述第一身份验证信息和所述第二挑战进行加密;所述第二认证模块用于将加密后的所述第一身份验证信息和所述第二挑战作为响应发送至所述接收端以进行身份认证。
本申请还提供一种交互认证系统。所述交互认证系统包括:发送端和接收端,所述发送端用于生成第一挑战并将所述第一挑战发送至所述接收端;所述接收端用于接收所述发送端发送的第一挑战,及用于根据第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战,及用于利用所述第一身份验证密钥对第一身份验证信息和第二挑战进行加密,以及用于将加密后的第一身份验证信息和第二挑战作为响应发送至所述接收端;所述发送端用于根据所述第一挑战生成第二身份验证密钥和第二身份验证信息,以及用于利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
本申请还提供一种计算机设备,包括处理器和存储器。所述存储器存储有计算机程序,所述计算机程序被所述处理器执行实现生成第一挑战并将所述第一挑战发送至所述接收端;接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;根据所述第一挑战生 成第二身份验证密钥和第二身份验证信息;利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
本申请还提供一种计算机可读存储介质,其上存储有计算机程序,当所述计算机程序被一个或多个处理器执行时,实现生成第一挑战并将所述第一挑战发送至所述接收端;接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;根据所述第一挑战生成第二身份验证密钥和第二身份验证信息;利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
本申请的交互认证方法、装置及系统、计算机设备及可读存储介质通过挑战响应对完成身份验证过程,且集身份验证和数据加密为一体,密钥和身份ID均由硬件TDP产生,由于硬件产生的ID是与硬件相关的,仅在上电运行后产生,不能进行迁移,具有高度的唯一性、私密性和安全性,无需进行存储,大大增加了系统的安全性。此外,该方法具有小面积、低功耗、易集成等特点,由于其具有显著的重构性,适合用于FPGA芯片系统。
本申请的实施方式的附加方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实施方式的实践了解到。
附图说明
本申请的上述和/或附加的方面和优点从结合下面附图对实施方式的描述中将变得明显和容易理解,其中:
图1是本申请某些实施方式的时间平均频率的示例性原理示意图;
图2是本申请某些实施方式的示例性时钟发生器的电路结构示意图;
图3是本申请某些实施方式的示例性集成电路的结构示意图;
图4是本申请某些实施方式的交互认证方法中引入人为偏差的场景示意图;
图5是本申请某些实施方式的TAF-DPS-PUF数字指纹发生器电路的架构示意图;
图6是本申请某些实施方式的交互认证方法的流程示意图;
图7是本申请某些实施方式的交互认证系统的结构示意图;
图8是本申请某些实施方式的交互认证方法的流程示意图;
图9是本申请某些实施方式的交互认证方法的流程示意图;
图10是本申请某些实施方式的交互认证方法的流程示意图;
图11是本申请某些实施方式的交互认证方法的流程示意图;
图12是本申请某些实施方式的交互认证方法的流程示意图;
图13是本申请某些实施方式的交互认证方法的流程示意图;
图14是本申请某些实施方式的交互认证发送装置的结构示意图;
图15是本申请某些实施方式的交互认证接收装置的结构示意图。
具体实施方式
下面详细描述本申请的实施方式,所述实施方式的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施方式是示例性的,仅用于解释本申请,而不能理解为对本申请的限制。
在本申请的描述中,需要理解的是,术语“中心”、“纵向”、“横向”、“长度”、“宽度”、“厚度”、“上”、“下”、“前”、“后”、“左”、“右”、“竖直”、“水平”、“顶”、“底”、“内”、“外”、“顺时针”、“逆时针”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个所述特征。在本申请的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。
在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接。可以是机械连接,也可以是电连接。可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通或两个元件的相互作用关系。对于本领域的普通技术人员而言,可以根据具体情况理解上述术语在本申请中的具体含义。
下面参考附图描述本申请实施例的交互认证方法及装置、系统、计算机设备和可读存储介质。
本申请的交互认证方法集身份验证和数据加密为一体,密钥和身份ID均由硬件TDP产生,其中,TDP技术可以解释为:时间平均频率直接周期合成技术(Time-Average-Frequency Direct Period Synthesis,TAF-DPS)及物理不可克隆功能技术的组合(physical unclonable function,PUF),PUF是一种“数字指纹”,用于作为半导体设备(如微处理器)的唯一身份。由于硬件产生的ID是与硬件相关的,仅在上电运行后产生,不能进行迁移,具有高度的唯一性、私密性和安全性,无需进行存储,大大增加了系统的安全性。此外,该方法具有小面积、低功耗、易集成等特点,由于其具有显著的重构性,适合用于面向现场可编程门阵列(Field-Programmable Gate Array,FPGA)的解决方案。
可以理解地,如图1所示,时间平均频率(TAF)主要是由多种周期来组成一个脉冲,在一段时间内满足平均频率的效果。可以描述为:
