Handshake method and device based on quantum terminal
A terminal, quantum technology, applied in the field of communication, can solve the problem of large load of quantum communication lines, and achieve the effect of improving handshake efficiency, reducing load, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] This embodiment provides a handshake method based on a quantum terminal, which can be used in a handshake device. Such as figure 2 As shown, the handshake method includes the following steps:
[0049] In step S11, the first communication terminal and the second communication terminal respectively obtain security keys from the quantum terminal, generate respective master keys and required key pairs, and store the master keys in the Session object.
[0050] When the first communication terminal and the second communication terminal are respectively connected to the corresponding first quantum terminal and the second quantum terminal, the first quantum terminal and the second quantum terminal perform key negotiation to generate a shared key, and the first communication The end obtains the security key (that is, the shared key) from the first quantum terminal, and the second communication end obtains the security key (that is, the shared key) from the second quantum termi...
Embodiment 2
[0057] This embodiment provides a handshake method based on a quantum terminal, which can be used in a handshake device. Wherein, the first communication terminal is connected with the first quantum terminal, and the second communication terminal is connected with the second quantum terminal. In this embodiment, the communication protocol between the first communication terminal and the second communication terminal is selected from but not limited to Transport Layer Security (TLS for short). Such as image 3 As shown, the handshake method includes the following steps:
[0058] In step S21, the first communication terminal and the second communication terminal respectively obtain security keys from the quantum terminal, generate respective master keys and required key pairs, and store the master keys in the Session object.
[0059] The first quantum terminal and the second quantum terminal respectively generate keys, and after key negotiation, form a shared key, which is use...
Embodiment 3
[0080] This embodiment provides a handshake method based on a quantum terminal, which can be used in a handshake device. In this embodiment, the communication protocol between the first communication terminal and the second communication terminal is selected from but not limited to Transport Layer Security (Transport Layer Security, TLS for short). Such as Figure 4 As shown, the method includes the following steps:
[0081] In step S31, the first communication terminal sends a first greeting message to the second communication terminal.
[0082] The first communication terminal sends the first greeting message (ClientHello) to the second communication terminal. The ClientHello message includes the communication protocol version supported by the first communication terminal itself, the encryption algorithm suite, and the random key used when generating the master key. Number, the use of this random number can add some random factors to generate the master key, so as to ensure ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


