[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102664739A - PKI (Public Key Infrastructure) implementation method based on safety certificate - Google Patents

PKI (Public Key Infrastructure) implementation method based on safety certificate Download PDF

Info

Publication number
CN102664739A
CN102664739A CN2012101240817A CN201210124081A CN102664739A CN 102664739 A CN102664739 A CN 102664739A CN 2012101240817 A CN2012101240817 A CN 2012101240817A CN 201210124081 A CN201210124081 A CN 201210124081A CN 102664739 A CN102664739 A CN 102664739A
Authority
CN
China
Prior art keywords
certificate
chip
authentication center
key
final entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101240817A
Other languages
Chinese (zh)
Inventor
杜丽萍
刘宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012101240817A priority Critical patent/CN102664739A/en
Publication of CN102664739A publication Critical patent/CN102664739A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a PKI (Public Key Infrastructure) implementation method based on a safety certificate. The method comprises the following steps of: deploying an encryption card or encryption equipment hardware equipment on the end part of a CA (Certificate Authority); encrypting all final entity CA certificates in the CA into a cipher text for storing; storing each middle-class CA certificate and root CA certificate in a CA encryption card or a chip of the encryption equipment; generating a key in a safety protocol of the PKI and calling the key to encrypt or decrypt the certificate in the chip; establishing a 'chip-class' PKI safety protocol between a user terminal and a CA terminal; establishing a certificate safety detection protocol in the CA; and detecting the CA certificate in a full trusted link in the CA timely to prevent an attacker from tampering the CA certificate to establish a PKI system based on the safety certificate.

