[go: up one dir, main page]

CN1599484A - Group system group key managing method - Google Patents

Group system group key managing method Download PDF

Info

Publication number
CN1599484A
CN1599484A CN 03157437 CN03157437A CN1599484A CN 1599484 A CN1599484 A CN 1599484A CN 03157437 CN03157437 CN 03157437 CN 03157437 A CN03157437 A CN 03157437A CN 1599484 A CN1599484 A CN 1599484A
Authority
CN
China
Prior art keywords
group key
group
key
network side
colony terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03157437
Other languages
Chinese (zh)
Other versions
CN100344183C (en
Inventor
冯凯锋
郑志彬
周国安
陈德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031574378A priority Critical patent/CN100344183C/en
Publication of CN1599484A publication Critical patent/CN1599484A/en
Application granted granted Critical
Publication of CN100344183C publication Critical patent/CN100344183C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种集群系统组密钥的管理方法,该方法包括:A.网络侧将要设置组密钥的集群终端所对应的CK作为密钥,将要设置的组密钥加密得到SKGi,同时按照一定的算法,根据所述要设置的组密钥计算出第一摘要;然后将携带有SKGi、第一摘要的组密钥设置命令发送至所述集群终端;B.所述集群终端利用自身的CK对SKGi解密得到组密钥,并按照步骤A中相同的算法,根据自己解密得到的组密钥计算出第二摘要,比较第二摘要与第一摘要是否一致,如果一致,则执行步骤C,否则,组密钥设置失败,跳出本流程;C.所述集群终端利用步骤B中解密出的组密钥进行设置。该方法由网络侧产生组密钥,管理简单,安全、可靠,能保障密钥更新信令的完整性,抵御重放组密钥更改信令的攻击。

Figure 03157437

The invention discloses a group key management method of a trunking system. The method includes: A. The network side uses the CK corresponding to the trunking terminal whose group key is to be set as the key, and encrypts the group key to be set to obtain SKG i , At the same time, according to a certain algorithm, calculate the first digest according to the group key to be set; then send the group key setting command carrying SKG i and the first digest to the cluster terminal; B. the cluster terminal Use its own CK to decrypt SKG i to obtain the group key, and follow the same algorithm in step A, calculate the second digest according to the group key obtained by decrypting itself, compare whether the second digest is consistent with the first digest, if they are consistent, Then execute step C, otherwise, the setting of the group key fails, and jump out of this process; C. The cluster terminal uses the group key decrypted in step B to set. The method generates the group key by the network side, is simple to manage, safe and reliable, can guarantee the integrity of the key update signaling, and resists the attack of replaying the group key change signaling.

Figure 03157437

Description

一种集群系统组密钥管理方法A Group Key Management Method for Cluster System

技术领域technical field

本发明涉及集群系统的安全管理技术,特别是指一种集群系统组密钥的管理方法。The invention relates to the security management technology of the cluster system, in particular to a management method of the group key of the cluster system.

背景技术Background technique

集群无线通信系统,以下简称集群系统,是一种较经济、较灵活的指挥调度通信系统,广泛应用在政府机关、能源交通、机场码头、工矿企业、消防警察、水利和军事等单位,以满足各单位内部通信联络的需要。Trunking wireless communication system, hereinafter referred to as trunking system, is a relatively economical and flexible command and dispatch communication system, which is widely used in government agencies, energy transportation, airport terminals, industrial and mining enterprises, fire police, water conservancy and military units to meet Internal communication needs of each unit.

集群系统提供最基本的业务为语音组呼业务(VGCS)。VGCS允许用户建立到属于某一给定服务区和组标识(GID)的一组用户的呼叫,业务的提供采用半双工模式,呼叫期间任何成员都可以成为讲者,但任一时刻只允许一个讲者,其他成员为听者。服务区可由若干属于同一移动交换中心(MSC)或不同MSC的小区组成,呼叫时每个相关小区有一个组呼信道,其中上行链路仅供当前讲话者使用,可称为组发射模式,所有听者守候在下行链路上,可称为组接收模式,组呼信道配置的通知消息在通知信道(NCH)通知信道上广播。由于同一小区用户共享一条下行信道,因而大大节省了无线资源。The most basic service provided by the trunking system is the Voice Group Call Service (VGCS). VGCS allows users to establish a call to a group of users belonging to a given service area and group identifier (GID). The service is provided in half-duplex mode. During the call, any member can become a speaker, but only One speaker, the other members are listeners. The service area can be composed of several cells belonging to the same mobile switching center (MSC) or different MSCs. When calling, each relevant cell has a group call channel, in which the uplink is only used by the current speaker, which can be called group transmission mode. All The listener waits on the downlink, which can be called the group receiving mode, and the notification message of the group call channel configuration is broadcast on the notification channel (NCH). Since users in the same cell share a downlink channel, wireless resources are greatly saved.

公安、军事等高机密性单位对于通信保密性的要求较高,要求对组呼业务进行端到端加密。由于组呼是一种多对多的通信,所以必须要求同一群组的每个成员之间共享组密钥(KG),用于生成每次组呼时使用的端到端加密密钥和完整性保护密钥。并且KG和对应的GID保存在每个用户的用户标识模块(SIM)卡中,网络侧也需要保存GID对应的KG。High confidentiality units such as public security and military have high requirements for communication confidentiality, and require end-to-end encryption for group call services. Since a group call is a many-to-many communication, each member of the same group must share a group key (KG), which is used to generate the end-to-end encryption key and complete permanent protection key. In addition, the KG and the corresponding GID are stored in the Subscriber Identity Module (SIM) card of each user, and the network side also needs to store the KG corresponding to the GID.

