Method and apparatus for verifying CGA signature
First Claim
1. A method for verifying Cryptographically Generated Address (CGA) signature, comprising:
- receiving, by a receiver, a message sent by a CGA owner, wherein a first Ron-Shamir-Adleman (RSA) public key, a first RSA public key signature, a second public key, and a second public key signature are carried in the message, the first RSA public key binds one or more second public keys, and a part of the message includes the one or more second public keys, wherein the part of the message is protected by the first RSA public key signature, wherein the second public key is an Elliptic Curve Cryptography (ECC) public key, and the corresponding second public key signature is an ECC public key signature; and
verifying, by the receiver, the first RSA public key signature according to the message;
extracting the second public key, and verifying the second public key signature.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatuses for verifying Cryptographically Generated Address (CGA) signature are provided. The method includes: receiving a message sent by a CGA address owner, wherein a RSA public key, a first RSA public key signature, a second public key, and a second public key signature are carried in the message, the first RSA public key binds one or more second public keys, and a part protected by the first public key signature includes the one or more second public keys; verifying the first RSA public key signature according to the message; extracting the second public key, and verifying the second public key signature. According to the method and apparatuses of the embodiment, the effect of supporting other public key can be achieved, the change of the IP address can be omitted, and public key deployment and computing resources are saved.
9 Citations
8 Claims
-
1. A method for verifying Cryptographically Generated Address (CGA) signature, comprising:
-
receiving, by a receiver, a message sent by a CGA owner, wherein a first Ron-Shamir-Adleman (RSA) public key, a first RSA public key signature, a second public key, and a second public key signature are carried in the message, the first RSA public key binds one or more second public keys, and a part of the message includes the one or more second public keys, wherein the part of the message is protected by the first RSA public key signature, wherein the second public key is an Elliptic Curve Cryptography (ECC) public key, and the corresponding second public key signature is an ECC public key signature; and verifying, by the receiver, the first RSA public key signature according to the message;
extracting the second public key, and verifying the second public key signature. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-readable storage device, wherein the device stores instructions that may be executed to:
-
add a first Ron-Shamir-Adleman (RSA) public key, a first RSA public key signature, a second public key, and a second public key signature to a message to be sent from a CGA owner, wherein the first RSA public key binds one or more second public keys, and a part of the message comprises the one or more second public keys, wherein the part of the message is protected by the first RSA public key signature, wherein the second public key is an Elliptic Curve Cryptography (ECC) public key, and the corresponding second public key signature is an ECC public key signature; and send the message from the CGA owner, wherein the CGA owner adds the first RSA public key, the first RSA public key signature, the second public key, and the second public key signature to the message.
-
-
6. A computer-readable storage device, wherein the device stores a set of instructions that may be executed to:
-
receive a message sent by a CGA owner, wherein a first Ron-Shamir-Adleman (RSA) public key, a first RSA public key signature, a second public key, and a second public key signature are carried in the message, the first RSA public key binds one or more second public keys, and a part of the message includes the one or more second public keys, wherein the part of the message is protected by the first RSA public key signature, wherein the second public key is an Elliptic Curve Cryptography (ECC) public key, and the corresponding second public key signature is an ECC public key signature; and verify the first RSA public key signature according to the message, extract the second public key, and verify the second public key signature. - View Dependent Claims (7, 8)
-
Specification