Handheld device encryption method and system based on quantum cryptography

A hand-held device and quantum cryptography technology, applied in key distribution, can solve problems such as attacks that cannot resist super computing power

Inactive Publication Date: 2015-07-15
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF9 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Known encryption schemes for handheld mobile devices use a public-key system to distribute session keys through public-private key pairs. However, the secu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handheld device encryption method and system based on quantum cryptography
  • Handheld device encryption method and system based on quantum cryptography
  • Handheld device encryption method and system based on quantum cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] see figure 1 , figure 2 , image 3 and Figure 4 , this hand-held device encryption method based on quantum cryptography comprises the following steps:

[0048] Quantum key storage: when the handheld device communicates, the handheld device that initiates the call is the calling terminal, and the called handheld device is the called terminal; the quantum key is stored in the handheld device through the key storage module;

[0049] The calling terminal initiates a call: the calling terminal initiates an encrypted communication request to the called terminal;

[0050] Called terminal key synchronization: After the called terminal confirms to accept the communication, the called terminal first sends a key synchronization request message to KMC through a short message; the key synchronization request message contains the phone number of the called terminal and the phone number of the calling terminal Phone number; KMC randomly generates a group of keys as the communica...

Embodiment 2

[0068] see figure 2 and Figure 4 , the handheld device encryption system based on quantum cryptography, including a handheld device and a quantum key management center; a wireless connection between the handheld device and the quantum key management center; the handheld device includes a radio frequency module, MCU, Beidou or GPS module, plus Decryption module, key module, microphone, touch screen and speaker; radio frequency module, Beidou or GPS module, encryption and decryption module, key module, microphone, touch screen and speaker are electrically connected to MCU; Realize the air interface function; the microphone is used for voice collection; the speaker is used for voice playback; the Beidou or GPS module is used to realize the functions of satellite positioning and timing; the encryption and decryption module: used to realize the data encryption and decryption process; the key module is used for quantum storage and distribution of keys;

[0069] The calling termi...

Embodiment 3

[0072] see Figure 5 , the encryption method for handheld devices based on quantum cryptography is characterized in that: there are n+1 quantum key distribution terminals QKD, including QKD0, QKD1, QKD2 to QKDn; there are n handheld device terminals TD, including TD1, TD2 to TDn TD and QKD correspond one-to-one, TD1 is connected with QKD1 through the key channel, TD2 is connected with QKD2 through the key channel, until TDn is connected with QKDn through the key channel; QKD0 distributes the quantum key through the quantum key distribution channel QL, and Generate the same point-to-point key pair between any two QKDx (x>=1) and QKDy (n>=y>x) points in QKD1 to QKDn; correspondingly, the handheld device terminal TDx passes through the key channel KLx Obtain the key from QKDx and store it in the storage space of the handheld device TDx; the terminal TDy of the handheld device obtains the key from QKDy through the key channel KLy and store it in the storage space of the handheld d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a handheld device encryption method based on the quantum cryptography. The method comprises steps as follows: quantum key storage, call making by a calling terminal, key synchronization at a called terminal, synchronization determination at the called terminal, call answering at the calling terminal, key synchronization at the calling terminal, synchronization determination at the calling terminal, cryptographic communication and key updating, wherein communication session keys Ksa used by the calling terminal and the called terminal have life cycles; after the communication session keys Ksa of the calling terminal and the called terminal reach the set states respectively in a communication process, the communication session keys Ksa are replaced with new the communication session keys Ksb, the communication session keys Ksb are injected into encryption and decryption modules of the calling terminal and the called terminal after replacement is succeeded, and the calling terminal and the called terminal adopt the communication session keys Ksb for cryptographic communication. The invention further discloses a handheld device encryption system based on the quantum cryptography. The method and the system have high safety, high independence, convenience in deployment, rapidness and simplicity.

Description

technical field [0001] The invention relates to an end-to-end quantum key synchronization method and system, in particular to a quantum cryptography-based handheld device encryption method and system. Background technique [0002] While mobile calls bring convenience, they also bring security risks, and there is a possibility that voice calls may be illegally intercepted. At present, the encryption method and device for handheld devices based on quantum cryptography do not exist yet. Known encryption schemes for handheld mobile devices use a public-key system to distribute session keys through public-private key pairs. However, the security of the public-key system depends on computational complexity and cannot resist attacks from super-computing capabilities. is an attack by a quantum computer. The one-time pad encryption method using quantum cryptography is theoretically proven to be unconditionally safe. Contents of the invention [0003] The technical purpose to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04W12/02H04W12/04H04W12/03
Inventor 苗春华尹凯刘梦婕王剑锋佘祥胜刘云赵义博
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products