Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric cryptographic terminal based on quantum random number, communication system and method

An asymmetric cryptography and quantum random number technology, applied in the field of communication encryption, can solve the problems of short development history, slow encryption/decryption speed, and complex equipment structure, and achieve the effect of simple algorithm, improved security, and simplified deployment process

Inactive Publication Date: 2019-12-24
HENGTONG QASKY QUANTUM INFORMATION RES INST CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although symmetric encryption has some good features, it also has obvious defects: ①Key distribution problem: To carry out encrypted communication, the two parties need to negotiate the encryption key through a secret secure channel, and this secret secure channel It may be difficult to realize; ② Key management problem: In a network with n users, any two users need to have a shared key. When the number of users in the network (ie n) is large, it needs to be managed The number of keys is very large, which is n(n-1) / 2; ③ does not have the digital signature function: when the subject A receives the electronic data of the subject B, it cannot prove to the third party that the electronic document is indeed from B
The disadvantages are: large key size, slow encryption / decryption speed, short development history, etc.
[0010] However, there are still many disadvantages in the QKD system: ①The keys distributed through negotiation at both ends of the QKD system are the same key, so the system itself still does not have the digital signature function; ②A complete QKD system must consist of a pair of QKDs, two QKS , one QKMC, two QVPNs, at least two switches and at least one bare fiber
It can be seen that the system is relatively complicated, at least not as convenient as mainstream cipher machines in terms of use; ③QKD technology has only gradually matured in recent years, and has not yet undergone strict tests in the market. The traditional asymmetric cryptosystem is short
The marketization rate of technology is low, and there is basically no commercial use. In addition, the key components of QKD equipment still have to be imported, and the service life is short, so the production cost of QKD equipment remains high; ④The current QKD equipment is actually a terminal product, but it is different from traditional communication Compared with the terminal equipment, there are some shortcomings such as bulky size, complex equipment structure, poor working stability, and harsh use requirements.
Moreover, traditional communication equipment has already adapted to the development needs of modern communication networks, and has developed a comprehensive and multi-series product system covering three levels: access, aggregation, and core, while QKD equipment can only be regarded as at the access level in terms of its shape. In such an initial stage of development, limited by technical conditions, it is impossible to develop a product system that truly belongs to the convergence or even the core level. Therefore, there is still a large generation gap between it and the development of traditional communication equipment, and it cannot meet the development needs of modern communication networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric cryptographic terminal based on quantum random number, communication system and method
  • Asymmetric cryptographic terminal based on quantum random number, communication system and method
  • Asymmetric cryptographic terminal based on quantum random number, communication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] This embodiment discloses an asymmetric cryptographic terminal based on quantum random numbers, refer to figure 1 As shown, the cryptographic terminal includes a quantum random number generator, a key generator, a trusted memory, a data processor, a transceiver interface module I, a transceiver interface module II and an integrated control processor.

[0050] The above-mentioned quantum random number generator utilizes the uncertainty of the nature of quantum phenomena to continuously output ultra-long chains of true random numbers (or "quantum random numbers") at high speed through signal acquisition from physical sources and digitization technology. Each true random number The number is a binary string containing infinite bits, and whether the character on each bit is 1 or 0 is completely random. Unlike pseudo-random numbers generated on computers through algorithmic complexity, true random numbers will not be successfully predicted even with infinite computing resour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetric cryptographic terminal based on a quantum random number, a communication system comprising a plurality of asymmetric cryptographic terminals, and a secret communication method for performing secret communication by using the asymmetric cryptographic terminals. The cryptographic terminal comprises a quantum random number generator and a key generator, wherein the quantum random number generator is used for generating and outputting two quantum random numbers; the key generator is used for firstly segmenting and truncating the two quantum random numbers intotwo groups of random number sequences with the same length, and then converting the two groups of random number sequences into a group of private keys and a group of public keys which are paired witheach other by using a private key algorithm and a public key algorithm respectively; and the asymmetric cryptographic terminal performs encryption, decryption, signature and signature verification according to the private key and the public key which are paired with each other. The password terminal is simple in algorithm and high in secret key updating frequency, and digital signature service and data encryption and decryption service can be provided at the same time in the communication process.

Description

technical field [0001] The present invention relates to communication encryption technology, to an asymmetric cryptographic terminal based on quantum random numbers, to a communication system including a plurality of such asymmetric cryptographic terminals, and to a method of using the asymmetric cryptographic terminal for secure communication method of secure communication. Background technique [0002] The current secure communication technology, one is the encryption technology based on the classical symmetric or asymmetric cryptographic system, and the other is the quantum secure communication technology based on the distribution key of the quantum state that has emerged in recent years. [0003] (1) Symmetric cryptosystem is a traditional cryptosystem, also known as private key cryptosystem. In a symmetric encryption system, the same key is used for encryption and decryption. Because the encryption / decryption key is the same, the two parties that need to communicate m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0861H04L9/0869H04L9/3247
Inventor 徐东杨光赵周荞邱红康
Owner HENGTONG QASKY QUANTUM INFORMATION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products