CN110213257B - High-safety IP secret communication method based on true random stream exclusive or encryption - Google Patents

High-safety IP secret communication method based on true random stream exclusive or encryption Download PDF

Info

Publication number
CN110213257B
CN110213257B CN201910452106.8A CN201910452106A CN110213257B CN 110213257 B CN110213257 B CN 110213257B CN 201910452106 A CN201910452106 A CN 201910452106A CN 110213257 B CN110213257 B CN 110213257B
Authority
CN
China
Prior art keywords
encryption
true random
decryption
message
data block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910452106.8A
Other languages
Chinese (zh)
Other versions
CN110213257A (en
Inventor
李大双
徐兵杰
何远杭
田波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN201910452106.8A priority Critical patent/CN110213257B/en
Publication of CN110213257A publication Critical patent/CN110213257A/en
Application granted granted Critical
Publication of CN110213257B publication Critical patent/CN110213257B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a high-safety IP secret communication method based on true random stream exclusive or encryption, which comprises an IP encryption processing device and an IP decryption processing device, wherein: the IP encryption processing device comprises a full IP format hidden encryption module, a quantum random number generator module, a true random stream exclusive or encryption module and two packet encryption tunnel encapsulation modules; the IP decryption processing device comprises two tunnel decapsulation packet decryption modules, a true random stream exclusive or decryption module and an all-IP format hidden decryption module. The invention can establish a high-safety secret communication IP network on the public Internet at low cost, can resist the attack threat of various existing cryptographic analysis deciphering technologies, can effectively resist the deciphering analysis attack of a quantum computer with strong computing capability, and can be used for both confidential communication of political parties with extremely high safety requirements and commercial secret communication with higher safety requirements.

