A chaotic security key distribution method and system based on post-processing

A security key and distribution system technology, which is applied in the field of secure communication systems, can solve problems such as limiting the rate of synchronous random number generation, and achieve the effects of increasing the difficulty of eavesdropping, ensuring security, and increasing the output rate

Active Publication Date: 2021-03-19
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In secure key distribution, in order to obtain synchronous random numbers, existing schemes use single-bit sampling in the process of analog-to-digital conversion, and must ensure the private synchronization of physical random sources to prevent the leakage of physical random sources. This limits the rate at which synchronous random numbers are generated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A chaotic security key distribution method and system based on post-processing
  • A chaotic security key distribution method and system based on post-processing
  • A chaotic security key distribution method and system based on post-processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] The present invention is further described below.

[0051] DSL works around 1550nm, and the frequency deviation from SL1 / 2 is 10GHz. The threshold current of both DSL and SLs is I th =14.7mA, the working current is 2I th and 1.5I th , the feedback time and strength of DSL are 3ns and 10ns respectively -1 , the delay of DSL injection to SLs is 0ns (assumed), and the feedback time and intensity of SL1 / 2 itself are 2ns and 5ns respectively -1 . Both the sender and the receiver sample the timing signals output by SL1 and SL2 at a sampling frequency of 2GHz.

[0052] image 3 is the initial chaotic laser signal generated by DSL under the action of external cavity feedback.

[0053] Figure 4 is the injection intensity k in =40ns -1 When , the chaotic laser signal generated by SL1, Figure 5 is the injection intensity k in =40ns -1, the chaotic laser signal generated by SL2 can be seen from the figure, the output timing signals of SL1 and SL2 have the same dynami...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a chaotic security key distribution scheme based on post-processing. The solution includes a synchronous true random number module and a post-processing module. In the present invention, the communication parties independently change the injection strength of the driving signal by using the optical attenuator controlled by the random control parameter generator. Only when the injection intensity of both parties in communication is the same, can the responding lasers of both parties in communication achieve good synchronization and generate synchronous true random numbers. Then the synchronized true random number is used as the seed key of the interleaved stop-and-go algorithm in the post-processing module, and the key generation rate is increased by calling it multiple times. After testing, the final key was able to pass 15 NIST tests.

Description

technical field [0001] The invention relates to the fields of chaos, semiconductor lasers, key distribution and the like, and is suitable for point-to-point and point-to-multipoint secure communication systems. [0002] technical background [0003] In recent years, with the rapid development of communication technology, great changes have taken place in people's lives. Communication has made people's lives more convenient and faster, but the hidden dangers of information that follow have become more and more serious. Therefore, confidential communication is also more and more people's attention. Nowadays, secure communication has become an important research part of network communication. The security of a secure communication system mainly depends on the keys used by the two communicating parties and the possibility of the keys being stolen by a third party during the key distribution process. Therefore, secure key distribution is particularly important. [0004] For the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/001H04L9/0869
Inventor 江宁赵晓燕王慧邱昆
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products