Description

A kind of PKI implementation method based on safety certificate
Technical field:
The present invention relates to filed of network information security.
Background technology:
At present, the domestic network safety system all adopts PKI/CA, and the PKI/CA technology is to adopt asymmetric cryptographic algorithm and symmetric cryptographic algorithm; Set up authenticating user identification, data integrity checking and Data Encrypting Transmission System jointly; But at the ca authentication center of PKI, user's various certificates all are to leave in the certificate database with the plaintext form; The certificate stored in clear receives spying upon of outside assault or internal control personnel easily; The assailant can come " formula of fastening one person's story upon another person attack " carried out at the ca authentication center, in a word through obtaining and replace all final entity CA certificate, each the intermediate CA certificate and the root ca certificate at ca authentication center; All there is potential safety hazard in existing P KI product, can not satisfy the demand of market to the network information security.
Summary of the invention:
A kind of PKI implementation method based on safety certificate is under the PKI of standard condition, uses the hardware device of smart card as the client encrypt system; In the chip of smart card, adopt asymmetric cryptographic algorithm and symmetric cryptographic algorithm to set up the client encrypt system, and write symmetric cryptographic algorithm, digest algorithm, client identity authentication protocol, digital signature protocol, signature verification agreement, enciphering/deciphering agreement; And the ssl protocol of client, and storage user's one group of private key and final entity CA certificate, set up the ca authentication center at the network application server end; The ca authentication center is made up of multiple servers or minicomputer, uses asymmetric cryptographic algorithm and symmetric cryptographic algorithm to set up authentication center's end encryption system at the ca authentication center, in server or minicomputer; Be prestored into symmetric cryptographic algorithm, digest algorithm, authentication center's end authentication agreement, digital signature protocol, signature verification agreement, enciphering/deciphering agreement, and the ssl protocol of authentication center's end, and store final entity CA certificate, each intermediate CA certificate and root ca certificate of all users; Authentication agreement, digital signature protocol and the ssl protocol of PKI; All comprise in the certificate database at ca authentication center, the final entity CA certificate that finds corresponding client user expressly after, on ca authentication central server hard disk; Call the authenticate password that PKI deciphering client transmissions is come; Obtain the final entity CA certificate of user of client, and in internal memory, the final entity CA certificate of the user of client and ca authentication center-side is compared authentication; Equally in internal memory; Digital signature to file is carried out signature verification, and each intermediate CA certificate and root ca certificate on the trust chain of cert verify, thereby; In ca authentication central server internal memory, accomplish the whole process of authentication agreement, signature verification agreement and the ssl protocol of ca authentication center-side;
The present invention adopts encrypted card or encryption equipment hardware device in the ca authentication center-side; Between user side and ca authentication center-side, set up the PKI security protocol of " chip-scale "; Wherein: the security protocol of PKI comprises: authenticating user identification, data integrity checking and data encryption transmission, and the technical characterictic of its method is:
In the PCI groove of the server at ca authentication center or minicomputer; Insert the polylith encrypted card; Or server or the minicomputer of many encryption equipments with the ca authentication center linked; And in the chip of encrypted card or encryption equipment, storage key K that the asymmetric cryptographic algorithm that prestores, symmetric cryptographic algorithm, one group are fixing, and various security protocol is like authentication agreement, signature verification agreement and server end ssl protocol etc.In the chip of the USB-KEY of client, deposit symmetric cryptographic algorithm, asymmetric cryptographic algorithm, user's private key, authentication agreement, digital signature protocol and client-side ssl protocol, and the user certificate of corresponding USB-KEY equipment promptly: final entity CA certificate;
In the certificate initialization procedure, all final entity CA certificate with the ca authentication center is encrypted to the ciphertext storage earlier, in the encrypted card or encryption equipment chip of ca authentication center-side; Use randomizer to produce the random number of one time one change, as symmetric key promptly: the key K i of encrypted certificate (i=1~n, n are all users' sum); One group key Ki encrypts one group of final entity CAi certificate; One-time pad, and all final entity CAi certificates are encrypted to ciphertext, be stored in the certificate database of ca authentication center-side; With each intermediate CA certificate and root ca certificate, leave in the chip of ca authentication center encrypted card or encryption equipment equipment;
The security protocol of PKI as: in authentication agreement, digital signature protocol and the ssl protocol, key produces, call key pair certificate encrypts or deciphers, and all in chip, accomplishes;
Set up the certificate security detecting protocol at the ca authentication center; Regularly the CA certificate in all trust chains at ca authentication center is detected, prevent that the assailant from distorting CA certificate, guarantee the safe, credible of all final entity CA certificate; Thereby; Between user side and ca authentication center-side, set up the PKI security protocol of " chip-scale ", all with the realization of software and hardware combination, concrete grammar is following based on the PKI system of safety certificate:
1, sets up safe PKI framework; In the PCI groove of the server at ca authentication center or minicomputer; Insert the polylith encrypted card, or server or the minicomputer of many encryption equipments with the ca authentication center linked, and in the chip of encrypted card or encryption equipment; The fixing storage key K of asymmetric cryptographic algorithm, symmetric cryptographic algorithm, one group that prestores, and various security protocol is like authentication agreement, signature verification agreement and server end ssl protocol etc.
2, in the chip of the USB-KEY of client, deposit symmetric cryptographic algorithm, asymmetric cryptographic algorithm, user's private key, authentication agreement, digital signature protocol and client-side ssl protocol, and the user certificate of corresponding USB-KEY equipment promptly: final entity CA certificate.
3, set up the safety certificate system, in the certificate initialization procedure, all final entity CA certificate with the ca authentication center is encrypted to the ciphertext storage earlier; Because certificate format and content are X.500 (or X.509) of standard, if use one group of fixing symmetric key to encrypt whole users' certificate; Then can cause and repeat newspaper (being the essential condition of decoding), if encrypt with asymmetric cryptographic algorithm, then the speed of service is slower; The asymmetric cryptographic algorithm encryption/decryption speed is if move in computer, and slow 100 times than symmetrical cryptographic algorithm encryption/decryption speed, if in chip hardware, move; Than symmetrical cryptographic algorithm encryption/decryption speed slow 1000 times, this can influence the speed of various security protocols.For this reason; Encrypted card or the randomizer in the encryption equipment chip in the ca authentication center-side produce the random number of one time one change, and as symmetric key promptly: the key of encrypted certificate, a group key are encrypted one group of final entity CA certificate; One-time pad; And all final entity CA certificates are encrypted to ciphertext, and be stored in the certificate database of ca authentication center-side, each intermediate CA certificate and root ca certificate are left in the chip of ca authentication center encrypted card or encryption equipment equipment.
