Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum-computing key negotiation method based on asymmetric key pools

A technology of key agreement and quantum computing, which is applied in the field of key exchange algorithms, can solve the problems that asymmetric key encryption algorithms are no longer safe and asymmetric keys are vulnerable

Inactive Publication Date: 2019-03-08
RUBAN QUANTUM TECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, with the development of quantum computers, the classical asymmetric key encryption algorithm will no longer be safe. Regardless of encryption and decryption or key exchange methods, quantum computers can obtain private keys through public key calculations. Therefore, the commonly used asymmetric keys will be Become Vulnerable in the Quantum Era

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum-computing key negotiation method based on asymmetric key pools
  • Anti-quantum-computing key negotiation method based on asymmetric key pools
  • Anti-quantum-computing key negotiation method based on asymmetric key pools

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] When the key card is recharging the key pool, the key management server will assign a group identity to the key card and give it an ID within the group. The key fob will be written into its own private key key pool and the public key key pools of other groups within the group. When the key management server establishes a group of an asymmetric key pool system, it will generate a corresponding number of private key key pools according to the number of members, and at the same time generate a public key key pool corresponding to the private key key pool one-to-one . The private key key pool is composed of true random numbers of a specified length. The public key key pool is composed of public key data, corresponding to the private key in the corresponding private key key pool.

[0035] The method of generating the public key is the calculation method in the DH key exchange algorithm. The key management server defines a large prime number p and a number g, and g is the ...

Embodiment 2

[0050] When the key card is recharging the key pool, the key management server will assign a group identity to the key card and give it an ID within the group. The key fob will be written into its own private key key pool and the public key key pools of other groups within the group. When the key management server establishes a group of an asymmetric key pool system, it will generate a corresponding number of private key key pools according to the number of members, and at the same time generate a public key key pool corresponding to the private key key pool one-to-one . The private key key pool is composed of true random numbers of a specified length. The public key key pool is composed of public key data, corresponding to the private key in the corresponding private key key pool.

[0051] The method of generating the public key is the calculation method in the ECDH key exchange algorithm. The key management server definition defines a prime number p > 3 and chooses two no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum-computing key negotiation method based on asymmetric key pools. The method includes a group. The group includes a plurality of use ends. The key pools are stored in quantum key cards configured for all the use ends, and include private key pools of the current parties and public key pools of the other members of the group. Equal negotiation keys are obtained through interaction of parameters of all the parties and the key pools of the current parties, and then key negotiation of every two terminals is realized. The quantum key card are independent hardware isolation equipment, greatly reduces possibility of stealing the keys by malicious software or malicious operations, and also cannot be obtained and cracked by quantum computers; and in the group,an asymmetric key exchange manner is adopted to realize key negotiation between objects, key sharing of two communication parties is realized, other objects cannot get corresponding shared keys, andcommunication security of the two communication parties in the group is guaranteed.

Description

technical field [0001] The invention relates to a public key cryptosystem and an asymmetric key pool technology, and specifically relates to the key exchange algorithm. The present invention is to realize the key exchange technology between communication parties in a group. Background technique [0002] The rapid development of the Internet has brought great convenience to people's life and work. People can sit at home to send and receive e-mails, make phone calls, conduct online shopping, bank transfers and other activities through the Internet. At the same time, network information security has gradually become a potential huge problem. Generally speaking, network information faces the following security risks: network information is stolen, information is tampered with, attackers fake information, malicious damage, etc. [0003] At present, the key technology to ensure the security of network information is cryptography. In the field of cryptography today, there are mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L9/14
CPCH04L9/0838H04L9/085H04L9/0852H04L9/0863H04L9/14H04L9/3234H04L63/0442
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products