Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of Enhancing the Security of File Confidential Communication Based on Content True Randomization Segmentation

A secure communication and true random technology, applied in secure communication devices, electrical components, encryption devices with shift registers/memory, etc., can solve problems such as easy theft and unsafe public infrastructure, and achieve enhanced security and improved effect of difficulty

Active Publication Date: 2022-03-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the VPN private network for secure communication established based on the public Internet, the transmission and routing exchange of data packets is completely completed by untrusted and insecure public infrastructure, and it is easy for an adversary to steal files transmitted on the Internet between VPN confidential subnets The ciphertext information, and then adopt advanced high-performance computing technology to implement deciphering analysis, and it is possible to recover the plaintext data of the communication file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of Enhancing the Security of File Confidential Communication Based on Content True Randomization Segmentation
  • Method of Enhancing the Security of File Confidential Communication Based on Content True Randomization Segmentation
  • Method of Enhancing the Security of File Confidential Communication Based on Content True Randomization Segmentation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] (1) A technical framework for enhancing the security of file confidential communication with content randomization

[0015] The new method proposed by the present invention to enhance the security of file confidential communication based on true randomized content segmentation, its main technical idea is to perform randomized segmentation processing on the entire plaintext file content based on quantum true random numbers, and combine randomized segmentation with IP packet encryption Two encryption mechanisms are organically used together. The sequence-encrypted file content data is randomized byte-by-byte (respectively "and" and "not + and") with the quantum true random number obtained in real time, and the XOR operation of the true random data is used to cover up its Sparse features, forming two true randomized split dense state data files. The two true randomized split encrypted data files are respectively transmitted through the IP encryption of the VPN secure tunn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for enhancing the security of file confidential communication based on true randomization of content segmentation. In the secure VPN subnet protected by an IP cipher machine, a quantum true random number generator, a secure communication server and different types of security devices are included. A communication terminal, the secure communication terminal is connected with a secure communication server and an IP cipher machine respectively, the quantum true random number generator is connected with a secure communication server, and the secure communication server is connected with an IP cipher machine; the IP cipher machine is in Establish a VPN security tunnel between the local VPN and the destination VPN on the public Internet. The present invention adopts a secure communication mechanism with triple protection of file content data sequence encryption, true random segmentation and IP packet encryption, and has the ability to resist the opponent's ability to decipher and analyze attacks using the powerful computing power of high-performance computers, and can greatly enhance the public Internet. Security for confidential communication of files over the Internet.

Description

technical field [0001] The invention relates to a method for enhancing the security of file confidential communication based on content true randomized segmentation. Background technique [0002] At present, developed countries are competing to develop high-performance computing technologies, especially powerful new computing technologies such as quantum computing, neural network computing, and cloud computing. confidential communication poses a huge security threat. [0003] In the VPN private network for secure communication established based on the public Internet, the transmission and routing exchange of data packets is completely completed by untrusted and insecure public infrastructure, and it is easy for an adversary to steal files transmitted on the Internet between VPN confidential subnets The ciphertext information is deciphered and analyzed by advanced high-performance computing technology, and the plaintext data of the communication file may be restored. Conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/40H04L67/06H04L67/1074
CPCH04L63/0428H04L63/0272H04L67/06H04L67/108H04L9/065
Inventor 李大双徐兵杰樊矾田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP