Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for using quantum cryptography in safe IP communication

A technology of secure communication and quantum cryptography, which is applied in key distribution, can solve problems such as limited computing power in security and difficult security calculation index, and achieve unconditional security, resist high-performance computing attacks, and reduce complexity.

Active Publication Date: 2013-12-11
STATE GRID CORP OF CHINA +3
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Diffie-Hellman key exchange algorithm is a public key algorithm based on the "discrete logarithm problem". Its security stems from the fact that computing discrete logarithms over finite fields is more difficult than computing exponents, i.e., security is limited to current computing power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for using quantum cryptography in safe IP communication
  • Method and system for using quantum cryptography in safe IP communication
  • Method and system for using quantum cryptography in safe IP communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0048]The invention proposes a key exchange method for enhancing the security of IP communication, the security of which does not depend on the complexity of calculation and can resist high-performance computing attacks. This method uses the framework defined by ISAKMP to establish the Internet Quantum Key Exchange Protocol (IQKE for short). Security is possible. The realization of the method of the present invention needs to establish at least two physically separated channels: one is a classical channel connecting IPSec gateways, and the other is a quantum channel connecting the QKD system. In addition, QKD devices need to be authenticated through classic channels to prevent man-in-the-middle attacks. The quantum key generated by the QKD system is injected into the IPSec gateway through the local connection. The key can be used for identity authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for using the quantum cryptography in safe IP communication. The method is on the basis of a framework defined by an ISAKMP and comprises the following steps that quantum keys are distributed and a shared secret is established; IQKE SA negotiation is conducted; IPSec SA negotiation is conducted; session keys are generated. According to an IQKE protocol defined by the method and system, the framework defined by the ISAKMP is adopted and is independent of a standard IKE protocol, the problem existing in the compatibility of the standard IKE protocol and a QKD system can be avoided so that the safety of the quantum keys generated by the IPSec through the QKD system can be enhanced; in addition, according to the IQKE protocol, the quantum keys generated by the QKD system are adopted and serve as pre-shared keys, so that the adoption of the typical key exchange algorithm is not needed and the complexity of key negotiation is reduced. QIKE and QKD can be conducted in parallel; according to the QKD system with the low speed, the key storage technology is adopted; according to the QKD system with the high speed, OTP encryption can be achieved, so that the unconditional safety is achieved. The method and system are significant for improvement of the safety of IP communication.

Description

technical field [0001] The invention belongs to the field of secure communication, and in particular relates to a method and system for using quantum cryptography in IP secure communication. Background technique [0002] A virtual private network (VPN) is a network that is logically isolated from the public communication infrastructure network, and its effect is equivalent to establishing a virtual private line in a wide area network. VPN adopts three key technologies: encryption technology, user identity authentication technology and tunnel technology. Among them, VPN encryption technology is realized by IP security protocol (IPSec). IPSec is a set of protocols proposed by the Internet Engineering Task Force (IETF) of the Internet Standards Organization, and is the most common method for realizing secure data communication on the Internet. [0003] At present, the VPN technology based on the IPSec security protocol is very mature and has been applied in almost all walks o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 周静卢利锋雷煜卿陈希
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products