CN118802297A - Authentication processing method and device and related equipment - Google Patents

Authentication processing method and device and related equipment Download PDF

Info

Publication number
CN118802297A
CN118802297A CN202410466115.3A CN202410466115A CN118802297A CN 118802297 A CN118802297 A CN 118802297A CN 202410466115 A CN202410466115 A CN 202410466115A CN 118802297 A CN118802297 A CN 118802297A
Authority
CN
China
Prior art keywords
key
information
authentication
obtaining
usim
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410466115.3A
Other languages
Chinese (zh)
Inventor
彭华熹
张艳
李邦灵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202410466115.3A priority Critical patent/CN118802297A/en
Publication of CN118802297A publication Critical patent/CN118802297A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an authentication processing method, an authentication processing device and related equipment, and relates to the technical field of communication. The method comprises the following steps: acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM; decrypting the SUCI to obtain a user permanent identifier SUPI; and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key. The scheme of the invention realizes the purpose of improving the security of the authentication process.

Description

Authentication processing method and device and related equipment
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an authentication processing method, an apparatus, and a related device.
Background
With the rapid development of internet technology, the network security risk of the information system is continuously increased, the threat challenge is increasingly serious, the password security is an important foundation of the information security, the method can be used for effectively guaranteeing the data security of the network information system, and the password technology is a core technology and an important means for guaranteeing the network information system.
Currently, the network Authentication key protocol (Authentication KEY AGREEMENT, AKA) of the communication network is implemented based on MILENAGE algorithm for performing Authentication and key agreement between a universal subscriber identity module (Universal Subscriber Identity Module, USIM) and Unified data management (Unified DATA MANAGE, UDM). The underlying algorithm of the MILENAGE algorithm is the advanced encryption standard (Advanced Encryption Standard, AES) -128, and the key K shared between usim and UDM is 128 bits.
However, with the development of quantum computing technology, conventional cryptographic algorithms face serious security threats. The quantum computer has strong computing power, can greatly reduce the cracking difficulty of the symmetric cryptographic algorithm, greatly increase the risk of AES-128 being cracked, and reduce the system security by obtaining the plaintext of AES-128 to calculate the 128-bit key by an attacker.
Disclosure of Invention
The invention aims to provide an authentication processing method, an authentication processing device and related equipment so as to improve the security of an authentication process.
To achieve the above object, an embodiment of the present invention provides an authentication processing method, which is executed by a network device, including:
Acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
decrypting the SUCI to obtain a user permanent identifier SUPI;
and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key.
Optionally, the obtaining authentication information according to the encapsulated first key includes:
Unpacking the packed first key to obtain the first key, and storing the first key and the SUPI in an associated manner;
And obtaining the authentication information according to the first key and the second key.
Optionally, the obtaining the authentication information according to the first key and the second key includes:
Obtaining first information according to a second encryption algorithm and the second key;
Obtaining second information according to the first encryption algorithm, the first key and the random number in the first information;
obtaining authentication related information according to the first information and the second information;
And obtaining the authentication information according to the authentication related information.
Optionally, the obtaining authentication related information according to the first information and the second information includes:
obtaining a fifth key based on the third key and the fourth key in the second information;
obtaining a third authentication token based on the fifth key, the first authentication token in the first information and the second authentication token in the second information;
Obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information;
obtaining a seventh key based on the third key and a sixth key in the first information;
obtaining a ninth key based on the fourth key and an eighth key in the first information;
And taking the random number, the third authentication token, the third expected response value, the seventh key and the ninth key as the authentication related information.
Optionally, the obtaining a third authentication token based on the fifth key, the first authentication token in the first information, and the second authentication token in the second information includes:
the first authentication token and the second authentication token are connected in series, and the result of the series connection is encrypted by using the fifth secret key to obtain the three authentication tokens; or alternatively
And encrypting the first authentication token by using the fifth key, and connecting the encrypted result with the second authentication token in series to obtain the three authentication tokens.
Optionally, the obtaining the authentication information according to the authentication related information includes:
Obtaining a tenth key based on the seventh key and the ninth key;
obtaining a fourth expected response value based on the third expected response value;
and taking the random number, the third authentication token, the fourth expected response value and the ninth key as the authentication information.
Optionally, after obtaining the authentication information according to the encapsulated first key, the method further includes:
and sending the random number and the third authentication token in the authentication information to the terminal.
Optionally, after the sending the random number and the third authentication token in the authentication information to the terminal, the method further includes:
receiving a first response value sent by the terminal;
And determining whether the authentication is successful or not according to the first response value.
To achieve the above object, an embodiment of the present invention provides an authentication processing method, which is executed by a terminal, including:
Judging whether a universal subscriber identity module USIM supports a first encryption algorithm or not;
And under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
Optionally, before sending the user hidden identifier SUCI and the encapsulated first key to the network side device, the method further includes:
acquiring a public key of a home network corresponding to the USIM;
Generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
Optionally, after sending the user hidden identifier SUCI and the encapsulated first key to the network side device, the method further includes:
receiving a random number and a third authentication token sent by the network side equipment;
and obtaining a first authentication token according to the first key, the random number and the third authentication token.
Optionally, after obtaining the first authentication token according to the first key, the random number and the third authentication token, the method further includes:
verifying according to the first authentication token;
Determining a first response value if the verification passes;
And sending the first response value to the network side equipment.
Optionally, the obtaining a first authentication token according to the first key, the random number and the third authentication token includes:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
Optionally, the method further comprises:
And verifying the fourth authentication token according to the second authentication token in the second information.
Optionally, the determining the first response value in the case of passing the verification includes:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
Optionally, the method further comprises:
Obtaining a seventh key based on the sixth key in the first information and the third key in the second information;
And obtaining a ninth key based on the eighth key in the first information and the fourth key in the second information.
To achieve the above object, an embodiment of the present invention provides an authentication processing apparatus, including:
The first receiving module is used for acquiring a user hidden identifier SUCI and a packaged first key which are sent by the terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
the first processing module is used for decrypting the SUCI to obtain a user permanent identifier SUPI;
And the second processing module is used for acquiring authentication information according to the packaged first key under the condition that the USIM of the terminal is determined to not support the first encryption algorithm through the SUPI.
To achieve the above object, an embodiment of the present invention provides an authentication processing apparatus, including:
