An anti-quantum computing point-to-point message transmission method and system based on a symmetric key pool

A quantum computing and message transmission technology, applied in the field of secure communication systems to ensure accuracy and increase authentication codes

Active Publication Date: 2019-05-28
RUBAN QUANTUM TECH CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The DH key agreement algorithm is an asymmetric algorithm, so the entire encryption and decryption protocol will also be at risk of being cracked in the quantum era

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-quantum computing point-to-point message transmission method and system based on a symmetric key pool
  • An anti-quantum computing point-to-point message transmission method and system based on a symmetric key pool
  • An anti-quantum computing point-to-point message transmission method and system based on a symmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0053] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing point-to-point message transmission method and system based on a symmetric key pool, and the method comprises the steps: a key card is configured fora participant, and a group symmetric key pool is stored in the key card; The anti-quantum computing point-to-point message transmission method comprises the following steps: at a sender, communicating with a receiver to carry out key negotiation so as to obtain a shared key; Utilizing the first random number to generate a message encryption key and a message authentication key, utilizing the message authentication key to operate a message to be sent to generate a first authentication code, and utilizing the message encryption key to encrypt the message and the first authentication code to obtain a first ciphertext; Generating a key encryption key and a key authentication key by using the second random number in combination with the shared key, operating the first random number by using the key authentication key to generate a second authentication code, and encrypting the first random number and the second authentication code by using the key encryption key to obtain a second ciphertext; And sending the first ciphertext, the second ciphertext and the second random number to a receiver.

Description

technical field [0001] The invention relates to the technical field of secure message communication, in particular to a secure communication system for implementing encryption and decryption of information and message authentication based on a symmetric key pool. Background technique [0002] With the outbreak of the information revolution in the 21st century and the continuous development of science and technology, how to ensure the secure communication between clients is a current research hotspot. To achieve information security such as data encryption, transmission and privacy, whether it is an enterprise company that conducts daily business activities, or a government agency, bank, etc., there is an urgent need for this, especially in today's globalized economic era, to ensure the unconditional security of information , is one of the focuses of current public attention. It was first proposed that the transmission of communication information between clients is almost a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products