Composite high security ip secret communication method with true random key change

A secure communication and true random technology, applied in key distribution, can solve the problems of implanting listening Trojans, easy access to IP subnets, security vulnerabilities of network equipment, etc., and achieve low cost and the effect of resisting attack threats

Active Publication Date: 2021-07-27
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing public Internet, there are always some security loopholes in various network devices, which are easy to be implanted by opponents through network attacks to monitor Trojan horses, and it is easy to obtain communication data between IP subnets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Composite high security ip secret communication method with true random key change
  • Composite high security ip secret communication method with true random key change

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In the composite high-security IP confidential communication method with truly random key changes proposed by the present invention, the IP encryption machine first uses the quantum true random data generated in real time and the key distribution protocol dynamically for each plaintext IP packet to be transmitted. The distributed keys are concatenated and hashed to form a format-hidden encryption key, and the entire message including the IP header is encrypted in full IP format to form a format-hidden data block; then the format-hidden data block is combined with the Quantum True random data is concatenated together to form an IP encrypted tunnel load data block, and then two randomized data blocks are formed by byte parity segmentation; finally, these two randomized data blocks are encrypted by the link transmission packet encryption algorithm Finally, the two block encrypted data blocks are repackaged into standard IPSec messages (that is, IP encrypted messages) respec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a composite high-security IP secret communication method with truly random key changes, including an IP encryption processing device and an IP decryption processing device, and the IP encryption processing device includes a sequentially connected quantum true random number generator module, a hash Operation module, all-IP format hidden encryption module and tunnel transmission parity segmentation module, the tunnel transmission parity segmentation module is respectively connected with two packet encryption tunnel encapsulation modules; the IP decryption processing device includes two tunnel decapsulation packet decryption modules, tunnel receiving Odd-even combination module, all-IP format hidden decryption module and hash operation module. The present invention can establish a high-security confidential communication IP network at a low cost on the public Internet, can resist the attack threats of various existing cryptographic analysis and deciphering technologies, and can very effectively resist the attacks of high-performance computers with powerful computing capabilities. Deciphering and analyzing attacks can be used in various confidential communications with high security requirements.

Description

technical field [0001] The invention relates to a composite high-safety IP secret communication method in which keys are truly randomly changed. Background technique [0002] At present, high-performance computing technologies such as quantum computing and neural network computing are developing rapidly, which will provide a way to accelerate computing for cryptanalysis and deciphering technology. The combination of high performance computing and cryptanalysis technology will pose a serious security challenge to the existing secure communication system. [0003] In the existing public Internet, there are always some security loopholes in various network devices, and it is easy for opponents to implant monitoring Trojans through network attacks, and it is easy to obtain communication data between IP subnets. Moreover, even if the IP subnets are directly connected based on a dedicated optical cable, the optical signal transmitted in the optical fiber is easy to be monitored, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0643H04L9/0869H04L63/0428
Inventor 李大双徐兵杰樊矾田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products