Supercharge Your Innovation With Domain-Expert AI Agents!

Implementation method of post-quantum key exchange protocol and application thereof

A technology of quantum key and implementation method, applied in key distribution, can solve problems such as slow exchange speed, and achieve the effect of reducing transmission bandwidth, computing time, and simplifying complexity

Active Publication Date: 2020-07-28
HUAZHONG UNIV OF SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an implementation method of a post-quantum key exchange protocol and its application, which is used to solve the technical problem of slow exchange speed in the implementation process of the existing post-quantum key exchange protocol because the exchange process is a single thread

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method of post-quantum key exchange protocol and application thereof
  • Implementation method of post-quantum key exchange protocol and application thereof
  • Implementation method of post-quantum key exchange protocol and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] An implementation method 100 of a post-quantum key exchange protocol, such as figure 1 shown, including:

[0040] Step 110, the client generates a public polynomial based on its Trivium module and based on generator polynomial Then send a data request signal to the server to receive the polynomial sent by the server And receive the data request signal sent by the server to send sent to the server for calculation public polynomial of Generated by the random number generated by the server using its Trivium module, where

[0041] Step 120, the client generates the key μ and the polynomial based on its Trivium module And based on another data request signal received from the server, the Sent to the server, for the server based on Generate the key μ and adjust its Trivium module state to synchronize with the current client Trivium module.

[0042] When executing this method for the first time, it is necessary to initialize the Trivium modules on the cli...

Embodiment 2

[0057] A client, including a processor for implementing the post-quantum key exchange protocol, configured to execute the method for implementing the post-quantum key exchange protocol as described in Embodiment 1 above. The relevant technical solutions are the same as those in Embodiment 1, and will not be repeated here.

Embodiment 3

[0059] A method for implementing a post-quantum key exchange protocol, comprising:

[0060] The server side generates a public polynomial based on its Trivium module and based on generator polynomial Then receive the data request signal sent by the client to send to the client And send a data request signal to the client to receive the client sent for calculation of Generated by the random number generated by the client using its Trivium module, where

[0061] The server side is based on Generate a polynomial m, and send another data request signal to the client to receive the polynomial corresponding to the key μ sent by the client Based on m and polynomial generate key μ;

[0062] The server side controls its Trivium module to continue working for a certain period of time, so that the state of its Trivium module is the same as that of the client.

[0063] When executing this method for the first time, it is necessary to initialize the Trivium modules on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security algorithm implementation, particularly relates to an implementation method of a post-quantum key exchange protocol and an application thereof, and provides a new public polynomial generation method, which simplifies a key exchange process, reduces the time required for key exchange, and reduces the bandwidth required for data transmissionfrom a server to a client, through a new data exchange scheme, specifically through handshake signals, calculation processes at the two ends are kept synchronous, and a server side and a client side are always in the same secret key exchange process. In addition, the client information is sent twice, so that the transmission bandwidth is further reduced. By designing the state synchronization mechanism of a client and a server, the Trivium modules at the two ends are ensured to be in the same state at the beginning of key exchange each time, the modules are prevented from being reinitialized,and the operation efficiency of the whole system is improved.

Description

technical field [0001] The invention belongs to the field of information security algorithm realization, and more specifically relates to a method for realizing a post-quantum key exchange protocol and its application. Background technique [0002] With the emergence of quantum computers, traditional encryption algorithms and key exchange schemes based on large integer decomposition and discrete logarithm problems are no longer safe and reliable. Key exchange technology based on lattice theory is a potential information in the post-quantum era. Solutions to security issues. "New Hope" is a key exchange protocol based on Ring Learning With Error (Ring-LWE). On January 30, 2019, the National Institute of Standards and Technology (NIST) announced that the NewHope protocol is one of the candidate algorithms for the second round of selection of public key encryption and key exchange algorithms in the post-quantum encryption project. , which is expected to become the standard fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0852H04L9/0869H04L9/0643H04L9/3093H04L9/0838H04L9/0819H04L9/0894
Inventor 刘冬生刘星杰张聪赵文定金子睿陆家昊
Owner HUAZHONG UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More