Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing ssh protocol based on post-quantum key exchange

A quantum key and key exchange technology, which is applied in the system field based on the post-quantum key exchange to realize the SSH protocol, can solve the problems of indeterminate attacker intrusion or illegal control, SQL injection, vulnerability to chosen ciphertext attack, etc.

Active Publication Date: 2021-06-15
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In addition, at this stage, SSH has also been exposed to many security loopholes, especially in the process of establishing a connection in the SSH protocol, it does not verify whether the two parties in the communication have been illegally invaded or controlled. Whether it is invaded or illegally controlled by the attacker provides an opportunity for the attacker to attack
Although the current SSH protocol has many advantages and has many users, it does have some loopholes and deficiencies, such as vulnerability to chosen ciphertext attacks, SQL injection, etc. Improving these existing problems has become a technical problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing ssh protocol based on post-quantum key exchange
  • Method and system for implementing ssh protocol based on post-quantum key exchange
  • Method and system for implementing ssh protocol based on post-quantum key exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0129] This embodiment provides a method for implementing the SSH protocol based on post-quantum key exchange, which can effectively prevent the shared key generated by the communicating client and server from being breached by a quantum computer; trusted status.

[0130] The protocol structure of the SSH improvement scheme is the three-layer system architecture stipulated by the current SSH protocol. For the specific protocol architecture, refer to figure 1 . From bottom to top, SSH is the transport layer, user authentication, and connection establishment. The session establishment process includes version negotiation, algorithm negotiation, key negotiation, user authentication, and connection request.

[0131] At present, the process of remote login between the communication parties using the SSH protocol is as follows: figure 2 shown.

[0132] The first step is version negotiation: the client and the server send their protocol version number and software version number ...

Embodiment 2

[0288] This embodiment provides a system for implementing the SSH protocol based on post-quantum key exchange, which can effectively prevent the shared key generated by the communicating client and server from being breached by a quantum computer; on the other hand, it can also verify both the client and the server trusted status.

[0289] The system for implementing the SSH protocol based on post-quantum key exchange includes a key exchange module, and the key exchange module includes a first key unit, a second key unit, a first verification unit, and a second verification unit, wherein:

[0290] The first key unit is located in the server and is used to complete the following functions:

[0291] Randomly sample from the Gaussian distribution of the first parameter, and calculate the public-private key pair of the server;

[0292] After the first verification unit passes the identity authentication of the client, it calculates the temporary session public key of the server f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information technology, and in particular relates to a method and a system for realizing the SSH protocol based on post-quantum key exchange. The method includes: the client and the server calculate the public-private key pair respectively; calculate the temporary session public key of the client, and send the client public key and the client temporary session public key to the server; the server authenticates the client; the calculation server Temporary session public key; calculate the server’s temporary session variable and temporary session error correction variable, and the initial seed of the server’s shared key; the server uses the post-quantum algorithm to generate the final server’s shared key for this session; Authentication; the client calculates the client temporary session variable and the initial seed of the client shared key through the server's identity authentication; the client uses the post-quantum algorithm to generate the final client shared key for this session. The method and its system can effectively resist quantum computer attacks and ensure network security.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a method for realizing the SSH protocol based on the post-quantum key exchange and a system for realizing the SSH protocol based on the post-quantum key exchange. Background technique [0002] With the continuous development of computer networks, the scale of the network has also become larger and larger, and people's demand for remote login functions has also increased, such as configuration and management of remote servers. SSH (Secure Shell) is currently one of the most widely used remote login protocols. Compared with other protocols that provide remote login, SSH can provide multiple security services such as authentication of both communication parties, encrypted transmission of communication data, and integrity verification. [0003] The SSH protocol standard specifies the layered architecture of SSH, such as figure 1 As shown in the SSH protocol architec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0838H04L9/085H04L9/0852H04L9/0869H04L9/32H04L63/06H04L63/083H04L67/08
Inventor 刘伟刘镝陶冶寇金锋王笑帝刘明辉
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products