T TAF=(1-r)T A+rT B
其中,T TAF是TAF-DPS的输出脉冲,T A和T B是两种周期,r代表T B出现的几率,1-r则为T A出现的几率。
请参阅图2,时钟发生器(TAF-DPS)可以包括:第一寄存器R1、第二寄存器R2、第三寄存器R3、第四寄存器R4、第一加法器J11、第二加法器J12、第一选择器X1、第二选择器X2、第三选择器X3、D触发器、第一反相器F01和第一反相器F02。
图2示出了示例性时钟发生器(例如,TAF-DPS)的电路结构示意图。TAF-DPS主要实现TAF的工作原理,通过控制字F(control word)控制生成任意频率的脉冲,关系如下:
T A=I·Δ,T B=(I+1)·Δ
T TAF=F·Δ=(I+r)·Δ=I·Δ-I·r·Δ+I·r·Δ+r·Δ=(1-r)·I·Δ+r·(I+1)·Δ=(1-r)T A+rT B
其中,F是TAF-DPS的控制字,满足F=I+r,I是整数,r是0到1之间的小数,Δ是K个输入相邻脉冲间的相位差。
假设时钟信号108传输到任一时钟发生器TAF-DPS的时钟信号是CLK,与该TAF-DPS的理想时钟CLK 0相比,该时钟信号108在传输到该TAF-DPS处的时钟延迟为ψ。则时钟信号108传输到该TAF-DPS处的时钟信号可以描述为:
CLK=CLK 0
其中,ψ通常是由线路长距离传输和负载引起的时间延迟。假设集成电路S1中有n个功能模块(参考图3所示),则时钟信号传输到每个TAF-DPS的时钟信号可以描述为:
CLK 1=CLK 01
CLK 2=CLK 02
CLK 3=CLK 03
CLK n=CLK 0n
其中,ψ 1,ψ 2,ψ 3…ψ n是每个TAF-DPS由于时钟配送产生时钟偏差,CLK 0为该TAF-DPS的理想时钟。
本申请为了生成独有的芯片指纹,由于传统的TDP电路的误差来源于制造工艺偏差,当我们人为引入偏差时,TDP电路便成了偏置TDP。由于人为引入的偏差量级远大于工艺偏差,因此,可以保证偏置的TDP的性质是一致的,即输入同样的挑战,产生相同的响应。我们把这种偏置TDP称为BTDP(Biased TDP)。请参阅图4,其中,人为引入偏差指的是将TDP线路的延迟控制在相应的差异范围内,PUF是将两条线路设计的完全一致,然后在 生产时引入偏差,而本申请的对称的BDTP电路中的对称协议是基于偏置型TAF-DPS-PUF,即将这个偏差转移至设计期,两条线路的延迟在设计时就不一样,比如图1中的ε 11和ε 12,如果使ε 11的延迟更大些,则产生0,如果使ε 11的延迟更小,则产生1。
可以理解地,本申请的交互认证方法中的发送端和接收端的系统电路中含有相同规格的偏置的时间平均频率直接周期合成技术与物理不可克隆功能(BTDP电路)。
本申请为基于偏置TAF-DPS-PUF(TDP)技术的交互认证方法。TAF-DPS-PUF的电路图如图5所示,
其中,TAF-DPS1的时钟周期可以表示为:
T DPS1=ε x+Fx
TAF-DPS2的时钟周期可以表示为:
T DPS2=ε′ x+F-ε′ x
其中,ε x=ε 2x3x4x。T DPS1和T DPS2在设计时是完全相同的,但在生产时引入制造偏差,造成T DPS1和T DPS2不一致,因此我们定义:
当ΔT=T DPS2-T DPS1≥0满足时,电路DFF输出固定数值bm=1。
当ΔT=T DPS2-T DPS1<0满足时,电路DFF输出固定数值bm=0。
通过一系列的ΔT的组合我们得到了固定的0/1序列,这个序列便是这颗芯片的数字指纹。例如序列为1010100,则1010100即为数字指纹。在本申请的实施例中,数字指纹可以指的是本申请的身份验证密钥和身份验证信息。
下面结合具体的实施例说明本申请实施例的交互认证方法,其中,本申请实施例的交互认证方法,其中,本申请实施例的交互认证方法对应的实现系统,是一个多方交互的过程,因此,为了说明的方便,首先集中在发送端进行说明,说明如下:
具体而言,图6是根据集中在发送端侧的交互认证方法的一个示例性流程图,发送端与接收端通信连接(如图7所示),交互认证方法包括:
S101:生成第一挑战并将第一挑战发送至接收端;
S102:接收接收端发送的响应,响应包括第一身份验证信息和第二挑战,第一身份验证信息和第二挑战由第一身份验证密钥进行加密;
S103:根据第一挑战生成第二身份验证密钥和第二身份验证信息;
S104:利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与第二身份验证信息进行匹配以进行身份认证。
具体地,请参阅图7,本申请的交互认证方法首先从发送端生成第一挑战F至接收端,其中,第一挑战F为一个控制字信息,例如F的具体数值可以为:F=108,F=384。发送端可以指的是终端A,接收端可以指的是终端B,由终端A开始通信,终端A随机产生一个第一挑战F,并在将第一挑战F加密后发送给终端B。本申请后续的实施例均以发送端A、 接收端B进行说明。
接收端B接收发送端A的第一挑战F后,会根据第一挑战F产生相应的响应。响应包括第一身份验证密钥和第一身份验证信息。BTDP B(F,SARD(0))为身份验证的第一身份验证密钥,
Figure PCTCN2020139027-appb-000001
为身份验证的ID为第一身份验证信息。与此同时,接收端B会产生一个新的第二挑战F new,第二挑战F new与第一挑战F相同。第二挑战F new为根据第一挑战F生成的响应根据发送端A与接收端B之间的预设协议关系截取响应中的数字产生的,例如第一挑战F为308,根据第一挑战F产生的响应的数字为12344308,若发送端A与接收端B之间的预设协议关系是截取响应中的最后三位数字,即得到第二挑战F new与第一挑战F相同为308。需要说明的是,第一挑战F和第二挑战F new为308仅仅是为解释本申请交互认证方法的简单示例,实际应用中的第一挑战F和第二挑战F new可以为其他更加复杂的数字,在此不一一说明。