当调度中心进行动态建组时,需要为每个组成员分发新组的密钥;另外基于安全的考虑,每个密钥有一定的使用周期,所以调度中心也可能发起周期性的组密钥更新。此外某些用户退出群组时,如调度中心因某部终端被盗而取消了其组权限,也必须更新其它组成员的组密钥以保证被取消权限的用户不能继续参与群组组呼。When the dispatch center dynamically builds a group, it needs to distribute a new group key to each group member; in addition, based on security considerations, each key has a certain period of use, so the dispatch center may also initiate periodic group keys renew. In addition, when some users exit the group, such as the dispatch center cancels its group authority because a certain terminal is stolen, the group key of other group members must also be updated to ensure that the user whose authority has been canceled cannot continue to participate in the group group call.

现有集群系统中组密钥的管理方法包括以下几种技术方案。The management method of the group key in the existing cluster system includes the following several technical solutions.

第一种:密钥管理中心为每个群组分配多个固定的组密钥,每个组密钥通过组密钥标识来唯一确定。这些固定的组密钥序列通过专用SIM卡读写设备写入每一组成员的SIM卡中。在进行组呼或者组播业务时,即需要使用加密功能时,可以由业务发起者或者网络选择组密钥系统中的组密钥标识,并将所选择的组密钥作为加、解密密钥,并将该密钥所对应的标识通知群组中每位参与集群业务的用户。The first type: the key management center assigns multiple fixed group keys to each group, and each group key is uniquely determined by the group key identifier. These fixed group key sequences are written into the SIM cards of each group member through a dedicated SIM card read-write device. When performing a group call or multicast service, that is, when the encryption function needs to be used, the service initiator or the network can select the group key identifier in the group key system, and use the selected group key as the encryption and decryption key , and notify each user in the group who participates in the cluster service of the identity corresponding to the key.

在集群系统中,每个群组成员并不是固定不变的。当群组增加新成员时,如果只是简单的将原来的组密钥写入新成员的SIM卡,则该新增加的成员可以使用组密钥解密出以前的群组通信信息。而且,群组中某成员可能已退出该群组,按照规定该成员不能继续参与该群组业务,但如果组密钥没有及时得到更新,那么已退出的成员仍然可以解密出群组的保密通信。可见,对组密钥进行安全、及时的更新对于保障群组通信安全十分必要。而采用第一种技术方案更新密钥时,需要专用的SIM卡读写设备,所以很难保证组密钥及时得到更新,因此无法保证集群系统安全通信。In a cluster system, each group member is not fixed. When a new member is added to the group, if the original group key is simply written into the SIM card of the new member, the newly added member can use the group key to decrypt the previous group communication information. Moreover, a member of the group may have withdrawn from the group. According to regulations, this member cannot continue to participate in the group business. However, if the group key is not updated in time, the withdrawn member can still decrypt the confidential communication of the group. . It can be seen that it is very necessary to update the group key safely and timely to ensure the security of group communication. When using the first technical solution to update the key, a dedicated SIM card reading and writing device is required, so it is difficult to ensure that the group key is updated in time, so it is impossible to ensure the safe communication of the cluster system.

第二种,由组成员协商产生组密钥。这种技术方案的出发点是将用于两方密钥协商的Diffie-Hellman密钥交换协议扩展到群组通信。In the second type, the group key is generated through negotiation among group members. The starting point of this technical solution is to extend the Diffie-Hellman key exchange protocol used for two-party key agreement to group communication.

群组Diffie-Hellman密钥交换协议描述如下:群组中有n个成员,分别记为M1、M2...Mn,公开一个大素数q以及其本原元α,协议中的运算都在有限域GF(q)上进行。密钥协商分为上行(n-1)轮和下行(n-1)轮两个阶段,最终每个成员都能计算出组密钥αN1N2...Nn,其中Ni是成员Mi独立产生并保密的随机数。The group Diffie-Hellman key exchange protocol is described as follows: there are n members in the group, which are respectively denoted as M 1 , M 2 ... M n , and a large prime number q and its primitive element α are disclosed. The operation in the protocol All are carried out on the finite field GF(q). The key agreement is divided into two stages: uplink (n-1) round and downlink (n-1) round, and finally each member can calculate the group key α N1N2...Nn , where N i is the member M i independent A random number that is generated and kept secret.

在上行阶段,成员Mi计算其接收到的集合的最后一个元素的Ni次幂,然后连同接收到的数值一起发给Mi+1,而在下行阶段,用户Mi计算其接收到的集合的最后元素的Ni次幂作为组密钥,然后计算集合中其它元素的Ni次幂,并发送给Mi-1。如表1所示,在上行交互阶段:第i轮,i=1,...,n-1,Mi向Mi+1发送 { α Π ( N k | k ∈ [ 1 , i ] ) | j ∈ [ 1 , i ] } ; 在下行交互阶段,第n-1+i轮,i=1,...,n-1Mn-i向Mn-i+1发送 { α Π ( N k | k ∉ [ i , j ] ) | j ∈ [ 1 , i ] } . In the uplink phase, member Mi calculates the N i power of the last element of the set it receives, and then sends it to Mi +1 together with the received value, while in the downlink phase, user Mi calculates the received value The N i power of the last element of the set is used as the group key, and then the N i power of other elements in the set is calculated and sent to M i-1 . As shown in Table 1, in the uplink interaction phase: in the i-th round, i=1,...,n-1, M i sends to M i+1 { α Π ( N k | k ∈ [ 1 , i ] ) | j ∈ [ 1 , i ] } ; In the downlink interaction phase, in the n-1+i round, i=1,..., n-1M ni sends to M n-i+1 { α Π ( N k | k ∉ [ i , j ] ) | j ∈ [ 1 , i ] } .

