Method of distributing keys over epon

A passive optical network and Ethernet technology, which is applied in the field of key distribution, can solve problems such as time-consuming and difficult-to-communication network message security algorithms, and achieve the effect of simplifying the complexity of the protocol

Inactive Publication Date: 2007-11-14
ELECTRONICS & TELECOMM RES INST
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So it consumes long time to encrypt or decrypt message using RSA algorithm
Therefore, the RSA algorithm is difficult to be used as a message security algorithm in a communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of distributing keys over epon
  • Method of distributing keys over epon
  • Method of distributing keys over epon

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] According to one aspect of the present invention, there is provided a method for distributing keys on EPON to generate a unicast secure channel, the method comprising: exchanging between an optical terminal (OLT) and an optical network unit (ONU) respectively by the OLT and the ONU The generated first random value; based on the exchanged first random value and the pre-distributed master key, use the hash function to generate the paired master key (PMK); exchanged between the OLT and the ONU is generated by the OLT and the ONU respectively and based on the exchanged second random value, OLT and ONU's respective media access control (MAC) addresses, and PMK, using a hash function to generate a temporary key.

[0038]According to another aspect of the present invention, there is provided a method for distributing keys on EPON to generate a broadcast security channel, the method comprising: transmitting a first random value generated by the OLT to the ONU; based on the trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a key distribution method of applying link security technology to an Ethernet passive optical network (EPON). An optical line terminal (OLT) and an optical network unit (ONU) respectively generate first random values and exchange the first random values with each other. The OLT and the ONU generate a pairwise master key (PMK) based on the exchanged first random values and a pre-distributed master key using a hash function. The OLT and the ONU respectively generate second random values and exchange the second random values with each other. The OLT and the ONU generate a temporary key based on the exchanged second random values, respective media access control (MAC) addresses of the OLT and the ONU, and the PMK using the hash function. Therefore, keys can be safely distributed over the EPON without using a separate secure channel.

Description

technical field [0001] The present invention relates to a key distribution method, and more particularly, to a method of distributing keys on an Ethernet Passive Optical Network (EPON) without using a secure channel. Background technique [0002] When entity A transmits a message to entity B over the communication network, unauthorized users may access and use the message being transmitted. If such a risk exists, encryption must be used to ensure the security of the message. Generally, encryption techniques used for security are classified into symmetric key encryption techniques and public key encryption techniques. These two encryption technologies use very different encryption algorithms and distribute keys differently. [0003] In symmetric key cryptography, the key used for encryption is the same as the key used for decryption. For example, if entity A uses key K C To encrypt a message, entity B must use key K C to decrypt the message received from entity A. The e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04B10/25
CPCH04J14/0227H04L9/08H04L63/162
Inventor 殷知淑韩景洙俞泰皖权栗
Owner ELECTRONICS & TELECOMM RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products