CN109039601B - Chaos safety key distribution method and system based on post-processing - Google Patents

Chaos safety key distribution method and system based on post-processing Download PDF

Info

Publication number
CN109039601B
CN109039601B CN201810793758.3A CN201810793758A CN109039601B CN 109039601 B CN109039601 B CN 109039601B CN 201810793758 A CN201810793758 A CN 201810793758A CN 109039601 B CN109039601 B CN 109039601B
Authority
CN
China
Prior art keywords
post
chaotic
output
processing
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810793758.3A
Other languages
Chinese (zh)
Other versions
CN109039601A (en
Inventor
江宁
赵晓燕
王慧
邱昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810793758.3A priority Critical patent/CN109039601B/en
Publication of CN109039601A publication Critical patent/CN109039601A/en
Application granted granted Critical
Publication of CN109039601B publication Critical patent/CN109039601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Semiconductor Lasers (AREA)
  • Optical Communication System (AREA)

Abstract

The invention provides a chaos safe key distribution scheme based on post-processing. The scheme comprises a synchronous true random number module and a post-processing module. In the present invention, both communicating parties independently change the injection intensity of the driving signal by using the optical attenuator controlled by the random control parameter generator. Only when the injection intensity of the two communication parties is the same, the response lasers of the two communication parties can be well synchronized to generate synchronous true random numbers. And then, taking the synchronous true random number as a seed key of a staggered stop-go algorithm in the post-processing module, and increasing the generation rate of the key by calling for many times. The final key was tested to pass 15 NIST tests.

