Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret communication method based on key fusion transformation

A communication method and key technology, applied in the field of secret communication technology, can solve the problems of concealment and unpredictability of eavesdropping behavior, difficulty in locating eavesdroppers, key exposure, waste of entropy resources, etc.

Active Publication Date: 2021-07-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the concealment and unpredictability of eavesdropping makes it difficult to locate the eavesdropper, so it is impossible to completely avoid the problem of key exposure
Generally, the key exposure problem can be expressed as a single attack or continuous leakage model, and the existing main countermeasure is to use fresh keys frequently to update keys with potential leakage problems, but this will waste a lot of precious entropy resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method based on key fusion transformation
  • Secret communication method based on key fusion transformation
  • Secret communication method based on key fusion transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to facilitate those skilled in the art to understand the technical content of the present invention, the content of the present invention will be further explained below in conjunction with the accompanying drawings.

[0022] The secret communication method and data transmission system based on key fusion transformation proposed by the present invention include: a source, a channel, and a sink. The source and the sink generate a series of shared keys based on one or more key generation mechanisms. sequence; the source uses the fusion transformation to process the key sequence, and then uses the output result as a temporary key to encrypt and encode the message, and sends the ciphertext to the sink; the sink also uses the result of the fusion transformation as a temporary key to encrypt the message Decode to get plaintext. Since the key fusion transformation protects the randomness of a single key, the probability of secrecy interruption can be significantly red...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret communication method based on key fusion transformation, which is applied in the field of communication. In view of the problem that the key is easily leaked in the existing security coding method, the method of the invention replaces the original key with the output of the key fusion transformation, Thereby greatly reducing the impact of a single key leak on the information security state; the data transmission system adopted in the present invention includes: a source, a channel, and a sink, and the source and the sink are based on a key generation mechanism, such as a physical layer key generation mechanism, to generate A series of shared key sequences; the source uses the fusion transformation to process the key sequence, and then uses the output result as a temporary key to encrypt and encode the message, and sends the ciphertext to the sink; the sink also uses the result of the fusion transformation as The temporary key decodes the message to obtain the plaintext; because the key fusion transformation protects the randomness of a single key, the probability of secrecy interruption can be significantly reduced.

Description

technical field [0001] The invention belongs to the communication field, in particular to a secret communication technology. Background technique [0002] In the current communication network, in order to prevent sensitive data from being leaked or eavesdropped during communication transmission, security coding methods such as public key encryption and symmetric encryption are usually used to encrypt data and then transmit in the channel. However, with the development of quantum computers , these traditional security coding methods are facing the danger of being cracked. Although post-quantum encryption technology and quantum cryptography have the potential to resist quantum computer attacks, there are challenges such as excessive computational overhead and delay, which make their general promotion difficult. The effectiveness of existing cryptographic methods, including public-key encryption systems, symmetric encryption, post-quantum encryption, and homomorphic encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00H04L29/06
CPCH04L9/002H04L9/0861H04L63/0428H04L63/0435
Inventor 李龙江马冰川
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products