Secure Communication Method Based on Packet Vertical Random Split and Path Separation Transmission

A technology of secure communication and segmentation, which is applied in the transmission system, digital transmission system, data exchange through path configuration, etc., can solve the problem of being unable to resist quantum computing deciphering and analysis attacks, and achieve the goal of improving transmission security and low investment cost Effect

Active Publication Date: 2021-04-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Even if the multi-path transmission technology of horizontal random segmentation and fragmentation is used for encrypted packets, after the hostile party monitors all message fragments and recovers the complete encrypted packet and then the complete ciphertext data, it may not be able to fight against the powerful computing power. Deciphering Analytical Attacks on Quantum Computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Communication Method Based on Packet Vertical Random Split and Path Separation Transmission
  • Secure Communication Method Based on Packet Vertical Random Split and Path Separation Transmission
  • Secure Communication Method Based on Packet Vertical Random Split and Path Separation Transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] (1) Technical principle scheme

[0037] The core concept of the new high-security and confidential communication method proposed by the present invention is mainly based on the transmission control technology of group vertical random segmentation and path separation, and adopts triple security tunnel encapsulation and three-segment security tunnel relay. For each IP plaintext group, the encryption protection of the end-end security tunnel between the source-destination host, the longitudinal random segmentation of the encrypted IP message at the user end, and the communication encryption protection of the source-destination VPN security tunnel , path separation transmission and encryption protection of each safe relay tunnel, a total of five safe and confidential communication protection mechanisms. And through the vertical random partition and path separation transmission control mechanism, the security of the end-to-end key distribution protocol between user hosts is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a new type of high-security confidential communication method based on group longitudinal random division and path separation transmission, adopting the security mechanism of group longitudinal random division and separation path transmission control to prevent the adversary from obtaining the complete secret IP message through monitoring. In this paper, the real IP address of the original IP message is hidden through the shadow IP subnet mechanism and the encapsulation and transmission of the three-section secure relay tunnel, making it difficult for the adversary to guess the real communication user by monitoring the content of the communication data. The novel high-security and secret communication method designed by the present invention can establish a high-safety and secret communication VPN network on the public Internet at a relatively low investment cost, can defend against security threats from various monitoring means, and can effectively fight against The deciphering analysis attack of the quantum computer with the ability can be used not only as a secure VPN for confidential communication, but also as a secure VPN for commercial confidential communication with higher security requirements.

Description

technical field [0001] The invention relates to a secret communication method based on group longitudinal random subdivision and path separation transmission. Background technique [0002] At present, developed countries are actively researching and developing quantum computers, and it is expected that a truly large-scale quantum computer will appear within a few years. Due to the superposition and entanglement characteristics between qubits, the computing power of quantum computers can increase exponentially with the increase in the number of qubits. Quantum computing will have a huge impact on secure communication based on traditional networking modes and transmission methods. security threats. [0003] In the existing public Internet, there are always some security loopholes in various network devices, and it is easy for an opponent to implant a monitoring Trojan horse through network attacks, and it is easy to obtain communication data between VPN subnets. Moreover, ev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/46
CPCH04L12/4633H04L12/4641H04L63/0435H04L63/0478H04L63/0485H04L63/18H04L63/20
Inventor 李大双徐兵杰何远杭田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products