High security ip confidential communication method based on true random stream XOR encryption

A secure communication and true random technology, applied in key distribution, can solve the problems of implanting listening Trojans, easy access to IP subnets, security vulnerabilities of network equipment, etc., and achieve low cost and the effect of resisting attack threats

Active Publication Date: 2021-07-09
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing public Internet, there are always some security loopholes in various network devices, which are easy to be implanted by opponents through network attacks to monitor Trojan horses, and it is easy to obtain communication data between IP subnets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High security ip confidential communication method based on true random stream XOR encryption
  • High security ip confidential communication method based on true random stream XOR encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention relates to the following special terms:

[0015] Encrypted state masking data block: After the entire plaintext IP message (including the IP header) is encrypted, a data block with the same length as the plaintext IP message is formed.

[0016] True randomized data block: A data block formed after performing an XOR encryption operation with a quantum true random number.

[0017] Ciphertext payload data: the data formed by dividing the true randomized data block into parity bytes, and encapsulating the standard IP protocol header to form an IP encrypted message.

[0018] The present invention proposes a high-safety secret communication method that jointly adopts a triple protection mechanism of group encryption with hidden IP message data format, true random stream XOR encryption and link transmission group encryption. This highly secure IP confidential communication method is based on true random stream XOR encryption technology, and uses all-IP f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security IP secret communication method based on true random stream XOR encryption, which includes an IP encryption processing device and an IP decryption processing device, wherein: the IP encryption processing device includes an all-IP format hidden encryption module, a quantum random A number generator module, a true random flow XOR encryption module and two packet encryption tunnel encapsulation modules; the IP decryption processing device includes two tunnel decapsulation packet decryption modules, a true random flow XOR decryption module and full IP format hidden decryption module. The present invention can establish a high-security confidential communication IP network at a low cost on the public Internet, can resist the attack threats of various existing cryptanalysis and deciphering technologies, and can very effectively resist the deciphering of quantum computers with powerful computing capabilities Analyzing attacks can be used not only for party, government and military confidential communications with extremely high security requirements, but also for commercial confidential communications with high security requirements.

Description

technical field [0001] The invention relates to a high-safety IP secret communication method based on true random stream XOR encryption. Background technique [0002] At present, the rapid development of quantum computing technology will provide a new way of exponentially accelerating computing for cryptanalysis and deciphering technology. The combination of quantum computing and cryptanalysis will pose serious security challenges to existing secure communication systems. [0003] In the existing public Internet, there are always some security loopholes in various network devices, and it is easy for opponents to implant monitoring Trojans through network attacks, and it is easy to obtain communication data between IP subnets. Moreover, even if the IP subnets are directly connected based on a dedicated optical cable, the optical signal transmitted in the optical fiber is easy to be monitored, and the IP packet data can be recovered through signal decoding. [0004] In the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0618H04L9/0852H04L9/0863H04L9/0869H04L63/0428
Inventor 李大双徐兵杰何远杭田波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products