Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication method for network signaling between quantum secure network devices

A technology of secure network and network equipment, which is applied in the field of authentication of communication signaling between network communication terminal equipment, can solve the problem that encrypted data cannot be effectively constructed by itself, and achieve the effect of preventing replay attacks

Active Publication Date: 2015-12-09
SHANDONG INST OF QUANTUM SCI & TECH +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The one-time secret key mechanism of the quantum security network makes the key impossible to be cracked, and the encrypted data cannot be effectively constructed by itself. The only thing that the attacker can effectively use is the intercepted encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method for network signaling between quantum secure network devices
  • An authentication method for network signaling between quantum secure network devices
  • An authentication method for network signaling between quantum secure network devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] figure 2 Shown is the signaling authentication flow chart of the present invention, assuming that the communicating network devices are A and B respectively, it is agreed that the length of the key used for signaling authentication each time is L bits, and the value of L is much smaller than the signaling key storehouse The length of the data; the calculation algorithm of the key-related hash operation message authentication code is agreed to be T.

[0033]In the first step, a synchronized quantum key storehouse for signaling authentication of both parties is preset between network device 1 and network device 2, that is, a synchronous signaling key storehouse. The synchronous signaling keystore is divided into two parts, the encrypted signaling keystore and the decrypted signaling keystore; the encrypted signaling keystore is used for encryption of signaling authentication, and the decrypted signaling keystore is used for signaling authentication decryption. The encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method for network signaling between quantum safety network equipment. The authentication method includes the following steps: creating synchronous signaling key stores used for signaling authentication for both sides between the communicated network equipment, wherein the synchronous signaling key stores are divided into an encrypting signaling key store and a decrypting signaling key store, and setting a read indicator and a write indicator for each signaling key store; a sending end calculating related hash operation message authentication codes H of keys based on key data and a read indicator offset address of the encrypting signaling key store of the sending end, and sending a corresponding signaling data packet to a receiving end; the receiving end receiving the signaling data packet, acquiring a read indicator offset address in the signaling data packet, and judging whether the key data of the read indicator offset address of the decrypting signaling key store of the receiving end is already used or not; and if the key data is not used, calculating H and verifying the content of the signaling data packet. The authentication method for the network signaling between the quantum safety network equipment has the advantages that the authentication is fast, and the method has a certain preventive effect on distributed denial of service (DDoS) attacks, can achieve true one-time-one-key encrypting authentication and is absolutely safe theoretically.

Description

technical field [0001] The invention relates to a quantum security communication network, in particular to an authentication method for communication signaling between network communication terminal devices in the quantum security communication network. Background technique [0002] Security is an important evaluation index in communication network, and cryptography provides a strong guarantee for secure communication. Traditional cryptography is based on the computational complexity of mathematical algorithms and cannot guarantee the absolute security of keys. Quantum cryptography uses the basic principles of quantum mechanics to ensure the absolute security of passwords: any measurement of a quantum system will interfere with the system, and if a third party tries to eavesdrop on the password, it must be measured in a certain way, and its measurement will bring security. The perceived abnormality will be known to the communicating parties, which is one of the most importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L1/00
Inventor 黄勇原磊高光辉赵梅生赵勇
Owner SHANDONG INST OF QUANTUM SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products