可以理解地,把BTDP看成一个函数y=f(x),工作机制与PUF相同。新的挑战的意思就是给x取一个新的数值,比如x=x0,然后得到y0=f(x0),y0就是响应。
然后,在接收端B中会根据第一身份验证密钥BTDP B(F,SARD(0))对第一身份验证信息
Figure PCTCN2020139027-appb-000002
和第二挑战F new加密,加密方式简单且安全性高。并将加密后的ID和新的第二挑战F new发送给发送端A。
可以理解地,ID需要加密,如果不加密的话,会在ID的传输过程中被人窃取。使用密钥对ID进行加密,加密方式可以为流加密,这里也不限于流加密的方式进行加密,也可以为其他加密方式,在此不做限制。
具体地,流加密方式可以通过对第一身份验证信息进行异或处理,即进行异或逻辑运算:
Figure PCTCN2020139027-appb-000003
以得到加密后的第一身份验证信息。
其中,异或(xor)是一个数学运算符。它应用于逻辑运算。异或的数学符号为
Figure PCTCN2020139027-appb-000004
计算机符号为“xor”。其运算法则为:
Figure PCTCN2020139027-appb-000005
如果a、b两个值不相同,则异或结果为1。如果a、b两个值相同,异或结果为0。异或也叫半加运算,其运算法则相当于不带进位的二进制加法:二进制下用1表示真,0表示假,则异或的运算法则为:
Figure PCTCN2020139027-appb-000006
Figure PCTCN2020139027-appb-000007
(同为0,异为1)。例如,第一身份验证信息(ID)用二进制表示为101001,第一身份验证密钥为010101,则根据第一身份验证密钥010101加密后的第二身份验证信息(ID)则根据异或逻辑运算,按位分别对第一身份验证密钥及第一身份验证信息进行计算,可以得出加密后的第一身份验证信息(ID)为111100。
需要说明的是,这里对第一身份验证信息进行逻辑运算处理的方式也不限于异或运算方式,也可以为其他方式,如“与”、“非”运算等,在此不做限制。
可以理解地,发送端A可以根据第一挑战F生成第二身份验证密钥和第二身份验证信 息。即,第二身份验证密钥和第二身份验证信息指的是发送端A根据第一挑战F生成的响应。然后,发送端A再利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与自身产生的第二身份验证信息进行匹配以进行身份认证。
其中,请参阅图8,利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与第二身份验证信息进行匹配以进行身份认证(即步骤S104)包括:
S1041:在解密后的第一身份验证信息与第二身份验证信息相同的情况下,确定接收端的身份验证通过并对第二挑战进行解密;
S1042:在解密后的第一身份验证信息与第二身份验证信息不相同的情况下,确定接收端的身份验证失败,发送端与接收端停止通信。
具体地,请结合图9,发送端A接收来自接收端B的第一身份验证信息
Figure PCTCN2020139027-appb-000008
并使用自身的BTDP A通过第一挑战F产生第二身份验证密钥BTDP A(F,SARD(0))和第二身份验证信息为
Figure PCTCN2020139027-appb-000009
此时发送端A可以解密出来接收端B的ID信息
Figure PCTCN2020139027-appb-000010
并将解密后的第一身份验证信息
Figure PCTCN2020139027-appb-000011
与发送端A自身产生的第二身份验证信息
Figure PCTCN2020139027-appb-000012
进行比较,若二者一致,则完成对接收端B的身份验证,若二者不一致,则停止通信。
可以理解地,第一身份验证信息
Figure PCTCN2020139027-appb-000013
与第二身份验证信息
Figure PCTCN2020139027-appb-000014
都是根据第一挑战F产生的响应。因此,第一身份验证信息和第二身份验证信息相同则代表发送端A和接收端B身份一致,验证通过。若第一身份验证信息和第二身份验证信息不相同则代表第一身份验证密钥不正确或第一身份验证信息不正确,发送端A和接收端B身份不一致,验证未通过,则停止发送端A和接收端B之间的通信。
在某些实施例中,第一身份验证密钥BTDP B(F,SARD(0))和第一身份验证信息
Figure PCTCN2020139027-appb-000015
可以由接收端B根据第一挑战F基于偏置的时间平均频率直接周期合成技术(TAF-DPS)与物理不可克隆技术(PUF)的第一加密电路(如图5所示)BTDP B生成。
在某些实施例中,第二身份验证密钥BTDP A(F,SARD(0))和第二身份验证信息
Figure PCTCN2020139027-appb-000016
可以由发送端A根据第一挑战F基于偏置的时间平均频率直接周期合成技术(TAF-DPS)与物理不可克隆技术(PUF)的第二加密电路BTDP A生成,第一加密电路BTDP B和第二加密电路BTDP A的性质保持一致,即输入同样的挑战,产生相同的响应,使得发送端A和接收端B的加密和解密的方式一致。
请参阅图9,在某些实施例中,在解密后的第一身份验证信息与第二身份验证信息相同的情况下,确定接收端的身份验证通过并对第二挑战进行解密(步骤S1041)包括:
S10411:根据解密后的第二挑战生成第一信息密钥;
S10412:利用第一信息密钥对传输信息进行加密得到加密信息;
S10413:将加密信息发送至接收端。
具体地,当接收端B的身份验证通过后,则发送端A会解码出第二挑战F new。发送端A利用第二挑战F new生一系列的第一信息密钥K A=BTDP A(F new),然后,发送端A利用第一信息密钥K A=BTDP A(F new)对明文PT进行加密得到密文
