A kind of Authentication protocol design and its implementation based on common key cryptosystem
Technical field
The invention discloses a kind of Authentication protocol design and its implementation based on common key cryptosystem, specially information
Security technology area.
Background technique
Public key cryptography technology, which is that one kind is widely applied, adds the information such as the file, the message that are sent to specified recipient
Close technology.The system for using this cryptographic technique needs to generate a pair of associated public key and private mathematically for each user
Key, public key are published by certain mode, so that any sender can get the public key of recipient, private key then has recipient
Secret saves.
Common key cryptosystem application in an important demand for security be to ensure that the public key used it is exact belong to it is specified
Recipient, that is, need a kind of user identifier (ID) and its public key to be bound together security mechanism.Conventional public-key password body
In system, for example, by using the system of RSA, DSA, ECC scheduling algorithm, the generation of public key and the mark of user are not related, need by
Tripartite authentication center (CA) provides certificate, i.e., signs to the public key of user and mark, the two is bound.Public key KPI can
Authentication and authorization server are provided for a large amount of user, is adapted as the base of the basic identity authentication protocol on internet
Infrastructure.The identity authentication protocol degree of safety of public key mode is high, but its computing cost is big, standard disunity, and user identifier is private
After key is lost, the mark of user and public key are bound together in conventional public-key system, if private key for user is lost, user can be weighed
Newborn public key and private key in a pair, and in id password system, the mark of user is exactly public key, therefore can not be canceled.For
This, we have proposed a kind of Authentication protocol designs based on common key cryptosystem and its implementation to come into operation, on solving
State problem.
Summary of the invention
The purpose of the present invention is to provide a kind of Authentication protocol design and its implementation based on common key cryptosystem, with
Solve the problems mentioned above in the background art.
To achieve the above object, the invention provides the following technical scheme: a kind of authentication protocol based on common key cryptosystem
Design and its implementation, including client, encrypting module, user program, authentication server, management server, application
Server, application interface, system database, database management module;
The client includes supporting the network equipment and radius server of IEEE8 0.21X agreement, for online
The access of user carries out certification control;The application interface provides the application and development interface of the client and application server,
It includes creating or reading ID authentication request routine, the routine of safety or classified information is created;The encrypting module is used for will
User identifier ID and its public key are bound, and carry out data encryption using key encryption block algorithm DES;The system database is for remembering
Sensitive information, shared key and its failure period data of each user are recorded, and information is carried out by the database management module
Security maintenance;The management server provides the network operation interface being written and read to the application server, and customer can
It operates on any machine on network;The authentication server is requestor's generation session key, and periodically from described
The key of update is obtained in user program.
Preferably, the authentication server in dialup server and leaves authentication information concentratedly using charging is dialled in
Radius server between certified transmission, authorization and configuration information agreement.
Preferably, controlled ports built in the application interface and uncontrolled port, wherein the uncontrolled port is located always
In diconnected state, for transmitting EAP protocol packet;The controlled ports can be configured to the controlled two kinds of sides of bi-direction controlled, defeated people
Formula, to adapt to different application environments.
Preferably, the client further includes WEB server, for register user by WEB mode to internet records into
Row inquiry, system manager are counted and are managed by price bidding of the WEB server to registration user.
Preferably, specific step is as follows for the implementation method:
S1: sending certification request to authenticator pae, input security parameter k, is carried out just using KGC operation algorithm to system
Beginningization;
S2: receiving the EAP Request of authenticator pae, and carries out response, and KGC is after the identity for confirming user, input system ginseng
The status identifier ID of number params, master key master-key and a userA, IDA∈{0,1}*, calculate qA=H1(IDA)
∈G1And return to the part private key D of userA=(s+qA)-1 p∈G1, then by DAUser is sent to by safe lane;
S3: the secret value x of user is inputtedA, public key RAWith part private key DA, calculateAnd SA=(xA+
yA)-1DA∈G1, and return to the private key SK of userA=SA;
S4: input message plaintext m ∈ M, signer identity IDA, private key SAAnd system parameter params, nothing is carried out to system
Certificate signature;
S5: verifying the information of input, if passing through, completes authentication protocol, if not passing through, return step S2 into
Row is verified again.