Figure A0315743700073
Figure A0315743700073

                               表1 Table 1

以n=5为例,在上行交互阶段,用户M4将接收到集合{αN1,αN1N2,αN1N2N3},他利用αN1N2N3和自己生成的随机数N4计算出αN1N2N3N4,并发送{αN1,αN1N2,αN1N2N3,αN1N2N3N4}给M5。M5利用αN1N2N3N4计算出最终组密钥αN1N2N3N4N5并保存,此后为下行交互阶段,M5计算中间值集合发送给M4,用户M4接收到集合{αN4N5,αN1N4N5,αN1N2N4N5},利用αN1N2N3N5也可以计算出最终密钥,然后计算中间值集合{αN5,αN1N5,αN1N2N5,αN1N2N3N5}发送给M3Taking n=5 as an example, in the uplink interaction stage, user M 4 will receive the set {α N1 , α N1N2 , α N1N2N3 }, he uses α N1N2N3 and the random number N 4 generated by himself to calculate α N1N2N3N4 , and sends { α N1 , α N1N2 , α N1N2N3 , α N1N2N3N4 } to M 5 . M 5 uses α N1N2N3N4 to calculate the final group key α N1N2N3N4N5 and saves it. Afterwards, in the downlink interaction phase, M 5 calculates the intermediate value set and sends it to M 4 , and user M 4 receives the set {α N4N5 , α N1N4N5 , α N1N2N4N5 }, The final key can also be calculated by using α N1N2N3N5 , and then the intermediate value set {α N5 , α N1N5 , α N1N2N5 , α N1N2N3N5 } is calculated and sent to M 3 .

在这种方案中,组密钥由n个组成员协商产生,总共需要经过2(n-1)次组成员之间的交互。对于无线系统而言,每次组成员之间的交互都需要申请信道资源建立连接,这样必然产生庞大的系统资源消耗;而且,在产生组密钥的过程中,每个组成员都要进行多次大数模幂运算,而目前移动终端的计算能力有限,数值太大有时将超出移动终端的计算范围。In this scheme, the group key is negotiated and generated by n group members, and a total of 2(n-1) interactions between group members are required. For a wireless system, each interaction between group members needs to apply for channel resources to establish a connection, which will inevitably consume huge system resources; moreover, in the process of generating group keys, each group member must perform multiple Modular exponentiation of the next largest number, and the computing power of the mobile terminal is currently limited, and the numerical value is too large and sometimes exceeds the computing range of the mobile terminal.

发明内容Contents of the invention

有鉴于此,本发明的目的是提供一种集群系统中组密钥的管理方法,使其适应集群系统组成员的动态变化,使集群系统通信安全。In view of this, the object of the present invention is to provide a group key management method in the cluster system, which can adapt to the dynamic changes of the group members of the cluster system and make the communication of the cluster system safe.

本发明提供的一种集群系统中组密钥的管理方法包括:A method for managing group keys in a cluster system provided by the present invention includes:

A.网络侧将要设置组密钥的集群终端所对应的CK作为密钥,将要设置的组密钥加密得到SKGi,同时按照一定的算法,根据所述要设置的组密钥计算出第一摘要;然后将携带有SKGi、第一摘要的组密钥设置命令发送至所述集群终端;A. The network side uses the CK corresponding to the cluster terminal for which the group key is to be set as the key, encrypts the group key to be set to obtain SKG i , and calculates the first summary; then send the group key setting command carrying SKG i and the first summary to the cluster terminal;

B.所述集群终端利用自身的CK对收到的SKGi解密得到组密钥,并按照步骤A中相同的算法,根据自己解密得到的组密钥计算出第二摘要,比较第二摘要与第一摘要是否一致,如果一致,则执行步骤C,否则,组密钥设置失败,跳出本流程;B. The cluster terminal uses its own CK to decrypt the received SKGi to obtain the group key, and according to the same algorithm in step A, calculates the second abstract according to the group key obtained by decrypting itself, and compares the second abstract with the first Check whether the summaries are consistent, if they are consistent, execute step C, otherwise, the group key setting fails, and this process is skipped;

C.所述集群终端利用步骤B中解密出的组密钥进行设置。C. The cluster terminal is configured using the group key decrypted in step B.

步骤A中所述第一摘要是网络侧根据所述要设置的组密钥和网络侧保存的所述集群终端组密钥更新序列号计算;The first abstract in step A is calculated by the network side according to the group key to be set and the cluster terminal group key update sequence number saved by the network side;

步骤A中所述组密钥设置命令还包括集群终端组密钥更新序列号;The group key setting command described in step A also includes the cluster terminal group key update sequence number;

则步骤B中所述第二摘要是所述集群终端根据自己解密得到的组密钥和网络侧发送的所述集群终端组密钥更新序列号计算。Then, the second digest in step B is calculated by the trunking terminal according to the group key obtained by decrypting itself and the group key update sequence number of the trunking terminal sent by the network side.