4, certificate encryption and key management method are following:
(1) at first; Through calling the randomizer in ca authentication center encrypted card or the encryption equipment chip, in chip, produce one group of random number, with this random number as storage key K; Wherein: storage key is changeless, and storage key K is used for the key of all encrypted certificates is encrypted.
(2) call randomizer in ca authentication center encrypted card or the encryption equipment chip, in chip, produce one group of random number L 1, and with this random number L 1As key K 1, with the final entity CA certificate CA in the ca authentication center certificate database 1In the input chip, in chip, use key K 1With final entity CA certificate CA 1Be encrypted to ciphertext; In chip, produce one group of random number L 2, and with this random number L 2As key K 2, with the final entity CA certificate CA in the ca authentication center certificate database 2In the input chip, in chip, use key K 2With final entity CA certificate CA 2Be encrypted to ciphertext; In chip, produce one group of random number L n, and with this random number n as key K n, with the final entity CA certificate CA in the ca authentication center certificate database nIn the input chip, in chip, use key K nWith final entity CA certificate CA nBe encrypted to ciphertext, wherein: the sequence number of each final entity CA certificate (sign of certificate) Li, (i=1~n) do not encrypt, certificate serial number Li are used for the final entity CA certificate CAi ciphertext of search and positioning certificate database, key K i(i=1~n), for encrypting the key of final entity CA certificate, n is all in the heart finally sums of entity CA certificate in the ca authentication.
(3) with certificate CA 1, certificate CA 2... certificate CA nCiphertext in chip, export, leave in the ca authentication center certificate database, in chip, re-use storage key K respectively with K 1, K 2... K nBe encrypted to ciphertext, generate K respectively 1', K 2' ... K n', again with K 1', K 2' ... K n', leave the corresponding final entity CA certificate CA of ca authentication center certificate database respectively in 1, CA 2..., CA nLast field of ciphertext record in.
5, set up " chip-scale " security protocol at ca authentication center; The security protocol of PKI as: in authentication agreement, digital signature protocol and the ssl protocol; When the ca authentication center-side need be obtained the final entity CA certificate of respective user; According to the sequence number (sign) of the next final entity CA certificate of client transmissions, the ciphertext of the final entity CA certificate record in the certificate database of location, and be input in the chip of ca authentication center encrypted card or encryption equipment; In chip, with the storage key K key ciphertext K that final entity CA certificate is corresponding i' (i=1~n) be decrypted into expressly promptly: K i(i=1~n), use K again i(i=1~n) decipher this final entity CA certificate to obtain it expressly; Afterwards; In chip, carry out other operations of security protocol again; Other operations as in the authentication agreement comprise: ca authentication center-side encryption system, in chip, call the PKI of the final entity CA certificate of respective user, and the ciphertext of the final entity CA certificate of user that client is transmitted is deciphered and is obtained expressly; And with the authentication of expressly comparing of the final entity CA certificate of the respective user of ca authentication center-side storage, judge whether the user of client credible; Other operations in digital signature protocol comprise: ca authentication center-side encryption system; In chip, call the PKI of the final entity CA certificate of respective user; Client is transmitted file digital signature deciphers; The summary info that obtains file is promptly: " digital finger-print 1 ", again with calling digest algorithm, to file make a summary obtain file summary info promptly: " digital finger-print 2 " of file; Whether whether identical with " digital finger-print 2 " through contrast " digital finger-print 1 ", it is credible to differentiate the user that file is signed; Whether other operations in ssl protocol comprise: identical with the final entity CA certificate of the user of ca authentication center-side through the contrast client; After accomplishing two-way authentication, consult symmetric cryptographic algorithm and the version and the symmetric key of client and ca authentication center-side again, that is: accomplish the sub-protocol of shaking hands of ssl protocol; At last; Carry out the record sub-protocol of ssl protocol, thereby, PKI security protocol set up based on " chip-scale ".
6, set up ca authentication center certificate safety detecting system
Set up the certificate security detecting protocol at the ca authentication center, regularly the CA certificate in all trust chains at ca authentication center is detected.Its testing process is, with all final entity CA certificates in the ca authentication center certificate database, that is: CA1, CA2 ..., CAn recorded content (comprising: the ciphertext of CAi, certificates identified and key ciphertext K i'), import successively in the chip of encrypted card or encryption equipment, in chip, call storage key K, will encrypt final entity CA certificate CAi (the key ciphertext K of i=1~n) respectively i' (i=1~n), be decrypted into expressly promptly: K i(i=1~n), use K again i(i=1~n) deciphers corresponding final entity CA certificate CAi, and (ciphertext of i=1~n) obtains it expressly, afterwards; In chip, call the PKI of next stage middle rank CA certificate, this has been decrypted into final entity CA certificate CAi expressly, and (i=1~n) carries out signature verification; If final entity CA certificate not through signature verification; Then this final entity CA certificate CAi (i=1~n) be regarded as being distorted, if through signature verification, this final entity CA certificate CAi (i=1~n) do not distorted then.Thereby, prevent that the assailant from distorting CA certificate, guarantee the safe, credible of all final entity CA certificate.
7, the whole users' in ca authentication center final entity CA certificate all be with the ciphertext stored in form in certificate database; Each intermediate CA certificate and root ca certificate leave in the chip hardware on the certificate trust chain; Can guarantee the storage security of each intermediate CA certificate and root ca certificate on all final entity CA certificates of authentication center, the trust chains; Simultaneously, the various certificates of assurance ca authentication center-side are believable; Even the assailant wants to distort user's final entity CA certificate; But; Under the situation of the key that can't obtain encrypted certificate, also can't the final entity CA certificate after distorting be encrypted to the ciphertext that the assailant can use, thereby; Prevent that the assailant from through distorting final entity CA certificate, attacking the various security protocols at ca authentication center.
8, leave all intermediate CA certificate and root ca certificate in ca authentication center encrypted card or the encryption equipment chip in, receive the protection of chip hardware, when setting up each intermediate CA certificate and root ca certificate trust chain for the first time; In chip, each intermediate CA certificate and root ca certificate on the trust chain are verified, no longer each intermediate CA certificate and root ca certificate on the trust chain are verified later on; Just; When ca authentication center security of operation agreement, during like: authentication, signature verification and ssl protocol, various security protocols not cert trust chain are verified; That is: never call subordinate middle rank CA certificate final entity CA certificate is carried out signature verification; Also never call upper level middle rank CA certificate next stage middle rank CA certificate is carried out signature verification, also need not call root ca certificate upper level middle rank CA certificate is carried out signature verification, thereby; Reduce the part link of various security protocols, improve the operational efficiency of each security protocol.