Figure PCTCN2020139027-appb-000017
明文PT即为发送端A希望传输给接收端B的信息内容,并将密文CT发送给接收端B。后续的接收端B可以利用第二挑战F new自身产生的第二信息密钥K B=BTDP B(F new)对接收的密文CT进行解密的到明文PTB。
在某些实施例中,利用第一信息密钥对传输信息进行加密得到加密信息包括:采用流加密方式通过逻辑运算利用所述第一信息密钥对传输信息进行加密。其中,逻辑运算为异或运算。
具体地,加密解密可以均采用流加密(位加密)方式,即,按位数分别进行加密。在本申请的其他实施例中,也可以采用其他的加密方式,在此不做限制。本申请的实施例全部采用异或加解密,加密过程与解密过程一致,如下所示:
加密过程:y=x XOR k
解密过程:x=y XOR k=(x XOR k)XOR k=x
其中,y是密文,x是原文,k是密钥。
需要说明的是,此处逻辑运算处理的方式也不限于异或运算方式,也可以为其他方式,如“与”、“非”运算等,在此不做限制。
本申请的交互认证方法集成数据加密和身份验证为一体,按流加密(位加密)的方法增加了密钥的复杂度,为外界破坏者入侵系统带来了极大的挑战。对称的BDTP电路为两个终端提供了身份验证的途径,两个终端拥有同样的电路,即拥有同样的ID,可以简单地通过挑战响应对完成身份验证过程。
请参阅图10,在某些实施例中,交互认证方法还包括:
S105:接收接收端发送的第一摘要信息,第一摘要信息为接收端根据第二挑战生成的第二信息密钥经过预设算法处理得到;
S106:将第一信息密钥经过预设算法处理得到第二摘要信息,将第一摘要信息和第二摘要信息进行匹配以进行解码认证。
其中,请参阅图11,步骤S60还包括:
S1061:在第一摘要信息和第二摘要信息相同的情况下,确定解码认证成功并向接收端发送确认信号以结束通信;
S1062:在第一摘要信息和第二摘要信息不相同的情况下,确定解码认证失败。
具体地,预设算法可以是哈希算法,也可以是实现将第一信息密钥缩减为第二摘要信息和将第二信息密钥缩减为第一摘要信息的其他算法。本申请实施例,以预设算法为哈希算法进行说明。请结合图7,接收端B将所有的第二信息密钥K B经过哈希算法缩减出第一摘要信息hash(K B),并发送给发送端A。发送端A将所有的第一信息密钥K A经过哈希算法缩减出第二摘要信息hash(K A),并将第二摘要信息hash(K A)与接收端B发送的第一摘要信息hash(K B)进行对比,若二者一致,证明解码正确,若二者不一致,证明解码错误。
在某些实施例中,当哈希算法验证通过后,发送端A向接收端B发送确认信号,确认信号可以为ACK信号,证明整个通讯过程正确完成,并结束通信。当解码错误时,若为摘要信息未完整发送或传输过程出错的情况,可以控制接收端B重新发送第一摘要信息,重新将第一摘要信息与第二摘要信息进行对比,再次证明解码是否正确。
综上,本申请的交互认证方法首先通过对称的BTDP电路自动产生对称密钥,不需要进行密钥传输,有效地解决了在使用流加密方式时,密钥和原文长度一致,如何传输密钥的问题。其次,由于将ID和密钥放入非易失性存储中,有被窃取的风险,本申请的交互认证方法只有在BTDP电路工作装填下,才会产生相应密钥和ID,不进行任何存储,增加破解难度。此外,本申请的交互认证方法将身份验证和数据传输通过一个电路即可完成,增加了电路复用性,降低交互认证系统的整体开销。
下面其次集中在接收端侧描述本申请实施例的交互认证方法。
具体而言,图12是根据集中在接收端B的交互认证方法的一个示例性流程图,接收端B与发送端A通信连接(如图7所示),该方法包括:
S201:接收发送端发送的第一挑战;
S202:根据第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战;
S203:利用第一身份验证密钥对第一身份验证信息和第二挑战进行加密;
S204:将加密后的第一身份验证信息和第二挑战作为响应发送至接收端以进行身份认证。
具体地,接收端B接收发送端A的第一挑战F后,会根据第一挑战F产生相应的响应。响应包括:BTDP B(F,SARD(0))和
Figure PCTCN2020139027-appb-000018
其中,BTDP B(F,SARD(0))作为身份验证的第一身份验证密钥,
Figure PCTCN2020139027-appb-000019
作为身份验证的ID为第一身份验证信息,并产生一个新的第二挑战F new,由第一身份验证密钥BTDP B(F,SARD(0))对第一身份验证信息
Figure PCTCN2020139027-appb-000020
和第二挑战F new加密,加密方式简单且安全性高。并将加密后的ID和新的挑战发送给发送端A。
请参阅图13,在某些实施例中,交互认证方法还包括:
S205:接收发送端发送的加密信息,加密信息由发送端根据第一信息密钥对传输信息进行加密得到,第一信息密钥由发送端根据第二挑战生成;
S206:根据第二挑战生成第二信息密钥;
S207:利用第二信息密钥对加密信息进行解密以得到传输信息。
其中,可以采用流加密方式通过逻辑运算利用第二信息密钥对加密信息进行加密。具体地,逻辑运算可以为异或运算。
在某些实施例中,交互认证方法还包括:
S208:将第二信息密钥经过预设算法处理得到第一摘要信息,并将第一摘要信息发送至发送端以进行解码认证。
预设算法可以是哈希算法,也可以是将第二信息密钥缩减为第一摘要信息的其他算法。
在某些实施例中,交互认证方法还包括:接收发送端发送的确认信号以结束通信。
需要说明的是,前述对集中在发送端描述的交互认证方法,也适用于本申请实施例的接收端,其实现原理类似,在此不再赘述。
