Negotiation system and negotiation method based on quantum truly random number negotiation secret key

A key negotiation and true random number technology, applied in key distribution, can solve the problems of wireless application and WAN remote link key distribution, storage capacity limitation of key groups, and key cracking, etc. Channel eavesdropping attack channel, high security, the effect of improving security

Active Publication Date: 2017-05-03
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the quantum key distribution (QKD) method based on physical security characteristics such as uncertainty and non-cloning has absolute security in theory, it cannot solve the problem of key distribution for wireless applications and remote links in wide area networks.
[0005] In addition, although the method of artificial key distribution can also prevent the key information from being attacked by channel theft, the key is basically fixed and has little ability to change dynamically. The flexibility is very poor, and the preset The number of key groups is limited by storage capacity
Moreover, if the cryptographic system uses a fixed key with a limited number of groups for a long time, there is also a risk of the key being cracked.
In addition, there is a high risk of artificial leakage during the frequent replacement of artificial keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Negotiation system and negotiation method based on quantum truly random number negotiation secret key
  • Negotiation system and negotiation method based on quantum truly random number negotiation secret key
  • Negotiation system and negotiation method based on quantum truly random number negotiation secret key

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0030] Such as figure 1 As shown, a key agreement system based on quantum true random number agreement, each end of the link includes a controlled pseudo-random number sequence generator and a quantum true random number sequence generator respectively connected to the key agreement control module and a hash operation module; the quantum true random number sequence generator produces a quantum true random number sequence code stream, and provides a true random number data block for the key agreement process; the controlled pseudo-random number sequence generator generates a pseudo-random number The sequence code stream provides the required pseudo-random number sequence data blocks for the key agreement process; the key agreement control module implements the key agreement protocol, that is, the negotiation process of the shared key at both ends of the link.

specific Embodiment 2

[0032] On the basis of the specific embodiment 1, a digital signature computing module is also included to provide digital signature computing functions.

specific Embodiment 3

[0034] On the basis of specific embodiment 1 or 2, the quantum true random number sequence generator is a true random number sequence generator based on optical quantum noise, and generates a quantum true random number sequence code stream based on the true random characteristic of optical quantum noise.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a negotiation system and a negotiation method based on a quantum truly random number negotiation secret key. Based on a controlled pseudo random number sequence generator and a quantum truly random number sequence generator at both ends of a link, two groups of quantum truly random number sequences are exchanged mutually by a negotiation protocol; after carrying out hash value operation, each end of the link compares the quantum truly random number sequence exchanged from the opposite end with the group of quantum truly random number sequence of the local end, which is used for exchange, to acquire position marking information with the same bit value; and one group of pseudo random number sequence is read, according to the position marking information, taking out bit values of corresponding positions one by one to form an original material bit string of the secret key, and by hash operation, a shared secret key is obtained. Compared with the prior art, a channel-eavesdropping attack channel of an opponent can be completely eliminated, and in the secret key negotiating process, any information related to the original material of the secret key is not transferred, so that the opponent cannot acquire any information related to the generated shared secret key on the basis of a channel eavesdropping or decoding means.

Description

technical field [0001] The invention relates to a negotiation key negotiation system and method based on quantum true random numbers, in particular to a key negotiation system and method based on quantum true random numbers for insecure wired and wireless network environments. Background technique [0002] Key sharing is the key to secure communication. The secure communication between two legal users is based on a secret key that only the two parties know. How to share a set of keys safely and in real time between the two parties is the key to designing a cryptographic system. Problems that must be resolved. [0003] Classical cryptography bases the security of key distribution on mathematical problems and the complexity of cracking calculations. The key information transmitted interactively during the key agreement process is protected by a high-strength encryption algorithm, but this does not guarantee its absolute security. The reason is that with the continuous enhance...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 李大双徐兵杰樊矾何远杭
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products