9, set up " chip-scale " various PKI security protocols (as: authentication, signature verification and ssl protocol) in the ca authentication center-side, the various links of various PKI security protocols are all accomplished in chip, that is: in chip, with storage key K decruption key K i' (i=1~n), generate key K i(i=1~n), use K again i(after i=1~n) becomes final entity CA certificate decrypt ciphertext expressly, carry out other operations of security protocol again, thereby, the safe class of the various security protocols of PKI improved.
10, set up the certificate safety detecting system at the ca authentication center; Regularly all final entity CA certificates in ca authentication center are carried out signature verification; Whether detect the final entity CA certificate at ca authentication center is distorted; So that in time the final entity CA certificate to the ca authentication center recovers, the various security protocols in assurance ca authentication center can normally be moved.
11, storage key K produces in chip, be used for to all encrypted certificates key K i (i=1~n) encrypt, storage key K is stored in the chip, and not outside the pio chip, guarantees storage and the security of operation of storage key K; (i=1~n) is in chip to the key K i of encrypted certificate, is produced by randomizer, in chip; Final entity CA certificate is carried out cryptographic operation, and guarantee that (i=1~n) encrypts one group of final entity CA certificate, one-time pad for the key K i of a group encryption certificate; Do not reuse; (i=1~n) does not go out chip to the key K i of encrypted certificate, and after being stored key K in the chip and being encrypted to ciphertext, exports in the chip to be stored in the certificate database; Thereby, the storage security and the security of operation of assurance encrypted certificate key.
12, with the final entity CA certificate data of magnanimity form with ciphertext; Leave in the certificate database at ca authentication center, simultaneously, with whole intermediate CA certificate and the root ca certificate on the certificate trust chain; With the plaintext stored in form in the chip of ca authentication center encrypted card or encryption equipment; Not only, can guarantee the final entity CA certificate of magnanimity, and the storage security of the important data of the whole intermediate CA certificate on the certificate trust chain and root ca certificate; And, can significantly reduce the construction cost that encryption device hardware is purchased at the ca authentication center.
Description of drawings:
Accompanying drawing 1: between client and ca authentication center-side, set up the procedure chart of " chip-scale " digital signature protocol,
Accompanying drawing 2: between client and ca authentication center-side, set up the procedure chart of " chip-scale " authentication agreement,
Embodiment:
Between client and ca authentication center-side, set up the performing step of " chip-scale " digital signature protocol below in conjunction with accompanying drawing 1 explanation:
At first, will intend in the file 1 input intelligent card chip of signature client encrypt system call digest algorithm in chip in client; File 1 to intending signature is made a summary; The summary info that obtains file 1 is promptly: " digital finger-print " of file 1, the client encrypt system is the private key of invoke user again, the ciphertext that " digital finger-print 1 " of file 1 encrypted " digital finger-print 1 " that obtain file 1 promptly: digital signature; Digital signature with sign, file 1 and the file of user's final entity CA certificate; Send to the ca authentication center in the lump, the sign of the final entity CA certificate that ca authentication center basis is received, the ciphertext of the final entity CA certificate of the user CAi of search and positioning correspondence in certificate database; In chip, with storage key K deciphering K i' obtain Ki; With Ki (this final entity CA certificate ciphertext of i=1~n) deciphering correspondence; Obtain the plaintext of this final entity CA certificate, again with the ciphertext of " digital finger-print 1 " of the PKI declassified document 1 in this final entity CA certificate promptly: digital signature obtains the plaintext of " digital finger-print 1 " of file; Calling digest algorithm again makes a summary to file 1; The summary info that obtains file 1 is promptly: " digital finger-print 2 ", whether whether identical with " digital finger-print 2 " through contrast " digital finger-print 1 ", it is credible to differentiate the user that file 1 is signed.
Between client and ca authentication center-side, set up the performing step of " chip-scale " authentication agreement below in conjunction with accompanying drawing 2 explanations:
At first, in the intelligent card chip of client, produce one group of random number S1, client encrypt system call user's private key; User's final entity CA certificate and random number S1 are encrypted to ciphertext promptly: authenticate password 1, client sends to the ca authentication center in the lump with sign, random number S1 and the authenticate password 1 of user's final entity CA certificate; The ca authentication center is according to the sign of the final entity CA certificate of receiving, the ciphertext of the final entity CA certificate of the user CAi of search and positioning correspondence in certificate database is in chip; Ki ' obtains Ki with storage key K deciphering, and (i=1~n) decipher this corresponding final entity CA certificate ciphertext obtains the plaintext of this final entity CA certificate with Ki; With the PKI decrypted authentication password 1 in this final entity CA certificate, obtain the final entity CA certificate of user of client and the random number S1 after the deciphering again, be made as: random number S2; With the final entity CA certificate of user after the client deciphering, compare with the final entity CA certificate of respective user of ca authentication center-side storage, contrast whether the two identical; Simultaneously, random number S1 and random number S2 with receiving that client transmissions is come compare; Contrast whether the two identical, if above twice contrast is all identical, then client is a validated user; Otherwise client is the disabled user, returns client " disabled user "; If the user of client is a validated user, then again by producing one group of random number S3 in ca authentication center-side encrypted card or the encryption equipment chip, in chip; By the PKI among the final entity CA certificate CAi after the deciphering, random number S3 and this final entity CA certificate CAi are encrypted to ciphertext promptly with the ca authentication center-side: authenticate password 2, the ca authentication center-side should organize random number S3 and authenticate password 2 sends to client in the lump; Client is called private key authenticate password 2 is deciphered in intelligent card chip, obtains the final entity CA certificate of the user CAi of ca authentication center-side storage and the random number S3 after the deciphering; Be made as: random number S4, with this final entity CA certificate CAi, compare with user's CA certificate of storing in the custom end intelligent card; Simultaneously, with the random number S3 that receives that the transmission of ca authentication center-side comes, S4 compares with random number; If above twice contrast is all identical, then is legal ca authentication center, otherwise is illegal ca authentication center; Thereby, accomplish two-way authentication.