综上,本申请的交互认证方法首先通过对称BTDP电路自动产生对称密钥,不需要进行密钥传输,有效地解决了在使用流加密方式时,密钥和原文长度一致,如何传输密钥的问题。其次,由于将ID和密钥放入非易失性存储中,有被窃取的风险,本申请的交互认证方法只有在电路工作装填下,才会产生相应密钥和ID,不进行任何存储,增加破解难度。此外,本申请的交互认证方法将身份验证和数据传输通过一个电路完成,增加了电路复用性,降低交互认证系统的整体开销。
为了实现上述实施例,请结合图14,本申请还提供一种交互认证发送装置100,用于发送端,发送端与接收端通信连接。交互认证发送装置100包括:第一生成模块101、第一接收模块102、第二生成模块103和第一认证模块104。
其中,第一生成模块101用于生成第一挑战并将第一挑战发送至接收端B。
第一接收模块102用于接收接收端B发送的响应,响应包括第一身份验证信息和第二挑战,第一身份验证信息和第二挑战由第一身份验证密钥进行加密。
第二生成模块103用于根据第一挑战生成第二身份验证密钥和第二身份验证信息。
第一认证模块104用于利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与第二身份验证信息进行匹配以进行身份认证。
需要说明的是,前述对集中在发送端描述的交互认证方法,也适用于本申请实施例的发送端的交互认证发送装置100,其实现原理类似,在此不再赘述。
综上,本申请的交互认证发送装置100通过挑战响应对完成身份验证过程,集身份验证和数据加密为一体,密钥和身份ID均由硬件TDP产生,由于硬件产生的ID是与硬件相关的,仅在上电运行后产生,不能进行迁移,具有高度的唯一性、私密性和安全性,无需进行存储,大大增加了系统的安全性。
为了实现上述实施例,请结合图15,本申请还提供一种交互认证接收装置200,用于接收端,接收端与发送端通信连接。交互认证装置200包括:第二接收模块201、第三生成模块202、加密模块203和第二认证模块204。
其中,第二接收模块201用于接收发送端发送的第一挑战。
第三生成模块202用于根据第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战。
加密模块203用于利用第一身份验证密钥对第一身份验证信息和第二挑战进行加密。
第二认证模块204用于将加密后的第一身份验证信息和第二挑战作为响应发送至接收端以进行身份认证。
需要说明的是,前述对集中在接收端描述的交互认证方法,也适用于本申请实施例的接收端的交互认证接收装置200,其实现原理类似,在此不再赘述。
综上,本申请的交互认证接收装置200通过挑战响应对完成身份验证过程,集身份验证和数据加密为一体,密钥和身份ID均由硬件TDP产生,由于硬件产生的ID是与硬件相关的,仅在上电运行后产生,不能进行迁移,具有高度的唯一性、私密性和安全性,无需进行存储,大大增加了系统的安全性。
请参阅图7,本申请还提供一种交互认证系统1000。交互认证系统1000包括:发送端A和接收端B。
发送端A用于生成第一挑战F并将第一挑战发送至接收端B。
接收端B用于接收发送端A发送的第一挑战F,及用于根据第一挑战F生成第一身份验证密钥、第一身份验证信息和第二挑战,及用于利用第一身份验证密钥对第一身份验证信息和第二挑战F new进行加密,以及用于将加密后的第一身份验证信息和第二挑战作为响应发送至接收端B。
发送端A用于根据第一挑战生成第二身份验证密钥和第二身份验证信息,以及用于利用第二身份验证密钥对第一身份验证信息进行解密并将解密后的第一身份验证信息与第二身份验证信息进行匹配以进行身份认证。
本申请的交互认证系统1000通过挑战响应对完成发送端和接收端的身份验证过程,且 集身份验证和数据加密为一体,密钥和身份ID均由硬件TDP产生,由于硬件产生的ID是与硬件相关的,仅在上电运行后产生,不能进行迁移,具有高度的唯一性、私密性和安全性,无需进行存储,大大增加了系统的安全性。此外,该方法具有小面积、低功耗、易集成等特点,由于其具有显著的重构性,适合用于面向现场可编程门阵列(Field-Programmable Gate Array,FPGA)的解决方案。
本申请还提供一种计算机设备,包括存储器和处理器,存储器上存储有计算机程序,当计算机程序被处理器执行时,实现上述任一实施方式的交互认证方法。
本申请实施方式还提供了一种计算机可读存储介质,其上存储有计算机程序,当计算机程序被一个或多个处理器执行时,实现上述任一实施方式的交互认证方法。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,程序可存储于一非易失性计算机可读存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等。
在本申请中,除非另有明确的规定和限定,第一特征在第二特征之“上”或之“下”可以包括第一和第二特征直接接触,也可以包括第一和第二特征不是直接接触而是通过它们之间的另外的特征接触。而且,第一特征在第二特征“之上”、“上方”和“上面”包括第一特征在第二特征正上方和斜上方,或仅仅表示第一特征水平高度高于第二特征。第一特征在第二特征“之下”、“下方”和“下面”包括第一特征在第二特征正下方和斜下方,或仅仅表示第一特征水平高度小于第二特征。
上文的公开提供了许多不同的实施方式或例子用来实现本申请的不同结构。为了简化本申请的公开,上文中对特定例子的部件和设置进行描述。当然,它们仅仅为示例,并且目的不在于限制本申请。此外,本申请可以在不同例子中重复参考数字和/或参考字母,这种重复是为了简化和清楚的目的,其本身不指示所讨论各种实施方式和/或设置之间的关系。此外,本申请提供了的各种特定的工艺和材料的例子,但是本领域普通技术人员可以意识到其他工艺的应用和/或其他材料的使用。
在本说明书的描述中,参考术语“一个实施方式”、“一些实施方式”、“示意性实施方式”、“示例”、“具体示例”、或“一些示例”等的描述意指结合实施方式或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施方式或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施方式或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施方式或示例中以合适的方式结合。