Description

Chaos safety key distribution method and system based on post-processing
Technical Field
The invention relates to the field of chaos, semiconductor lasers, key distribution and the like, and is suitable for point-to-point and point-to-multipoint secret communication systems.
Technical Field
In recent years, with the rapid development of communication technology, people's lives have changed greatly, and communication makes people's lives more convenient and faster, but the information hidden danger therewith is more and more serious, so that secret communication is more and more concerned by people. Today, secure communications have become an important part of network communications. The security of a secure communication system depends mainly on the keys used by the two communicating parties and the amount of possibility that the keys are stolen by a third party during the key distribution process. Therefore, secure key distribution is particularly important.
For key distribution schemes based on chaotic semiconductor lasers, authors propose a key distribution scheme based on correlated Physical randomness in the literature [ Yoshimura K, Muramatsu J, Davis P, et al secure key distribution using rectified random access in lasers drive by common random access light [ J ]. Physical review letters 2012,108(7):070602 ]. In the document [ Xue C, Jiang N, Qiu K, et al.Key distribution based on synchronization in bandwidth-enhanced random bit generators with dynamic post-processing [ J ]. Optics express,2015,23(11):14510-14519 ], authors propose to implement key distribution schemes using dynamic post-processing in a random code generator driving-response synchronization. In the document [ Xue C, Jiang N, Lv Y, et al, secure key distribution based on dynamic keys systems [ J ]. IEEE Transactions on Communications,2017,65(1):312-319 ], authors use cascaded semiconductor lasers to achieve chaotic synchronization key distribution. In the secure key distribution, in order to obtain a synchronized random number, the existing scheme adopts single-bit sampling in the analog-to-digital conversion process, and must ensure the private synchronization of a physical random source to prevent the leakage of the physical random source, thereby limiting the generation rate of the synchronized random number.
The invention provides a chaos security key distribution method and system based on post-processing. Based on the physical random number generator and the post-processing technology, the synchronous true random numbers generated by the two communication parties are used as seed keys of the staggered stop-go algorithm in the post-processing module, and high-speed and reliable key distribution is realized.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a chaos security key distribution method and system based on post-processing, and both communication parties can realize a very good synchronization effect due to the same injection strength under the action of an injection locking mechanism and symmetric operation. Then, the synchronous true random numbers generated by the two communication parties are used as seed keys of the staggered stop-go algorithm for post-processing, and high-speed and reliable key distribution can be realized.
In order to achieve the above object, the present invention provides a chaos security key distribution system based on post-processing, which is characterized in that the security key distribution system comprises a synchronous true random number module and a post-processing module (PPM), wherein,
a synchronous true random number module: the Semiconductor Laser device comprises a synchronous physical random source, a photoelectric conversion module (PD), a Delay module (Delay), an analog-to-digital conversion (ADC) module and an exclusive OR (XOR) module, wherein the synchronous physical random source comprises a Driving Semiconductor Laser (DSL), a Semiconductor Laser 1(Semiconductor Laser1, SL1), a Semiconductor Laser 2(Semiconductor Laser 2, SL2) and a Random Control Parameter Generator (RCPG);
the DSL generates an initial chaotic laser signal under the action of the feedback of the outer cavity, and the initial chaotic laser signal is used as a driving signal and is injected to the Alice end and the Bob end in a unidirectional mode through a public channel; before one path of initial chaotic laser signals are injected into SL1 and SL2, the SL1 and the SL2 are synchronized by setting the same random control parameters generated by RCPGs at an Alice end and a Bob end, so that synchronous chaotic laser signals synchronized with both communication parties are generated; then, the two communication parties respectively pass the synchronous chaotic laser signal through PD, Delay, ADC and XOR to generate a true random number STRN synchronous with the two communication parties; the other path of initial chaotic laser signals of the Alice end and the Bob end directly passes through the PD, the Delay, the ADC and the XOR without being processed to generate a control sequence dnTransmitting to a post-processing module;
post-processing module (PPM): adopting a staggered stop-go algorithm (ASA), taking the STRN as a seed key of the ASA algorithm, and taking the control sequence dnAnd as a control sequence of the ASA algorithm, performing post-processing on the STRN by using the ASA algorithm to obtain a final key.
Preferably, the synchronous physical random source further comprises a mirror (R); the laser and the reflector are combined to form an external cavity semiconductor laser with feedback, and the DSL generates an initial chaotic laser signal under the action of the external cavity feedback.
Preferably, the synchronous physical random source further comprises an optical Attenuator (ATT), and the injection intensity of the SL1 and the SL2 of both communication parties is independently changed by the ATT controlled by the RCPG, so that the difficulty of eavesdropping is increased.
Preferably, before the chaotic signal is injected into the SL1 and the SL2, the Alice terminal and the Bob terminal independently change the injection strength by using ATT controlled by RCPG; in this case, the SL1 and the SL2 can achieve high-quality synchronization only when the random control parameters generated independently by the RCPGs at the Alice terminal and the Bob terminal are the same.
