Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An unconditional security authentication method based on lfsr hash

A technology of security authentication and hashing, which is applied in the field of information security, can solve the problems of violating security proof assumptions, low randomness of irreducible polynomials, and accelerated calculation speed, so as to reduce the probability of security failure and tighten the probability of security failure Effect

Active Publication Date: 2021-10-15
MATRICTIME DIGITAL TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, an irreducible polynomial of degree 128 has about 2 128 On the order of / 128, it is difficult to find them all and choose one at random
Therefore, the randomness of the irreducible polynomials selected in the actual use process is not high, and the security of the actual authentication is therefore limited.
[0005] Moreover, in the existing technology, such as the literature "Zhou Lei, Cheng Jie, Tang Shibiao. Research on high-speed QKD system authentication scheme based on Toeplitz matrix. Journal of Quantum Electronics, 2019, 36(3): 329-335" and "Cui Ke. Quantum key distribution real-time processing technology research. Anhui: University of Science and Technology of China, 2014 "In the authentication method based on LFSR hash used in ", in order to accelerate the calculation speed, the authentication process usually needs to be implemented by well-designed hardware, and the hardware structure During the design process, it is necessary to fix the irreducible polynomial in advance p ( x ) in the form of p ( x ) form is directly reflected in the general hardware structure, so p ( x ) is often known by the attacker, which directly violates the assumption of the security proof
Therefore, in the actual hardware environment, there are security loopholes in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An unconditional security authentication method based on lfsr hash
  • An unconditional security authentication method based on lfsr hash
  • An unconditional security authentication method based on lfsr hash

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Preferably, take n =128, select public p ( x ) =x 128 +x 29 +x 27 +x 2 + 1. It should be noted that this embodiment only demonstrates the first round of authentication, and each subsequent round of authentication follows the steps of the first round of authentication.

[0044] Step 1, the authentication parties share the initial state of 128 bits generated by random numbers s and a random bit string r . s and r The information is only shared by the authenticating parties. Preferably, this step is implemented using the BB84 protocol quantum key distribution, thereby ensuring that the attacker cannot obtain s and r any information.

[0045] Step 2, assuming that the sender Alice wants to send a string of 392-bit text, then she converts this message into a binary code, and adds a timestamp after the string of codes. Optionally, an 8-bit clock is used, that is, the clock period is 256, assuming that the time stamp at this time is (11111100). Timestamp th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an unconditional security authentication method based on LFSR hash, which belongs to the field of information security. Aiming at the security in the hardware implementation environment existing in the prior art, the present invention provides an unconditional security authentication method based on LFSR hash, by adding a time stamp behind the bit string of valid information, the valid information can be In the case of removing the hash value of zero, this scheme can be implemented in p ( x ) can still obtain unconditional security under the premise of being disclosed, and greatly reduce the probability of security failure of hash authentication.

Description

technical field [0001] The invention relates to the field of information security, and more specifically, relates to an unconditional security authentication method based on LFSR hash suitable for quantum security systems. Background technique [0002] Message authentication technology is a technology that can identify the sender and receiver of information. It is the first door to protect information security. Its task is to identify and verify the legitimacy, authenticity and integrity of messages. , secure communication and other fields all play an indispensable role. There are many traditional authentication schemes, such as based on RSA, discrete logarithm, elliptic curve, etc., but these schemes only have computational security and are facing the threat of quantum computing. Therefore, exploring an efficient, practical and unconditionally secure hash authentication method has become an urgent problem in the field of information security. [0003] Wegman and Carte fir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/46G06F21/602
Inventor 富尧李炳宏
Owner MATRICTIME DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products