A chaotic secure key distribution method and system based on post-processing

A security key and distribution system technology, applied in the field of secure communication systems, can solve problems such as limiting the generation rate of synchronous random numbers, and achieve the effects of increasing the difficulty of eavesdropping, simplifying the algorithm, and improving the output rate

Active Publication Date: 2018-12-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In secure key distribution, in order to obtain synchronous random numbers, existing schemes use single-bit sampling in the process of analog-to-digital conversion, and must ensure the private synchronization of physical random sources to prevent the leakage of physical random sources. This limits the rate at which synchronous random numbers are generated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A chaotic secure key distribution method and system based on post-processing
  • A chaotic secure key distribution method and system based on post-processing
  • A chaotic secure key distribution method and system based on post-processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] The present invention is further described below.

[0050] DSL works around 1550nm, and the frequency deviation from SL1 / 2 is 10GHz. The threshold current of both DSL and SLs is I th =14.7mA, the working current is 2I th and 1.5I th , the feedback time and strength of DSL are 3ns and 10ns respectively -1 , the delay of DSL injection to SLs is 0ns (assumed), and the feedback time and strength of SL1 / 2 itself are 2ns and 5ns respectively -1 . Both the sender and the receiver sample the timing signals output by SL1 and SL2 at a sampling frequency of 2GHz.

[0051] image 3 is the initial chaotic laser signal generated by DSL under the action of external cavity feedback.

[0052] Figure 4 is the injection intensity k in =40ns -1 When , the chaotic laser signal generated by SL1, Figure 5is the injection intensity k in =40ns -1 , the chaotic laser signal generated by SL2 can be seen from the figure that the output timing signals of SL1 and SL2 have the same dyn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a chaotic security key distribution scheme based on post-processing. The scheme includes synchronous true random number module and post-processing module. In the present invention, both parties of the communication independently change the injection intensity of the driving signal by using an optical attenuator controlled by a random control parameter generator. Only when the injection intensities of both parties of the communication are the same, the response lasers of both parties of the communication can achieve good synchronization and produce synchronous true randomnumber. Then, the synchronized true random number is used as the seed key of the staggered stop algorithm in the post-processing module, and the generation rate of the key is improved through multiple calls. After testing, the final key can pass 15 NIST tests.

Description

technical field [0001] The invention relates to the fields of chaos, semiconductor lasers, key distribution and the like, and is suitable for point-to-point and point-to-multipoint secure communication systems. technical background [0002] In recent years, with the rapid development of communication technology, great changes have taken place in people's lives. Communication has made people's lives more convenient and faster, but the hidden dangers of information that follow have become more and more serious. Therefore, confidential communication is also more and more people's attention. Nowadays, secure communication has become an important research part of network communication. The security of a secure communication system mainly depends on the keys used by both parties in the communication and the possibility of the keys being stolen by a third party during the key distribution process. Therefore, secure key distribution is particularly important. [0003] For the key...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/001H04L9/0869
Inventor 江宁赵晓燕王慧邱昆
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products