Preferably, the synchronous chaotic laser signal generated by the SL1/SL2 is divided into two paths, one path completes photoelectric conversion in the PD, and the other path passes through the delay module first and then completes photoelectric conversion in the PD; then, two paths of signals enter an ADC at the same time, analog-to-digital conversion is completed in the ADC, and two groups of binary sequences are obtained after sampling, quantization and judgment; and finally, carrying out XOR exclusive operation on the two groups of binary sequences to obtain a group of synchronous true random numbers STRN.
Preferably, the ASA algorithm is described in detail as follows: one sequence is used to control the output of the other two sequences; when the control Sequence 1(Sequence 1) is output as 1, Sequence 2(Sequence 2) is driven so that the next bit is output, and Sequence 3(Sequence 3) is not driven so that the previous bit is repeatedly output; when the output of Seq1 is 0, then Seq2 is not driven and the previous bit is repeatedly output, and Seq3 is driven and the next bit is output; and finally, carrying out XOR operation on the output of the Seq2 and the output of the Seq3, carrying out XOR operation on the obtained XOR output and the STRN, and obtaining an output sequence which is the output of the algorithm.
Preferably, the control sequence Seq1 of the ASA algorithm is the control sequence dn; the other two input sequences Seq2 and Seq3 of the ASA algorithm are both STRNs; the output of the ASA algorithm is used as the final key.
Preferably, the post-processing module may also call the ASA algorithm multiple times to increase the rate of generation of the final key.
Preferably, when the ASA algorithm is called multiple times, for the 1 st call, both of the other two input sequences Seq2 and Seq3 of the ASA algorithm are STRN; for the nth call, when n >1, the other two input sequences Seq2 and Seq3 of the ASA algorithm are both the output of the previous ASA algorithm; after multiple calls, the output of each call of the ASA algorithm is connected in series to serve as a final key.
Preferably, the physical entropy source for generating the seed key may not be a chaotic laser, and may be generated by a chaotic circuit.
Meanwhile, the invention also provides a chaos security key distribution method based on post-processing, which is characterized in that a Driving Semiconductor Laser (DSL) generates an initial chaos Laser signal under the action of outer cavity feedback, the initial chaos Laser signal is taken as a Driving signal,injecting the signals into an Alice end and a Bob end in a single direction through a public channel; before one path of initial chaotic Laser signals are injected into a Semiconductor Laser 1(Semiconductor Laser1, SL1) and a Semiconductor Laser 2(Semiconductor Laser 2, SL2), the SL1 and the SL2 are synchronized by setting that random control parameters generated by Random Control Parameter Generators (RCPG) at an Alice end and a Bob end are the same, so that synchronous chaotic Laser signals with synchronous communication parties are generated; then, the two communication parties respectively carry out photoelectric conversion, time delay, analog-to-digital conversion and exclusive OR on the synchronous chaotic laser signal to generate a true random number STRN of the two communication parties; the other path of initial chaotic laser signals of the Alice end and the Bob end directly generates a control sequence d through photoelectric conversion, time delay, analog-to-digital conversion and exclusive OR without processingn(ii) a Adopting a staggered stop-go algorithm (ASA), taking the STRN as a seed key of the ASA algorithm, and taking the control sequence dnAnd as a control sequence of the ASA algorithm, performing post-processing on the STRN by using the ASA algorithm to obtain a final key.
The chaos safe key distribution scheme based on post-processing of the invention has the following advantages: (1) the staggered stop-and-go algorithm in the post-processing module can be called for multiple times, so that the output rate of the secret key is improved; (2) the algorithm related in the post-processing module is simple and is easy to realize by software. (4) In the invention, the injection intensity of the SL of both communication parties is independently changed by the ATT controlled by the RCPG, thus increasing the eavesdropping difficulty; (5) the information exchanged by the two communication parties does not contain the information generated by the key, thereby ensuring the security of key distribution.
Drawings
FIG. 1 is a schematic diagram of a chaotic secure key distribution system based on post-processing according to the present invention;
FIG. 2 is a schematic structural diagram of a post-processing module;
fig. 3 shows an initial chaotic laser signal generated by DSL under the action of external cavity feedback;
chaotic laser signal (injection intensity of 40 ns) generated by SL1 in FIG. 4-1);
Chaotic laser signal (injection intensity of 40 ns) generated by SL2 in FIG. 5-1);
FIG. 6 is a cross-correlation function graph of chaotic signals generated by DSL and SL1 (injection strength of 40 ns)-1);
FIG. 7 is a cross-correlation function graph of chaotic signals generated by SL1 and SL2 (injection intensity of 40 ns)-1);
FIG. 8 RCPGAAnd RCPGBAnd corresponding SL1 and SL2 cross-correlation functions;
FIG. 9 is a graph of bit error for a synchronous true random number versus key bit error;
FIG. 10 impact of ASA invocation times on the number of key passes NIST tests;
figure 11 NIST test results for the final key when ASA calls 20 times.
Detailed Description
In order to achieve the above object, the present invention provides a chaos secure key distribution system based on post-processing, which is characterized in that the secure key distribution system comprises a synchronous true random number module and a post-processing module, wherein:
a synchronous true random number module: the system comprises a synchronous physical random source, a photoelectric conversion module (PD), a Delay module (Delay), an analog-to-digital conversion (ADC) module, an exclusive OR (XOR) module and the like. The method is mainly used for generating synchronous true random numbers.