尽管已经示出和描述了本申请的实施方式,本领域的普通技术人员可以理解:在不脱 离本申请的原理和宗旨的情况下可以对这些实施方式进行多种变化、修改、替换和变型,本申请的范围由权利要求及其等同物限定。

Claims (18)

  1. 一种交互认证方法,用于发送端,所述发送端与接收端通信连接,其特征在于,所述交互认证方法包括:
    生成第一挑战并将所述第一挑战发送至所述接收端;
    接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;
    根据所述第一挑战生成第二身份验证密钥和第二身份验证信息;
    利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
  2. 根据权利要求1所述的交互认证方法,其特征在于,所述第一身份验证密钥和所述第一身份验证信息由所述接收端根据所述第一挑战基于偏置的时间平均频率直接周期合成技术与物理不可克隆技术的第一加密电路生成。
  3. 根据权利要求1或2所述的交互认证方法,其特征在于,所述第二身份验证密钥和所述第二身份验证信息由所述发送端根据所述第一挑战基于偏置的时间平均频率直接周期合成技术与物理不可克隆技术的第二加密电路生成,所述第一加密电路和所述第二加密电路的性质保持一致。
  4. 根据权利要求1至3中任意一项所述的交互认证方法,其特征在于,所述利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证包括:
    在解密后的所述第一身份验证信息与所述第二身份验证信息相同的情况下,确定所述接收端的身份验证通过并对第二挑战进行解密;
    在解密后的所述第一身份验证信息与所述第二身份验证信息不相同的情况下,确定所述接收端的身份验证失败,所述发送端与所述接收端停止通信。
  5. 根据权利要求4所述的交互认证方法,其特征在于,所述在解密后的所述第一身份验证信息与所述第二身份验证信息相同的情况下,确定所述接收端的身份验证通过并对第二挑战进行解密包括:
    根据解密后的第二挑战生成第一信息密钥;
    利用所述第一信息密钥对传输信息进行加密得到加密信息;
    将所述加密信息发送至所述接收端。
  6. 根据权利要求5所述的交互认证方法,其特征在于,所述利用所述第一信息密钥对传输信息进行加密得到加密信息包括:
    采用流加密方式通过逻辑运算利用所述第一信息密钥对传输信息进行加密。
  7. 根据权利要求5所述的交互认证方法,其特征在于,所述交互认证方法还包括:
    接收所述接收端发送的第一摘要信息,所述第一摘要信息为所述接收端根据所述第二挑战生成的第二信息密钥经过预设算法处理得到;
    将所述第一信息密钥经过预设算法处理到第二摘要信息,将所述第一摘要信息和所述第二摘要信息进行匹配以进行解码认证。
  8. 根据权利要求7所述的交互认证方法,其特征在于,所述将所述第一摘要信息和所述第二摘要信息进行匹配以进行解码认证包括:
    在所述第一摘要信息和所述第二摘要信息相同的情况下,确定解码认证成功并向所述接收端发送确认信号以结束通信;
    在所述第一摘要信息和所述第二摘要信息不相同的情况下,确定解码认证失败。
  9. 一种交互认证方法,用于接收端,所述接收端与发送端通信连接,其特征在于,所述交互认证方法包括:
    接收所述发送端发送的第一挑战;
    根据所述第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战;
    利用所述第一身份验证密钥对所述第一身份验证信息和所述第二挑战进行加密;
    将加密后的所述第一身份验证信息和所述第二挑战作为响应发送至所述接收端以进行身份认证。
  10. 根据权利要求9所述的交互认证方法,其特征在于,所述交互认证方法还包括:
    接收发送端发送的加密信息,所述加密信息由所述发送端根据第一信息密钥对传输信息进行加密得到,所述第一信息密钥由所述发送端根据所述第二挑战生成;
    根据所述第二挑战生成第二信息密钥;
    利用所述第二信息密钥对所述加密信息进行解密以得到所述传输信息。
  11. 根据权利要求10所述的交互认证方法,其特征在于,所述利用所述第二信息密钥对所述加密信息进行解密以得到所述传输信息包括:
    采用流加密方式通过逻辑运算利用所述第二信息密钥对加密信息进行加密。
  12. 根据权利要求9所述的交互认证方法,其特征在于,所述交互认证方法还包括:
    将所述第二信息密钥经过预设算法处理得到第一摘要信息,并将所述第一摘要信息发送至所述发送端以进行解码认证。
  13. 根据权利要求9所述的交互认证方法,其特征在于,所述交互认证方法还包括:
    接收所述发送端发送的确认信号以结束通信。
  14. 一种交互认证发送装置,用于发送端,所述发送端与接收端通信连接,其特征在于,所述交互认证发送装置包括:
    第一生成模块,所述第一生成模块用于生成第一挑战并将所述第一挑战发送至所述接收端;
    第一接收模块,所述第一接收模块用于接收所述接收端发送的响应,所述响应包括第一身份验证信息和第二挑战,所述第一身份验证信息和所述第二挑战由第一身份验证密钥进行加密;
    第二生成模块,所述第二生成模块用于根据所述第一挑战生成第二身份验证密钥和第二身份验证信息;
    第一认证模块,所述第一认证模块用于利用所述第二身份验证密钥对第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
  15. 一种交互认证接收装置,用于接收端,所述接收端与发送端通信连接,其特征在于,所述交互认证接收装置包括:
