A method for using a quantum key through IKEv2 negotiation

A quantum key and quantum technology, applied in the field of communication, can solve the problem of insufficient security of network encryption methods, and achieve the effect of improving security

Active Publication Date: 2019-05-03
ANHUI WANTONG POSTS & TELECOMM CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] A method for using quantum keys in IKEv2 negotiation proposed by the present invention can solve the technical problem that existing network encryption methods are easily cracked and not safe enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for using a quantum key through IKEv2 negotiation
  • A method for using a quantum key through IKEv2 negotiation
  • A method for using a quantum key through IKEv2 negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments.

[0051] Such as figure 1 As shown, the IKEv2 negotiation method described in this embodiment uses a quantum key, adopts the IKEv2 pre-shared key mode, and uses the quantum key to establish an IPESC tunnel. The main steps are as follows:

[0052] S100. The initiator and the responder use the quantum key distribution protocol QKD to generate a quantum key QK, and use QK to replace or combine the shared key g^ir generated by Diffie-Hellman key exchange;

[0053] S200. Use the quantum key ticket QKT to uniquely identify the quantum key QK generated this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for using a quantum key through IKEv2 negotiation, and relates to the technical field of communication. The technical problem that an existing network encryption method is easy to crack and is not safe enough can be solved. The method comprises the following steps: generating a quantum key QK by using a quantum key distribution protocol QKD, and replace the sharedkey g^ir generated by QK or combined with Diffie-Hellman key exchange giving a specific step of calculating a key material and a HASH value by using a QK value, so that generated IKE SA and IPSEC SA keys indirectly use a quantum key; A quantum key bill QKT load is newly added in an ISAKMP protocol, the QK key generated this time is uniquely identified, and the QKT load is used for replacing or combining with the KE load of Diffie-Hellman key exchange to carry out on the KE load of Hellman key exchange, and a specific exchange step during IKEv2 negotiation is given. According to the invention,a novel quantum encryption technology can be combined, so that the traditional IPSEC technology can generate IKE SA and CHILD SA by using a quantum key in an IKEv2 negotiation stage, and the encryption in the negotiation stage and the encryption of a tunnel message are improved in security due to the use of the quantum key.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for using a quantum key in IKEv2 negotiation. Background technique [0002] IPSEC (Internet Protocol Security) is an open standard framework that ensures confidential and secure communication over an IP network by using encrypted security services. IKE (InternetKey Exchange) is a main protocol in the IPSEC architecture, and IPSEC exchanges and manages encryption keys used in VPNs through the IKE protocol. IKE has two versions, V1 and V2. IKEv1 is an earlier version. IKEv2 simplifies the SA negotiation process. The negotiation process is mainly completed through the initial exchange and the creation of child SA exchanges, and adds security features and scalability. IKEv2 initially uses two exchanges, namely IKE_SA_INIT exchange and IKE_AUTH exchange, to complete the negotiation of an IKE SA and a pair of IPSec SAs, and then implement the key update of the IKE SA ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 林晨
Owner ANHUI WANTONG POSTS & TELECOMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products