Synchronous physical random sources: the Laser comprises a Driving Semiconductor Laser (DSL), a Semiconductor Laser 1(Semiconductor Laser1, SL1), a Semiconductor Laser 2(Semiconductor Laser 2, SL2), a reflecting mirror R, an optical coupler OC, an optical attenuator ATT, a random control parameter generator RCPG and the like. The laser and the reflector are combined to form an external cavity semiconductor laser with feedback, the DSL generates an initial chaotic laser signal under the action of the external cavity feedback, and the initial chaotic laser signal is used as a driving signal and is injected to the Alice end and the Bob end in a single direction through a public channel. Before the chaotic signal is injected into SL1 and SL2, the Alice terminal and the Bob terminal independently change the injection strength by using ATT controlled by a random control parameter generator. In this case, the quality of synchronization between SL1 and SL2 will vary with the consistency of the independent random signals generated by RCPGs at Alice and Bob terminals. Only when the random control parameters set by the Alice terminal and the Bob terminal are the same, the SL1 and the SL2 can realize synchronization.
Then, a synchronous chaotic laser signal generated by the SL1(SL2) is divided into two paths, one path completes photoelectric conversion in the PD, and the other path passes through the delay module first and then completes photoelectric conversion in the PD. Then, two paths of signals enter an ADC at the same time, analog-to-digital conversion is completed in the ADC, and two groups of binary sequences are obtained after sampling, quantization and judgment. And finally, carrying out exclusive OR operation on the two groups of binary sequences to obtain a group of synchronous true random numbers STRN.
Post-processing module (PPM): the invention adopts a staggered stop-go algorithm (ASA) to carry out post-processing on the STRN, and the STRN is used as a seed key of the ASA.
ASA: one sequence is used to control the output of the other two sequences. When the control Sequence 1(Sequence 1) is output as 1, Sequence 2(Sequence 2) is driven so that the next bit is output, and Sequence 3(Sequence 3) is not driven so that the previous bit is repeatedly output; when the output of Seq1 is 0, at this time Seq2 is not driven and the previous bit is repeatedly output, whereas when Seq3 is driven, the next bit is output. And finally, carrying out XOR operation on the output of the Seq2 and the output of the Seq3, carrying out XOR operation on the obtained XOR output and the STRN, and obtaining an output sequence which is the output of the algorithm. The ASA method comprises the following specific implementation steps:
step 1: initialization: let the input sequences Seq1, Seq2 and Seq3 be { a }, respectivelyn,n≥1},{b1n,n≥1},{b2n,n≥1}。
Step 2: let { c1n,n≥1},{c2nN is more than or equal to 1, respectively, is the output sequence of Seq2 and Seq3 under the action of a control sequence Seq1, and c is initialized1(1)=b1(1),c2(1)=b2(1),j1=0,j2=0(j1And j2Are respectively a sequence c1nAnd c2nThe pointer of (c). When i is not less than 2, if a (i) is 1, j1=j1+1,c1(i)=b1(j1+1),c2(i)=c2(i-1). On the contrary, if a (i) is 0, thenj2=j2+1,c2(i)=b2(j2+1),c1(i)=c1(i-1). Circulate until i ═ length (a)n) And (6) ending.
And step 3: c is to1nAnd c2nLogic exclusive OR is carried out to obtain a binary sequence cn
And 4, step 4: c is tonAnd performing logical exclusive or with the STRN to obtain the output w of the algorithm.
In the present invention, the ASA algorithm is called multiple times in the post-processing module in order to increase the rate of generation of the final key. Control sequence d of the ASA algorithm we employnThe chaotic signal is generated by injecting chaotic signals which are common to both communication parties, and the generation mode is the same as that of the STRN. And the other two input sequences Seq2 and Seq3 of the ASA algorithm are the outputs of the former ASA algorithm. In particular, the input sequences Seq2 and Seq3 of the ASA algorithm are both STRNs when the ASA algorithm is first invoked. Finally, the output of each ASA algorithm is concatenated as the final key.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a chaos security key distribution system based on post-processing, which includes a semiconductor laser DSL/SLs (s is 1,2) with external feedback, a photoelectric conversion module, a delay module, an analog-to-digital conversion module, an exclusive-or module, and a post-processing module.
The DSL generates an initial chaotic laser signal under the action of the outer cavity feedback. And taking the initial chaotic laser signal as a driving signal, and injecting the initial chaotic laser signal into the Alice end and the Bob end in a single direction through a public channel. Before the chaotic signal is injected into the SL1 and the SL2, the Alice terminal and the Bob terminal independently change the injection strength by using ATT controlled by RCPG. In this case, the quality of synchronization between SL1 and SL2 will vary with the consistency of the independent random signals generated by RCPGs at Alice and Bob terminals. Only when the random control parameters set by the Alice terminal and the Bob terminal are the same, the SL1 and the SL2 can realize synchronization. For simplicity, the injection strength is set as follows: when randomWhen the sequence is 1, the injection intensity is kin=40ns-1(ii) a When the random sequence is 0, the injection intensity is kin=70ns-1. In order to prevent the SL1/2 and the DSL from having high correlation, and thus the chaotic signal generated by the SL1/2 is leaked, the external cavity feedback lengths and the feedback strengths of the SL1 and the SL2 should be different from those of the DSL.
Then, the synchronous chaotic laser signal generated by SL1/SL2 is divided into two paths, one path completes photoelectric conversion in the PD, and the other path passes through the delay module and then completes photoelectric conversion in the PD. Then, two paths of signals enter an ADC at the same time, analog-to-digital conversion is completed in the ADC, and two groups of binary sequences As (s is 1,2)/Bs (s is 1,2) are obtained after sampling, quantization and judgment. And then carrying out exclusive OR operation on the two groups of binary sequences to obtain the synchronous true random number STRN1/STRN 2. Due to injection locking and symmetric operation, both communicating parties can achieve high quality synchronization.
