Key protection method and system for passive optical network
A passive optical network and key protection technology, applied in key distribution, can solve the security threats of PON system and other issues, and achieve the effect of efficient encryption process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0051] Example 1 Encryption of PLOAM messages
[0052] This embodiment illustrates a method and a system for transmitting key-related information by using an extended PLOAM message (that is, using an increased byte of the PLOAM message).
[0053] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The algorithm used to calculate the Key is stored at the and ONU; the format of the extended PLOAM message is shown in Table 1, Table 2 and Table 3. In Table 1, the key-related information, also referred to as the second key seed used to generate the encryption key, is located between the ONU-ID and the Message ID. In Table 2, the second key seed can also be located between Message ID and Data. In Table 3, the second key seed can also be located between Data and CRC.
[0054] Table 1 The first extended ...
example 2
[0069] This embodiment illustrates a method and system for transmitting key-related information by using a newly created PLOAM message.
[0070] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The same algorithm used to calculate the Key is stored at the ONU; the name of the newly created PLOAM message used to transmit key-related information is Ralative_information_Key, and the format is shown in Table 4. In the table, key-related information, also known as the second key seed used to generate the encryption key.
[0071] Table 4 Format of the Ralative_information_Key message
[0072]
[0073] When the PLOAM information sent by the OLT (ONU) to the ONU (OLT) needs to be encrypted, the OLT (ONU) locally generates a key-related information, which is the second key seed used to generate the ke...
example 3
[0083] This embodiment describes the method and system for transmitting key-related information by extending the bytes of the GEM frame header (that is, adding a field in the GEM frame header).
[0084] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The algorithm used to calculate the Key is stored at the and ONU; the format of the extended GEM frame header is shown in Table 5, and the GEM frame header is composed of five parts, which are respectively PLI (payload length indication), Port ID (port identification), PTI (Payload Type Indication), RIK (Key Related Information) and HEC (Frame Header Error Control). After the GEM frame header is Payload (payload). The RIK field in the GEM frame header is used to carry key-related information, and the above-mentioned key-related information is also ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 