End-to-end hand-held device encryption method based on quantum cryptography and system

A hand-held device and quantum cryptography technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as attacks that cannot resist super-powerful computing power

Inactive Publication Date: 2016-02-17
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF6 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Known encryption schemes for handheld mobile devices use a public-key system to distribute session keys through public-private key pairs. However, the secu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end hand-held device encryption method based on quantum cryptography and system
  • End-to-end hand-held device encryption method based on quantum cryptography and system
  • End-to-end hand-held device encryption method based on quantum cryptography and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] see figure 1 , figure 2 , image 3 with Figure 4 , this end-to-end handheld device encryption method based on quantum cryptography comprises the following steps:

[0049] Quantum key storage: when the handheld device communicates, the handheld device that initiates the call is the calling terminal, and the called handheld device is the called terminal; the quantum communication key is stored in the handheld device through the key storage module;

[0050] Initiate a call: When encrypted communication is required, the calling end initiates an encrypted communication request to the called end;

[0051] Quantum key synchronization: After receiving the encrypted communication request and confirming the answer, the called terminal sends a key synchronization request message to the calling terminal;

[0052] Synchronization confirmation: After receiving the key synchronization request message, the calling terminal reads the quantum communication key Ksa from its key pool...

Embodiment 2

[0064] see figure 2 with Figure 4 , the end-to-end handheld device encryption system based on quantum cryptography includes: radio frequency module, MCU, Beidou or GPS module, encryption and decryption module, key module, microphone, touch screen and speaker; radio frequency module, Beidou or GPS module, The encryption and decryption module, key module, microphone, touch screen and speaker are electrically connected to the MCU; the MCU realizes the air interface function through the handheld device; the microphone is used for voice collection; the speaker is used for voice playback; Beidou or GPS module is used to realize The function of satellite positioning and timing; encryption and decryption module: used to realize the encryption and decryption process of data; the key module is used for the storage and distribution of quantum communication keys; the MCU of the calling terminal uses the quantum communication through the encryption and decryption module of the calling te...

Embodiment 3

[0067] see Figure 5 , both the quantum key distribution terminal QKD1 and the quantum key distribution terminal QKD2 distribute the quantum key through the quantum key distribution channel QL, and generate point-to-point between the two quantum key distribution terminals QKD1 and quantum key distribution terminal QKD2 point of the same key pair. The handheld device TD1 obtains the key from the quantum key distribution terminal QKD1 through the key channel KL1 and stores it in the storage space of the handheld device terminal TD1, and the handheld device terminal TD2 obtains the key from the quantum key distribution terminal QKD2 through the key channel KL2 and stores it In the storage space of the handheld device terminal TD2; the key management center KMC manages key synchronization and update between the handheld device terminal TD1 and the handheld device terminal TD2 through the management channel SL1 and the management channel SL2. As a preferred solution, the specific ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an end-to-end hand-held device encryption method based on quantum cryptography and a system. The encryption method comprises following steps of storing quantum keys; initiating a call; synchronizing the quantum keys; performing synchronous confirmation; answering the call; and performing encryption communication. In the encryption communication, an MCU of a main calling end injects quantum communication keys Ksa into an encryption and decryption model; an MCU of a called end injects the quantum communication keys Ksa into the encryption and decryption model; the MCU of the called end using the quantum communication keys to encrypt the data; the encrypted data is sent out via a radio frequency module of the called end; a radio frequency module of the main calling end injects the received encrypted data into the encryption and decryption model for decryption; and after being decrypted, the data is played by a loudspeaker of the main calling end or displayed via a touch type display. The invention also discloses an end-to-end hand-held device encryption system based on quantum cryptography. The encryption method and system are highly safe, independent and easy, quick and simple to deploy.

Description

technical field [0001] The invention relates to an end-to-end quantum key synchronization method, in particular to an end-to-end handheld device encryption method and system based on quantum cryptography. Background technique [0002] While mobile calls bring convenience, they also bring security risks, and there is a possibility that voice calls may be illegally intercepted. The data transmission block diagram of the encryption and decryption of the handheld device is as follows: figure 1 shown. At present, an end-to-end handheld device encryption method and device based on quantum cryptography does not yet exist. Known encryption schemes for handheld mobile devices use a public-key system to distribute session keys through public-private key pairs. However, the security of the public-key system depends on computational complexity and cannot resist attacks from super-computing capabilities. is an attack by a quantum computer. The one-time pad encryption method using qua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 苗春华刘云赵义博尹凯刘梦婕王剑锋佘祥胜
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products