Attack model library establishment method in quantum cryptographic protocol

An attack model and quantum cryptography technology, applied in key distribution, can solve problems such as information security threats, and achieve the effect of ensuring communication security

Inactive Publication Date: 2015-11-11
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The development of the network is becoming more and more complicated, and ensuring the security of the information network has become the core content of the national informatization strategy. In a specif

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack model library establishment method in quantum cryptographic protocol
  • Attack model library establishment method in quantum cryptographic protocol
  • Attack model library establishment method in quantum cryptographic protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0033] Such as figure 1 As shown, the method for establishing the attack model library in the quantum cryptography protocol includes the interception and retransmission attack model, the random replacement attack model, the general attack model, the Trojan horse attack model and the invisible photon attack model;

[0034] The interception and retransmission attack model is as follows: the sender sends the sequence A i Transmitted into the channel, the eavesdropper intercepts all of them and randomly selects the measurement base, measures each photon and records the result E i ; When all photons are measured, the eavesdropper gets a new sequence Ei' and sends it to the receiver, and the receiver gets the result B i . Such as figure 1 As ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack model library establishment method in a quantum cryptographic protocol. An attack model library comprises an interception retransmission attack model, a random replacement attack model, a general attack model, a Trojan Horse attack model and an invisible photon attack model. The interception retransmission attack model is as follows: a transmitter transmits a sequence Ai to an information channel; an eavesdropper completely intercepts sequence and randomly selects a measurement basis to measure each photon and record a result Ei; the eavesdropper obtains a new sequence Ei' while all photons are measured and transmits the sequence to a receiver, and the receiver obtains a result Bi. The model library established by the method comprises the interception retransmission attack model, the random replacement attack model, the general attack model, the Trojan Horse attack model and the invisible photon attack model. By accurately describing the process of the five attack manners, the method is suitable for the communication protocol with similar property and could effectively detect the wiretap to ensure the communication safety.

Description

technical field [0001] The invention relates to a method for establishing an attack model library in a quantum cryptography protocol. Background technique [0002] The development of the network is becoming more and more complicated, and ensuring the security of the information network has become the core content of the national informatization strategy. In a specific network environment, the threat of stealing secrets through special means is becoming increasingly serious. , eavesdroppers can steal information from the channel, which poses a threat to information security. The main purpose of eavesdropping is to obtain secret information transmitted between legitimate users, and the most important thing about quantum cryptography protocol is its security. There are many ways to attack the quantum communication process. A model checking method is proposed to model eavesdropping in quantum cryptography protocols. When the security properties of a protocol need to be verifie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 杨帆郝玉洁常佳玉
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products