Description

High-safety IP secret communication method based on true random stream exclusive or encryption
Technical Field
The invention relates to a high-safety IP secret communication method based on true random stream exclusive or encryption.
Background
At present, the quantum computing technology is developed rapidly, and a new exponential acceleration operation way is provided for the cryptanalysis and decryption technology. The use of quantum computing in combination with cryptanalysis techniques will pose serious security challenges for existing secure communication systems.
In the existing public internet, various network devices always have some security holes, are easy to be implanted into monitoring trojans by enemies through a network attack means, and are easy to acquire communication data between IP subnets. And even if the IP subnetworks are directly connected based on the special optical cable, optical signals transmitted in the optical fiber are easy to monitor, and IP message data is recovered through signal decoding.
In the existing IP secret communication network, the IP encryption adopts an encryption key which is manually preset or dynamically distributed by a key distribution protocol, the same fixed and invariable encryption key is used before the next key exchange, a high-speed secret communication system generates a large number of plaintext-ciphertext pairs with the same key in the period, the input data of an encryption algorithm is also fixed and invariable in the process of one encryption operation, and the ciphertexts generated by encryption are the same under the condition that the key and the input plaintext data are the same, thereby giving an adversary the opportunity of carrying out deciphering by using a cryptanalysis technology of plaintext-ciphertext comparison.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a high-security IP secret communication method based on true random stream XOR encryption, which embeds a true random stream XOR encryption mechanism into the encryption process of an IP message, so that the input of an encryption algorithm of a secret communication system is truly randomized, and a ciphertext stream output by encryption of the secret communication system also presents the property of true randomization, thereby greatly improving the security of the existing secret communication system and being capable of very effectively resisting cryptanalysis decoding attack based on strong calculation power of quantum computation.
The technical scheme adopted by the invention for solving the technical problems is as follows: a high-security IP secret communication method based on true random stream exclusive-OR encryption comprises an IP encryption processing device and an IP decryption processing device, wherein: the IP encryption processing device comprises an all-IP format hidden encryption module, a quantum random number generator module, a true random flow exclusive or encryption module and two grouping encryption tunnel encapsulation modules, wherein the quantum random number generator module is respectively connected with the true random flow exclusive or encryption module and one grouping encryption tunnel encapsulation module; the IP decryption processing device comprises two tunnel decapsulation packet decryption modules, a true random stream exclusive or decryption module and an all-IP format hidden decryption module, wherein the two tunnel decapsulation packet decryption modules are connected with the true random stream exclusive or decryption module, and the true random stream exclusive or decryption module is connected with the all-IP format hidden decryption module.
Compared with the prior art, the invention has the following positive effects:
in the existing public internet, various network devices always have some security holes, are easy to be implanted into monitoring trojans by enemies through a network attack means, and are easy to acquire communication data between IP subnets.
The high-safety IP secret communication method based on true random stream XOR encryption adopts three communication protection mechanisms of full IP format hidden encryption, quantum true random stream XOR encryption and link transmission block encryption, and even if the input of an IP encryption processing device is continuous and same plaintext IP messages, the ciphertext load of the output IP secret state message can also present the characteristic of true random change, so that an adversary can hardly obtain IP plaintext content by monitoring the communication data content and analyzing and decoding.
The high-security IP secret communication method based on the true random stream XOR can establish a high-security IP secret communication network on the public Internet at a lower cost, can resist the attack threat of various existing cryptographic analysis deciphering technologies, can very effectively resist the deciphering analysis attack of a quantum computer with strong computing capacity, and can be used for party and government secret communication with extremely high security requirements and commercial secret communication with higher security requirements.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is an implementation architecture of the method of the present invention.
Fig. 2 shows an IP encrypted tunneling packet format.
Detailed Description
The present invention relates to the following specific terms:
and (3) secret state covering data block: and after the whole plaintext IP message (including the IP header) is subjected to block encryption, a data block with the same length as the plaintext IP message is formed.
True randomized data block: and carrying out XOR encryption operation by using the quantum true random number to form a data block.
Ciphertext payload data: and (3) partitioning the true randomized data block according to the odd-even bytes to form data, and encapsulating a standard IP protocol header to form an IP secret message.
