Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Seamless key exchanging technology based on secret communication

A technology of secure communication and seamless key change, which is applied in the field of seamless key change technology, can solve problems affecting normal communication of users and prolonging communication interruption time, so as to enhance market adaptability and user manageability, improve cost performance, overcome long-term effect

Inactive Publication Date: 2008-07-16
中电科网络安全科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, if the number of cipher machines in the system is large and the communication transmission rate is low, the communication interruption time caused by the cipher machine changing the key will be prolonged, affecting the normal communication of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Seamless key exchanging technology based on secret communication
  • Seamless key exchanging technology based on secret communication
  • Seamless key exchanging technology based on secret communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]In the process of full-duplex communication, each cipher machine mainly has two aspects of work, one is to encrypt the data received by the terminal, and then send the ciphertext to the network; the other is to encrypt the data received by the network The data is decrypted, and then the decrypted plaintext is sent to the terminal. correspond figure 1 As shown, there are two independent transmission channels, channel 1 and channel 2. For simplicity, we only discuss the data transfer processing in one channel direction. Such as figure 1 As shown, when the data passes through the cipher machine A at the sending end, the cipher machine A encrypts the data; The channel between cipher machines is always in ciphertext state.

[0042] Here, we refer to cipher machine A as an encryption cipher machine, and cipher machine B as a decryption cipher machine. The technical method of seamless key exchange is mainly composed of two parts, one is the regular replacement of the whole...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The KDMC carries out key-encrypting key base on-line replacement to related cryptces uniformly in the full-duplex secure communication system based on cryptoes. Based on the traditional way of key-encrypting key base replacement, the base buffer storage and MK handshaking switching technology are applied and improved to realize seamless key-encrypting key replacement of normal data secure communications among cryptoes continuously.

Description

technical field [0001] The present invention relates to a method that is applied in a full-duplex secure and confidential communication system, aiming at the key distribution and management center's unified on-line replacement of regular key databases for each cipher machine in the system, and when the cipher machine itself regularly replaces the session message key, it does not Seamless key change technology that interrupts normal communication. technical background [0002] In a secure and confidential communication system based on a cipher machine, the system key change is mainly for the regular (or timing) replacement of the working key storehouse of the cipher machine (hereinafter referred to as the key storehouse) and the session message key used in each session . Among them, the management of the encryption machine key store is a very important part of the whole system. [0003] At present, quite a lot of security systems generally adopt online key management, that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/16H04L9/00H04K1/00
Inventor 袁健刘振钧霍卫华王银
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products