Method and system for improving encryption/decryption speed of passive optical network

A passive optical network, encryption and decryption technology, applied in the direction of transmission system, digital transmission system, multiplexing system selection device, etc., can solve the problems that it is difficult to ensure timely exchange of keys, and the speed of encryption processing cannot be guaranteed.

Inactive Publication Date: 2010-12-01
ZTE CORP
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The exchange of keys adopts IEEE's slow protocol, and the number of packets sent per second is limited to 10. When the number of ONUs in the system increases, it is difficult to ensure timely exchange of keys
It can be seen that when there are multiple ONUs in the system, the processing speed of encryption cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving encryption/decryption speed of passive optical network
  • Method and system for improving encryption/decryption speed of passive optical network
  • Method and system for improving encryption/decryption speed of passive optical network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The number of stirring keys is the same as the number of seed keys, that is, m is equal to N, and the OLT and ONU directly use these m seed keys for encryption and decryption respectively. The ONU sends the seed key to the OLT through the new_churning_key message. The churning_key field in the new_churning_key message is originally 3 bytes, but is extended to 3×m bytes. In this embodiment, since N=m, only 33-3*(N-1) bytes remain in the Pad field. After receiving it, the OLT takes out the key and directly corresponds to each encrypted block.

[0067] Taking N equal to 8 as an example, combine Figure 5 Explain the corresponding steps:

[0068] Step 1: ONU generates 8 keys;

[0069] Step 2: Fill in the values ​​of the 8 keys into the churning_key0 to churning_key7 fields of the new_churning_key message;

[0070] Step 3: ONU sends new_churning_key message to OLT, the message format is as follows image 3 shown;

[0071] Step 4: After receiving the new_churning_key m...

Embodiment 2

[0073] ONU and OLT use the same algorithm to generate N churning keys using m seed keys. The method for generating N keys may be through shift or bit operation, but is not limited to this method. If the number m of seed keys is less than the number N of churning keys, the ONU sends the seed key to the OLT through a new_churning_key message. The churning_key field in the new_churning_key message was originally 3 bytes, but here it is extended to 3×m bytes, so that only 33-3×(m-1) bytes remain in the Pad field. After receiving the new_churning_key, the OLT uses the same method as the ONU to use the m seed key carried in the new_churning_key to generate N seed keys, corresponding to each encrypted block.

[0074] Taking m equal to 4 and N equal to 8 as an example, combine Figure 6 Explain the corresponding steps:

[0075] as attached Figure 4 Shown:

[0076] Step 1: ONU generates 4 keys;

[0077] Step 2: Fill in the values ​​of the four keys into the churning_key0 to chur...

Embodiment 3

[0101] Due to the limitation of the message body, for example, only t keys can be transmitted, and the m seed keys can be transmitted in multiple times. If you pass t each time, you will pass (N-1) / t+1 times in total. The key index is the same every time. The OLT obtains N keys after receiving all the messages. The churning_key field in the new_churning_key message is originally 3 bytes, which can be extended to a maximum of 24 bytes (there is also a 12-byte Pad for other functions), so that the first (N-1) / t messages can be replaced by churning_key The Pad fields used are all occupied. After receiving it, the OLT takes out the key and directly corresponds to each encrypted block.

[0102] Taking N equal to 20 and m equal to 20 as an example, combine Figure 5 and 6 Explain the corresponding steps:

[0103] Step 1: ONU generates 20 keys;

[0104] Step 2: ONU fills the values ​​of 0-7 keys into the churning_key0 to churning_key7 fields of the new_churning_key message;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for improving the encryption / decryption speed of a passive optical network, which can accelerate an encryption treatment speed and improve encryption effects at the same time. The method comprises the following steps of: dividing cleartext data to be encrypted into N groups by an optimal line terminal (OLT), wherein N is more than 1; encrypting the N groups of data to be encrypted by using N different secrete keys; combining the encrypted N groups of data into a ciphertext stream for output after the encryption is completed, wherein the N different secrete keys are determined by a plurality of seed keys sent by an optical network unit (ONU) or the ONT.

Description

technical field [0001] The invention relates to the field of PON (Passive Optical Network, Passive Optical Network), in particular to a method and system for improving the encryption and decryption speed of the Passive Optical Network. Background technique [0002] EPON (Ethernet Passive Optical Network, Ethernet Passive Optical Network) is a new generation of broadband passive optical integrated access technology based on IEEE802.3-2005Section 5 and IEEE802.3av standards. The system usually consists of an OLT (Optical Line Terminal, Optical Line Terminal), ONU (Optical Network Unit, Optical Network Unit) or ONT (Optical Network Termination, Optical Network Terminal) on the user side, and ODN (Optical Distribution Network, Optical Distribution Network). ODN is composed of passive optical components such as single-mode optical fibers, optical splitters, and optical connectors, and provides optical transmission media for the physical connection between OLT and ONU. ODN is usu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q11/00H04L29/06H04L9/18
Inventor 李明生何苑凌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products