the third processing module is used for judging whether the universal subscriber identity module USIM supports the first encryption algorithm or not;
And the first sending module is used for sending the user hidden identifier SUCI and the encapsulated first key to network side equipment under the condition that the USIM does not support the first encryption algorithm, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
To achieve the above object, an embodiment of the present invention provides a network-side device, including a processor and a transceiver,
The transceiver is used for: acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
the processor is configured to: decrypting the SUCI to obtain a user permanent identifier SUPI;
The processor is further configured to: and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key.
To achieve the above object, an embodiment of the present invention provides a terminal including a processor and a transceiver,
The processor is configured to: judging whether a universal subscriber identity module USIM supports a first encryption algorithm or not;
The transceiver is used for: and under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
To achieve the above object, an embodiment of the present invention provides a communication device including a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; the processor, when executing the program or instructions, implements the authentication processing method as described above.
To achieve the above object, an embodiment of the present invention provides a readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the steps in the authentication processing method as described above.
To achieve the above object, embodiments of the present invention provide a computer program product comprising computer instructions which, when executed by a processor, implement the steps of the authentication processing method as described above.
The technical scheme of the invention has the following beneficial effects:
According to the method, through obtaining SUCI and the packaged first secret key sent by the terminal, after decrypting SUCI to obtain SUPI, the SUPI determines whether the USIM of the terminal supports the first encryption algorithm, so that authentication information is obtained by the packaged first secret key under the condition that the USIM of the terminal does not support the first encryption algorithm. The length of the first secret key is larger than that of the USIM secret key, so that the obtained authentication information enhances the capacity of resisting quantum computation even if the USIM does not support the first encryption algorithm, and the security of the authentication process is improved.
Drawings
Fig. 1 is a flowchart of a method applied to a network side device according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an application flow of a method according to an embodiment of the present invention;
fig. 3 is a flowchart of a method applied to a terminal according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an apparatus module according to an embodiment of the invention;
FIG. 5 is a second schematic diagram of a device module according to an embodiment of the invention;
fig. 6 is a block diagram of a terminal according to an embodiment of the present invention;
fig. 7 is a block diagram of a terminal according to another embodiment of the present invention;
Fig. 8 is a block diagram of a network side device according to an embodiment of the present invention.
Detailed Description
In order to make the technical problems, technical solutions and advantages to be solved more apparent, the following detailed description will be given with reference to the accompanying drawings and specific embodiments.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be understood that the sequence numbers of the following processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
In addition, the terms "system" and "network" are often used interchangeably herein.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B may be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
For ease of understanding, some of the following descriptions are directed to embodiments of the present invention:
1) Universal subscriber identity module (Universal Subscriber Identity Module, USIM): the data such as the core key and the identifier of the user are saved.
2) Mobile Equipment (ME): and matching with USIM to complete network authentication.
3) User Equipment (UE): ME and USIM are collectively referred to.
4) Secure anchor function (Security Anchor Function, SEAF): the visited network implements authentication of the UE.
5) Authentication server function (Authentication Server Function, AUSF): the home network implements authentication of the UE.
6) Unified data management (Unified DATA MANAGEMENT, UDM)/home subscriber server (Home Subscriber Server, HSS): store subscription information, authentication data, etc. of the user.
7) Key encapsulation mechanism (Key Encapsulation Mechanism, KEM): c=kem_enc (PK, M), which is a quantum secure key encapsulation algorithm, cryptographically encapsulates M using public key PK.
8) Key decapsulation mechanism: m=kem_dec (SK, C), and the private key SK is used to decapsulate C to obtain plaintext M, kem_dec is a quantum-secure key decapsulation algorithm.
9) Symmetric encryption function: c=e (K, M), which is a quantum secure symmetric encryption algorithm, is symmetrically encrypted using a symmetric key K for M.
10 Symmetric decryption function): m=d (K, C), C is symmetrically decrypted using symmetric key K, D is a quantum secure symmetric decryption algorithm.
11 Asymmetric encryption function): c=e_pub (PK, M), which is a quantum-secure public-key encryption algorithm, is asymmetrically encrypted using public key PK.
12 Asymmetric decryption function): m=d_pub (SK, C), which is a quantum-secure public key decryption algorithm, using the private key SK to asymmetrically decrypt C.
13 Signature function): s=sign (K, M), which is signed using private key K.
14 Signature verification function): VERIFY (K, M, S), S is signed using public key K.
15 Summary function): h=hash (M), the digest value of M is calculated using a quantum-safe digest algorithm.
As shown in fig. 1, an authentication processing method in an embodiment of the present invention is executed by a network side device, and includes:
Step 11, obtaining a user hidden identifier SUCI and a packaged first key sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
Step 12, decrypting the SUCI to obtain a user permanent identifier SUPI;
And step 13, obtaining authentication information according to the encapsulated first key under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI.
Thus, according to the steps, the network side equipment can obtain the first key sent by the terminal and the package through obtaining SUCI, after decrypting SUCI to obtain SUPI, the SUPI determines whether the USIM of the terminal supports the first encryption algorithm, so that the authentication information is obtained by the package first key under the condition that the USIM of the terminal does not support the first encryption algorithm. The length of the first secret key is larger than that of the USIM secret key, so that the obtained authentication information enhances the capacity of resisting quantum computation even if the USIM does not support the first encryption algorithm, and the security of the authentication process is improved.
Optionally, the network side device is a UDM or HSS.
In this embodiment, the first encryption algorithm is implemented based on a key that is the same length as the first key. For example, the second key is 128 bits long, the first key is 256 bits long, and the first encryption algorithm needs to be implemented based on the 256bit key, such as MILENAGE-256 algorithms.
Optionally, in this embodiment, the terminal sends SUCI and the encapsulated first key if the USIM does not support the first encryption algorithm by determining if the USIM supports the first encryption algorithm. Specifically, the terminal sends an initial registration request (Initial Registration Request) message that carries the SUCI and the encapsulated first key. Correspondingly, the network side device obtains the SUCI and the encapsulated first key by receiving Initial Registration Request a message or a message forwarded by other devices. For example, the UDM receives AUSF a sent authentication Request (Nudm _ Authenticate _get Request) message carrying the SUCI and the encapsulated first key.
The method for judging whether the USIM supports the first encryption algorithm can also be understood as checking whether the USIM is a new card, and when the USIM is a new card, the USIM supports the first encryption algorithm.
Optionally, before the terminal sends the SUCI and the encapsulated first key, acquiring a public key of a home network corresponding to the USIM; generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
That is, for a USIM that does not support the first encryption algorithm, the terminal may encapsulate the generated first key with pk_hn by acquiring the public key pk_hn of its home network. The terminal reads the home network information on the card and acquires the PK_HN. And the manner of acquiring the pk_hn includes: reading PK_HN from the card; or from the home network operator. In addition, the generated first key k_me is encapsulated using pk_hn, and a secure public key algorithm, such as a PQC algorithm, may be used, and for the encapsulated first key k_me_enc, k_me_enc=kem_enc (pk_hn, k_me).