Claims (8)

1. the PKI implementation method based on safety certificate is under the PKI of standard condition, under the PKI of standard condition; Use the hardware device of smart card, in the chip of smart card, adopt asymmetric cryptographic algorithm and symmetric cryptographic algorithm to set up the client encrypt system as the client encrypt system; And write symmetric cryptographic algorithm, digest algorithm, client identity authentication protocol, digital signature protocol, signature verification agreement, enciphering/deciphering agreement, and the ssl protocol of client, and storage user's one group of private key and final entity CA certificate; Set up the ca authentication center at the network application server end, the ca authentication center is made up of multiple servers or minicomputer, uses asymmetric cryptographic algorithm and symmetric cryptographic algorithm to set up authentication center's end encryption system at the ca authentication center; In server or minicomputer; Be prestored into symmetric cryptographic algorithm, digest algorithm, authentication center's end authentication agreement, digital signature protocol, signature verification agreement, enciphering/deciphering agreement, and the ssl protocol of authentication center's end, and store final entity CA certificate, each intermediate CA certificate and root ca certificate of all users; Authentication agreement, digital signature protocol and the ssl protocol of PKI; All comprise in the certificate database at ca authentication center, the final entity CA certificate that finds corresponding client user expressly after, on ca authentication central server hard disk; Call the authenticate password that PKI deciphering client transmissions is come; Obtain the final entity CA certificate of user of client, and in internal memory, the final entity CA certificate of the user of client and ca authentication center-side is compared authentication; Equally in internal memory; Digital signature to file is carried out signature verification, and each intermediate CA certificate and root ca certificate on the trust chain of cert verify, thereby; In ca authentication central server internal memory, accomplish the whole process of authentication agreement, signature verification agreement and the ssl protocol of ca authentication center-side;
The present invention adopts encrypted card or encryption equipment hardware device in the ca authentication center-side; Between user side and ca authentication center-side, set up the PKI security protocol of " chip-scale "; Wherein: the security protocol of PKI comprises: authenticating user identification, data integrity checking and data encryption transmission, and the technical characterictic of its method is:
In the PCI groove of the server at ca authentication center or minicomputer; Insert the polylith encrypted card; Or server or the minicomputer of many encryption equipments with the ca authentication center linked; And in the chip of encrypted card or encryption equipment, storage key K that the asymmetric cryptographic algorithm that prestores, symmetric cryptographic algorithm, one group are fixing, and various security protocol is like authentication agreement, signature verification agreement and server end ssl protocol etc.In the chip of the USB-KEY of client, deposit symmetric cryptographic algorithm, asymmetric cryptographic algorithm, user's private key, authentication agreement, digital signature protocol and client-side ssl protocol, and the user certificate of corresponding USB-KEY equipment promptly: final entity CA certificate;
In the certificate initialization procedure, all final entity CA certificate with the ca authentication center is encrypted to the ciphertext storage earlier, in the encrypted card or encryption equipment chip of ca authentication center-side; Use randomizer to produce the random number of one time one change, as symmetric key promptly: the key K i of encrypted certificate (i=1~n, n are all users' sum); One group key Ki encrypts one group of final entity CAi certificate; One-time pad, and all final entity CAi certificates are encrypted to ciphertext, be stored in the certificate database of ca authentication center-side; With each intermediate CA certificate and root ca certificate, leave in the chip of ca authentication center encrypted card or encryption equipment equipment;
The security protocol of PKI as: in authentication agreement, digital signature protocol and the ssl protocol, key produces, call key pair certificate encrypts or deciphers, and all in chip, accomplishes;
Set up the certificate security detecting protocol at the ca authentication center; Regularly the CA certificate in all trust chains at ca authentication center is detected; Prevent that the assailant from distorting CA certificate; Guarantee the safe, credible of all final entity CA certificate, thereby, the PKI security protocol of foundation " chip-scale " between user side and ca authentication center-side.
2. according to the method for claim 1, it is characterized in that:
Certificate encryption and key management method are following:
(1) at first; Through calling the randomizer in ca authentication center encrypted card or the encryption equipment chip, in chip, produce one group of random number, with this random number as storage key K; Wherein: storage key is changeless, and storage key K is used for the key of all encrypted certificates is encrypted;
(2) call randomizer in ca authentication center encrypted card or the encryption equipment chip, in chip, produce one group of random number L 1, and with this random number L 1As key K 1, with the final entity CA certificate CA in the ca authentication center certificate database 1In the input chip, in chip, use key K 1With final entity CA certificate CA 1Be encrypted to ciphertext; In chip, produce one group of random number L 2, and with this random number L 2As key K 2, with the final entity CA certificate CA in the ca authentication center certificate database 2In the input chip, in chip, use key K 2With final entity CA certificate CA 2Be encrypted to ciphertext; In chip, produce one group of random number L n, and with this random number n as key K n, with the final entity CA certificate CA in the ca authentication center certificate database nIn the input chip, in chip, use key K nWith final entity CA certificate CA nBe encrypted to ciphertext, wherein: the sequence number of each final entity CA certificate (sign of certificate) Li, (i=1~n) do not encrypt, certificate serial number Li are used for the final entity CA certificate CAi ciphertext of search and positioning certificate database, key K i(i=1~n), for encrypting the key of final entity CA certificate, n is all in the heart finally sums of entity CA certificate in the ca authentication;
(3) with certificate CA 1, certificate CA 2... certificate CA nCiphertext in chip, export, leave in the ca authentication center certificate database, in chip, re-use storage key K respectively with K 1, K 2... K nBe encrypted to ciphertext, generate K respectively 1', K 2' ... K n', again with K 1', K 2' ... K n', leave the corresponding final entity CA certificate CA of ca authentication center certificate database respectively in 1, CA 2..., CA nLast field of ciphertext record in.
3. according to the method for claim 1, it is characterized in that:
