High-security IP secure communication method based on true random stream XOR encryption

A secret communication, true random technology, applied in key distribution, can solve the problems of network equipment security loopholes, implanted monitoring Trojans, easy access to IP subnets, etc. Effect

Active Publication Date: 2019-09-06
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing public Internet, there are always some security loopholes in various network devices, which are easy to be implanted by opponents through network attacks to monitor Trojan horses, and it is easy to obtain communication data between IP subnets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security IP secure communication method based on true random stream XOR encryption
  • High-security IP secure communication method based on true random stream XOR encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention relates to the following special terms:

[0015] Encrypted state masking data block: After the entire plaintext IP message (including the IP header) is encrypted, a data block with the same length as the plaintext IP message is formed.

[0016] True randomized data block: A data block formed after performing an XOR encryption operation with a quantum true random number.

[0017] Ciphertext payload data: the data formed by dividing the true randomized data block into parity bytes, and encapsulating the standard IP protocol header to form an IP encrypted message.

[0018] The present invention proposes a high-safety secret communication method that jointly adopts a triple protection mechanism of group encryption with hidden IP message data format, true random stream XOR encryption and link transmission group encryption. This highly secure IP confidential communication method is based on true random stream XOR encryption technology, and uses all-IP f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security IP secure communication method based on true random stream XOR encryption. A system comprises an IP encryption processing device and an IP decryption processingdevice. The IP encryption processing device comprises a full-IP format hidden encryption module, a quantum random number generator module, a true random stream XOR encryption module and two packet encryption tunnel packaging modules. The IP decryption processing device comprises two tunnel deblocking packet decryption modules, a true random stream XOR decryption module and a full IP format hidingdecryption module. According to the method, a high-security secure communication IP network can be established on the public Internet at a low cost. Attacks and threats of various existing password analysis decoding technologies can be resisted, decoding analysis attacks of a quantum computer with strong computing power can be resisted very effectively, and the method can be used for party and government army confidential communication with extremely high safety requirements and commercial confidential communication with relatively high safety requirements.

Description

technical field [0001] The invention relates to a high-safety IP secret communication method based on true random stream XOR encryption. Background technique [0002] At present, the rapid development of quantum computing technology will provide a new way of exponentially accelerating computing for cryptanalysis and deciphering technology. The combination of quantum computing and cryptanalysis will pose serious security challenges to existing secure communication systems. [0003] In the existing public Internet, there are always some security loopholes in various network devices, and it is easy for opponents to implant monitoring Trojans through network attacks, and it is easy to obtain communication data between IP subnets. Moreover, even if the IP subnets are directly connected based on a dedicated optical cable, the optical signal transmitted in the optical fiber is easy to be monitored, and the IP packet data can be recovered through signal decoding. [0004] In the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0618H04L9/0852H04L9/0863H04L9/0869H04L63/0428
Inventor 李大双徐兵杰何远杭田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products