在执行步骤C之前,该方法可以进一步包括:Before performing step C, the method may further include:

C1、所述集群终端判断网络侧保存的所述集群终端组密钥更新序列号是否大于自身保存的组密钥更新序列号,如果大于,则执行步骤C,否则,组密钥设置失败,跳出本流程。C1. The cluster terminal judges whether the group key update sequence number of the cluster terminal stored on the network side is greater than the group key update sequence number stored by itself, and if it is greater, then execute step C; otherwise, the group key setting fails and jumps out This process.

步骤A中所述第一摘要是网络侧根据所述要设置的组密钥和当前时间计算;The first summary in step A is calculated by the network side according to the group key to be set and the current time;

步骤A中所述组密钥设置命令还包括网络侧将计算第一摘要的当前时间;The group key setting command in step A also includes the current time when the network side will calculate the first summary;

步骤B中所述第二摘要是所述集群终端根据要设置的组密钥和当前时间计算。The second digest in step B is calculated by the trunking terminal according to the group key to be set and the current time.

在执行步骤C之前,该方法可以进一步包括:Before performing step C, the method may further include:

C2、所述集群终端判断计算第二摘要的时间是否大于所述计算第一摘要的时间、并且两者之差是否在预先设定的范围之内,如果是,则执行步骤C,否则,组密钥设置失败,跳出本流程。C2. The cluster terminal judges whether the time for calculating the second summary is greater than the time for calculating the first summary, and whether the difference between the two is within a preset range. If yes, execute step C; otherwise, set The key setting fails, and this process is skipped.

步骤C可以包括:Step C can include:

集群终端判断自身是否有组标识记录,如果有,则利用自身解密出的组密钥更新所述组标识记录所对应的组密钥,如果没有,则增加组标识记录表项,再将自身解密出的组密钥保存在组标识记录表项中。The cluster terminal judges whether it has a group identification record, and if so, uses the group key decrypted by itself to update the group key corresponding to the group identification record, and if not, adds a group identification record entry, and then decrypts itself The output group key is stored in the group identification record entry.

在步骤C之后,该方法可以进一步包括:所述集群终端通知网络侧组密钥设置成功,并且网络侧根据该结果更新自身保存的管理记录。After step C, the method may further include: the trunking terminal notifying the network side that the group key is set successfully, and the network side updates the management record saved by itself according to the result.

步骤A中所述要设置的组密钥是网络侧产生的随机序列。The group key to be set in step A is a random sequence generated by the network side.

在组密钥设置失败后,该方法可以进一步包括:所述集群终端通知网络侧组密钥设置失败。After the group key setting fails, the method may further include: the cluster terminal notifying the network side of the group key setting failure.

该方法可以进一步包括:预先设置处于激活状态的集群组成员列表,在执行步骤A之前进一步:The method may further include: presetting a list of cluster group members in an active state, and before performing step A:

A1、根据所述集群组成员列表,判断是否还有没有完成本次组密钥设置的集群终端,如果还有,选择其中一个作为要进行组密钥设置的集群终端,执行步骤A,否则,跳出本流程;A1. According to the cluster group member list, determine whether there are cluster terminals that have not completed the group key setting this time, if there are, select one of them as the cluster terminal to be set for the group key, and perform step A, otherwise , jump out of this process;

并且在执行步骤C之后,执行步骤A1。And after step C is executed, step A1 is executed.

步骤C中所述设置为更新组密钥,或首次设置组密钥。The setting described in step C is updating the group key, or setting the group key for the first time.

步骤A中所述组密钥设置命令还可以包括组标识;The group key setting command described in step A may also include a group identifier;

则在步骤B之前,进一步包括:所述集群终端根据组标识判断自身是否需要设置组密钥,如果需要,则执行步骤B,否则,不进行处理,跳出本流程。Then before step B, it further includes: the trunking terminal judges whether it needs to set a group key according to the group identifier, and if so, executes step B; otherwise, skips the process without processing.

本发明由网络侧确定要设置的组密钥,并用集群组中每个组成员和网络共享的保密信息CK作为密钥将要设置的组密钥加密后,通过信令通知每个组成员了,计算简单、方便;而且由于使用摘要信息,从而保障了密钥更新信令的完整性,也可以鉴别发起者的真实身份;该方法还使用SQN或时戳来抵御重放组密钥更改信令攻击,所以安全性高。In the present invention, the network side determines the group key to be set, and uses the secret information CK shared by each group member in the cluster group and the network as a key to encrypt the group key to be set, and then notifies each group member through signaling , the calculation is simple and convenient; and because the summary information is used, the integrity of the key update signaling can be guaranteed, and the real identity of the initiator can also be identified; this method also uses SQN or time stamp to resist the replay group key change signal order attack, so the security is high.

附图说明Description of drawings

图1为实现本发明方法的流程示意图;Fig. 1 is the schematic flow chart realizing the method of the present invention;

图2为实现本发明方法的具体实施例一流程示意图;Fig. 2 is a schematic flow chart of a specific embodiment for realizing the method of the present invention;

图3为实现本发明方法的具体实施例二流程示意图。Fig. 3 is a schematic flow chart of the second specific embodiment for realizing the method of the present invention.