The security protocol of PKI as: in authentication agreement, digital signature protocol and the ssl protocol; When the ca authentication center-side need be obtained the final entity CA certificate of respective user; According to the sequence number (sign) of the next final entity CA certificate of client transmissions, the ciphertext of the final entity CA certificate record in the certificate database of location, and be input in the chip of ca authentication center encrypted card or encryption equipment; In chip, with the storage key K key ciphertext K that final entity CA certificate is corresponding i' (i=1~n) be decrypted into expressly promptly: K i(i=1~n), use K again i(i=1~n) decipher this final entity CA certificate to obtain it expressly; Afterwards; In chip, carry out other operations of security protocol again; Other operations as in the authentication agreement comprise: ca authentication center-side encryption system, in chip, call the PKI of the final entity CA certificate of respective user, and the ciphertext of the final entity CA certificate of user that client is transmitted is deciphered and is obtained expressly; And with the authentication of expressly comparing of the final entity CA certificate of the respective user of ca authentication center-side storage, judge whether the user of client credible; Other operations in digital signature protocol comprise: ca authentication center-side encryption system; In chip, call the PKI of the final entity CA certificate of respective user; Client is transmitted file digital signature deciphers; The summary info that obtains file is promptly: " digital finger-print 1 ", again with calling digest algorithm, to file make a summary obtain file summary info promptly: " digital finger-print 2 " of file; Whether whether identical with " digital finger-print 2 " through contrast " digital finger-print 1 ", it is credible to differentiate the user that file is signed; Whether other operations in ssl protocol comprise: identical with the final entity CA certificate of the user of ca authentication center-side through the contrast client; After accomplishing two-way authentication, consult symmetric cryptographic algorithm and the version and the symmetric key of client and ca authentication center-side again, that is: accomplish the sub-protocol of shaking hands of ssl protocol; At last; Carry out the record sub-protocol of ssl protocol, thereby, PKI security protocol set up based on " chip-scale ".
4. according to the method for claim 1, it is characterized in that:
Set up the certificate security detecting protocol at the ca authentication center, regularly the CA certificate in all trust chains at ca authentication center is detected.Its testing process is, with all final entity CA certificates in the ca authentication center certificate database, that is: CA1, CA2 ..., CAn recorded content (comprising: the ciphertext of CAi, certificates identified and key ciphertext K i'), import successively in the chip of encrypted card or encryption equipment, in chip, call storage key K, will encrypt final entity CA certificate CAi (the key ciphertext K of i=1~n) respectively i' (i=1~n), be decrypted into expressly promptly: K i(i=1~n), use K again i(i=1~n) deciphers corresponding final entity CA certificate CAi, and (ciphertext of i=1~n) obtains it expressly, afterwards; In chip, call the PKI of next stage middle rank CA certificate, this has been decrypted into final entity CA certificate CAi expressly, and (i=1~n) carries out signature verification; If final entity CA certificate not through signature verification; Then this final entity CA certificate CAi (i=1~n) be regarded as being distorted, if through signature verification, this final entity CA certificate CAi (i=1~n) do not distorted then.Thereby, prevent that the assailant from distorting CA certificate, guarantee the safe, credible of all final entity CA certificate.
5. according to the method for claim 1, it is characterized in that:
(1) the whole users' in ca authentication center final entity CA certificate all be with the ciphertext stored in form in certificate database; Each intermediate CA certificate and root ca certificate leave in the chip hardware on the certificate trust chain; Can guarantee the storage security of each intermediate CA certificate and root ca certificate on all final entity CA certificates of authentication center, the trust chains; Simultaneously, the various certificates of assurance ca authentication center-side are believable; Even the assailant wants to distort user's final entity CA certificate; But; Under the situation of the key that can't obtain encrypted certificate, also can't the final entity CA certificate after distorting be encrypted to the ciphertext that the assailant can use, thereby; Prevent that the assailant from through distorting final entity CA certificate, attacking the various security protocols at ca authentication center;
(2) set up " chip-scale " various PKI security protocols (as: authentication, signature verification and ssl protocol) in the ca authentication center-side, the various links of various PKI security protocols are all accomplished in chip, that is: in chip, with storage key K decruption key K i' (i=1~n), generate key K i(i=1~n), use K again i(after i=1~n) becomes final entity CA certificate decrypt ciphertext expressly, carry out other operations of security protocol again, thereby, the safe class of the various security protocols of PKI improved;
(3) with the final entity CA certificate data of magnanimity form with ciphertext; Leave in the certificate database at ca authentication center, simultaneously, with whole intermediate CA certificate and the root ca certificate on the certificate trust chain; With the plaintext stored in form in the chip of ca authentication center encrypted card or encryption equipment; Not only, can guarantee the final entity CA certificate of magnanimity, and the storage security of the important data of the whole intermediate CA certificate on the certificate trust chain and root ca certificate; And, can significantly reduce the construction cost that encryption device hardware is purchased at the ca authentication center.
6. according to the method for claim 1, it is characterized in that:
Leave all intermediate CA certificate and root ca certificate in ca authentication center encrypted card or the encryption equipment chip in, receive the protection of chip hardware, when setting up each intermediate CA certificate and root ca certificate trust chain for the first time; In chip, each intermediate CA certificate and root ca certificate on the trust chain are verified, no longer each intermediate CA certificate and root ca certificate on the trust chain are verified later on; Just; When ca authentication center security of operation agreement, during like: authentication, signature verification and ssl protocol, various security protocols not cert trust chain are verified; That is: never call subordinate middle rank CA certificate final entity CA certificate is carried out signature verification; Also never call upper level middle rank CA certificate next stage middle rank CA certificate is carried out signature verification, also need not call root ca certificate upper level middle rank CA certificate is carried out signature verification, thereby; Reduce the part link of various security protocols, improve the operational efficiency of each security protocol.
7. according to the method for claim 1, it is characterized in that:
Set up the certificate safety detecting system at the ca authentication center; Regularly all final entity CA certificates in ca authentication center are carried out signature verification; Whether detect the final entity CA certificate at ca authentication center is distorted; So that in time the final entity CA certificate to the ca authentication center recovers, the various security protocols in assurance ca authentication center can normally be moved.
8. according to the method for claim 2, it is characterized in that:
Storage key K produces in chip, be used for to all encrypted certificates key K i (i=1~n) encrypt, storage key K is stored in the chip, and not outside the pio chip, guarantees storage and the security of operation of storage key K; (i=1~n) is in chip to the key K i of encrypted certificate, is produced by randomizer, in chip; Final entity CA certificate is carried out cryptographic operation, and guarantee that (i=1~n) encrypts one group of final entity CA certificate, one-time pad for the key K i of a group encryption certificate; Do not reuse; (i=1~n) does not go out chip to the key K i of encrypted certificate, and after being stored key K in the chip and being encrypted to ciphertext, exports in the chip to be stored in the certificate database; Thereby, the storage security and the security of operation of assurance encrypted certificate key.
CN2012101240817A 2012-04-26 2012-04-26 PKI (Public Key Infrastructure) implementation method based on safety certificate Pending CN102664739A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101240817A CN102664739A (en) 2012-04-26 2012-04-26 PKI (Public Key Infrastructure) implementation method based on safety certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101240817A CN102664739A (en) 2012-04-26 2012-04-26 PKI (Public Key Infrastructure) implementation method based on safety certificate