Where the K _ ME may be a randomly generated secure key, such as a 256bit key.
Optionally, in this embodiment, after decrypting SUCI to obtain the SUPI, the network side device, for example, the UDM, may determine whether the USIM supports the first encryption algorithm according to the subscription data of the USIM corresponding to the SUPI.
Optionally, in this embodiment, the obtaining authentication information according to the encapsulated first key includes:
Unpacking the packed first key to obtain the first key, and storing the first key and the SUPI in an associated manner;
And obtaining the authentication information according to the first key and the second key.
That is, after the K_ME_ENC is decapsulated to K_ME, the K_ME is saved locally and associated with SUPI. And, the authentication information is obtained using the k_me and the second key k_usim.
Wherein the decapsulation of k_me_enc may be implemented using kem_dec and a home network private key sk_hn, i.e. k_me=kem_dec (sk_hn, k_me_enc).
Optionally, the obtaining the authentication information according to the first key and the second key includes:
Obtaining first information according to a second encryption algorithm and the second key;
Obtaining second information according to the first encryption algorithm, the first key and the random number in the first information;
obtaining authentication related information according to the first information and the second information;
And obtaining the authentication information according to the authentication related information.
Here, the second encryption algorithm is implemented based on a key having the same length as the second key. For example, the second key is 128 bits long, the first key is 256 bits long, and the second encryption algorithm needs to be implemented based on a 128bit key, such as MILENAGE-128 algorithms.
Optionally, the k_usim is input to a second encryption algorithm, and the calculated first information av_usim includes: random number RAND, first authentication token autn_usim, first expected response value xres_usim, sixth key ck_usim, eighth key ik_usim. That is, av_usim= (RAND, autn_usim, xres_usim, ck_usim, ik_usim).
Optionally, the RAND in the k_me and the av_usim is input to a first encryption algorithm, and the calculated second information av_me includes: RAND, second authentication token autn_me, second expected response value xres_me, third key ck_me, fourth key ik_me. I.e., av_me= (RAND, autn_me, xres_me, ck_me, ik_me).
Optionally, in this embodiment, the obtaining authentication related information according to the first information and the second information includes:
obtaining a fifth key based on the third key and the fourth key in the second information;
obtaining a third authentication token based on the fifth key, the first authentication token in the first information and the second authentication token in the second information;
Obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information;
obtaining a seventh key based on the third key and a sixth key in the first information;
obtaining a ninth key based on the fourth key and an eighth key in the first information;
And taking the random number, the third authentication token, the third expected response value, the seventh key and the ninth key as the authentication related information.
Wherein the fifth key autn_usim_enc_k is an autn_usim protection key. Alternatively, autn_usim_enc_k is calculated using a one-way function (f-function) based on ck_me and ik_me, i.e., autn_usim_enc_k=f (ck_me, ik_me). If the second key has a length of 128 bits, the first key has a length of 256 bits, and the autn_usim_enc_k is an autn_usim protection key with 256 bits, the one-way function used may be, for example, a digest function HASH with 256 bits or a key derivation function (Key Derivation Function, KDF).
Optionally, the obtaining a third authentication token based on the fifth key, the first authentication token in the first information, and the second authentication token in the second information includes:
the first authentication token and the second authentication token are connected in series, and the result of the series connection is encrypted by using the fifth secret key to obtain the three authentication tokens; or alternatively
And encrypting the first authentication token by using the fifth key, and connecting the encrypted result with the second authentication token in series to obtain the three authentication tokens.
That is, for the third authentication token AUTN _ ENC, autn_enc=e (autn_usim_enc_k, AUTN USIM AUTN ME), or AUTN enc=e (AUTN USIM enck, AUTN USIM) AUTN ME, thus, encryption and integrity protection of the autn_usim are achieved.
Optionally, the obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information includes:
and connecting the first expected response value and the second expected response value in series, and obtaining a summary of the series result as a third expected response value.
Here, the digest of the series result may be obtained using a digest function, that is, xres=hash (xres_usim_xres_me) for the third expected response value XRES.
Similar to the third expected response value, the seventh key and the ninth key may be connected in series and then the digest is obtained, and for the seventh key CK, ck=hash (ck_usim||ck_me); for the ninth key IK, ik=hash (ik_usim||ik_me).
Thus, the authentication related information AV (RAND, AUTN, XRES, CK, IK) can be constructed. Thereafter, authentication information is further obtained according to AV (RAND, AUTN, XRES, CK, IK).
Optionally, the obtaining the authentication information according to the authentication related information includes:
Obtaining a tenth key based on the seventh key and the ninth key;
obtaining a fourth expected response value based on the third expected response value;
and taking the random number, the third authentication token, the fourth expected response value and the ninth key as the authentication information.
Wherein the tenth key K AUSF is derived by KDF based on CK and IK; the fourth expected response value XRES is derived from the KDF based on XRES. Thus, authentication information including RAND, AUTN, XRES x and K AUSF can be obtained.
In this embodiment, for a system employing 5G AKA, the resulting authentication information is 5G HE AV. Accordingly, the network side device, such as UDM, may return the requested 5G HE AV to AUSF in an authentication Response (Nudm _ UEAuthentication _get Response) message and instruct the 5G HE AV to use for 5G AKA. If the Nudm _ UEAuthentication _get request contains SUCI, the UDM will contain SUPI in the Nudm _ UEAuthentication _get response.
AUSF temporarily holds XRES and received SUCI or SUPI, AUSF may also hold K AUSF. AUSF generates a 5G AV based on the 5G HE AV received from UDM/ARPF. Specifically, HXRES x was calculated from XRES x, K SEAF was derived from K AUSF, and then XRES x and K AUSF in the 5G HE AV were replaced with HXRES x and K SEAF, respectively, to give a 5G AV. Then AUSF removes K SEAF and sends a 5G SE AV (RAND, AUTN, HXRES x) to SEAF in response through authentication (Nausf _ UEAuthentication _ Authenticate). SEAF sends RAND and AUTN to the UE via a non-access stratum (Non Access Stratum, NAS) message (e.g., auth-Req) that also contains ngKSI used by the UE and AMF to identify K AMF (i.e., ME and SEAF keys derived from K SEAF) and part of the native security context, and that also includes a back bidding (Anti-Bidding down Between Architectures, ABBA) parameter between the architectures.
Optionally, in this embodiment, after obtaining the authentication information according to the encapsulated first key, the method further includes:
and sending the random number and the third authentication token in the authentication information to the terminal.
In this way, the terminal can receive the random number and the third authentication token to perform subsequent authentication.
Optionally, after receiving the random number and the third authentication token sent by the network side device, the terminal obtains a first authentication token according to the first key, the random number and the third authentication token.
Optionally, the obtaining a first authentication token according to the first key, the random number and the third authentication token includes:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
The terminal may generate the av_me by using a first encryption algorithm similar to the network side device based on the k_me and the RAND, for example, the ME of the terminal may input the locally stored k_me and the received RAND to the first encryption algorithm (e.g., MILENAGE-256 algorithm), and calculate the av_me. Thereafter, autn_usim_enc_k is obtained based on ck_me and ik_me in av_me. Here, autn_usim_enc_k, i.e., autn_usim_enc_k=f (ck_me, ik_me), can be obtained in the same manner as the network-side apparatus described above. Then, for different generation modes (serial-before-encryption or serial-after-encryption) of the third authentication token, the autn_usim and the autn_me are obtained by inverse processing.
If the generation of the third authentication token is firstly serial connection and then encryption, the reverse processing is firstly decryption and then interception, the AUTN_ENC is decrypted by using the AUTN_USIM_ENC_K to obtain serial connection information of the AUTN_USIM and the AUTN_ME of the fourth authentication token, and the AUTN_USIM and the AUTN_ME can be intercepted due to the known length of the authentication token; if the generation of the third authentication token is to encrypt and then concatenate, then the inverse process is to intercept and decrypt, because the authentication token length is known, intercept the autn_me and the third information (encrypted autn_usim), and decrypt the third information using autn_usim_enc_k to obtain the autn_usim.