    第二接收模块,所述第二接收模块用于接收所述发送端发送的第一挑战;
    第三生成模块,所述第三生成模块用于根据所述第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战;
    加密模块,所述加密模块用于利用所述第一身份验证密钥对所述第一身份验证信息和所述第二挑战进行加密;
    第二认证模块,所述第二认证模块用于将加密后的所述第一身份验证信息和所述第二 挑战作为响应发送至所述接收端以进行身份认证。
  16. 一种交互认证系统,其特征在于,所述交互认证系统包括:发送端和接收端,
    所述发送端用于生成第一挑战并将所述第一挑战发送至所述接收端;
    所述接收端用于接收所述发送端发送的第一挑战,及用于根据所述第一挑战生成第一身份验证密钥、第一身份验证信息和第二挑战,及用于利用所述第一身份验证密钥对第一身份验证信息和第二挑战进行加密,以及用于将加密后的第一身份验证信息和第二挑战作为响应发送至所述接收端;
    所述发送端用于根据第一挑战生成第二身份验证密钥和第二身份验证信息,以及用于利用所述第二身份验证密钥对所述第一身份验证信息进行解密并将解密后的所述第一身份验证信息与所述第二身份验证信息进行匹配以进行身份认证。
  17. 一种计算机设备,其特征在于,包括处理器和存储器,所述存储器存储有计算机程序,所述计算机程序被所述处理器执行实现1-13任一项的方法。
  18. 一种计算机可读存储介质,其特征在于,其上存储有计算机程序,当所述计算机程序被一个或多个处理器执行时实现1-13任一项的方法。
PCT/CN2020/139027 2020-12-24 2020-12-24 交互认证方法、装置及系统、计算机设备及可读存储介质 WO2022133904A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2020/139027 WO2022133904A1 (zh) 2020-12-24 2020-12-24 交互认证方法、装置及系统、计算机设备及可读存储介质
CN202080003617.2A CN115280813A (zh) 2020-12-24 2020-12-24 交互认证方法、装置及系统、计算机设备及可读存储介质
US18/266,690 US20240048540A1 (en) 2020-12-24 2020-12-24 Interactive authentication method, system, computer device, and non-volatile readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/139027 WO2022133904A1 (zh) 2020-12-24 2020-12-24 交互认证方法、装置及系统、计算机设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2022133904A1 true WO2022133904A1 (zh) 2022-06-30

Family

ID=82157183

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/139027 WO2022133904A1 (zh) 2020-12-24 2020-12-24 交互认证方法、装置及系统、计算机设备及可读存储介质

Country Status (3)

Country Link
US (1) US20240048540A1 (zh)
CN (1) CN115280813A (zh)
WO (1) WO2022133904A1 (zh)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142961A (zh) * 2010-06-30 2011-08-03 华为技术有限公司 一种网关、节点和服务器进行鉴权的方法、装置及系统
CN102421096A (zh) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 一种基于无线网络的数据安全传输方法
CN102457844A (zh) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 一种m2m组认证中组密钥管理方法及系统
CN103118363A (zh) * 2011-11-17 2013-05-22 中国电信股份有限公司 一种互传秘密信息的方法、系统、终端设备及平台设备
WO2017009378A1 (en) * 2015-07-13 2017-01-19 Gemalto Sa Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server
US20170272945A1 (en) * 2016-03-17 2017-09-21 M2MD Technologies, Inc. Method and system for managing security keys for user and M2M devices in a wireless communication network environment
CN110048856A (zh) * 2019-04-25 2019-07-23 高创(苏州)电子有限公司 数据传输方法、装置和pos机系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142961A (zh) * 2010-06-30 2011-08-03 华为技术有限公司 一种网关、节点和服务器进行鉴权的方法、装置及系统
CN102457844A (zh) * 2010-10-28 2012-05-16 中兴通讯股份有限公司 一种m2m组认证中组密钥管理方法及系统