Finally, the true random numbers STRNs (s 1,2) are post-processed by a post-processing module, and the STRN is used as a seed key of the ASA. In the present invention, the ASA algorithm in the post-processing module is called many times, and the calling method is shown in fig. 2 (a). A model diagram of the ASA algorithm is shown in fig. 2 (b). Control sequence d of ASAn1/dn2The chaotic signal is generated by injecting chaotic signals which are common to both communication parties, and the generation mode is the same as that of the STRN. And the other two input sequences Seq2 and Seq3 of the ASA algorithm are the outputs of the former ASA algorithm. Specifically, at the first time the ASA algorithm is invoked, the input sequences Seq2 and Seq3 of the ASA algorithm are both STRNs. Finally, the outputs of each ASA algorithm are concatenated, and the resulting sequence is the final key.
Examples
The present invention is further explained below.
DSL operates around 1550nm at a frequency offset of 10GHz from SL 1/2. Threshold currents of DSL and SLs are Ith14.7mA, the working current is 2I respectivelythAnd 1.5IthThe feedback time and intensity of DSL are 3ns and 10ns respectively-1The delay of DSL injection to SLs is 0ns (assumed), SL1/2 itselfThe feedback time and intensity of (2 ns) and (5 ns) respectively-1. The timing signals output by the SLs 1 and 2 are sampled at a sampling frequency of 2GHz by both the transmitter and the receiver.
Fig. 3 is an initial chaotic laser signal generated by DSL under the action of the outer cavity feedback.
FIG. 4 shows the injection intensity kin=40ns-1Time of flight, chaotic laser signal generated by SL1, FIG. 5 shows injection intensity kin=40ns-1In the case of a chaotic laser signal generated by SL2, it can be seen from the figure that the output timing signals of SL1 and SL2 have the same dynamic characteristics. Calculated cross-correlation function graphs of chaotic laser signals generated by the DSL and the SL1, the SL1 and the SL2 are respectively shown in figures 6 and 7. As can be seen from fig. 6, when the lag time is 0ns, the correlation coefficient is highest, close to 0.5. However, in consideration of the situations of synchronization error, sampling clock jitter, clock mismatch and the like which occur in the actual capturing process, the method for capturing the synchronous physical random number from the DSL chaotic laser signal has higher error rate. As can be seen from fig. 7, when the lag time is 0ns, the cross-correlation coefficient of SL1 and SL2 is close to 1, which indicates that the output chaotic timing signals of the two lasers achieve zero delay synchronization and the synchronization quality is very good.
Fig. 8 is a timing diagram of RCPG, and the corresponding SL1 and SL2 cross-correlation functions. FIG. 8 (a) and FIG. 8 (b) are RCPGsAAnd RCPGBThe generated random sequences, fig. 8 (c), are the corresponding SL1 and SL2 dynamic cross-correlation coefficient curves. As is evident from the figure, only when RCPG is usedAAnd RCPGBWhen the generated random sequences are the same, namely the injection intensities of the two communication parties are matched, the chaotic signals output by the two semiconductor lasers can achieve high-quality synchronization.
FIG. 9 is a graph of bit error for a synchronous true random number versus key bit error. In the invention, the ASA algorithm is used for post-processing the STRN, and the ASA algorithm can know that if error codes occur in the STRN, certain influence is caused on the following output bits, and the error codes can be accumulated. Therefore, Bit Error Rate (BER) when STRN is usedSTRN) Bit Error Rate (BER) of a time, keyfinal) Will follow the ASThe number of a calls ρ increases.
Figure 10 is the effect of the number of ASA invocations in the post-processing module on the number of key passes the NIST test. Since the generation rate of the key is related to the number of times of invoking ASA in the post-processing module, the generation rate of the key is higher as the number of times of invoking is larger, and therefore, it is necessary to study the influence of the number of times of invoking ASA on the randomness of the key. It can be known from the figure that when the number of times of invocation is increased from 1 to 20, the final key can pass 15 NIST tests, but at this time, if the number of times of invocation of ASA is continuously increased, the randomness of the key is reduced, and the key cannot pass 15 NIST tests. That is, the upper limit of the number of times ASA is called in the post-processing module is 20 times, and the key rate can be increased by 19 times.
Figure 11 shows the NIST test results for the final key when ASA is invoked 20 times. As shown, the final key passes 15 NIST tests.
In summary, the present invention has the following features: (1) the key distribution scheme is suitable for point-to-point and point-to-multipoint communication systems; (2) the post-processing module adopts a staggered stop-and-go algorithm, and the algorithm is simple and easy to realize by software; (3) based on a physical random number generator and a post-processing technology, the synchronous true random numbers generated by two communication parties are used as seed keys of an ASA algorithm in a post-processing module, and the output rate of the keys can be improved through multiple times of calling; (4) the injection intensity of the semiconductor lasers of the two communication parties is independently changed by the optical attenuator controlled by the random control parameter generator, so that the eavesdropping difficulty is increased; (5) the information exchanged by the two communication parties does not contain the information generated by the key, so that the security of key distribution is ensured.
Although illustrative embodiments of the present invention have been described above to facilitate the understanding of the present invention by those skilled in the art, it should be understood that the present invention is not limited to the scope of the embodiments, and various changes may be made apparent to those skilled in the art as long as they are within the spirit and scope of the present invention as defined and defined by the appended claims, and all matters of the invention which utilize the inventive concepts are protected.

Claims (20)

1. A chaos security key distribution system based on post-processing is characterized in that the security key distribution system comprises a synchronous true random number module and a post-processing module (PPM), wherein,
a synchronous true random number module: the Semiconductor Laser device comprises a synchronous physical random source, a photoelectric conversion module (PD), a Delay module (Delay), an analog-to-digital conversion (ADC) module and an exclusive OR (XOR) module, wherein the synchronous physical random source comprises a Driving Semiconductor Laser (DSL), a Semiconductor Laser 1(Semiconductor Laser1, SL1), a Semiconductor Laser 2(Semiconductor Laser 2, SL2) and a Random Control Parameter Generator (RCPG);
the DSL generates an initial chaotic laser signal under the action of the feedback of the outer cavity, and the initial chaotic laser signal is used as a driving signal and is injected to the Alice end and the Bob end in a unidirectional mode through a public channel; before one path of initial chaotic laser signals are injected into SL1 and SL2, the SL1 and the SL2 are synchronized by setting the same random control parameters generated by RCPGs at an Alice end and a Bob end, so that synchronous chaotic laser signals synchronized with both communication parties are generated; then, the two communication parties respectively pass the synchronous chaotic laser signal through PD, Delay, ADC and XOR to generate a true random number STRN synchronous with the two communication parties; the other path of initial chaotic laser signals of the Alice end and the Bob end directly passes through the PD, the Delay, the ADC and the XOR without being processed to generate a control sequence dnTransmitting to a post-processing module;
post-processing module (PPM): adopting a staggered stop-go algorithm (ASA), taking the STRN as a seed key of the ASA algorithm, and taking the control sequence dnAnd as a control sequence of the ASA algorithm, performing post-processing on the STRN by using the ASA algorithm to obtain a final key.
2. The chaotic secure key distribution system based on post-processing according to claim 1, wherein the synchronous physical random source further comprises a mirror (R); the laser and the reflector are combined to form an external cavity semiconductor laser with feedback, and the DSL generates an initial chaotic laser signal under the action of the external cavity feedback.
3. The chaotic security key distribution system based on post-processing as claimed in claim 1, wherein the synchronous physical random source further comprises an optical Attenuator (ATT), and the injection intensity of SL1 and SL2 of both communication parties is independently changed by the ATT controlled by the RCPG, thereby increasing the difficulty of eavesdropping.
4. The chaotic secure key distribution system based on post-processing as claimed in claim 3, wherein before the chaotic signal is injected into the SL1 and SL2, the Alice terminal and the Bob terminal independently change the injection strength by using ATT controlled by RCPG; in this case, the SL1 and the SL2 can achieve high-quality synchronization only when the random control parameters generated independently by the RCPGs at the Alice terminal and the Bob terminal are the same.
5. The chaotic security key distribution system based on post-processing as claimed in claim 1, wherein the synchronous chaotic laser signal generated by SL1/SL2 is divided into two paths, one path completes photoelectric conversion in the PD, and the other path passes through the delay module first and then completes photoelectric conversion in the PD; then, two paths of signals enter an ADC at the same time, analog-to-digital conversion is completed in the ADC, and two groups of binary sequences are obtained after sampling, quantization and judgment; and finally, carrying out XOR exclusive operation on the two groups of binary sequences to obtain a group of synchronous true random numbers STRN.
6. The post-processing based chaotic secure key distribution system according to claim 1, wherein the ASA algorithm is described in detail as follows: one sequence is used to control the output of the other two sequences; when the control Sequence 1(Sequence 1) is output as 1, Sequence 2(Sequence 2) is driven so that the next bit is output, and Sequence 3(Sequence 3) is not driven so that the previous bit is repeatedly output; when the output of Seq1 is 0, then Seq2 is not driven and the previous bit is repeatedly output, and Seq3 is driven and the next bit is output; and finally, carrying out XOR operation on the output of the Seq2 and the output of the Seq3, carrying out XOR operation on the obtained XOR output and the STRN, and obtaining an output sequence which is the output of the algorithm.
7. The post-processing based chaotic secure key distribution system according to claim 6, wherein the control sequence Seq1 of the ASA algorithm is the control sequence dn(ii) a The other two input sequences Seq2 and Seq3 of the ASA algorithm are both STRNs; the output of the ASA algorithm is used as the final key.
8. The chaotic secure key distribution system based on post-processing as claimed in claim 7, wherein the post-processing module further invokes the ASA algorithm multiple times to increase the generation rate of the final key.
9. The chaotic secure key distribution system based on post-processing as claimed in claim 8, wherein when the ASA algorithm is called multiple times, for the 1 st call, two other input sequences Seq2 and Seq3 of the ASA algorithm are both STRN; for the nth call, when n >1, the other two input sequences Seq2 and Seq3 of the ASA algorithm are both the output of the previous ASA algorithm; after multiple calls, the output of each call of the ASA algorithm is connected in series to serve as a final key.