The invention provides a high-security secret communication method jointly adopting triple protection mechanisms of block encryption, true random stream exclusive or encryption and link transmission block encryption of a hidden IP message data format. The high-security IP secret communication method takes a true random stream exclusive or encryption technology as a core, and enhances the security and completeness of a true random stream exclusive or encryption mechanism by hiding encryption and link transmission packet encryption in an all-IP format. Firstly, a whole plaintext IP message (including an IP header) to be transmitted is subjected to block encryption by a block encryption algorithm to form a secret state covering data block with the same length as the plaintext IP message; secondly, carrying out byte-by-byte exclusive-or encryption operation on the secret state covering data block by using a quantum true random data block with the same length as the plaintext IP message based on the quantum true random number to form a true random data block, and taking the quantum true random data block as another true random data block; then, based on two different encryption keys which are independently negotiated for link transmission encryption, the two truly randomized data blocks are encrypted in groups by adopting a group encryption algorithm to form two group encrypted data blocks; finally, the two block encrypted data blocks are respectively packaged into standard IPSec messages (namely IP secret state messages) and transmitted to the destination IP password device through the public Internet.
By adopting the high-security IP secret communication method based on the true random stream XOR encryption, the input of two paths of block encryption algorithms of the transmission link is true random data stream, so that the block encryption output of the transmission link is also true random ciphertext stream, and all the existing cryptanalysis attack methods cannot work. Even if the secret communication system adopts the public block cipher algorithm, the enemy can be forced to carry out exhaustive operation of traversing the triple key space, so the operation amount of the enemy for carrying out the cryptanalysis decryption at least exceeds the upper limit of the block key space, and the computation time amount and the storage space amount required by the cryptanalysis decryption operation are infeasible in engineering realization.
Therefore, the method of the invention has the capability of resisting the attack of decoding and analyzing implemented by strong calculation power of network monitoring, quantum computation and the like by the enemy. By adopting the technology provided by the invention, a high-safety secret communication network can be established based on the public Internet.
The method of the invention is described in detail below with reference to the accompanying drawings:
technical framework of high-safety IP secret communication method based on true random stream exclusive or encryption
The invention provides a high-safety IP secret communication method based on true random stream exclusive-OR encryption, which is designed in a way that an IP message content true random exclusive-OR encryption transmission technology is taken as a core, and the safety completeness of the true random stream exclusive-OR encryption technology is enhanced by hiding encryption and link transmission block encryption in an all-IP format. For each plaintext IP message, triple transmission protection mechanisms of full IP format hidden encryption of a hidden IP plaintext format, true random XOR encryption of a secret state hidden data block and block encryption of a true random data block are respectively implemented.
The invention does not relate to the specific implementation of dynamic key negotiation between IP encryption machines and IPSec message encapsulation between IP encryption machines.
1. Implementation architecture design of high-security IP (Internet protocol) secret communication method based on true random stream XOR (exclusive OR) encryption
In the high-security IP secret communication method based on true random stream exclusive or encryption, the secret communication implementation architecture design is shown in figure 1. The IP encryption processing function mainly comprises 5 modules including a full IP format hidden encryption module, a quantum random number generator module, a true random stream exclusive or encryption module and two grouping encryption tunnel encapsulation modules. The IP decryption processing mainly comprises 4 modules including two tunnel decapsulation packet decryption modules, a true random stream exclusive or decryption module and a full IP format hiding decryption module.
In the proposed high-security IP secret communication method based on true random stream XOR encryption, an IP encryption device firstly hides and encrypts the whole message including an IP header by adopting a full IP format aiming at each plaintext IP packet to be transmitted, carries out byte-by-byte XOR encryption based on a quantum true random number generated in real time to form a true random data block with the same length as the original IP message, the quantum true random data block used for the exclusive-or encryption is used as another true random data block, after the two true random data blocks are encrypted by the block encryption algorithm, re-encapsulated into two new IP secret messages, then transmitted from the Internet access link, and transmitting the data to the received IP decryption equipment through the Internet, removing the encapsulation of the IP decryption equipment, and recovering the plaintext IP message through XOR decryption operation and full IP format hidden decryption operation.
The packet encryption keys (k1, k2) used for link transport encryption and the key (k3) used for full IP format covert encryption are derived by a dynamic key distribution protocol negotiation, and these three keys are not related to each other and are not required to be derived by derivation from each other.
2. The combination of true randomization of encrypted input and block encryption greatly improves the resistance to cryptanalysis and cracking