具体实施方式Detailed ways

对于无线系统而言,网络侧设备可以作为可信的密钥管理中心,直接掌握集群系统的组密钥。因此,为了简化组密钥的产生过程和集群系统的安全,本发明的方法是由网络侧来确定要设置的组密钥,并用集群组中每个组成员和网络共享的保密信息CK作为密钥,将要设置的组密钥加密,然后再通过信令通知每个组成员;每个组成员利用自身的CK对要设置的组密钥进行解密,得到要设置的组密钥。For the wireless system, the network-side device can serve as a trusted key management center to directly grasp the group key of the cluster system. Therefore, in order to simplify the generation process of the group key and the security of the cluster system, the method of the present invention determines the group key to be set by the network side, and uses the secret information CK shared by each group member and the network in the cluster group as Key, encrypt the group key to be set, and then notify each group member through signaling; each group member uses its own CK to decrypt the group key to be set to obtain the group key to be set.

参加图1所示,实现本发明方法的具体过程如下:Shown in Fig. 1, realize the concrete process of the inventive method as follows:

步骤101:网络侧将要设置组密钥的集群终端所对应的CK作为密钥,将要设置的组密钥加密得到SKGi,同时根据一定的算法,根据所述要设置的组密钥计算出第一摘要;然后将携带有SKGi、第一摘要的组密钥设置命令发送至所述集群终端;Step 101: The network side uses the CK corresponding to the cluster terminal for which the group key is to be set as the key, encrypts the group key to be set to obtain SKG i , and calculates the first a summary; then send a group key setting command carrying SKG i and the first summary to the cluster terminal;

步骤102:所述集群终端利用自身的CK对SKGi解密得到组密钥,并按照步骤101中同样的算法,根据自己解密得到的组密钥计算出第二摘要,比较第二摘要与第一摘要是否一致,如果一致,则执行步骤103,否则,组密钥设置失败,跳出本流程;Step 102: The cluster terminal uses its own CK to decrypt SKGi to obtain the group key, and according to the same algorithm in step 101, calculates the second digest according to the group key obtained by decrypting itself, and compares the second digest with the first digest Whether they are consistent, if they are consistent, then perform step 103, otherwise, the group key setting fails, and this process is skipped;

步骤103:该集群终端利用自身解密出的组密钥设置组密钥。这里的设置包括两种情况,自身已保存有组密钥,此时为更新组密钥;另一种是首次设置组密钥。Step 103: The trunking terminal uses the group key decrypted by itself to set a group key. The settings here include two cases, the group key has already been saved, and the group key is updated at this time; the other is the group key is set for the first time.

当然,步骤101中所述组密钥设置命令如果还包括组标识,则在步骤102之前,集群终端根据接收到的组标识判断自身是否需要设置组密钥,如果需要,则执行步骤102,否则,不进行处理,跳出本流程。Of course, if the group key setting command in step 101 also includes a group identifier, then before step 102, the cluster terminal judges whether it needs to set a group key according to the received group identifier, and if so, executes step 102, otherwise , do not process, and jump out of this process.

下面结合附图和具体实施例详细说明本发明的技术方案。The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

在集群系统中,每个集群终端,即每个组成员,分别和网络侧共享一个秘密数据CK,用于加密网络和用户间通信。本实施例在进行组密钥管理的过程中使用了CK,加密算法fE,解密算法fD,摘要算法H。In the cluster system, each cluster terminal, that is, each group member, shares a secret data CK with the network side for encrypting communication between the network and users. In this embodiment, CK, encryption algorithm f E , decryption algorithm f D , and digest algorithm H are used in the process of group key management.

参见图2所示,本实施例管理组密钥的具体过程如下:Referring to Figure 2, the specific process of managing group keys in this embodiment is as follows:

步骤201:当网络侧决定发起组密钥更新和组密钥分发流程时,生成一个随机序列作为新KG,即要设置的组密钥,并生成处于激活状态的组成员列表,按照步骤202~209逐个通知用户更新组密钥。Step 201: When the network side decides to initiate the group key update and group key distribution process, generate a random sequence as the new K G , that is, the group key to be set, and generate a list of active group members, follow step 202 ˜209 Notify users one by one to update the group key.

步骤202:网络侧取得组成员I所对应的CK和SQN,其中,SQN表示用户组密钥更新情况的序列号;然后用组成员I所对应的CK作为密钥,用加密算法fE加密KG得到SKGi,即SKGi=fE(CKi,KG)。Step 202: The network side obtains the CK and SQN corresponding to the group member I, where SQN represents the serial number of the user group key update; then uses the CK corresponding to the group member I as the key to encrypt K with the encryption algorithm f E G obtains SKGi, that is, SKGi=f E (CKi, K G ).

步骤203:网络侧利用摘要算法H、SQNi和KG,计算第一摘要DIGTi=H(SQNi,KG)。Step 203: the network side calculates the first digest DIGTi=H(SQNi, K G ) by using digest algorithms H, SQNi and K G .

步骤204:网络侧向组成员I发送携带有GID、SKGi、SQNi和DIGTi的组密钥更新指令。Step 204: The network side sends a group key update instruction carrying GID, SKGi, SQNi and DIGTi to group member I.

步骤205:组成员I收到携带有GID、SKGi、SQNi和DIGTi的组密钥更新指令后,用自己的CK解密SKGi,得到rec_KG,即rec_KG=fD(CKi,SKGi)。Step 205: After receiving the group key update command carrying GID, SKGi, SQNi and DIGTi, group member I decrypts SKGi with its own CK to obtain rec_KG, ie rec_KG=fD(CKi, SKGi).

