Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-quantum computing IKE system based on alliance chain and negotiation communication method

A technology of quantum computing and communication methods, applied in the field of consortium chain, it can solve the problems of troublesome sharing process, negotiated key leakage, denial of service attacks, etc., to achieve high anti-quantum security, safe transmission process, and reduce equipment burden.

Pending Publication Date: 2020-05-19
南京如般量子科技有限公司 +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The current IKE negotiation key process may be cracked under the calculation of a quantum computer, which will lead to the leakage of the negotiation key
[0006] 2. The current DH negotiation method based on the asymmetric key pool needs to share the public key of the negotiating parties with the other party in advance. The sharing process is cumbersome and requires manual operation.
[0007] 3. Currently, replacing the IKE key negotiation process with the quantum key issuance process requires relatively expensive quantum key issuance equipment, and the quantum key issuance process requires unified scheduling by the key management server, which is vulnerable to denial of service attack causes paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing IKE system based on alliance chain and negotiation communication method
  • Anti-quantum computing IKE system based on alliance chain and negotiation communication method
  • Anti-quantum computing IKE system based on alliance chain and negotiation communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The system structure of the present invention is as figure 1 As shown, the alliance chain is composed of a blockchain server and a blockchain client. Each member is equipped with a key card, and the blockchain client is the two parties that need to use IKE to communicate.

[0048] In the present invention, the session key K of both communication parties is stored and generated in a distributed manner through secret sharing, and n Endorsers among them form a distributed key generation service based on ID cryptography. The generation principle is as follows:

[0049] Randomly select n different non-zero elements x1, x2,...,xn from the finite field GF(q) of prime order q, and distribute them to participants Pi(i=1,2,...,n). Take the session key K as the shared secret information, select t-1 elements a1, a2,..., a(t-1) from GF(q), and construct a polynomial Then there is Ki=f(xi)(1≤i≤n). (xi, Ki) as the shadow secret of participant Pi.

[0050] K can be obtained by obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-quantum computing IKE system based on an alliance chain and a negotiation communication method. The alliance chain is composed of a block chain server and a client. Theserver and the client side are provided with independent secret key cards; a private key and a public key pool are stored in the key cards; identity information of all alliance chain servers and clients is stored in the server public key pool. The client public key pool stores identity information of the client public key pool and identity information of all servers. The method has the advantagesthat quantum-resistant calculation in the communication process is achieved through the secret key cards, ID hiding, offset, negotiation communication and the like, and the communication safety is greatly improved.

Description

technical field [0001] The invention relates to the field of consortium chains, in particular to a consortium chain-based anti-quantum computing IKE system and a negotiation communication method. Background technique [0002] The Internet Key Exchange Protocol (IKE) is composed of the Internet Security Association and Key Management Protocol (ISAKMP) and two key exchange protocols. The IKE protocol is used to exchange and manage encryption keys used in VPNs. It solves the problem of securely establishing or updating shared keys in an insecure network environment. IKE is a very general protocol. It can not only negotiate security associations for IPsec, but also negotiate security parameters for any protocol that requires confidentiality, such as SNMPv3, RIPv2, and OSPFv2. But so far, it still has security flaws. [0003] As most people understand, quantum computers have great potential for code-breaking. Today's mainstream asymmetric (public key) encryption algorithms, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0825H04L9/0838H04L9/0877
Inventor 富尧钟一民汪仲祥
Owner 南京如般量子科技有限公司