Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data link anti-quantum computing communication method and system based on ID cryptography and symmetric key pool

A technology of quantum computing and communication methods, applied in the field of data link systems, can solve problems such as low security, large capacity of symmetric key pool, communication security threats, etc., to enhance the use security, security guarantee, and improve security sexual effect

Active Publication Date: 2020-09-22
南京如般量子科技有限公司 +1
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. In the prior art, the three links of information encryption and message authentication, direct sequence spread spectrum, and frequency hopping for data link security, especially the last two links, all use pseudo-random numbers, and pseudo-random numbers have Predictive, so the entire data link communication security is not high;
[0006] 2. In the direct sequence spread spectrum and frequency hopping in the prior art, the information that may be obtained by the enemy such as TOD is used as initial information to perform subsequent pseudo-random sequence calculations, resulting in low security of the entire data link communication
[0007] 3. In the existing technology, due to the large capacity, the symmetric key pool cannot be stored in a highly secure security chip, and there is a possibility of being captured and disassembled to be cracked
Once the symmetric key pool is cracked, the security of communication based on the symmetric key pool is threatened;
[0008] 4. In the prior art, the group-type symmetric key pool is shared by all members in the group. Once the group-type symmetric key pool is cracked, the security of group communication based on the group-type symmetric key pool Threatened; In addition, all group members can crack the confidential communication between other members, and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data link anti-quantum computing communication method and system based on ID cryptography and symmetric key pool
  • Data link anti-quantum computing communication method and system based on ID cryptography and symmetric key pool
  • Data link anti-quantum computing communication method and system based on ID cryptography and symmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0069] This embodiment proposes a data link anti-quantum computing communication method based on ID cryptography and symmetric key pool, including the following steps:

[0070] 1. Synchronize using the synchronization prefix method:

[0071] The sending end calculates the synchronization frequency. In order to improve the anti-reconnaissance performance of the synchronization head, the synchronization frequency changes with the change of the real-time information (TOD) of the system. TOD is the real-time information of the system, which is obtained by reading the local clock, and its accuracy is also determined by the local clock, which can be accurate to milliseconds or even microseconds. The clock information is divided into TODH and TODL according to the needs of the method, which represent the high byte of time and the low byte of time respectively. When we calculate the random code that determines the synchronization frequency, we can select a part of the real-time infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data link anti-quantum computing communication method and system based on ID cryptography and a symmetric key pool. The method comprises the following steps: firstly, allocating respective identity IDs and private keys to two communication parties through an ID cryptography mechanism, calculating opposite side public keys by the two communication parties respectively by utilizing the IDs disclosed by the opposite sides, and calculating symmetric keys according to the own private keys and the opposite side public keys; when the two parties with the symmetric key communicate with each other, enabling asender and areceiver to perform frequency hopping synchronization through adoption of a synchronization header method, and appoint to select at least one part of information in the synchronization header as initial information; enabling the initial information to besubjected to root key transformation by a key pool, so that the initial information acquired by the enemy becomes useless information; and then, based on a true random number key sequence in three links of root key calculation information encryption and message authentication, direct sequence spread spectrum and frequency hopping which cannot be obtained by an enemy, achieving anti-quantum calculation of data transmission, and therefore the security of the whole data link system is greatly improved.

Description

technical field [0001] The invention relates to the field of data link systems, in particular to a data link anti-quantum computing communication method based on ID cryptography and a symmetric key pool. Background technique [0002] The data link system is a system that uses wireless channels as the main transmission medium to complete the transmission and processing of formatted information, and transmits and uses information required for specific campaign / tactical coordination between command and control systems, sensors, and weapon platforms. . The data link system consists of a sender and a receiver. In the case of two-way communication, both sides have a sender and a receiver. The security of data link information plays a vital role in the safe and efficient operation of the data link system. At the application layer, symmetric keys are mainly used to encrypt and store data and files. At the physical layer, confidentiality protection is mainly carried out by means o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/06H04B1/692H04B1/7087H04B1/7156
CPCH04L9/3242H04L9/3006H04L9/083H04L63/0435H04L63/062H04B1/692H04B1/7087H04B1/7156Y02D30/70
Inventor 富尧钟一民杨羽成
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products