Message authentication method and system based on quantum key card

A message authentication and quantum key technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem of not being deciphered and not getting right and clear, to ensure security, reduce consumption, and reduce the consumption of data processing resources. Effect

Active Publication Date: 2018-06-15
RUBAN QUANTUM TECH CO LTD
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The key used in point-to-point communication on the user side is a classical algorithm based on mathematical complexity problems. T...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication method and system based on quantum key card
  • Message authentication method and system based on quantum key card
  • Message authentication method and system based on quantum key card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] In this embodiment, the client A1 and the client An belong to the same quantum network service station, which has a quantum service center A, which can be regarded as the message authentication between the client A1 and the client An in the local area network. When there is direct communication between two clients, the public key issuance method required for message authentication is as follows: figure 2 shown.

[0067] Message authentication specifically includes the following steps:

[0068] Step 1.1: Quantum network service station A receives the common key request from client A1 and performs message authentication

[0069] 1.1.1 Start of message authentication: Client A1 first establishes a communication connection with the matching quantum key card.

[0070] 1.1.2 User-side message authentication key generation: the quantum key card obtains the key K1 and key Q1 according to the stored key seed SS and the random number generated by the random number generator in...

Embodiment 2

[0103] Such as image 3 As shown, the difference between the message authentication system of this embodiment and that of Embodiment 1 is that a different common key seed generation method is adopted. In this embodiment, the source of the common key for the communication between client A1 and client An is to XOR and encrypt the two corresponding key seeds stored in quantum network service station A for A1 and An respectively, and send them to the client respectively A1 and An. The corresponding key seed may be the key seed used by the quantum network service station A to communicate with the client A1 and the client An, or two other key seeds may be used, and the former is used in this embodiment.

[0104] In this embodiment, message authentication includes the following steps:

[0105] Step 2.1: Quantum network service station A receives the common key request from client A1 and performs message authentication

[0106]2.1.1 Start of message authentication: Client A1 first ...

Embodiment 3

[0119] Such as Figure 4 As shown, the difference between the message authentication system of this embodiment and Embodiment 1 lies in the issuing method of the common key, including the following steps:

[0120] Step 3.1: Quantum network service station A receives the common key request from client A1 and performs message authentication

[0121] 3.1.1 Start of message authentication: Client A1 first establishes a communication connection with the matching quantum key card.

[0122] 3.1.2 Generation of session key request: the quantum key card uses a random number generator to generate a random number N1 as the unique identifier of this service, and appends the request information R of this session key to generate a session key Request M1.

[0123] 3.1.3 The user side sends a session key request and performs message authentication: the matching quantum key card of client A1 packs the session key request and sends it to quantum network service station A. Quantum network ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a message authentication method based on a quantum key card, and a message authentication method. The message authentication system comprises a quantum network service stationconfigured at a network side and two clients configured at a user side to participate the message authentication, each client is configured with a quantum key card, two clients directly or indirectlyacquire a common key seed through the quantum network service station at the network side when performing the message authentication; two clients respectively generate message authentication codes byusing the owned common key seed in the corresponding quantum key card, and correspondingly implements message authentication at the user side. When two clients perform the message authentication, thecommon key seed is acquired through the quantum network service station at the network side, the generation and the comparison authentication of the message authentication code are performed at the user side, the security of the data transmission is guaranteed, and the consumption on the data processing resource at the network side is lowered.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a message authentication system and method based on a quantum key card. Background technique [0002] Information security has been widely concerned by people since ancient times. Information has undoubtedly become an important strategic resource of the country. The security of the system is directly related to the success or failure of the country in many fields such as politics, economy, military, society and even foreign strategy. Nowadays, quantum secure communication technology has obvious advantages in data transmission security, and has gradually been put into practical use. Message authentication code is a verification mechanism used by both communication entities in cryptography and a tool to ensure the integrity of message data. The construction method was proposed by M.Bellare and completely depends on the Hash function, so it is also called the Hash fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/3242
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products