Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, data authentication method, and related device and system

A data encryption and data technology, which is applied in digital transmission systems, transmission systems, and key distribution, can solve problems such as inability to meet QKD terminal data authentication, inability to perform data integrity verification functions, and high collision probability of CRC check values. Reduce the risk of decryption, increase the pass rate, and improve the effect of randomness

Active Publication Date: 2019-01-25
QUANTUMCTEK
View PDF11 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using the CRC algorithm for verification, the collision probability of the CRC verification value is relatively high. Therefore, eavesdroppers can easily forge the interactive data to make the CRC verification pass, and cannot perform a very good data integrity verification function.
After experimental verification, using randomly generated data to calculate the CRC check value and statistics, it was found that 18.2 million data, the number of conflicts has reached 38638, which cannot meet the requirements of QKD terminal data authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, data authentication method, and related device and system
  • Data encryption method, data authentication method, and related device and system
  • Data encryption method, data authentication method, and related device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] see figure 2 , which is a schematic flowchart of a data encryption method provided in the embodiment of the present application, the method includes:

[0045] S201: Determine the number of bits N of the data to be encrypted.

[0046] S202: Determine the number of bits m of the data after encrypting the data to be encrypted, where m is smaller than N.

[0047] S203: Select an m-order primitive polynomial for realizing the shift operation of the linear feedback shift register LFSR, and obtain m-bit initial shift data.

[0048] It is necessary to select an m-order primitive polynomial in the LFSR function family according to the number of bits m of the encrypted data, for example, the 64th-order primitive polynomial x^64+x^7+x^6+x^5+x^4 +x^2+x+1, its purpose is to generate new bit data by using the m-order primitive polynomial according to the LFSR shift principle. It is understandable that a primitive polynomial with a higher order can be selected, so that the LFSR ps...

Embodiment 2

[0090] The first embodiment above introduces a method for encrypting the data to be encrypted, and the second embodiment introduces a method for authenticating the integrity of the data to be encrypted based on the encryption result.

[0091] see Figure 5 , is a schematic flowchart of a data authentication method provided in an embodiment of the present application, the data authentication method is applied to a QKD system, and the QKD system includes a first QKD terminal and a second QKD terminal communicating through a classical network. The data authentication method includes the following steps:

[0092] S501: The first QKD terminal encrypts the first data to be authenticated; wherein, the first data to be authenticated includes data A sent by the first QKD terminal to the second QKD terminal within a preset period of time, and The data B received by the first QKD terminal from the second QKD terminal within the preset time period.

[0093] Among them, the first QKD ter...

Embodiment 3

[0119] see Figure 6 , which is a schematic diagram of the composition of a data encryption device provided in the embodiment of the present application. The data encryption device 600 includes:

[0120] The number of bits determination unit 601 is configured to determine the number of bits N of the data to be encrypted, and determine the number of bits m of the data after encrypting the data to be encrypted, where m is less than N;

[0121] The shift parameter acquisition unit 602 is used to select the m-order primitive polynomial for realizing the shift operation of the linear feedback shift register LFSR, and obtain the initial shift data of m bits;

[0122] An encrypted data generation unit 603, configured to process at least two sub-matrices to be encrypted belonging to the matrix to be encrypted and at least two random sub-matrices belonging to the random matrix, so as to obtain The matrix data, the matrix data is the data after encrypting the data to be encrypted; wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method, a data authentication method and a related deviceand system. The method comprises the following steps: determining the bit number N of the data to beencrypted; determining a bit number m of the data to be encrypted after the data to be encrypted is encrypted; selecting the m-order primitive polynomial of LFSR shift operation and obtaining the initial shift data of m bits; processing at least two submatrices to be encrypted belonging to the matrix to be encrypted and at least two random submatrices belonging to the random matrix to obtain matrix data multiplied by the matrix to be encrypted and the random matrix; Wherein, the matrix to be encrypted is an N-row 1-column matrix composed of N bits of the data to be encrypted, and the random matrix is a Toeplitz matrix of m rows and N columns composed of m + N-11-bit data, m + N-1-bit data includes the initial shift data of m-bit and N-1 bit data which should be newly generated by N-1 shiftbased on m-th order primitive polynomial. The present application is capable of improving the accuracy of data integrity authentication.

Description

technical field [0001] The present application relates to the technical field of quantum key distribution, and in particular to a data encryption method, a data authentication method, and related equipment and systems. Background technique [0002] The fundamental difference between Quantum Key Distribution (QKD) and the classical key system is that it uses different quantum states of photons as the carrier of the key, and the basic principles of quantum mechanics guarantee that the process cannot be eavesdropped and cannot Decipherability, thus providing a more secure key system. [0003] In the specific implementation of the QKD system, to ensure its security, various possible attacks need to be considered. One possible attack is a man-in-the-middle attack. Specifically, when the eavesdropper Eve has the entire device that can complete the QKD protocol, for legal The two parties in the communication, namely the QKD terminal Alice and Bob, the eavesdropper Eve can intercep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0852H04L9/0869
Inventor 程节汤艳琳赵梅生
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products