Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of ikev2 negotiation using quantum key

A quantum key and quantum technology, applied in the field of communication, can solve the problem that the network encryption method is not safe enough to crack, and achieve the effect of improving security

Active Publication Date: 2021-11-30
ANHUI WANTONG POSTS & TELECOMM CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] A method for using quantum keys in IKEv2 negotiation proposed by the present invention can solve the technical problem that existing network encryption methods are easily cracked and not safe enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of ikev2 negotiation using quantum key
  • A method of ikev2 negotiation using quantum key
  • A method of ikev2 negotiation using quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments.

[0051] Such as figure 1 As shown, the IKEv2 negotiation method described in this embodiment uses a quantum key, adopts the IKEv2 pre-shared key mode, and uses the quantum key to establish an IPESC tunnel. The main steps are as follows:

[0052] S100. The initiator and the responder use the quantum key distribution protocol QKD to generate a quantum key QK, and use QK to replace or combine the shared key g^ir generated by Diffie-Hellman key exchange;

[0053] S200. Use the quantum key ticket QKT to uniquely identify the quantum key QK generated this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for using quantum key in IKEv2 negotiation, which relates to the technical field of communication. It can solve the technical problem that the existing network encryption method is easy to be cracked and not safe enough. Including using the quantum key distribution protocol QKD to generate the quantum key QK, replacing or combining the shared key g^ir generated by Diffie‑Hellman key exchange with QK, and giving the specific steps of using the QK value to calculate the key material and HASH value , so that the generated IKE SA and IPSEC SA keys indirectly use the quantum key; the quantum key ticket QKT payload is added to the ISAKMP protocol to uniquely identify the QK key generated this time, and the QKT payload is used instead of or combined with Diffie‑Hellman encryption The KE load of the key exchange is used for quantum key exchange, and the specific exchange steps during IKEv2 negotiation are given. The present invention can combine the new quantum encryption technology, so that the traditional IPSEC technology can use the quantum key to generate IKE SA and CHILD SA in the IKEv2 negotiation phase, and the encryption of the negotiation phase and the encryption of the tunnel message are improved due to the use of the quantum key. security.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for using a quantum key in IKEv2 negotiation. Background technique [0002] IPSEC (Internet Protocol Security) is an open standard framework that ensures confidential and secure communication over an IP network by using encrypted security services. IKE (InternetKey Exchange) is a main protocol in the IPSEC architecture, and IPSEC exchanges and manages encryption keys used in VPNs through the IKE protocol. IKE has two versions, V1 and V2. IKEv1 is an earlier version. IKEv2 simplifies the SA negotiation process. The negotiation process is mainly completed through the initial exchange and the creation of child SA exchanges, and adds security features and scalability. IKEv2 initially uses two exchanges, namely IKE_SA_INIT exchange and IKE_AUTH exchange, to complete the negotiation of an IKE SA and a pair of IPSec SAs, and then implement the key update of the IKE SA ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 林晨
Owner ANHUI WANTONG POSTS & TELECOMM CO LTD