10. The chaotic secure key distribution system based on post-processing as claimed in claim 1, wherein the physical entropy source generating the seed key may not be a chaotic laser but may be generated by a chaotic circuit.
11. A chaos safe secret key distribution method based on post-processing is characterized in that a Driving Semiconductor Laser (DSL) generates an initial chaos Laser signal under the action of outer cavity feedback, the initial chaos Laser signal is used as a Driving signal and is injected to an Alice end and a Bob end in a unidirectional mode through a public channel; one path of initial chaotic laser signal is injected into a semiconductor laserBefore 1(Semiconductor Laser1, SL1) and the Semiconductor Laser 2(Semiconductor Laser 2, SL2), the SL1 and the SL2 are synchronized by setting that random control parameters generated by Random Control Parameter Generators (RCPG) at an Alice end and a Bob end are the same, so that synchronous chaotic Laser signals with synchronous communication parties are generated; then, the two communication parties respectively carry out photoelectric conversion, time delay, analog-to-digital conversion and exclusive OR on the synchronous chaotic laser signal to generate a true random number STRN of the two communication parties; the other path of initial chaotic laser signals of the Alice end and the Bob end directly generates a control sequence d through photoelectric conversion, time delay, analog-to-digital conversion and exclusive OR without processingn(ii) a Adopting a staggered stop-go algorithm (ASA), taking the STRN as a seed key of the ASA algorithm, and taking the control sequence dnAnd as a control sequence of the ASA algorithm, performing post-processing on the STRN by using the ASA algorithm to obtain a final key.
12. The chaotic secure key distribution method based on post-processing as claimed in claim 11, wherein the laser and the mirror are combined to form an external cavity semiconductor laser with feedback, and the DSL generates an initial chaotic laser signal under the feedback effect of the external cavity.
13. The chaotic security key distribution method based on post-processing as claimed in claim 11, wherein the injection strength of SL1 and SL2 of both parties is independently changed by the RCPG controlled optical Attenuator (ATT), increasing the difficulty of eavesdropping.
14. The chaotic secure key distribution method based on post-processing according to claim 13, wherein before chaotic signals are injected into SL1 and SL2, Alice terminal and Bob terminal independently change injection strength by using ATT controlled by RCPG; in this case, the SL1 and the SL2 can achieve high-quality synchronization only when the random control parameters generated independently by the RCPGs at the Alice terminal and the Bob terminal are the same.
15. The chaotic secure key distribution method based on post-processing as claimed in claim 11, wherein the synchronous chaotic laser signal generated by SL1/SL2 is divided into two paths, one path completes photoelectric conversion, the other path completes photoelectric conversion after being delayed; then, analog-to-digital conversion is simultaneously completed on the two paths of signals, and two groups of binary sequences are obtained after sampling, quantization and judgment; and finally, carrying out exclusive OR on the two groups of binary sequences to obtain a group of synchronous true random numbers STRN.
16. The post-processing based chaotic secure key distribution method according to claim 11, wherein the ASA algorithm is specifically described as follows: one sequence is used to control the output of the other two sequences; when the control Sequence 1(Sequence 1) is output as 1, Sequence 2(Sequence 2) is driven so that the next bit is output, and Sequence 3(Sequence 3) is not driven so that the previous bit is repeatedly output; when the output of Seq1 is 0, then Seq2 is not driven and the previous bit is repeatedly output, and Seq3 is driven and the next bit is output; and finally, carrying out XOR operation on the output of the Seq2 and the output of the Seq3, carrying out XOR operation on the obtained XOR output and the STRN, and obtaining an output sequence which is the output of the algorithm.
17. The post-processing based chaotic secure key distribution method according to claim 16, wherein the control sequence Seq1 of the ASA algorithm is the control sequence dn(ii) a The other two input sequences Seq2 and Seq3 of the ASA algorithm are both STRNs; the output of the ASA algorithm is used as the final key.
18. The chaotic secure key distribution method based on post-processing as claimed in claim 17, wherein the ASA algorithm is further invoked multiple times to increase the generation rate of the final key.
19. The post-processing based chaotic secure key distribution method of claim 18, wherein when the ASA algorithm is called multiple times, for the 1 st call, two other input sequences Seq2 and Seq3 of the ASA algorithm are both STRN; for the nth call, when n >1, the other two input sequences Seq2 and Seq3 of the ASA algorithm are both the output of the previous ASA algorithm; after multiple calls, the output of each call of the ASA algorithm is connected in series to serve as a final key.
20. The chaotic secure key distribution method based on post-processing as claimed in claim 11, wherein the physical entropy source generating the seed key may not be a chaotic laser but be generated by a chaotic circuit.
CN201810793758.3A 2018-07-18 2018-07-18 Chaos safety key distribution method and system based on post-processing Active CN109039601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810793758.3A CN109039601B (en) 2018-07-18 2018-07-18 Chaos safety key distribution method and system based on post-processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810793758.3A CN109039601B (en) 2018-07-18 2018-07-18 Chaos safety key distribution method and system based on post-processing

