Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption transmission method and a quantum encryption method

A technology of quantum encryption and encrypted transmission, which is applied in transmission systems, photon quantum communication, and key distribution, and can solve problems such as increased power consumption and increased risk of encrypted data cracking

Active Publication Date: 2019-05-24
SHENZHEN USC COMM
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide an encrypted transmission method and a quantum encryption method, aiming at solving the increased risk of encrypted data being cracked under the existing IPSEC (Internet Protocol Security) system. The problem of increased consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption transmission method and a quantum encryption method
  • Encryption transmission method and a quantum encryption method
  • Encryption transmission method and a quantum encryption method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0052] Such as figure 1 As shown, it is a schematic diagram of an encrypted transmission method provided by an embodiment of the present invention; see figure 1 , figure 1 Include the following steps:

[0053] S101. The first terminal sends an encryption start request to the second terminal.

[0054] It should be noted that, in this embodiment, the first terminal and the second terminal may be converted to each other under one condition.

[0055] S102. The second terminal receives the encryption start request, and returns encryption response information to the first terminal.

[0056] After receiving the encryption start request, the second terminal determines whether to agree to encrypted transmission with the first terminal, and then sends the encrypted response information to the first terminal. It can be understood that the returned encrypted corresponding information includes not only the second terminal's The confirmation information may also include some communicati...

no. 2 example

[0075] Such as figure 2 As shown, it is a quantum encryption method provided by the embodiment of the present invention. The quantum encryption method is applied in the process of quantum encryption transmission. The quantum encryption method includes: the first application layer of the first terminal obtains the first quantum from the key server The key information is sent to the first kernel, and the first quantum key information is configured to the first kernel through a preset encryption algorithm, and the first quantum key configuration information corresponding to the first kernel is updated; The key configuration information is returned to the first application layer and sent to the second application layer of the second terminal; the second application layer sends the corresponding first quantum key configuration information to the second kernel, and the corresponding The configuration information of the first quantum key is decrypted.

[0076] For ease of understan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an encryption transmission method and a quantum encryption method. In the encryption transmission method, a first terminal and a second terminal communicate with each other to determine an encryption transmission protocol; when the quantum key is adopted to encrypt a pure genus, the quantum key is respectively acquired from the key server for encryption transmission confirmation; Encryption verification between the first terminal and the second terminal is completed by sending quantity keys to the two terminals through the key server, so that the problem that mutual encryption verification between the two terminals is intercepted is avoided, and the security of encryption verification is improved; The quantum encryption method is applied to the encryption transmission method, the quantum encryption method adopts a quantum key to encrypt and decrypt in the encryption transmission process between a first terminal and a second terminal, and adoptsthe quantum key to encrypt and decrypt, so that the decoding process of a data packet is more difficult, and the security of encryption transmission is improved.

Description

technical field [0001] The invention relates to the technical field of communication, and more specifically, to an encrypted transmission method and a quantum encryption method. Background technique [0002] Under the existing IPSEC (Internet Protocol Security) system, during the link establishment process, the key used to encrypt data will be generated later, and the key period is the time set by the user (usually more than a few hours, if The setting time is short, which will lead to frequent key generation and increase the system burden), in view of the fact that the computer capacity is becoming more and more powerful, theoretically there is a risk that the traditional encryption key will be cracked. [0003] Quantum key: Utilizing the "quantum non-cloning theorem, quantum indivisibility" feature, the key encrypts information, which is currently the only known distribution method that cannot be eavesdropped or deciphered. Combined with traditional IPSEC, it not only uti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04B10/70
Inventor 黄晓鹏胡云刘松林
Owner SHENZHEN USC COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products