Preferably, KGC algorithm are as follows: output < G1, G2, e >, wherein G1And G2It is two q rank cyclic groups, e:G1×G2→G2It is
One bilinear map selects a random numberAnd G1A generation member P ∈ G1, calculate Ppub=sP and g=e (p,
P), three cryptographic Hash functions are selected WithAnd open system parameter
Params=< G1, G2, e, q, g, P, Ppub, H1, H2, H3>, message space is M={ 0,1 }*, system master key master-key is
Preferably, the algorithm when carrying out without certificate signature operates to one random number of selectionCalculate U=gr=e
(P, P)rIfCalculate V=(r+h) SA, σ=(U, V) is returned as signer A to the signature of m.
Preferably, when being verified, Q is calculatedA=(s+qA) P=Ppub+H1(IDA) P, yA=H2(RA) and h=H3(m,
U), e (V, R are checkedA+yAQA)=UghWhether true, if equation is set up, otherwise verifier's output 1 exports 0.
Compared with prior art, the beneficial effects of the present invention are: the present invention is using no certificate signature system, signature verifier
When verifying signature without verifying the validity of signer public key as under conventional public-key cryptographic system, it is not based on identity
Key escrow in cryptographic system, using the related news of higher layer message format transmitting authentication public key, without understanding bottom
Details, certification mode is highly-safe, good reliability, while there is good system to expand performance.
Detailed description of the invention
Fig. 1 is present system functional block diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment, it shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of Authentication protocol design based on common key cryptosystem,
Including client, encrypting module, user program, authentication server, management server, application server, application interface, it is
System database, database management module;
The client includes supporting the network equipment and radius server of IEEE8 0.21X agreement, for online
The access of user carries out certification control;The application interface provides the application and development interface of the client and application server,
It includes creating or reading ID authentication request routine, the routine of safety or classified information is created;The encrypting module is used for will
User identifier ID and its public key are bound, and carry out data encryption using key encryption block algorithm DES;The system database is for remembering
Sensitive information, shared key and its failure period data of each user are recorded, and information is carried out by the database management module
Security maintenance;The management server provides the network operation interface being written and read to the application server, and customer can
It operates on any machine on network;The authentication server is requestor's generation session key, and periodically from described
The key of update is obtained in user program.
Wherein, the authentication server in dialup server and leaves authentication information concentratedly using charging is dialled in
Certified transmission between radius server, authorization and configuration information agreement, controlled ports built in the application interface and it is non-by
Port is controlled, wherein the uncontrolled port is in diconnected state always, for transmitting EAP protocol packet;The controlled ports
It can be configured to bi-direction controlled, the defeated controlled two ways of people, to adapt to different application environments, the client further includes WEB clothes
Business device, inquires internet records by WEB mode for registering user, system manager passes through the WEB server pair
The price bidding of registration user is counted and is managed.
The present invention also provides a kind of implementation methods of Authentication protocol design based on common key cryptosystem, and specific steps are such as
Under:
S1: sending certification request to authenticator pae, input security parameter k, is carried out just using KGC operation algorithm to system
Beginningization, KGC algorithm are as follows: output < G1, G2, e >, wherein G1And G2It is two q rank cyclic groups, e:G1×G2→G2It is a bilinearity
Mapping, selects a random numberAnd G1A generation member P ∈ G1, calculate Ppub=sP and g=e (p, p) selects three
Cryptographic Hash function WithAnd open system parameter params=<
G1, G2, e, q, g, P, Ppub, H1, H2, H3>, message space is M={ 0,1 }*, system master key master-key is
S2: receiving the EAP Request of authenticator pae, and carries out response, and KGC is after the identity for confirming user, input system ginseng
The status identifier ID of number params, master key master-key and a userA, IDA∈{0,1}*, calculate qA=H1(IDA)
∈G1And return to the part private key D of userA=(s+qA)-1p∈G1, then by DAUser is sent to by safe lane;
S3: the secret value x of user is inputtedA, public key RAWith part private key DA, calculateAnd SA=(xA+
yA)-1DA∈G1, and return to the private key SK of userA=SA;
S4: input message plaintext m ∈ M, signer identity IDA, private key SAAnd system parameter params, nothing is carried out to system
Certificate signature, the algorithm when carrying out without certificate signature operate to one random number of selectionCalculate U=gr=e (P, P)r,
IfCalculate V=(r+h) SA, σ=(U, V) is returned as signer A to the signature of m;
S5: verifying the information of input, if passing through, completes authentication protocol, if not passing through, return step S2 into
Row is verified again, when being verified, calculates QA=(s+qA) P=Ppub+H1(IDA) P, yA=H2(RA) and h=H3(m, U), inspection
Look into e (V, RA+yAQA)=UghWhether true, if equation is set up, otherwise verifier's output 1 exports 0.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.