Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for achieving SSH protocol based on post-quantum key exchange

A quantum key and key exchange technology, applied in the field of systems that implement SSH protocol based on post-quantum key exchange, can solve the problems of being vulnerable to selected ciphertext attack, SQL injection, intrusion or illegal control by undetermined attackers

Active Publication Date: 2018-06-01
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, at this stage, SSH has also been exposed to many security loopholes, especially in the process of establishing a connection in the SSH protocol, it does not verify whether the two parties in the communication have been illegally invaded or controlled. Whether it is invaded or illegally controlled by the attacker provides an opportunity for the attacker to attack
Although the current SSH protocol has many advantages and has many users, it does have some loopholes and deficiencies, such as vulnerability to chosen ciphertext attacks, SQL injection, etc. Improving these existing problems has become a technical problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for achieving SSH protocol based on post-quantum key exchange
  • Method and system for achieving SSH protocol based on post-quantum key exchange
  • Method and system for achieving SSH protocol based on post-quantum key exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0129] This embodiment provides a method for implementing the SSH protocol based on post-quantum key exchange, which can effectively prevent the shared key generated by the communicating client and server from being breached by a quantum computer; trusted status.

[0130] The protocol structure of the SSH improvement scheme is the three-layer system architecture stipulated by the current SSH protocol. For the specific protocol architecture, refer to figure 1 . From bottom to top, SSH is the transport layer, user authentication, and connection establishment. The session establishment process includes version negotiation, algorithm negotiation, key negotiation, user authentication, and connection request.

[0131] At present, the process of remote login between the communication parties using the SSH protocol is as follows: figure 2 shown.

[0132] The first step is version negotiation: the client and the server send their protocol version number and software version number ...

Embodiment 2

[0288] This embodiment provides a system for implementing the SSH protocol based on post-quantum key exchange, which can effectively prevent the shared key generated by the communicating client and server from being breached by a quantum computer; on the other hand, it can also verify both the client and the server trusted status.

[0289] The system for implementing the SSH protocol based on post-quantum key exchange includes a key exchange module, and the key exchange module includes a first key unit, a second key unit, a first verification unit, and a second verification unit, wherein:

[0290] The first key unit is located in the server and is used to complete the following functions:

[0291] Randomly sample from the Gaussian distribution of the first parameter, and calculate the public-private key pair of the server;

[0292] After the first verification unit passes the identity authentication of the client, it calculates the temporary session public key of the server f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information, and particularly relates to a method and system for achieving SSH protocol based on post-quantum key exchange. The method comprises the steps of a client and a server respectively calculating a public and private key pair; calculating a temporary session public key of the client, and sending the client public key and the client temporarysession public key to the server; the server performing identity verification on the client; calculating a temporary session public key of the server; calculating a temporary session variable of theserver and a temporary session error eliminating variable, the server sharing secret key initial seeds; the server generating a final server sharing secret key of the conversation through the post-quantum algorithm; the client side verifying the identity of the server according to the public key of the server; the client passes the identity identification of the server, calculating the temporary session variables of the client and the initial seed of the shared secret key of the client; and the client side using a post-quantum algorithm to generate a final client shared secret key of the conversation. According to the method and the system, the attack of the quantum computer can be effectively resisted, and the safety of the network is ensured.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a method for realizing the SSH protocol based on the post-quantum key exchange and a system for realizing the SSH protocol based on the post-quantum key exchange. Background technique [0002] With the continuous development of computer networks, the scale of the network has also become larger and larger, and people's demand for remote login functions has also increased, such as configuration and management of remote servers. SSH (Secure Shell) is one of the most widely used remote login protocols at present. Compared with other protocols that provide remote login, SSH can provide various security services such as authentication of both communication parties, encrypted transmission of communication data, and integrity verification. . [0003] The SSH protocol standard specifies the layered architecture of SSH, such as figure 1 As shown in the SSH protocol archi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0838H04L9/085H04L9/0852H04L9/0869H04L9/32H04L63/06H04L63/083H04L67/08
Inventor 刘伟刘镝陶冶寇金锋王笑帝刘明辉
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products