The invention provides a high-security IP secret communication method based on true random stream XOR encryption, which has the core idea that the input content of a link transmission block encryption algorithm is truly randomized through true random stream XOR encryption operation, and a ciphertext stream generated by link transmission block encryption is also truly randomized, so as to resist various existing cryptanalysis and decryption methods. The true randomization exclusive-or encryption mechanism carries out true randomization exclusive-or encryption operation byte by byte on the basis of quantum true random numbers which are dynamically generated in real time and have the same length as the IP message, so as to obtain a randomized data block with completely randomized content, and the randomized data block is re-packaged into an IP secret state message after being encrypted by a grouping algorithm. Meanwhile, quantum true random data which is used for true random XOR encryption and has the same length with the IP message is encrypted by a grouping algorithm and then packaged into another IP secret state message. The IP sequence numbers of the two IP secret messages are generated in an increasing mode, and the difference value is 1. Because the input and the output of the link transmission block encryption algorithm are true randomized data streams and do not have any characteristics which can be utilized by a cryptanalysis technology, the method can resist all existing cryptanalysis deciphering methods which adopt plain-ciphertext comparison analysis and neural network deep learning characteristic analysis.
3. The format hiding encryption improves the lower limit of the exhaustive deciphering operand of the enemy
In the high-security secret communication method based on the true random stream XOR encryption, before the true random stream XOR encryption IP message is executed, the whole IP message (including an IP header) is protected by adopting the format hiding encryption, so that when an enemy jointly executes exclusive decryption XOR operation on the IP packet encryption messages associated with two odd-even serial numbers, no plaintext characteristics can be found in output data of the enemy, and the exclusive operation amount of the enemy for decrypting the packets is forced to exceed the decryption operation upper limit of traversing a single key space. Even in the case of the disclosed algorithm, in order to crack the whole cryptosystem, the adversary must first perform the packet decryption operation on each link transmission packet encryption key combination (k1, k2), and then perform the exhaustive operation of the IP format hiding decryption. Finally, even if the adversary performs the exhaustive operation of the block algorithm once in the two key spaces, because the exclusive or decryption output of the decryption operation result for each pair of block key combinations is secret masked data, the plaintext IP packet cannot be decrypted, and the cryptanalysis decryption operation for the IP format hidden encryption algorithm must be performed. The decoding operation that requires the combination and decryption in the triple key space is also not feasible in engineering.
(II) working process
1. IP encryption processing workflow
When the IP encryption processing device executes IP encryption on a plaintext IP message, the following processing steps are adopted:
firstly, a block encryption key k3 negotiated based on a key distribution protocol carries out block encryption of a hidden format on the whole plaintext IP message including an IP header to form a secret state covering data block with the same length as the plaintext IP message;
secondly, quantum true random data blocks which are generated in real time and have the same length as the plaintext IP message are obtained from a quantum random number generator;
thirdly, carrying out exclusive-or encryption operation on the secret state covering data block byte by using the quantum true random data block to form a true random data block which is used as one true random data block input by the link transmission block encryption, and simultaneously using the quantum true random data block as the other true random data block input by the link transmission block encryption;
and fourthly, performing block encryption on the true randomized data block to form ciphertext load data of the IP message transmitted by the link based on the block encryption keys k1 and k2 respectively, and re-encapsulating a standard IP protocol header to form two IP secret state messages. The IP secret state message sequence number field encrypted by k1 is set as an increasing odd sequence number value, the IP secret state message sequence number field encrypted by k2 is set as an increasing even sequence number value, and the difference value of the two IP secret state message sequence numbers is 1. And then, the two IP secret messages are sent to the public Internet and are forwarded and transmitted to a target IP cipher machine through a routing relay. Fig. 2 shows an IP encrypted tunneling packet format.
Thus, the IP cipher encryption device completes the encryption processing flow of the plaintext IP message.
2. IP decryption processing workflow
When the local IP decryption processing device receives the IP secret message, the following steps are adopted:
firstly, stripping off an IP head packaged in tunnel transmission;
and secondly, for the IP secret state message corresponding to the odd sequence number, carrying out packet decryption operation on the cipher text load based on a key k1 to obtain a true randomized data block output by link transmission packet decryption. For the IP secret state message corresponding to the even sequence number, carrying out packet decryption operation on the cipher text load based on a key k2 to obtain another true randomized data block output by link transmission packet decryption;
the third step: executing logical XOR decryption operation byte by byte on the link transmission true randomized data block with two collected odd and even serial numbers (namely the serial numbers are associated and the difference value is 1), and recovering the all IP block encrypted data block;
the fourth step: and based on the key k3, carrying out packet decryption operation on the all-IP packet encrypted data block obtained by the XOR decryption operation to recover the plaintext IP message.
Therefore, the IP decryption processing device completes the decryption processing flow of the IP secret message.

