FIELD: information technology.
SUBSTANCE: invention relates to a method of generating a shared secret key in a group of subscribers. Method includes generating a user of a common encryption-decryption key for communication nodes in a group of subscribers, executing a session of user interaction with an electronic device, setting general system parameters for all nodes of the network. Method includes exchanging public keys of network nodes, using calculation in groups of points of elliptic curves, creating a parameter Qx of each node x, forming a common secret key for an arbitrary number of subscribers in groups of points of ellipsoidal curves. Key is generated using a cryptographically qualitative sensor of random or pseudorandom numbers on each node of the network, performing a preliminary stage of exchange through communication channels in the network with open keys Yi and a main step of generating a shared secret key, and common secret key is formed on condition that some of nodes may be inaccessible for sending and receiving information, wherein user of one of nodes includes it, starting session of interaction through communication channels with network node, on which it operates, performs protected exchange between all nodes of network, for this purpose, preliminary common system parameters for all nodes of the network must be set, as well each node must calculate and exchange its public keys, then the user creates for each network node its parameter Qx, sends parameter Qx to all network nodes, each with its own, and calculates common secret key.
EFFECT: technical result consists in reduction of time costs for performance of procedure for obtaining common secret encryption-decryption key in group of subscribers.
4 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF STORING AND USING CRYPTOGRAPHIC KEY | 2008 |
|
RU2417410C2 |
WEBER FUNCTION CYCLE-BASED QUANTUM ATTACK-SECURE ENCRYPTION METHOD | 2013 |
|
RU2541938C1 |
CRYPTOGRAPHIC DEVICE WITH VARIABLE CONFIGURATION | 2018 |
|
RU2752697C1 |
SYSTEM AND METHOD FOR USER AUTHENTICATION USING ELECTRONIC DIGITAL SIGNATURE OF USER | 2015 |
|
RU2610696C2 |
METHOD FOR TRANSFER OF DOCUMENT ALONG OPEN CHANNEL OF SHARED ACCESS | 2008 |
|
RU2386216C1 |
METHOD FOR RESTRICTION OF ACCESS TO DATA USING ATTRIBUTE-BASED ENCRYPTION | 2022 |
|
RU2804040C1 |
AUTHENTICATED CODING METHOD | 2018 |
|
RU2694336C1 |
KEY ENCAPSULATION PROTOCOLS | 2019 |
|
RU2787692C2 |
METHOD FOR CRYPTOGRAPHIC TRANSFORMATION WITH SIMULTANEOUS GENERATION OF A DERIVED ENCRYPTION KEY | 2021 |
|
RU2775253C1 |
METHOD OF INFORMATION TRANSMISSION BETWEEN END COMMUNICATION NODES THROUGH INTERMEDIATE NODES WITHOUT RE-ENCRYPTION | 2022 |
|
RU2792414C1 |
Authors
Dates
2020-04-21—Published
2019-03-19—Filed