Publications (1)

Publication Number Publication Date
CN102664739A true CN102664739A (en) 2012-09-12

Family

ID=46774159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101240817A Pending CN102664739A (en) 2012-04-26 2012-04-26 PKI (Public Key Infrastructure) implementation method based on safety certificate

Country Status (1)

Country Link
CN (1) CN102664739A (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237235A (en) * 2013-03-18 2013-08-07 中国科学院信息工程研究所 Method and system for realizing identity authentication on Cloud TV terminals
CN103533403A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Equipment certificate activating method for smart cloud TV terminal
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
WO2016107576A1 (en) * 2014-12-31 2016-07-07 北京热景生物技术有限公司 Composition and system for separating and detecting alpha-fetoprotein variant and use thereof
WO2016106867A1 (en) * 2014-12-29 2016-07-07 中国科学院信息工程研究所 Method and system for protecting root ca certificate in virtualized environment
CN106027235A (en) * 2016-05-13 2016-10-12 北京三未信安科技发展有限公司 PCI password card, and password operation method and system for massive keys
CN106713279A (en) * 2016-11-29 2017-05-24 北京航天爱威电子技术有限公司 Video terminal identity authentication system
CN106789050A (en) * 2017-03-24 2017-05-31 联想(北京)有限公司 A kind of data encryption/decryption method and server cluster
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN107026853A (en) * 2017-03-24 2017-08-08 中国联合网络通信集团有限公司 Safety certifying method, system and server
CN107104799A (en) * 2016-02-22 2017-08-29 西门子公司 A kind of method and apparatus for creating certificate test library
CN107302434A (en) * 2016-04-15 2017-10-27 平安科技(深圳)有限公司 The method of calibration and system of Electronic Signature
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
CN108141458A (en) * 2015-10-16 2018-06-08 大众汽车有限公司 For the method and system that the first contact of mobile equipment and equipment is protected to establish
CN108390758A (en) * 2018-04-04 2018-08-10 广州赛姆科技资讯股份有限公司 User password processing method, device and internal control safety monitor system
CN108810002A (en) * 2018-06-21 2018-11-13 北京智芯微电子科技有限公司 The more CA application systems and method of safety chip
CN109787987A (en) * 2019-01-29 2019-05-21 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal identity identifying method based on block chain
CN109842488A (en) * 2017-11-28 2019-06-04 中天安泰(北京)信息技术有限公司 For the key generation component in phy chip
CN110401818A (en) * 2019-08-08 2019-11-01 北京珞安科技有限责任公司 A kind of safe communication system and method for electric power video transmission
CN111181894A (en) * 2018-11-09 2020-05-19 北京天德科技有限公司 Efficient and safe protocol for block link point communication
WO2020143318A1 (en) * 2019-01-07 2020-07-16 平安科技(深圳)有限公司 Data verification method and terminal device
CN111641587A (en) * 2020-04-27 2020-09-08 河南省云安大数据安全防护产业技术研究院有限公司 Internet of things equipment interconnection method and device
CN111818072A (en) * 2020-07-16 2020-10-23 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center
CN112468343A (en) * 2020-12-02 2021-03-09 天津光电通信技术有限公司 X86 card-based platform and method for restoring important materials of network data packets
CN113449321A (en) * 2021-07-01 2021-09-28 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
CN114978751A (en) * 2022-06-16 2022-08-30 东软睿驰汽车技术(沈阳)有限公司 Service certificate acquisition method and device and electronic equipment
CN115314188A (en) * 2022-10-11 2022-11-08 北京紫光青藤微系统有限公司 Decoding device, authentication method for decoding device and mobile terminal