Claims (2)

1. A high-security IP secret communication system based on true random stream exclusive or encryption is characterized in that: the device comprises an IP encryption processing device and an IP decryption processing device, wherein: the IP encryption processing device comprises an all-IP format hidden encryption module, a quantum random number generator module, a true random flow exclusive or encryption module and two grouping encryption tunnel encapsulation modules, wherein the quantum random number generator module is respectively connected with the true random flow exclusive or encryption module and one grouping encryption tunnel encapsulation module; the IP decryption processing device comprises two tunnel decapsulation packet decryption modules, a true random stream exclusive or decryption module and an all-IP format hidden decryption module, wherein the two tunnel decapsulation packet decryption modules are connected with the true random stream exclusive or decryption module, and the true random stream exclusive or decryption module is connected with the all-IP format hidden decryption module.
2. A highly secure IP security communication system based on true random stream exclusive or encryption according to claim 1, characterized in that: for each plaintext IP message, a triple transmission protection mechanism of full IP format hidden encryption, true random XOR encryption and block encryption is respectively implemented: firstly, carrying out block encryption on the whole plaintext IP message to be transmitted by using a block encryption algorithm to form a secret state covering data block with the same length as the plaintext IP message; secondly, carrying out byte-by-byte exclusive-or encryption operation on the secret state covering data block by using a quantum true random data block with the same length as the plaintext IP message based on the quantum true random number to form a true random data block, and taking the quantum true random data block as another true random data block; then, based on two different encryption keys which are independently negotiated for link transmission encryption, the two truly randomized data blocks are encrypted in groups by adopting a group encryption algorithm to form two group encrypted data blocks; wherein:
when the IP encryption processing device executes IP encryption on a plaintext IP message, the following processing steps are adopted:
firstly, based on a block encryption key k3, carrying out block encryption of a hidden format on the whole plaintext IP message including an IP header to form a secret state covering data block with the same length as the plaintext IP message;
secondly, a quantum true random data block which is generated by a quantum random number generator in real time and has the same length as a plaintext IP message is used as a true random data block which is input by link transmission block encryption; simultaneously, carrying out exclusive-or encryption operation on the secret state covering data block byte by using the quantum true random data block to form another true random data block input by link transmission grouping encryption;
thirdly, based on the block encryption keys k1 and k2, the true randomized data block is encrypted in a block mode to form cipher text load data of the IP message transmitted by the link, a standard IP protocol head is sealed again to form two IP secret state messages, wherein the IP secret state message sequence number domain encrypted by using k1 is set as an increasing odd sequence number value, the IP secret state message sequence number domain encrypted by using k2 is set as an increasing even sequence number value, and the difference value of the two IP secret state message sequence numbers is 1; then, the two IP secret state messages are sent to the public Internet and forwarded and transmitted to a target IP cipher machine through a routing relay;
when the IP decryption processing device receives the IP secret message, the following steps are adopted:
firstly, stripping off an IP head packaged in tunnel transmission;
secondly, for the IP secret state message corresponding to the odd sequence number, carrying out packet decryption operation on the cipher text load based on a key k1 to obtain a true randomized data block output by link transmission packet decryption; for the IP secret state message corresponding to the even sequence number, carrying out packet decryption operation on the cipher text load based on a key k2 to obtain another true randomized data block output by link transmission packet decryption;
thirdly, executing logical exclusive-or operation byte by byte on the link transmission true randomized data block with the two parity serial numbers being collected, and recovering the full IP block encrypted data;
and fourthly, based on the key k3, carrying out grouping decryption operation on the all-IP grouping encrypted data block obtained by the XOR decryption operation, and recovering the plaintext IP message.
CN201910452106.8A 2019-05-28 2019-05-28 High-safety IP secret communication method based on true random stream exclusive or encryption Active CN110213257B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910452106.8A CN110213257B (en) 2019-05-28 2019-05-28 High-safety IP secret communication method based on true random stream exclusive or encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910452106.8A CN110213257B (en) 2019-05-28 2019-05-28 High-safety IP secret communication method based on true random stream exclusive or encryption

Publications (2)

Publication Number Publication Date
CN110213257A CN110213257A (en) 2019-09-06
CN110213257B true CN110213257B (en) 2021-07-09