Publications (2)

Publication Number Publication Date
CN109039601A CN109039601A (en) 2018-12-18
CN109039601B true CN109039601B (en) 2021-03-19

Family

ID=64644204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810793758.3A Active CN109039601B (en) 2018-07-18 2018-07-18 Chaos safety key distribution method and system based on post-processing

Country Status (1)

Country Link
CN (1) CN109039601B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110601828B (en) * 2019-09-12 2020-10-30 太原理工大学 High-speed key secure distribution system and method based on multi-state superposition keying synchronization
CN110768780B (en) * 2019-09-20 2021-04-23 电子科技大学 Key distribution method and system based on broadband physical random source
CN111147234B (en) * 2019-12-06 2022-05-13 太原理工大学 High-speed physical key distribution system and method based on multi-mode laser chaotic synchronization
CN112181362A (en) * 2020-09-28 2021-01-05 苏州矗联电子技术有限公司 High-reliability physical random number generation system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968290A (en) * 2012-11-20 2013-03-13 华中科技大学 Isomeric lightweight class true random number generator
US8738675B2 (en) * 2006-08-03 2014-05-27 Salih Ergun Random numbers generation using continuous-time chaos
CN104380245A (en) * 2013-02-28 2015-02-25 皇家飞利浦有限公司 Random number generator and stream cipher
CN105262585A (en) * 2015-09-22 2016-01-20 太原理工大学 Secure and high-speed key distribution system and method
CN106027238A (en) * 2016-06-30 2016-10-12 中国电子科技集团公司第五十四研究所 True random number generator applicable to wireless communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9189202B2 (en) * 2013-12-23 2015-11-17 The University Of Massachusetts Generate random numbers using metastability resolution time

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8738675B2 (en) * 2006-08-03 2014-05-27 Salih Ergun Random numbers generation using continuous-time chaos
CN102968290A (en) * 2012-11-20 2013-03-13 华中科技大学 Isomeric lightweight class true random number generator
CN104380245A (en) * 2013-02-28 2015-02-25 皇家飞利浦有限公司 Random number generator and stream cipher
CN105262585A (en) * 2015-09-22 2016-01-20 太原理工大学 Secure and high-speed key distribution system and method
CN106027238A (en) * 2016-06-30 2016-10-12 中国电子科技集团公司第五十四研究所 True random number generator applicable to wireless communication system

Also Published As

Publication number Publication date
CN109039601A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN109039601B (en) Chaos safety key distribution method and system based on post-processing
Zhao et al. Experimental quantum key distribution with decoy states
CN107113169B (en) Permanent secure communications from short-term secure encrypted quantum communications
Guan et al. Observation of quantum fingerprinting beating the classical limit
JP2018537722A (en) Apparatus and method for adding an entropy source to a quantum key distribution system
Zhao et al. Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber
CN112769558B (en) Code rate self-adaptive QKD post-processing method and system
CN113708846B (en) Gate control device for single-photon detector and quantum communication equipment
WO2022027866A1 (en) Synchronization method and apparatus for quantum key distribution system
CN113708847B (en) Gate control device for single-photon detector and quantum communication equipment
Wang et al. Synchronization-based key distribution utilizing information reconciliation
CN108377182A (en) A kind of the RC4 stream ciphers generating means and method of high safety
WO2010011127A2 (en) Quantum network relay
Hasegawa et al. Experimental decoy state quantum key distribution with unconditional security incorporating finite statistics
CN113612611B (en) Asynchronous sampling method and system for continuous variable quantum key distribution
US7409162B2 (en) Timing error reduction in QKD systems
KR890000101B1 (en) Integrated scrambler-encoder using sequence
CN112994877B (en) Quantum key distribution system and method based on quantum random number
CN110768777B (en) Barker code pulse data synchronization method suitable for CVQKD system
Liu et al. Security-enhanced key distribution based on chaos synchronization between dual path-injected semiconductor lasers
Pérez-Resa et al. Self-synchronized encryption for physical layer in 10Gbps optical links
Zhao et al. Secure Key Distribution based on Chaos Synchronization and Alternating Step Algorithm
RU2382504C1 (en) Device for encrypting and decrypting formalised messages with hashing function
Rumyantsev et al. Modeling of quantum key distribution system for secure information transfer
Ahmed et al. Chaos-Based RNG using Semiconductor Lasers with Parameters Variation Tolerance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant