High-security IP secure communication method

A confidential communication and security technology, applied to secure communication devices and key distribution, can solve the problems of inability to crack the confidential communication system, destroy the integrity of ciphertext information, and inability to determine the group key, so as to resist attack threats and reduce investment costs. Effect

Active Publication Date: 2019-07-12
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the true randomization segmentation mechanism not only "destroys" the integrity of the ciphertext information, but also completely eliminates any identifiable features in the input data of the block encryption algorithm, all existing cryptanalytic attack methods cannot be effective
Since the output of the de-randomization combination i...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security IP secure communication method
  • High-security IP secure communication method
  • High-security IP secure communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] (1) Technical framework of the new IP secure communication method

[0017] The core concept of the new high-security IP confidential communication method proposed by the present invention revolves around the true randomization and segmentation transmission technology of IP message content, and adopts three encryption mechanisms to provide transmission protection. For each plaintext IP message, three transmission protection mechanisms are respectively implemented: group encryption of all IP messages between IP encryption machines, true randomized segmentation and randomized XOR, and packet encryption of randomized segmented data blocks.

[0018] The present invention does not relate to the specific realization of dynamic key negotiation between IP encryption machines and IPSec message encapsulation between IP encryption machines.

[0019] 1. Realization architecture design of new high-security IP confidential communication method

[0020] In the new high-security IP con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security IP (Internet Protocol) secure communication method, which comprises an IP encryption processing device and an IP decryption processing device, and is characterized in that the IP encryption processing device comprises an all-IP message packet encryption module, a true randomization segmentation module, two exclusive-OR operation modules and two packet encryption and tunnel packaging modules; the IP decryption processing device comprises two tunnel unpackging and grouping decryption modules, two exclusive-OR operation modules, a detruding randomization combining module and an all-IP message grouping decryption module. According to the invention, three encryption protection mechanisms of full-IP message packet encryption, true randomization segmentation and IP tunnel packet encryption are adopted, so that an enemy difficultly obtains IP plaintext contents by monitoring communication data contents, analyzing and decoding. According to the method disclosed by the invention, a high-security secret communication IP network can be established on the public Internet at a lower investment cost, attack threats of various existing password analysis decoding means can be resisted, and decoding analysis attacks of the quantum computer can be resisted.

Description

technical field [0001] The invention relates to a high-safety IP secret communication method. Background technique [0002] At present, developed countries are actively developing quantum computers, and the era of quantum computing is no longer far away. Due to the dual characteristics of superposition and entanglement between qubits, the computing power of quantum computers can increase exponentially with the increase in the number of qubits. Quantum computing will pose a huge security threat to secure communications based on cryptographic algorithms. . The rapid development of artificial intelligence based on neural network learning provides a new exponentially accelerated calculation method for cryptanalysis and deciphering technology. The neural network computing model based on quantum chips will pose serious security challenges to existing secure communication systems. [0003] In the existing public Internet, there are always some security loopholes in various netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0618H04L9/0852H04L63/0428H04L63/1441
Inventor 李大双徐兵杰何远杭樊矾
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products