A Symmetric Key Distribution Method for Resisting Quantum Attacks

An anti-quantum attack, symmetric key technology, applied in the field of anti-quantum attack symmetric key distribution, can solve the problems of human error, lack of convenience, high price, etc. Effect

Active Publication Date: 2022-05-27
ZHEJIANG QUANTUM TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former can physically realize the security of symmetric key distribution, but requires special equipment and fiber channels, and the price is very expensive; the security of the latter depends on the transmission path of the medium containing the symmetric key, and the convenience is insufficient and artificial Mistakes are inevitable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Symmetric Key Distribution Method for Resisting Quantum Attacks
  • A Symmetric Key Distribution Method for Resisting Quantum Attacks
  • A Symmetric Key Distribution Method for Resisting Quantum Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0029] The symmetric key distribution mechanism proposed in this embodiment involves two kinds of keys. One is the key distributed in the system, which is used to encrypt the application data. One is the key used to encrypt the application key to ensure its transmission security, hereinafter referred to as the root key, its length is denoted as N, and N=256, M=128.

[0030] Before the key distribution process is started, the key service terminal must have shared at least one root key with the key management server, denoted as KR1, and then start the key distribution process:

[0031] (1) The key management server generates a random number of length N through the random number generator to update KR1, which is recorded as KR2; at the same time, the key management server generates k random numbers of length M through the random number generator, Used as an application key, denoted as KA, and k is greater than or equal to 1, the random number generator can be in the form of hardw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A symmetric key distribution method for anti-quantum attack, comprising: a, the key service terminal and the key management server share at least one root key; b, the key management server constructs a key distribution message and sends it to the key The service terminal; c. The key service terminal receives the key distribution message; d. The key service terminal generates a root key update message, and the key service terminal updates a new root key and sends it to the key management server; e. The key management server sends a root key update message, and then generates a root key update confirmation message; f. The key service terminal receives the encrypted root key update confirmation message, and the key distribution process is completed. Compared with the prior art, the present invention realizes the safe distribution of the symmetric key between the key management server and the key service terminal by optimizing the symmetric key distribution mechanism between the key management server and the key service terminal, which can achieve The security performance of anti-quantum attack, so as to realize the secure transmission of symmetric key.

Description

technical field [0001] The invention relates to the technical field of information transmission, in particular to a symmetric key distribution method for resisting quantum attacks. Background technique [0002] In terms of resisting quantum computer attacks, symmetric cryptographic mechanisms have natural advantages, because usually, the keys used in symmetric cryptographic mechanisms are randomly generated rather than generated by a specific algorithm. But it is precisely because of the randomness of symmetric keys that the distribution of symmetric keys must use other methods to ensure security. In fact, in the widely used secure communication based on asymmetric encryption mechanism, the asymmetric encryption mechanism is usually used to negotiate a symmetric key between two communicating parties, and the symmetric key is ultimately used to encrypt data for transmission. Since the security of symmetric key agreement is guaranteed using asymmetric cryptographic algorithms...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 郑韶辉董智超方分分
Owner ZHEJIANG QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products