Unlock instant, AI-driven research and patent intelligence for your innovation.

Information theoretical security-based key agreement method in satellite network

A technology of information theory and security key, applied in the field of wireless network communication, which can solve the problem that cryptographic security cannot be proved.

Inactive Publication Date: 2013-04-10
UNIV OF SCI & TECH OF CHINA
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. The security of traditional cryptography cannot be proven in theory, which leads to the need to define additional security levels when discussing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information theoretical security-based key agreement method in satellite network
  • Information theoretical security-based key agreement method in satellite network
  • Information theoretical security-based key agreement method in satellite network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Because the satellite network has two important characteristics of large transmission delay and asymmetric communication channel. Therefore, in the specific implementation of the information theory security key agreement protocol, technologies that meet these two characteristics should be adopted, especially the larger transmission delay puts forward higher requirements for communication: the larger delay leads to the loss of communication link resources. is scarce, all secure service links must consume less. Due to the large transmission delay of the satellite network, the consumption of link resources is mainly measured by the number of communication rounds.

[0032] In the information theory security key agreement protocol, all communication is based on the basic assumption that the communication channel is two independent discrete memoryless channels, and the negotiation technology used in the protocol process is that the number of communication rounds of the commun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information theoretical security-based key agreement method in a satellite network, which can be used for key agreement in the satellite network and belongs to the technical field of wireless network communication. The agreement method comprises the following steps of: introducing information theoretical security into the satellite network and establishing an agreement protocol according to the characteristics of the satellite network; and in the agreement protocol, two legal communication parties are communicated with each other on a pair of independent discrete memoryless channels in the satellite network, priority extraction and information agreement are finished through a two-stage code communication scheme in which only two cycles of communication are used,privacy enhancement is finished through a universal hashing technique, and finally the two parties acquire an information theoretical security-based shared key. In the method, the characteristics of long delay and asymmetric channels in the satellite network are considered, so that the information theoretical security-based key agreement can be realized, and the shared key of the two communication parties in the satellite network can be unconditionally secure.

Description

technical field [0001] The present invention generally relates to the technical field of wireless network communication, and in particular relates to a key negotiation method based on information theory security in a satellite network. Background technique [0002] Traditional cryptography such as the encryption systems DES and AES using symmetric keys and the encryption system PKI using public key mechanisms are all based on complexity theory, using the viewpoint and method of complexity theory to study the establishment of cryptographic system models and the analysis of cryptographic security. and deciphering etc. The security standard established by traditional cryptography is the conditional security of cryptographic systems, that is, when discussing the security of traditional encryption systems, a certain timeliness and the computing power and resources of the enemy must always be taken into account. If the attacker uses the current The best known method to attack an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/06H04W12/0431
Inventor 刘斌俞能海金学学杨福荣
Owner UNIV OF SCI & TECH OF CHINA