Data authentication method based on HMAC-SM3 algorithm and quantum key distribution system

A technology of quantum key distribution and data authentication, which is applied in the field of quantum key distribution, can solve the problems of not being able to satisfy QKD terminal data authentication, not being able to verify data integrity, and having a high probability of CRC check value collision

Active Publication Date: 2019-01-25
QUANTUMCTEK
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using the CRC algorithm for verification, the collision probability of the CRC verification value is relatively high. Therefore, eavesdroppers can easily forge the interactive data to make the CRC verification pass, and cannot perform a very good data integrity verification function.
After experimental verification, using randomly generated data to calculate the CRC check value and statistics, it was found that 18.2 million data, the number of conflicts has reached 38638, which cannot meet the requirements of QKD terminal data authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authentication method based on HMAC-SM3 algorithm and quantum key distribution system
  • Data authentication method based on HMAC-SM3 algorithm and quantum key distribution system
  • Data authentication method based on HMAC-SM3 algorithm and quantum key distribution system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] see image 3 , is a schematic flowchart of a data authentication method based on the HMAC-SM3 algorithm provided in the embodiment of the present application. The data authentication method is applied to a QKD system, and the QKD system includes a first QKD terminal and a second QKD terminal communicating through a classical network. Two QKD terminals, wherein the first QKD terminal is figure 1 Alice shown, the second QKD terminal is figure 1 Shown by Bob.

[0059] Since the first QKD terminal and the second QKD terminal respectively correspond to a quantum key management terminal, they can pre-allocate three different key data for the corresponding QKD terminal, which are the first key, the second key and the third secret key respectively. key.

[0060] The data authentication method includes the following steps:

[0061] S301: The first QKD terminal uses the first key to perform HMAC-SM3 operation on the first data to be authenticated to obtain a first hash value;...

Embodiment 2

[0078] see Figure 4 , is a schematic flowchart of another data authentication method based on the HMAC-SM3 algorithm provided by the embodiment of the present application. The data authentication method is applied to a QKD system, and the QKD system includes a first QKD terminal communicating through a classical network and The second QKD terminal, wherein the first QKD terminal is figure 1 Alice shown, the second QKD terminal is figure 1 Shown by Bob.

[0079] Since the first QKD terminal and the second QKD terminal respectively correspond to a quantum key management terminal, they can pre-allocate two different key data for the corresponding QKD terminal, namely the fourth key and the fifth key.

[0080] The data authentication method includes the following steps:

[0081] S401: The first QKD terminal uses the fourth key to perform HMAC-SM3 operation on the first data to be authenticated to obtain a third hash value; uses the fifth key to perform HMAC-SM3 operation on th...

Embodiment approach

[0134] In a possible implementation manner, specifically, within the same clock cycle, the FPGA may be used to perform parallel processing on the intermediate variable assignment operation or the word register assignment operation.

[0135] Specifically, in each round of iterative compression operation, after the intermediate variable assignment operation is completed, the operation result needs to be put into the register, so as to realize the word register assignment operation based on the operation result in the register, however, the data into the register A certain amount of time will be spent in the process, resulting in that the intermediate variable assignment operation and the word register assignment operation of the same round of iterative compression operation cannot be completed within the same clock cycle. Therefore, the intermediate variable assignment operation can be completed in parallel with one clock cycle of the FPGA, and the word register assignment operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a data authentication method based on a HMAC-SM3 algorithm and a quantum key distribution system. For two quantum key distribution QKD terminals communicating througha classic network, the two QKD terminals use the same key and adopt HMAC-SM3 algorithm The to perform hashing operation on the terminal interaction data in the same time period to obtain a hash valuerespectively, wherein, the terminal interaction data comprises data sent by two QKD terminals to opposite terminals respectively,. If the interactive data of the terminal is not tampered with while passing through the classic network, the hash values obtained by the two QKD terminals from the peers are the same as the hash values calculated by the two QKD terminals themselves. The hash value obtained by the HMAC-SM3 algorithm has higher security and is not easy to be cracked in the transmission process, which improves the accuracy of data integrity authentication.

Description

technical field [0001] The present application relates to the technical field of quantum key distribution, in particular to a data authentication method based on the HMAC-SM3 algorithm and a quantum key distribution system. Background technique [0002] The fundamental difference between Quantum Key Distribution (QKD) and the classical key system is that it uses different quantum states of photons as the carrier of the key, and the basic principles of quantum mechanics guarantee that the process cannot be eavesdropped and cannot Decipherability, thus providing a more secure key system. [0003] In the specific implementation of the QKD system, to ensure its security, various possible attacks need to be considered. One possible attack is a man-in-the-middle attack. Specifically, when the eavesdropper Eve has the entire device that can complete the QKD protocol, for legal The two parties in the communication, namely the QKD terminal Alice and Bob, the eavesdropper Eve can int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0852
Inventor 程节汤艳琳蒋连军
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products