CN103118363A (zh) * 2011-11-17 2013-05-22 中国电信股份有限公司 一种互传秘密信息的方法、系统、终端设备及平台设备
CN102421096A (zh) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 一种基于无线网络的数据安全传输方法
WO2017009378A1 (en) * 2015-07-13 2017-01-19 Gemalto Sa Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server
US20170272945A1 (en) * 2016-03-17 2017-09-21 M2MD Technologies, Inc. Method and system for managing security keys for user and M2M devices in a wireless communication network environment
CN110048856A (zh) * 2019-04-25 2019-07-23 高创(苏州)电子有限公司 数据传输方法、装置和pos机系统

Also Published As

Publication number Publication date
CN115280813A (zh) 2022-11-01
US20240048540A1 (en) 2024-02-08

Similar Documents

Publication Publication Date Title
CN108292402B (zh) 用于信息的安全交换的公共秘密的确定和层级确定性密钥
US11470077B2 (en) Authentication of networked devices having low computational capacity
RU2737917C1 (ru) Повышение неоднозначности
US8670563B2 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN111492616B (zh) 用于基于晶格的密码学的可配置设备
US11018866B2 (en) Dynamic second factor authentication for cookie-based authentication
WO2020082160A1 (en) Methods and systems for secure data communication
US20190280858A1 (en) Key exchange schemes with addressable elements
CN109274502B (zh) 公钥加密及密钥签名的创建方法、设备及可读存储介质
US20200195446A1 (en) System and method for ensuring forward &amp; backward secrecy using physically unclonable functions
Tsai et al. TTP based high-efficient multi-key exchange protocol
CN113711564A (zh) 用于加密数据的计算机实现的方法和系统
US20230032099A1 (en) Physical unclonable function based mutual authentication and key exchange
KR20210063378A (ko) 공통 비밀을 공유하는 컴퓨터 구현 시스템 및 방법
US10630466B1 (en) Apparatus and method for exchanging cryptographic information with reduced overhead and latency
Wu et al. Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme
Buchovecká et al. Lightweight Authentication and Secure Communication Suitable for IoT Devices.
WO2022133904A1 (zh) 交互认证方法、装置及系统、计算机设备及可读存储介质
US20220345298A1 (en) Systems and methods for providing signatureless, confidential and authentication of data during handshake for classical and quantum computing environments
Zhang et al. A CPK-based identity authentication scheme for IoT.
CN117917041A (zh) 生成共享加密密钥
Brotsis et al. Towards post-quantum blockchain platforms
CN117795901A (zh) 生成数字签名份额
KR102539418B1 (ko) Puf 기반 상호 인증 장치 및 방법
KR102304831B1 (ko) 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20966476

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18266690

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20.10.2023)