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237235A (en) * 2013-03-18 2013-08-07 中国科学院信息工程研究所 Method and system for realizing identity authentication on Cloud TV terminals
CN103237235B (en) * 2013-03-18 2016-01-20 中国科学院信息工程研究所 A kind of facing cloud television terminal authentication implementation method and system
CN103533403A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Equipment certificate activating method for smart cloud TV terminal
CN103533403B (en) * 2013-10-31 2016-07-06 中国科学院信息工程研究所 What a kind of device certificate towards smart cloud TV terminal activated realizes method
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
WO2016106867A1 (en) * 2014-12-29 2016-07-07 中国科学院信息工程研究所 Method and system for protecting root ca certificate in virtualized environment
WO2016107576A1 (en) * 2014-12-31 2016-07-07 北京热景生物技术有限公司 Composition and system for separating and detecting alpha-fetoprotein variant and use thereof
US11057195B2 (en) 2015-10-16 2021-07-06 Volkswagen Aktiengesellschaft Method and system for providing security for the first time a mobile device makes contact with a device
CN108141458A (en) * 2015-10-16 2018-06-08 大众汽车有限公司 For the method and system that the first contact of mobile equipment and equipment is protected to establish
CN108141458B (en) * 2015-10-16 2021-09-03 大众汽车有限公司 Method and system for securing first contact establishment of a mobile device with a device
CN106921485A (en) * 2015-12-24 2017-07-04 航天信息股份有限公司 Encrypting and decrypting method based on matrix operation
CN107104799A (en) * 2016-02-22 2017-08-29 西门子公司 A kind of method and apparatus for creating certificate test library
CN107104799B (en) * 2016-02-22 2021-04-16 西门子公司 Method and device for creating certificate test library
CN107302434A (en) * 2016-04-15 2017-10-27 平安科技(深圳)有限公司 The method of calibration and system of Electronic Signature
CN107302434B (en) * 2016-04-15 2021-08-24 平安科技(深圳)有限公司 Method and system for checking electronic signature
CN106027235A (en) * 2016-05-13 2016-10-12 北京三未信安科技发展有限公司 PCI password card, and password operation method and system for massive keys
CN106027235B (en) * 2016-05-13 2019-05-17 北京三未信安科技发展有限公司 A kind of PCI cipher card and magnanimity secret key cipher operation method and system
CN106713279B (en) * 2016-11-29 2019-12-13 北京航天爱威电子技术有限公司 video terminal identity authentication system
CN106713279A (en) * 2016-11-29 2017-05-24 北京航天爱威电子技术有限公司 Video terminal identity authentication system
CN107026853A (en) * 2017-03-24 2017-08-08 中国联合网络通信集团有限公司 Safety certifying method, system and server
CN107026853B (en) * 2017-03-24 2019-10-22 中国联合网络通信集团有限公司 Safety certifying method, system and server
CN106789050A (en) * 2017-03-24 2017-05-31 联想(北京)有限公司 A kind of data encryption/decryption method and server cluster
CN109842488A (en) * 2017-11-28 2019-06-04 中天安泰(北京)信息技术有限公司 For the key generation component in phy chip
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
CN108390758A (en) * 2018-04-04 2018-08-10 广州赛姆科技资讯股份有限公司 User password processing method, device and internal control safety monitor system
CN108810002A (en) * 2018-06-21 2018-11-13 北京智芯微电子科技有限公司 The more CA application systems and method of safety chip
CN108810002B (en) * 2018-06-21 2020-02-21 北京智芯微电子科技有限公司 Multi-CA application system and method of security chip
CN111181894B (en) * 2018-11-09 2023-06-06 北京天德科技有限公司 Network communication method for enabling block chain nodes to efficiently communicate and safely
CN111181894A (en) * 2018-11-09 2020-05-19 北京天德科技有限公司 Efficient and safe protocol for block link point communication
WO2020143318A1 (en) * 2019-01-07 2020-07-16 平安科技(深圳)有限公司 Data verification method and terminal device
CN109787987A (en) * 2019-01-29 2019-05-21 国网江苏省电力有限公司无锡供电分公司 Electric power internet-of-things terminal identity identifying method based on block chain
CN110401818B (en) * 2019-08-08 2020-11-13 北京珞安科技有限责任公司 Safe communication system for power video transmission
CN110401818A (en) * 2019-08-08 2019-11-01 北京珞安科技有限责任公司 A kind of safe communication system and method for electric power video transmission
CN111641587A (en) * 2020-04-27 2020-09-08 河南省云安大数据安全防护产业技术研究院有限公司 Internet of things equipment interconnection method and device
CN111818072B (en) * 2020-07-16 2022-04-15 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center
CN111818072A (en) * 2020-07-16 2020-10-23 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center
CN112468343A (en) * 2020-12-02 2021-03-09 天津光电通信技术有限公司 X86 card-based platform and method for restoring important materials of network data packets
CN112468343B (en) * 2020-12-02 2023-10-24 天津光电通信技术有限公司 Restoration platform and method for network data packet important materials based on X86 card
CN113449321A (en) * 2021-07-01 2021-09-28 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
CN113449321B (en) * 2021-07-01 2024-04-05 北京明朝万达科技股份有限公司 Ciphertext retrieval method, device and system
CN114978751A (en) * 2022-06-16 2022-08-30 东软睿驰汽车技术(沈阳)有限公司 Service certificate acquisition method and device and electronic equipment
CN114978751B (en) * 2022-06-16 2024-01-26 东软睿驰汽车技术(沈阳)有限公司 Service certificate acquisition method and device and electronic equipment
CN115314188A (en) * 2022-10-11 2022-11-08 北京紫光青藤微系统有限公司 Decoding device, authentication method for decoding device and mobile terminal
CN115314188B (en) * 2022-10-11 2022-12-09 北京紫光青藤微系统有限公司 Decoding device, authentication method for decoding device and mobile terminal

Similar Documents

Publication Publication Date Title
CN102664739A (en) PKI (Public Key Infrastructure) implementation method based on safety certificate
CN108092982B (en) Data storage method and system based on alliance chain
CN104735068B (en) Method based on the close SIP safety certification of state
CN109040067B (en) Physical unclonable technology PUF-based user authentication device and authentication method
WO2020087805A1 (en) Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network
CN104219228B (en) A kind of user's registration, user identification method and system
CN107896147B (en) Method and system for negotiating temporary session key based on national cryptographic algorithm
CN110598422A (en) Trusted identity authentication system and method based on mobile digital certificate
CN111083131A (en) Lightweight identity authentication method for power Internet of things sensing terminal
CN109728909A (en) Identity identifying method and system based on USBKey
RU2018103183A (en) MUTUAL AUTHENTICATION OF CONFIDENTIAL COMMUNICATION
CN102024123B (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN103312691A (en) Method and system for authenticating and accessing cloud platform
CN103051869A (en) System and method for encrypting camera video in real time
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN103905384A (en) Embedded inter-terminal session handshake realization method based on security digital certificate
CN108737323A (en) A kind of digital signature method, apparatus and system
CN102739403A (en) Identity authentication method and device for dynamic token
CN103916363A (en) Communication security management method and system for encryption machine
CN111224784B (en) Role separation distributed authentication and authorization method based on hardware trusted root
CN104468126A (en) Safety communication system and method
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN113312608A (en) Electric power metering terminal identity authentication method and system based on timestamp

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120912