Optionally, the steps executed by the terminal further include:
And verifying the fourth authentication token according to the second authentication token in the second information.
That is, after obtaining the fourth authentication token through the above-described decryption-then-interception manner, the terminal may further verify the validity of the fourth authentication token by using the first encryption algorithm based on the k_me and the RAND. Specifically, after the K_ME and RAND are input to the first encryption algorithm (e.g., MILENAGE-256), the calculated AUTN_ME is compared to the fourth authentication token (AUTN_ME obtained by decryption and then interception).
In this embodiment, the ME of the terminal performs the above steps to obtain the autn_usim, and forwards the received RAND and the obtained autn_usim to the USIM.
Optionally, after obtaining the first authentication token according to the first key, the random number and the third authentication token, the method further includes:
verifying according to the first authentication token;
Determining a first response value if the verification passes;
And sending the first response value to the network side equipment.
In this way, after obtaining the autn_usim based on the received third authentication token, the terminal performs authentication according to the autn_usim, determines the first response value RES when the authentication passes, and sends RES to the network side device.
Wherein the USIM of the terminal performs the above steps, verifies the autn_usim, and checks whether the autn_usim is accepted. The ME determines a second response value RES in case the verification passes and calculates RES from RES.
Optionally, the determining the first response value in the case of passing the verification includes:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
That is, the USIM of the terminal inputs the k_usim to the second encryption algorithm, calculates an av_usim, and thereafter, the ME first obtains a second response value RES based on the xres_usim in the av_usim and the xres_me in the av_me. Specifically, after xres_usim and xres_me are connected in series, the result of the series connection is calculated by using a digest function, so as to obtain RES, that is, res=hash (xres_usim xres_me). Thus, ME may calculate RES from RES. The USIM will send the xres_usim, ck_usim, ik_usim in the av_usim to the ME.
Optionally, the steps executed by the terminal further include:
Obtaining a seventh key based on the sixth key in the first information and the third key in the second information;
And obtaining a ninth key based on the eighth key in the first information and the fourth key in the second information.
Thus, the ME calculates CK from ck_usim sent by USIM and ck_me held locally; IK is calculated by ik_usim sent by USIM and locally held ik_me.
The manner in which the terminal determines the seventh key CK and the ninth key IK is the same as the network-side apparatus described above, ck=hash (ck_usim||ck_me); ik=hash (ik_usim i ik_me).
Alternatively, ME may derive K AUSF from CK and IK and K SEAF from K AUSF.
In this embodiment, the terminal sends RES to the network side device, which may be that the terminal returns RES to SEAF in the NAS message authentication response. Thereafter SEAF calculates HRES from RES and compares HRES with HXRES. If the two values are consistent, SEAF considers that the authentication is successful from the perspective of the service network; if not, SEAF considers the authentication failed and indicates a failure to AUSF. SEAF sends RES to AUSF via Nausf _ UEAuthentication _ Authenticate Request message and also sends the corresponding SUCI or SUPI from the UE to AUSF via Nausf _ UEAuthentication _ Authenticate Request message. Upon receiving Nausf _ UEAuthentication _ Authenticate Request message containing RES, AUSF may verify that the authentication information has expired. If the authentication information has expired AUSF may consider the authentication unsuccessful from the perspective of the home network. AUSF should compare the received RES with the stored XRES, AUSF should consider the authentication successful from the perspective of the home network if RES and XRES agree.
AUSF indicates to SEAF via Nausf _ UEAuthentication _ Authenticate Response whether authentication was successful. If the authentication is successful AUSF sends K SEAF to SEAF through Nausf _ UEAuthentication _ Authenticate Response. If AUSF receives SUCI from SEAF at the time of initiating authentication and authentication is successful, AUSF should also include SUPI in Nausf _ UEAuthentication _ Authenticate Response.
If authentication is successful SEAF should use the key K SEAF received from the Nausf _ UEAuthentication _ Authenticate Response message as the anchor key. Then SEAF should derive K AMF from K SEAF, ABBA parameters and SUPI and provide ngKSI and K AMF to the AMF. If SUCI is used for this authentication, SEAF should provide ngKSI and K AMF to the AMF only after receiving the Nausf _ UEAuthentication _ Authenticate Response message containing SUPI; communication services are not provided to the UE until the service network learns the SUPI.
The overall flow of the method according to the embodiment of the present invention in 5G AKA is described below with reference to fig. 2:
The ME checks whether the USIM is a new card, and if not, acquires the public key PK_HN of the USIM home network. The ME randomly generates 256-bit K_ME, and encrypts and encapsulates the K_ME into K_ME_ENC. The K_ME_ENC, SUCI is sent to the UDM/HSS by initializing a registration request.
After the UDM/HSS obtains K_ME_ENC, decrypting the K_ME_ENC to obtain K_ME; calculating to obtain an AV_USIM based on the 128-bit K_USIM; an AV_ME is obtained through calculation of the RAND and the K_ME; AUTN/u is calculated usim_enc_k; encrypting and protecting the AUTN_USIM to obtain AUTN_ENC; construct 5G HE AV. Terminals RAND and autn_enc are informed by authentication requests.
After the ME obtains RAND and AUTN_ENC, CK_ME, IK_ME and XRES_ME are calculated by K_ME and RAND; AUTN/u is calculated usim_enc_k; the autn_usim is decrypted from the autn_enc by the autn_usim_enc_k. The RAND and autn_usim are sent to the USIM.
After the USIM obtains RAND and autn_usim, the autn_usim is authenticated; xres_usim, ck_usim, ik_usim were calculated. Xres_usim, ck_usim, and ik_usim are sent to ME.
The ME calculates RES, CK, IK from the received xres_usim, ck_usim, and ik_usim, and the locally held xres_me, ck_me, ik_me. The terminal sends an authentication response to the UDM/HSS, including RES.
In summary, in a scenario that the terminal USIM does not support the first encryption algorithm, the method of the embodiment of the invention can complete authentication based on the provided first key, and the length of the first key is greater than that of the key stored by the USIM, so that the security of the system is improved; and because other network elements and related interfaces do not need to be modified, the cost of modification is lower, and the compatibility with the original protocol is higher.
It should be noted that in this embodiment, whether the USIM supports the first encryption algorithm is determined, if the USIM supports the first encryption algorithm, the terminal may directly encrypt and encapsulate the second key, send the encapsulated second key and SUCI to the network side device, and the network side device and the terminal complete authentication based on the second key.
It should be further noted that the method according to the embodiment of the present invention is applicable not only to 3G, 4G and 5G AKA protocols, but also to corresponding EAP-AKA, and in the above embodiment, the description is mainly made with 5G AKA.
As shown in fig. 3, an authentication processing method according to an embodiment of the present invention is executed by a terminal, and includes:
Step 31, judging whether a universal subscriber identity module USIM supports a first encryption algorithm;
And step 32, under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
In this way, the network side device can obtain the authentication information by the encapsulated first key by acquiring SUCI and the encapsulated first key sent by the terminal, after decrypting SUCI to obtain the SUPI, determining by the SUPI whether the USIM of the terminal supports the first encryption algorithm, and thus for the case that the USIM of the terminal does not support the first encryption algorithm. The length of the first secret key is larger than that of the USIM secret key, so that the obtained authentication information enhances the capacity of resisting quantum computation even if the USIM does not support the first encryption algorithm, and the security of the authentication process is improved.
Optionally, before sending the user hidden identifier SUCI and the encapsulated first key to the network side device, the method further includes:
acquiring a public key of a home network corresponding to the USIM;
Generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
Optionally, after sending the user hidden identifier SUCI and the encapsulated first key to the network side device, the method further includes:
receiving a random number and a third authentication token sent by the network side equipment;
and obtaining a first authentication token according to the first key, the random number and the third authentication token.