Family

ID=67789199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910452106.8A Active CN110213257B (en) 2019-05-28 2019-05-28 High-safety IP secret communication method based on true random stream exclusive or encryption

Country Status (1)

Country Link
CN (1) CN110213257B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110798311B (en) * 2019-10-15 2021-12-17 中国电子科技集团公司第三十研究所 IP encryption method for realizing one-time pad based on quantum true random number matrix

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918243A (en) * 2015-06-15 2015-09-16 上海交通大学 Mobile terminal secrecy system and method based on quantum true random number
CN205812031U (en) * 2016-07-07 2016-12-14 上海交通大学 The secrecy remotely controlled for Internet of Things controls device
CN106612176A (en) * 2016-12-16 2017-05-03 中国电子科技集团公司第三十研究所 Negotiation system and negotiation method based on quantum truly random number negotiation secret key
CN109639650A (en) * 2018-11-21 2019-04-16 中国电子科技集团公司第三十研究所 Secret communication method based on grouping longitudinal random subdivision and path separated transmission

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9887835B2 (en) * 2015-08-05 2018-02-06 TransferSoft, Inc. Symmetric stream cipher
WO2017035268A1 (en) * 2015-08-24 2017-03-02 Ricardo Richard Frederick Data obfuscation method and service using unique seeds
KR20180136628A (en) * 2017-06-15 2018-12-26 채서령 The quantum security panel by quantum random numbers generator and pseudo random numbers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918243A (en) * 2015-06-15 2015-09-16 上海交通大学 Mobile terminal secrecy system and method based on quantum true random number
CN205812031U (en) * 2016-07-07 2016-12-14 上海交通大学 The secrecy remotely controlled for Internet of Things controls device
CN106612176A (en) * 2016-12-16 2017-05-03 中国电子科技集团公司第三十研究所 Negotiation system and negotiation method based on quantum truly random number negotiation secret key
CN109639650A (en) * 2018-11-21 2019-04-16 中国电子科技集团公司第三十研究所 Secret communication method based on grouping longitudinal random subdivision and path separated transmission

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"量子通信系统中关键技术研究";朱武;《中国优秀硕士学位论文全文数据库-基础科学辑》;20180415;全文 *

Also Published As

Publication number Publication date
CN110213257A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110071943B (en) Compound high-safety IP secret communication method with truly random change of secret key
CN110011786B (en) High-safety IP secret communication method
US8687800B2 (en) Encryption method for message authentication
CN112235112B (en) Zero-semantic and one-time pad-based IP encryption method, system and storage medium
CN110798311B (en) IP encryption method for realizing one-time pad based on quantum true random number matrix
WO2007059558A1 (en) Wireless protocol for privacy and authentication
Alkady et al. A new security protocol using hybrid cryptography algorithms
CN112073115B (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
CN106850191A (en) The encryption and decryption method and device of distributed memory system communication protocol
CN113726725A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN116321129A (en) Lightweight dynamic key-based power transaction private network communication encryption method
Amorado et al. Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques
Prajwal et al. User defined encryption procedure for IDEA algorithm
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN110022204B (en) Method for enhancing security of file secret communication based on content true randomization segmentation
CN107666491A (en) The data transmission method of air-ground integrated network based on symmetric cryptography
Kent Encryption-based protection for interactive user/computer communication
CN110213257B (en) High-safety IP secret communication method based on true random stream exclusive or encryption
CN114124416B (en) System and method for quickly exchanging data between networks
Li et al. Mimic encryption system for network security
CN116980194A (en) Safe and efficient data transmission method and system based on cloud edge end cooperation
Forhad et al. An improvement of advanced encryption standard
Sabuwala et al. Securing unmanned aerial vehicles by encrypting mavlink protocol
Zuo et al. A novel software-defined network packet security tunnel forwarding mechanism
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant