Unlock instant, AI-driven research and patent intelligence for your innovation.

Key generation method, device and storage medium

A key generation device and key generation technology, applied in the field of information security, can solve problems such as the reduction of data packet security, and achieve the effect of ensuring security

Active Publication Date: 2021-07-30
SUZHOU KEDA TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a key generation method, device and storage medium, which can solve the problem that when the quantum key generation terminal generates a quantum key at a slow speed, the same quantum key is used to encrypt different data packets, resulting in a decrease in the security of the data packets The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method, device and storage medium
  • Key generation method, device and storage medium
  • Key generation method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific implementation manners of the present application will be further described in detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present application, but not to limit the scope of the present application.

[0042] First, some terms involved in this application are introduced.

[0043] Hash operation (also known as hash function or hash algorithm): It is a function that changes an arbitrarily long input message string into a fixed-length output string, which is the hash value of the input message. A hash operation is a function that maps a key value to an index. For example: the hash function is h(x)=key%100 (that is, the remainder of dividing the key by 100), and this function is used to output the last two digits of the key. Hash algorithms include but are not limited to: SM3 or SHA-256, etc.

[0044] Symmetric encryption algorithm (or private key encryption): refers to the encryption algori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a key generation method, device and storage medium, belonging to the field of information security technology. The method includes: obtaining a quantum key generated by a quantum key generation terminal; dividing the quantum key into multiple first keys and Multiple second keys; use multiple first keys and multiple second keys to perform m rounds of derivation transformations to obtain multiple derivation keys; it can solve the problem that the quantum key generation terminal generates quantum keys at a slow speed , the use of the same quantum key to encrypt different data packets leads to the problem that the security of the data packet is reduced; since multiple derived keys can be generated based on the quantum key, the derived key can be used when the quantum key generation speed is slow Encrypt the data packet to ensure the security of the data packet.

Description

technical field [0001] The present application relates to a key generation method, device and storage medium, and belongs to the technical field of information security. Background technique [0002] Quantum communication refers to a new type of communication method that uses quantum entanglement effect to transmit information. In the process of quantum secure communication, the sender and receiver use the state of a single photon as the information carrier to establish a key. Since a single photon is indivisible, an eavesdropper cannot divide a single photon into two parts, let one part continue to transmit, and measure the state of the other part to obtain key information. [0003] In the process of quantum communication, multiple quantum key generation terminals conduct key negotiation in advance to obtain quantum keys; the application equipment connected to the quantum key generation terminals obtains the quantum key and uses the quantum key to process data encryption....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0861
Inventor 雷心田王彦杰顾志松
Owner SUZHOU KEDA TECH