Optionally, after obtaining the first authentication token according to the first key, the random number and the third authentication token, the method further includes:
verifying according to the first authentication token;
Determining a first response value if the verification passes;
And sending the first response value to the network side equipment.
Optionally, the obtaining a first authentication token according to the first key, the random number and the third authentication token includes:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
Optionally, the method further comprises:
And verifying the fourth authentication token according to the second authentication token in the second information.
Optionally, the determining the first response value in the case of passing the verification includes:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
Optionally, the method further comprises:
Obtaining a seventh key based on the sixth key in the first information and the third key in the second information;
And obtaining a ninth key based on the eighth key in the first information and the fourth key in the second information.
It should be noted that, the method is implemented in cooperation with the method executed by the network side device, and the implementation manner of the embodiment of the method is applicable to the method, so that the same technical effects can be achieved.
As shown in fig. 4, an embodiment of the present invention provides an authentication processing apparatus, including:
A first receiving module 410, configured to obtain a user hidden identifier SUCI and an encapsulated first key sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key of a universal user identity module USIM;
A first processing module 420, configured to decrypt the SUCI to obtain a user permanent identifier SUPI;
And a second processing module 430, configured to obtain authentication information according to the encapsulated first key if it is determined by the SUPI that the USIM of the terminal does not support the first encryption algorithm.
The device can obtain the authentication information by the encapsulated first key by acquiring SUCI and the encapsulated first key sent by the terminal, after decrypting SUCI to obtain SUPI, determining whether the USIM of the terminal supports the first encryption algorithm by the SUPI, and thus aiming at the condition that the USIM of the terminal does not support the first encryption algorithm. The length of the first secret key is larger than that of the USIM secret key, so that the obtained authentication information enhances the capacity of resisting quantum computation even if the USIM does not support the first encryption algorithm, and the security of the authentication process is improved.
Optionally, the second processing module is further configured to:
Unpacking the packed first key to obtain the first key, and storing the first key and the SUPI in an associated manner;
And obtaining the authentication information according to the first key and the second key.
Optionally, the second processing module is further configured to:
Obtaining first information according to a second encryption algorithm and the second key;
Obtaining second information according to the first encryption algorithm, the first key and the random number in the first information;
obtaining authentication related information according to the first information and the second information;
And obtaining the authentication information according to the authentication related information.
Optionally, the second processing module is further configured to:
obtaining a fifth key based on the third key and the fourth key in the second information;
obtaining a third authentication token based on the fifth key, the first authentication token in the first information and the second authentication token in the second information;
Obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information;
obtaining a seventh key based on the third key and a sixth key in the first information;
obtaining a ninth key based on the fourth key and an eighth key in the first information;
And taking the random number, the third authentication token, the third expected response value, the seventh key and the ninth key as the authentication related information.
Optionally, the second processing module is further configured to:
the first authentication token and the second authentication token are connected in series, and the result of the series connection is encrypted by using the fifth secret key to obtain the three authentication tokens; or alternatively
And encrypting the first authentication token by using the fifth key, and connecting the encrypted result with the second authentication token in series to obtain the three authentication tokens.
Optionally, the second processing module is further configured to:
Obtaining a tenth key based on the seventh key and the ninth key;
obtaining a fourth expected response value based on the third expected response value;
and taking the random number, the third authentication token, the fourth expected response value and the ninth key as the authentication information.
Optionally, the apparatus further comprises:
and the second sending module is used for sending the random number and the third authentication token in the authentication information to the terminal.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving the first response value sent by the terminal;
And the fourth processing module is used for determining whether the authentication is successful or not according to the first response value.
It should be noted that, the apparatus is an apparatus to which the method executed by the network side device is applied, and the implementation manner of the embodiment of the method is applicable to the apparatus, so that the same technical effects can be achieved.
As shown in fig. 5, an embodiment of the present invention provides an authentication processing apparatus, including:
a third processing module 510, configured to determine whether the universal subscriber identity module USIM supports the first encryption algorithm;
And a first sending module 520, configured to send, to a network side device, a user hidden identifier SUCI and an encapsulated first key if the USIM does not support the first encryption algorithm, where the length of the first key is greater than that of a second key, and the second key is a key stored by the USIM.
The device enables the network side equipment to acquire SUCI sent by the terminal and the encapsulated first secret key, after decrypting SUCI to obtain SUPI, the SUPI determines whether the USIM of the terminal supports the first encryption algorithm, so that the authentication information is obtained by the encapsulated first secret key under the condition that the USIM of the terminal does not support the first encryption algorithm. The length of the first secret key is larger than that of the USIM secret key, so that the obtained authentication information enhances the capacity of resisting quantum computation even if the USIM does not support the first encryption algorithm, and the security of the authentication process is improved.
Optionally, the apparatus further comprises:
An acquisition module, configured to acquire a public key of a home network corresponding to the USIM;
And the fifth processing module is used for generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
Optionally, the apparatus further comprises:
A third receiving module, configured to receive a random number and a third authentication token sent by the network side device;
And a sixth processing module, configured to obtain a first authentication token according to the first key, the random number, and the third authentication token.
Optionally, the apparatus further comprises:
A seventh processing module, configured to verify according to the first authentication token;
An eighth processing module for determining a first response value in case of verification pass;
and the third sending module is used for sending the first response value to the network side equipment.
Optionally, the sixth processing module is further configured to:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
Optionally, the apparatus further comprises:
and a ninth processing module, configured to verify the fourth authentication token according to the second authentication token in the second information.
Optionally, the eighth processing module is further configured to:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
Optionally, the apparatus further comprises:
a tenth processing module, configured to obtain a seventh key based on the sixth key in the first information and the third key in the second information;
An eleventh processing module, configured to obtain a ninth key based on the eighth key in the first information and the fourth key in the second information.
It should be noted that, the device is a device to which the method executed by the terminal is applied, and the implementation manner of the embodiment of the method is applicable to the device, so that the same technical effects can be achieved.
As shown in fig. 6, a terminal 600 of an embodiment of the present invention includes a processor 610 and a transceiver 620, wherein,
The processor is configured to: judging whether a universal subscriber identity module USIM supports a first encryption algorithm or not;
The transceiver is used for: and under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
Optionally, the processor is further configured to:
acquiring a public key of a home network corresponding to the USIM;
Generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
Optionally, the transceiver is further configured to receive a random number and a third authentication token sent by the network side device;
the processor is further configured to obtain a first authentication token according to the first key, the random number, and the third authentication token.
Optionally, the processor is further configured to verify from the first authentication token; determining a first response value if the verification passes;
the transceiver is further configured to send the first response value to the network side device.
Optionally, the processor is further configured to:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
Optionally, the processor is further configured to:
And verifying the fourth authentication token according to the second authentication token in the second information.
Optionally, the processor is further configured to:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
Optionally, the processor is further configured to:
Obtaining a seventh key based on the sixth key in the first information and the third key in the second information;
And obtaining a ninth key based on the eighth key in the first information and the fourth key in the second information.
A mobile terminal according to another embodiment of the present invention, as shown in fig. 7, includes a transceiver 710, a processor 700, a memory 720, and a program or instructions stored on the memory 720 and executable on the processor 700; the processor 700 implements the authentication processing method applied to the terminal when executing the program or the instructions.
The transceiver 710 is configured to receive and transmit data under the control of the processor 700.
Wherein in fig. 7, a bus architecture may comprise any number of interconnected buses and bridges, and in particular one or more processors represented by processor 700 and various circuits of memory represented by memory 720, linked together. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. The transceiver 710 may be a number of elements, i.e. comprising a transmitter and a receiver, providing a unit for communicating with various other apparatus over a transmission medium. The user interface 730 may also be an interface capable of interfacing with an inscribed desired device for a different user device, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 700 is responsible for managing the bus architecture and general processing, and the memory 720 may store data used by the processor 700 in performing operations.
The network side equipment of the embodiment of the invention comprises a processor and a transceiver,
The transceiver is used for: acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key of a universal user identity module USIM;
the processor is configured to: decrypting the SUCI to obtain a user permanent identifier SUPI;
The processor is further configured to: and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key.
Optionally, the processor is further configured to:
Unpacking the packed first key to obtain the first key, and storing the first key and the SUPI in an associated manner;
And obtaining the authentication information according to the first key and the second key.
Optionally, the processor is further configured to:
Obtaining first information according to a second encryption algorithm and the second key;
Obtaining second information according to the first encryption algorithm, the first key and the random number in the first information;
obtaining authentication related information according to the first information and the second information;
And obtaining the authentication information according to the authentication related information.
Optionally, the processor is further configured to:
obtaining a fifth key based on the third key and the fourth key in the second information;
obtaining a third authentication token based on the fifth key, the first authentication token in the first information and the second authentication token in the second information;
Obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information;
obtaining a seventh key based on the third key and a sixth key in the first information;
obtaining a ninth key based on the fourth key and an eighth key in the first information;
And taking the random number, the third authentication token, the third expected response value, the seventh key and the ninth key as the authentication related information.
Optionally, the processor is further configured to:
the first authentication token and the second authentication token are connected in series, and the result of the series connection is encrypted by using the fifth secret key to obtain the three authentication tokens; or alternatively
And encrypting the first authentication token by using the fifth key, and connecting the encrypted result with the second authentication token in series to obtain the three authentication tokens.
Optionally, the processor is further configured to:
Obtaining a tenth key based on the seventh key and the ninth key;
obtaining a fourth expected response value based on the third expected response value;
and taking the random number, the third authentication token, the fourth expected response value and the ninth key as the authentication information.
Optionally, the transceiver is configured to:
and sending the random number and the third authentication token in the authentication information to the terminal.
Optionally, the transceiver is configured to receive a first response value sent by the terminal;
The processor is further configured to determine whether authentication is successful according to the first response value.
The network side device according to another embodiment of the present invention, as shown in fig. 8, includes a transceiver 810, a processor 800, a memory 820, and a program or instructions stored on the memory 820 and executable on the processor 800; the processor 800 implements the authentication processing method applied to the network side device when executing the program or the instructions.
The transceiver 810 is configured to receive and transmit data under the control of the processor 800.
Wherein in fig. 8, a bus architecture may comprise any number of interconnected buses and bridges, and in particular, one or more processors represented by processor 800 and various circuits of memory represented by memory 820, linked together. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. The transceiver 810 may be a number of elements, i.e., including a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 800 is responsible for managing the bus architecture and general processing, and the memory 820 may store data used by the processor 800 in performing operations.
The readable storage medium of the embodiment of the present invention stores a program or an instruction, which when executed by a processor, implements the steps in the authentication processing method described above, and can achieve the same technical effects, and is not described herein again for avoiding repetition.
The processor is a processor in the terminal or the network side device described in the foregoing embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory RAM), a magnetic disk or an optical disk.
The embodiment of the present application further provides a computer program product, which includes computer instructions, where the computer instructions, when executed by a processor, implement each process of the method embodiment shown in fig. 1 or fig. 3 and achieve the same technical effects, and are not repeated herein.
It is further noted that the terminals described in this specification include, but are not limited to, smartphones, tablets, etc., and that many of the functional components described are referred to as modules in order to more particularly emphasize their implementation independence.
In an embodiment of the invention, the modules may be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different bits which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Likewise, operational data may be identified within modules and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices.
Where a module may be implemented in software, taking into account the level of existing hardware technology, a module may be implemented in software, and one skilled in the art may, without regard to cost, build corresponding hardware circuitry, including conventional Very Large Scale Integration (VLSI) circuits or gate arrays, and existing semiconductors such as logic chips, transistors, or other discrete components, to achieve the corresponding functions. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
The exemplary embodiments described above are described with reference to the drawings, many different forms and embodiments are possible without departing from the spirit and teachings of the present invention, and therefore, the present invention should not be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will convey the scope of the invention to those skilled in the art. In the drawings, the size of the elements and relative sizes may be exaggerated for clarity. The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Unless otherwise indicated, a range of values includes the upper and lower limits of the range and any subranges therebetween.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that various modifications and adaptations can be made without departing from the principles of the present invention, and such modifications and adaptations are intended to be comprehended within the scope of the present invention.

