Composite high-security IP secure communication method with true random change key

A secure communication and true random technology, applied in key distribution, can solve the problems of implanting listening Trojan horses, network equipment security holes, easy access to IP subnets, etc., and achieve the effect of resisting attack threats and effectively deciphering and analyzing attacks

Active Publication Date: 2019-07-30
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing public Internet, there are always some security loopholes in various network devices, which are easy to be implanted by opponents through network attacks to monitor Trojan horses, and it is easy to obtain communication data between IP subnets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Composite high-security IP secure communication method with true random change key
  • Composite high-security IP secure communication method with true random change key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In the composite high-security IP confidential communication method with truly random key changes proposed by the present invention, the IP encryption machine first uses the quantum true random data generated in real time and the key distribution protocol dynamically for each plaintext IP packet to be transmitted. The distributed keys are concatenated and hashed to form a format-hidden encryption key, and the entire message including the IP header is encrypted in full IP format to form a format-hidden data block; then the format-hidden data block is combined with the Quantum True random data is concatenated together to form an IP encrypted tunnel load data block, and then two randomized data blocks are formed by byte parity segmentation; finally, these two randomized data blocks are encrypted by the link transmission packet encryption algorithm Finally, the two block encrypted data blocks are repackaged into standard IPSec messages (that is, IP encrypted messages) respec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a composite high-security IP secure communication method with a true random change of a secret key. The system comprises an IP encryption processing device and an IP decryptionprocessing device. The IP encryption processing device comprises a quantum true random number generator module, a Hash operation module, a full-IP format hidden encryption module and a tunnel transmission parity segmentation module which are sequentially connected, and the tunnel transmission parity segmentation module is respectively connected with the two packet encryption tunnel packaging modules. The IP decryption processing device comprises two tunnel deblocking packet decryption modules, a tunnel receiving odd-even combining module, a full-IP format hiding decryption module and a Hash operation module. According to the method, a high-security secure communication IP network can be established on the public Internet at a low cost. Attack threats of various existing password analysisdecoding technologies can be resisted, decoding analysis attacks of a high-performance computer with high computing power can be effectively resisted, and the method can be used for various secure communication with high security requirements.

Description

technical field [0001] The invention relates to a composite high-safety IP secret communication method in which keys are truly randomly changed. Background technique [0002] At present, high-performance computing technologies such as quantum computing and neural network computing are developing rapidly, which will provide a way to accelerate computing for cryptanalysis and deciphering technology. The combination of high performance computing and cryptanalysis technology will pose a serious security challenge to the existing secure communication system. [0003] In the existing public Internet, there are always some security loopholes in various network devices, and it is easy for opponents to implant monitoring Trojans through network attacks, and it is easy to obtain communication data between IP subnets. Moreover, even if the IP subnets are directly connected based on a dedicated optical cable, the optical signal transmitted in the optical fiber is easy to be monitored, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0643H04L9/0869H04L63/0428
Inventor 李大双徐兵杰樊矾田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products