步骤206:组成员I根据SQNi和rec_KG计算第二摘要,即rec_DIGT=H(SQNi,rec_KG),并比较自身计算出的第二摘要rec_DIGT与网络侧计算的第一摘要DIGTi是否一致,如果一致,则执行步骤207,否则,组密钥设置失败,并通知网络侧,跳出本流程。Step 206: Group member I calculates the second abstract according to SQNi and rec_KG, namely rec_DIGT=H(SQNi, rec_KG), and compares whether the second abstract rec_DIGT calculated by itself is consistent with the first abstract DIGTi calculated by the network side, if consistent, Then execute step 207, otherwise, the group key setting fails, and the network side is notified, and this procedure is skipped.

步骤207:组成员I判断SQNi是否大于自身保存的组密钥更新序列号SQN,如果大于,则认为是组密钥更新指令合法,执行步骤208,否则,回送密钥更新失败信令,跳出本流程。Step 207: Group member 1 judges whether SQNi is greater than the group key update sequence number SQN saved by itself, if greater, then considers that the group key update command is legal, and executes step 208, otherwise, returns the key update failure signaling, and jumps out of this process.

步骤208:组成员I利用自身解密得出的rec_KG设置组密钥。组成员I更新组密钥成功后,发送组密钥更新成功信令到网络侧,并将SIM卡中SQN更新为SQNi。Step 208: Group member I uses the rec_KG obtained by decrypting itself to set a group key. After the group member I successfully updates the group key, it sends a group key update success signaling to the network side, and updates the SQN in the SIM card to SQNi.

这里,如果组成员I自身SIM卡中组ID列表中有GID,则所该GID所对应的组密钥更新为rec_KG,否则增加一条组ID为GID,组密钥为rec_KG的记录。Here, if there is a GID in the group ID list of the group member I's own SIM card, the group key corresponding to the GID is updated to rec_KG, otherwise a record with the group ID being GID and the group key being rec_KG is added.

步骤209:网络侧接收到组成员I的组密钥更新确认信令后,将组成员I对应SQN更新为SQNi+1,标记组成员I的组密钥已经更新。Step 209: After receiving the group key update confirmation signaling of group member I, the network side updates the SQN corresponding to group member I to SQNi+1, marking that the group key of group member I has been updated.

上述过程只描述了对一个集群终端的组密钥进行设置,当前处于激活太的列表中,可能包括多个组成员,网络侧要重复执行步骤202~209来完成。当然,对于当前未处于激活状态的组成员,可以在其进行位置登记时,使用同样的过程设置其组密钥。The above process only describes the setting of a group key of a cluster terminal, which is currently in the active list and may include multiple group members, and the network side needs to repeat steps 202-209 to complete. Certainly, for a group member who is not currently in an active state, the same procedure can be used to set its group key when registering its location.

下面举具体实施例二详细说明本发明的技术方案。The technical solution of the present invention will be described in detail below with specific example 2.

参见图3所示,本实施例进行组密钥管理的具体过程如下:Referring to Figure 3, the specific process of group key management in this embodiment is as follows:

步骤301:当网络侧决定发起组密钥更新和组密钥分发流程时,生成一个随机序列作为新KG,并生成处于激活状态的组成员列表,按照步骤302~309逐个通知用户更新组密钥。Step 301: When the network side decides to initiate the group key update and group key distribution process, generate a random sequence as the new K G , and generate a list of active group members, and notify users one by one to update the group key according to steps 302-309 key.

步骤302:网络侧根据自身保存的组成员I所对应的CK,并且将该CK作为密钥,用加密算法fE加密KG,得到SKGi,即SKGi=fE(CKi,KG)。Step 302: The network side encrypts K G with the encryption algorithm f E according to the CK corresponding to group member I stored by itself, and uses the CK as a key to obtain SKGi, that is, SKGi=f E (CKi, K G ).

步骤303:网络侧利用摘要函数H、KG和当前时间TS,计算出第一摘要DIGTi,DIGTi=H(TS,KG);Step 303: The network side calculates the first summary DIGT i by using the summary function H, K G and the current time TS, DIGT i =H(TS, K G );

步骤304:网络侧向组成员I发送携带有GID、SKGi、TS和DIGTi的组密钥更新指令。Step 304: The network side sends a group key update instruction carrying GID, SKG i , TS and DIGT i to group member I.

步骤305:组成员I收到携带有GID、SKGi、SQNi和DIGTi的组密钥更新指令后,用自己的CK解密SKGi,得到rec_KG,即rec_KG=fD(CKi,SKGi)。Step 305: After receiving the group key update command carrying GID, SKGi, SQNi and DIGTi, group member I decrypts SKGi with its own CK to obtain rec_KG, ie rec_KG=fD(CKi, SKGi).

步骤306:组成员I根据当前时间和自身解密得到rec_KG,计算第二摘要rec_DIGT,即rec_DIGT=H(TS,rec_KG),并且将第二摘要rec_DIGT与第一摘要DIGT进行比较,如果一致,则认为本次组密钥设置合法,否则,密钥设置失败。Step 306: Group member I decrypts rec_KG according to the current time and itself, calculates the second digest rec_DIGT, namely rec_DIGT=H(TS, rec_KG), and compares the second digest rec_DIGT with the first digest DIGT, if they are consistent, consider The group key setting is valid this time, otherwise, the key setting fails.

步骤307:组成员I比较TS与当前时间TS`,如果TS`大于TS且两者之差在预先设定的时间范围内,则认为组密钥更新指令合法,利用自身解密出的组密钥进行设置,然后执行步骤308,否则,向网络侧发送密钥更新失败信令。Step 307: Group member I compares TS with the current time TS`, if TS` is greater than TS and the difference between the two is within the preset time range, the group key update command is considered legal, and the group key decrypted by itself is used to Make settings, and then execute step 308, otherwise, send a key update failure signaling to the network side.

这里,如果组成员I的SIM卡中组ID列表中已存在GID,组成员I则利用rec_KG更新GID所对应的组密钥,否则,在自身的SIM卡中增加一条组ID为GID、组密钥为rec_KG的记录。并且,所述时间范围主要根据信令的传输时间来设定。Here, if GID already exists in the group ID list in the SIM card of group member I, group member I will use rec_KG to update the group key corresponding to GID; The record whose key is rec_KG. Moreover, the time range is mainly set according to the transmission time of the signaling.

步骤308:组成员I更新组密钥成功后,通知网络侧组密钥更新成功信令。网络侧接收到组成员I的组密钥更新成功信令后,标记组成员I的组密钥已经更新。Step 308: After the group member I successfully updates the group key, it notifies the network side of the group key update success signaling. After receiving the signaling that the group key of group member I is successfully updated, the network side marks that the group key of group member I has been updated.

与图2所示实施例不同的是,本实施例在采用全网同步时钟的网络中,利用时戳信息代替SQN抵御重发攻击,比如cdma系统。利用这种方法不需要在网络侧和终端保存SQN信息,能够节省存储空间。Different from the embodiment shown in FIG. 2 , this embodiment uses timestamp information instead of SQN to defend against retransmission attacks in a network using a network-wide synchronous clock, such as a cdma system. Using this method does not need to save SQN information on the network side and the terminal, which can save storage space.

Claims (12)

1, a kind of management method of group system group key is characterized in that, this method may further comprise the steps:
A. network side group key will be set the pairing CK of colony terminal as key, the group key that will be provided with is encrypted and is obtained SKG i,, calculate first summary according to the described group key that will be provided with simultaneously according to certain algorithm; To carry SKG then i, first summary group key order be set be sent to described colony terminal;
B. described colony terminal utilizes the SKG of CK to receiving of self iDeciphering obtains group key, and according to algorithm identical in the steps A, calculates second summary according to oneself deciphering the group key that obtains, relatively whether second summary is consistent with first summary, if unanimity, then execution in step C, otherwise group key is provided with failure, jumps out this flow process;
C. described colony terminal utilizes the group key that decrypts among the step B to be provided with.
2, method according to claim 1 is characterized in that,
First summary described in the steps A is the described colony terminal group key management sequence number calculating of network side according to described group key that will be provided with and network side preservation;
Group key described in the steps A is provided with order and also comprises colony terminal group key management sequence number;
The then described colony terminal group key management sequence number calculating that sends of group key that to be described colony terminal obtain according to own deciphering of second summary described in the step B and network side.
3, method according to claim 2 is characterized in that, before execution in step C, this method further comprises:
C1, described colony terminal are judged the described colony terminal group key management sequence number of network side preservation whether greater than the group key management sequence number of self preserving, if greater than, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
4, method according to claim 1 is characterized in that, first summary described in the steps A is that network side calculates according to described group key that will be provided with and current time;
Group key described in the steps A is provided with order and comprises that also network side will calculate the current time of first summary;
Second summary described in the step B is that described colony terminal calculates according to group key that will be provided with and current time.
5, method according to claim 4 is characterized in that, before execution in step C, this method further comprises:
C2, described colony terminal judge calculate second summary time whether greater than time of described calculating first summary and both differences whether within predefined scope, if, execution in step C then, otherwise group key is provided with failure, jumps out this flow process.
6, method according to claim 1 is characterized in that, step C comprises:
Colony terminal judges whether self has the group id record, if have, then utilize the described group id of the group key management that self decrypts to write down pairing group key, if do not have, then increase group id record list item, the group key that self is decrypted is kept in the group id record list item again.
7, method according to claim 1 is characterized in that, after step C, this method further comprises: described colony terminal informing network side group key is provided with success, and network side upgrades the management accounts of self preserving according to this result.
8, method according to claim 1 is characterized in that, the group key that will be provided with described in the steps A is the random sequence that network side produces.
9, method according to claim 1 is characterized in that, after group key was provided with failure, this method further comprised: described colony terminal informing network side group key is provided with failure.
10, method according to claim 1 is characterized in that, this method further comprises: set in advance the cluster group membership tabulation that is in state of activation, further before execution in step A:
A1, according to described cluster group membership tabulation, judge whether to have or not and finish the colony terminal that this group key is provided with, if also have, select one of them as will carrying out the colony terminal that group key is provided with, execution in step A, otherwise, jump out this flow process;
And after execution in step C, execution in step A1.
11, method according to claim 1 is characterized in that, is set to the update group key described in the step C, or group key is set first.
12, method according to claim 1 is characterized in that, group key described in the steps A is provided with order and also comprises group id;
Before step B, further comprise:
Described colony terminal judges according to group id whether needs are provided with group key for self, if desired, and execution in step B then, otherwise, do not handle, jump out this flow process.
CNB031574378A 2003-09-19 2003-09-19 Group system group key managing method Expired - Fee Related CN100344183C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031574378A CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031574378A CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Publications (2)

Publication Number Publication Date
CN1599484A true CN1599484A (en) 2005-03-23
CN100344183C CN100344183C (en) 2007-10-17