Claims (23)

1. An authentication processing method, which is executed by a network side device, comprising:
Acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
decrypting the SUCI to obtain a user permanent identifier SUPI;
and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key.
2. The method of claim 1, wherein the obtaining authentication information from the encapsulated first key comprises:
Unpacking the packed first key to obtain the first key, and storing the first key and the SUPI in an associated manner;
And obtaining the authentication information according to the first key and the second key.
3. The method of claim 2, wherein the obtaining the authentication information based on the first key and the second key comprises:
Obtaining first information according to a second encryption algorithm and the second key;
Obtaining second information according to the first encryption algorithm, the first key and the random number in the first information;
obtaining authentication related information according to the first information and the second information;
And obtaining the authentication information according to the authentication related information.
4. A method according to claim 3, wherein said obtaining authentication related information from said first information and said second information comprises:
obtaining a fifth key based on the third key and the fourth key in the second information;
obtaining a third authentication token based on the fifth key, the first authentication token in the first information and the second authentication token in the second information;
Obtaining a third expected response value based on the first expected response value in the first information and the second expected response value in the second information;
obtaining a seventh key based on the third key and a sixth key in the first information;
obtaining a ninth key based on the fourth key and an eighth key in the first information;
And taking the random number, the third authentication token, the third expected response value, the seventh key and the ninth key as the authentication related information.
5. The method of claim 4, wherein the obtaining a third authentication token based on the fifth key, the first authentication token in the first information, and the second authentication token in the second information, comprises:
the first authentication token and the second authentication token are connected in series, and the result of the series connection is encrypted by using the fifth secret key to obtain the three authentication tokens; or alternatively
And encrypting the first authentication token by using the fifth key, and connecting the encrypted result with the second authentication token in series to obtain the three authentication tokens.
6. The method according to claim 4 or 5, wherein said obtaining said authentication information based on said authentication related information comprises:
Obtaining a tenth key based on the seventh key and the ninth key;
obtaining a fourth expected response value based on the third expected response value;
and taking the random number, the third authentication token, the fourth expected response value and the ninth key as the authentication information.
7. The method of claim 1, wherein after obtaining authentication information from the encapsulated first key, further comprising:
and sending the random number and the third authentication token in the authentication information to the terminal.
8. The method of claim 7, wherein after the sending the random number in the authentication information and the third authentication token to the terminal, further comprises:
receiving a first response value sent by the terminal;
And determining whether the authentication is successful or not according to the first response value.
9. An authentication processing method, performed by a terminal, comprising:
Judging whether a universal subscriber identity module USIM supports a first encryption algorithm or not;
And under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
10. The method of claim 9, wherein before sending the user hidden identifier SUCI and the encapsulated first key to the network-side device, further comprises:
acquiring a public key of a home network corresponding to the USIM;
Generating the first key, and encapsulating the first key by using the public key to obtain the encapsulated first key.
11. The method of claim 9, wherein after the sending the user hidden identifier SUCI and the encapsulated first key to the network side device, further comprises:
receiving a random number and a third authentication token sent by the network side equipment;
and obtaining a first authentication token according to the first key, the random number and the third authentication token.
12. The method of claim 11, wherein the obtaining the first authentication token from the first key, the random number, and the third authentication token further comprises:
verifying according to the first authentication token;
Determining a first response value if the verification passes;
And sending the first response value to the network side equipment.
13. The method of claim 11, wherein the obtaining a first authentication token from the first key, the random number, and the third authentication token comprises:
obtaining second information based on the first key and the random number;
obtaining a fifth key based on the third key and the fourth key in the second information;
Decrypting the third authentication token by using the fifth key to obtain the first authentication token and a fourth authentication token; or determining third information and a fourth authentication token based on the third authentication token, and decrypting the third information by using the fifth key to obtain the first authentication token.
14. The method as recited in claim 13, further comprising:
And verifying the fourth authentication token according to the second authentication token in the second information.
15. The method of claim 12, wherein determining the first response value if the verification passes comprises:
Obtaining first information according to a second encryption algorithm and the second key;
and obtaining the first response value based on the first expected response value in the first information and the second expected response value in the second information.
16. The method as recited in claim 12, further comprising:
Obtaining a seventh key based on the sixth key in the first information and the third key in the second information;
And obtaining a ninth key based on the eighth key in the first information and the fourth key in the second information.
17. An authentication processing apparatus, comprising:
The first receiving module is used for acquiring a user hidden identifier SUCI and a packaged first key which are sent by the terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
the first processing module is used for decrypting the SUCI to obtain a user permanent identifier SUPI;
And the second processing module is used for acquiring authentication information according to the packaged first key under the condition that the USIM of the terminal is determined to not support the first encryption algorithm through the SUPI.
18. An authentication processing apparatus, comprising:
the third processing module is used for judging whether the universal subscriber identity module USIM supports the first encryption algorithm or not;
And the first sending module is used for sending the user hidden identifier SUCI and the encapsulated first key to network side equipment under the condition that the USIM does not support the first encryption algorithm, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
19. A network side device is characterized by comprising a processor and a transceiver,
The transceiver is used for: acquiring a user hidden identifier SUCI and a packaged first key which are sent by a terminal; the length of the first key is larger than that of a second key, and the second key is a key stored by a universal user identity module USIM;
the processor is configured to: decrypting the SUCI to obtain a user permanent identifier SUPI;
The processor is further configured to: and under the condition that the USIM of the terminal does not support the first encryption algorithm through the SUPI, acquiring authentication information according to the packaged first key.
20. A terminal is characterized by comprising a processor and a transceiver,
The processor is configured to: judging whether a universal subscriber identity module USIM supports a first encryption algorithm or not;
The transceiver is used for: and under the condition that the USIM does not support the first encryption algorithm, sending a user hidden identifier SUCI and a packaged first key to network side equipment, wherein the length of the first key is larger than that of a second key, and the second key is a key stored by the USIM.
21. A communication device, comprising: a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; the authentication processing method according to any one of claims 1 to 8 or the authentication processing method according to any one of claims 9 to 16 is implemented when the program or instructions are executed by the processor.
22. A readable storage medium having stored thereon a program or instructions which when executed by a processor performs the authentication processing method according to any of claims 1-8 or the steps of the authentication processing method according to any of claims 9-16.
23. A computer program product comprising computer instructions which, when executed by a processor, implement the steps of the authentication processing method according to any one of claims 1 to 8 or the authentication processing method according to any one of claims 9 to 16.
CN202410466115.3A 2024-04-18 2024-04-18 Authentication processing method and device and related equipment Pending CN118802297A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410466115.3A CN118802297A (en) 2024-04-18 2024-04-18 Authentication processing method and device and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410466115.3A CN118802297A (en) 2024-04-18 2024-04-18 Authentication processing method and device and related equipment

