A high security ip secret communication method

A confidential communication and security technology, applied in secure communication devices and key distribution, can solve the problems of destroying the integrity of ciphertext information, inability to crack the confidential communication system, inability to determine the group key, etc.

Active Publication Date: 2022-03-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the true randomization segmentation mechanism not only "destroys" the integrity of the ciphertext information, but also completely eliminates any identifiable features in the input data of the block encryption algorithm, all existing cryptanalytic attack methods cannot be effective
Since the output of the de-randomization combination is block-encrypted "random" data without plaintext features, even if the adversary uses a quantum computer to perform exhaustive deciphering operations, it is impossible to determine which pair of block key combinations is correct. Therefore, even if the adversary completes the Exhaustive calculations cannot crack this secure communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A high security ip secret communication method
  • A high security ip secret communication method
  • A high security ip secret communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] (1) Technical framework of the new IP secure communication method

[0017] The core concept of the new high-security IP confidential communication method proposed by the present invention revolves around the true randomization and segmentation transmission technology of IP message content, and adopts three encryption mechanisms to provide transmission protection. For each plaintext IP message, three transmission protection mechanisms are respectively implemented: group encryption of all IP messages between IP encryption machines, true randomized segmentation and randomized XOR, and packet encryption of randomized segmented data blocks.

[0018] The present invention does not relate to the specific realization of dynamic key negotiation between IP encryption machines and IPSec message encapsulation between IP encryption machines.

[0019] 1. Realization architecture design of new high-security IP confidential communication method

[0020] In the new high-security IP con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security IP confidential communication method, which includes an IP encryption processing device and an IP decryption processing device. The IP encryption processing device includes a full IP packet encryption module, a true randomization segmentation module, and two XOR operation modules. and two packet encryption and tunnel encapsulation modules; the IP decryption processing device includes two tunnel uncapsulation and packet decryption modules, two XOR operation modules, detrue randomization combination module and all IP message packet decryption module. The present invention adopts three encryption protection mechanisms of all IP message group encryption, true randomized division and IP tunnel group encryption, so that it is difficult for an adversary to obtain IP plaintext content by analyzing and deciphering the monitoring communication data content. The method of the invention can establish a high-safety confidential communication IP network on the public Internet with a relatively low investment cost, can resist the attack threat of various existing cryptanalysis and deciphering means, and can resist the deciphering and analysis attack of the quantum computer.

Description

technical field [0001] The invention relates to a high-safety IP secret communication method. Background technique [0002] At present, developed countries are actively developing quantum computers, and the era of quantum computing is no longer far away. Due to the dual characteristics of superposition and entanglement between qubits, the computing power of quantum computers can increase exponentially with the increase in the number of qubits. Quantum computing will pose a huge security threat to secure communications based on cryptographic algorithms. . The rapid development of artificial intelligence based on neural network learning provides a new exponentially accelerated calculation method for cryptanalysis and deciphering technology. The neural network computing model based on quantum chips will pose serious security challenges to existing secure communication systems. [0003] In the existing public Internet, there are always some security loopholes in various netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/40
CPCH04L9/0618H04L9/0852H04L63/0428H04L63/1441
Inventor 李大双徐兵杰何远杭樊矾
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products