Family

ID=34660301

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031574378A Expired - Fee Related CN100344183C (en) 2003-09-19 2003-09-19 Group system group key managing method

Country Status (1)

Country Link
CN (1) CN100344183C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100344208C (en) * 2005-07-15 2007-10-17 华为技术有限公司 Identification method for preventing replay attack
CN101511082B (en) * 2008-02-15 2011-01-05 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN101291214B (en) * 2007-04-19 2011-08-10 华为技术有限公司 Group cipher key generating method, system and apparatus
CN102571328A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 Method and system for invoking service of user terminal, and user terminal
CN102561678A (en) * 2012-01-12 2012-07-11 中国建筑第八工程局有限公司 Construction method of fair-faced concrete wall with wood grain finish
CN102638794A (en) * 2007-03-22 2012-08-15 华为技术有限公司 Authentication and key negotiation method, and authentication method, system and equipment
CN101751986B (en) * 2008-12-11 2013-09-25 群联电子股份有限公司 Flash memory storage system, its controller and method for preventing data tampering
CN104980269A (en) * 2014-04-03 2015-10-14 华为技术有限公司 Secret key sharing method, device and system
CN106998320A (en) * 2016-01-25 2017-08-01 展讯通信(上海)有限公司 The transmission method and device of the group root key of cluster multi call

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109384A (en) * 1988-11-02 1992-04-28 Tseung Lawrence C N Guaranteed reliable broadcast network
IL106796A (en) * 1993-08-25 1997-11-20 Algorithmic Res Ltd Broadcast encryption
US5748736A (en) * 1996-06-14 1998-05-05 Mittra; Suvo System and method for secure group communications via multicast or broadcast
US6049878A (en) * 1998-01-20 2000-04-11 Sun Microsystems, Inc. Efficient, secure multicasting with global knowledge
US6636968B1 (en) * 1999-03-25 2003-10-21 Koninklijke Philips Electronics N.V. Multi-node encryption and key delivery
US6240188B1 (en) * 1999-07-06 2001-05-29 Matsushita Electric Industrial Co., Ltd. Distributed group key management scheme for secure many-to-many communication

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100344208C (en) * 2005-07-15 2007-10-17 华为技术有限公司 Identification method for preventing replay attack
CN102638794A (en) * 2007-03-22 2012-08-15 华为技术有限公司 Authentication and key negotiation method, and authentication method, system and equipment
CN102638794B (en) * 2007-03-22 2016-03-30 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101291214B (en) * 2007-04-19 2011-08-10 华为技术有限公司 Group cipher key generating method, system and apparatus
CN101511082B (en) * 2008-02-15 2011-01-05 中国移动通信集团公司 Method, equipment and system for updating group cipher key
CN101751986B (en) * 2008-12-11 2013-09-25 群联电子股份有限公司 Flash memory storage system, its controller and method for preventing data tampering
CN102571328A (en) * 2010-12-30 2012-07-11 中国移动通信集团公司 Method and system for invoking service of user terminal, and user terminal
CN102571328B (en) * 2010-12-30 2016-01-27 中国移动通信集团公司 The service calling method of user terminal, system and user terminal
CN102561678A (en) * 2012-01-12 2012-07-11 中国建筑第八工程局有限公司 Construction method of fair-faced concrete wall with wood grain finish
CN104980269A (en) * 2014-04-03 2015-10-14 华为技术有限公司 Secret key sharing method, device and system
CN106998320A (en) * 2016-01-25 2017-08-01 展讯通信(上海)有限公司 The transmission method and device of the group root key of cluster multi call

Also Published As

Publication number Publication date
CN100344183C (en) 2007-10-17

Similar Documents

Publication Publication Date Title
EP2850862B1 (en) Secure paging
CN1123159C (en) Method and arrangement for encrypting radio traffic in a telecommunications network
CN103781066B (en) Wireless transmitter/receiver unit and the method being implemented by it
EP2034658B1 (en) Method and system for distributing key in wireless network
CN101867898B (en) Short message encrypting communication system, method and secret key center
CN102170636B (en) Methods and devices for computing shared encryption key
US8724812B2 (en) Methods for establishing a secure point-to-point call on a trunked network
CN101511082B (en) Method, equipment and system for updating group cipher key
CN101895877B (en) Method, device and system for key agreement
CN105144655A (en) Proximity discovery, authentication and link establishment between communicating mobile devices in 3GPP LTE
CN101442742A (en) Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN109087100B (en) Key distribution method, device, equipment and storage medium
CN100456669C (en) A Method for Group Key Distribution
CN103179558A (en) Method and system for cluster system implementing group calling encryption
CN108989048A (en) Cryptographic key distribution method, device, equipment and storage medium
RU2014126582A (en) SIMPLIFIED MANAGEMENT OF GROUP SECRET KEYS
CN102026174A (en) Method and device for maintaining secrecy of user identification in paging procedure
CN100359968C (en) A Method for Updating Group Key in Cluster System
CN1705261A (en) End-to-end encrypting communication system and method
CN104661217A (en) Authentication and key derivation method and system based on TD-LTE (time division-long term evolution) network
CN100344183C (en) Group system group key managing method
CN102123361B (en) Method and device for realizing encrypted message communication
CN101159907A (en) An encryption method and encryption system for a multi-mode mobile communication terminal
CN106332074A (en) A multi-party communication authentication method and system
Sagheer et al. Sms security for smartphone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071017

Termination date: 20150919

EXPY Termination of patent right or utility model