Publications (1)

Publication Number Publication Date
CN118802297A true CN118802297A (en) 2024-10-18

Family

ID=93020732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410466115.3A Pending CN118802297A (en) 2024-04-18 2024-04-18 Authentication processing method and device and related equipment

Country Status (1)

Country Link
CN (1) CN118802297A (en)

Similar Documents

Publication Publication Date Title
ES2672340T3 (en) System and method to ensure machine-to-machine communications
CN111052672B (en) Secure key transfer protocol without certificate or pre-shared symmetric key
US8165565B2 (en) Method and system for recursive authentication in a mobile network
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
KR20050084877A (en) Secure implementation and utilization of device-specific security data
US8230218B2 (en) Mobile station authentication in tetra networks
CN111614621B (en) Internet of things communication method and system
CN101895881B (en) Method for realizing GBA secret key and pluggable equipment of terminal
US20180013832A1 (en) Health device, gateway device and method for securing protocol using the same
CN112020038A (en) Domestic encryption terminal suitable for rail transit mobile application
CN110831002B (en) Method and device for key deduction and computing storage medium
CN104243452A (en) Method and system for cloud computing access control
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN116132025A (en) Key negotiation method, device and communication system based on preset key group
CN108966214B (en) Authentication method of wireless network, and secure communication method and system of wireless network
CN110890959B (en) Account encryption method, system and device
CN111836260B (en) Authentication information processing method, terminal and network equipment
JP2023506791A (en) Privacy information transmission method, device, computer equipment and computer readable medium
CN113422753B (en) Data processing method, device, electronic equipment and computer storage medium
Yoon et al. Security enhancement scheme for mobile device using H/W cryptographic module
CN118802297A (en) Authentication processing method and device and related equipment
EP3125595A1 (en) Method to provide identification in privacy mode
CN118647022B (en) Geographic information data encryption transmission method and system based on 5G private network
US20240340164A1 (en) Establishment of forward secrecy during digest authentication
WO2022048125A1 (en) Information processing method and apparatus, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination