CN113691370B - Method and device for quantum secure communication - Google Patents

Method and device for quantum secure communication Download PDF

Info

Publication number
CN113691370B
CN113691370B CN202110849002.8A CN202110849002A CN113691370B CN 113691370 B CN113691370 B CN 113691370B CN 202110849002 A CN202110849002 A CN 202110849002A CN 113691370 B CN113691370 B CN 113691370B
Authority
CN
China
Prior art keywords
key
modulation
ciphertext
quantum
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110849002.8A
Other languages
Chinese (zh)
Other versions
CN113691370A (en
Inventor
赖俊森
吴冰冰
刘璐
汤瑞
赵鑫
汤晓华
赵文玉
张海懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202110849002.8A priority Critical patent/CN113691370B/en
Publication of CN113691370A publication Critical patent/CN113691370A/en
Application granted granted Critical
Publication of CN113691370B publication Critical patent/CN113691370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The application relates to the technical field of quantum communication, and discloses a method for quantum secret communication, which is applied to a quantum secret communication sending end and comprises the following steps: distributing QKD by using the quantum key to generate an initial key; expanding the initial key to obtain a data key and a modulation key; encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal; generating a modulation control signal using the modulation key; and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end. The data layer encryption is realized by encrypting the plaintext electric signals by using the data key to obtain ciphertext electric signals, the modulation control signals generated by using the modulation key are used for performing electro-optical modulation on the ciphertext electric signals to realize physical layer encryption, and the security of quantum secret communication is improved due to the adoption of double encryption on the physical layer and the data layer. The application also discloses a device for quantum secure communication.

Description

Method and device for quantum secret communication
Technical Field
The present application relates to the field of quantum communication technology, and for example, to a method and an apparatus for quantum secure communication.
Background
At present, quantum communication is in a rapid development stage, new technologies emerge endlessly, and with continuous progress of quantum communication hardware, software and a matching platform, the attraction of quantum communication to the industry is promoted. In order to improve the security and confidentiality of quantum communication, encrypting a plaintext electric signal in the quantum communication process is an indispensable link. The QKD (Quantum key Distribution) technology can provide Quantum key generation and sharing of information theory safety of a theoretical protocol level for a transmitting end and a receiving end, a typical QKD system comprises a discrete variable based on a Quantum key Distribution protocol BB84 and a continuous variable based on a coherent state continuous variable Quantum key Distribution protocol GG02, and the two continuous variables are respectively suitable for different application scenes. After obtaining the quantum key shared by the transmitting end and the receiving end, the existing quantum secure communication system generally adopts an encryption virtual private network device or an encryption router based on an IPSec (Internet Protocol Security) Protocol as an encryption application device to encrypt a data layer of a plaintext electrical signal, and then transmits a ciphertext signal.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art: in the prior art, the plaintext electric signal is directly transmitted only by single encryption, so that the security of quantum communication transmission is low.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method and a device for quantum secure communication, so as to improve the security of quantum secure communication transmission.
In some embodiments, the method for quantum secure communication is applied to a quantum secure communication sending end, and the method includes: distributing QKD by using the quantum key to generate an initial key; expanding the initial key to obtain a data key and a modulation key; encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal; generating a modulation control signal using the modulation key; and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end.
In some embodiments, the method for quantum secure communication is applied to a quantum secure communication receiving end, and the method includes: generating an initial key by using Quantum Key Distribution (QKD); expanding the initial key to obtain a data key and a modulation key; generating a demodulation control signal by using the modulation key; demodulating the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; and decrypting the ciphertext electric signal by using the data secret key to obtain a plaintext electric signal.
In some embodiments, the apparatus for quantum secure communication is applied to a quantum secure communication sending end, and the apparatus includes: a quantum key distribution sending module configured to generate an initial key using Quantum Key Distribution (QKD); a sender key expansion module configured to expand the initial key to obtain a data key and a modulation key; the data encryption module is configured to encrypt a plaintext electric signal by using the data key to obtain a ciphertext electric signal; a randomized modulation spreading module configured to generate a modulation control signal using the modulation key; and the electro-optical modulation module is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to a quantum secret communication receiving end.
In some embodiments, the apparatus for quantum secure communication is applied to a quantum secure communication receiving end, and the apparatus includes: a quantum key distribution receiving module configured to generate an initial key using a Quantum Key Distribution (QKD); a receiver key expansion module configured to expand the initial key to obtain a data key and a modulation key; a randomized demodulation adaptation module configured to generate a demodulation control signal using the modulation key; the photoelectric detection demodulation module is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; and the data decryption module is configured to decrypt the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
The method and the device for quantum secret communication provided by the embodiment of the disclosure can realize the following technical effects: the method comprises the steps of generating an initial key through Quantum Key Distribution (QKD), expanding the initial key to obtain a data key and a modulation key, encrypting a plaintext electric signal by using the data key to obtain a ciphertext electric signal to realize data layer encryption, generating a modulation control signal by using the modulation key, and electro-optically modulating the ciphertext electric signal by using a modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the accompanying drawings and not in limitation thereof, in which elements having the same reference numeral designations are shown as like elements and not in limitation thereof, and wherein:
FIG. 1 is a schematic diagram of a method for quantum secure communication provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of another method for quantum secure communication provided by embodiments of the present disclosure;
FIG. 3 is a timing diagram of another method for quantum secure communication provided by embodiments of the present disclosure;
FIG. 4 is a schematic diagram of an apparatus for quantum secure communication provided by embodiments of the present disclosure;
fig. 5 is a schematic diagram of a system for quantum secure communication according to an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and advantages of the embodiments of the present disclosure can be understood in detail, a more particular description of the embodiments of the disclosure, briefly summarized above, may be had by reference to the appended drawings, which are included to illustrate, but are not intended to limit the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
The terms "first," "second," and the like in the description and claims of the embodiments of the disclosure and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged as appropriate for the embodiments of the disclosure described herein. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion.
The term "plurality" means two or more, unless otherwise specified.
In the embodiment of the present disclosure, the character "/" indicates that the preceding and following objects are in an or relationship. For example, A/B represents: a or B.
The term "and/or" is an associative relationship that describes objects, meaning that three relationships may exist. E.g., a and/or B, represents: a or B, or A and B.
The term "correspond" may refer to an association or binding relationship, and a corresponds to B refers to an association or binding relationship between a and B.
With reference to fig. 1, an embodiment of the present disclosure provides a method for quantum secure communication, where the method is applied to a quantum secure communication sending end, and the method includes:
and S101, the quantum secret communication sending end generates an initial key by using the quantum key distribution QKD.
And S102, the quantum secret communication sending end expands the initial key to obtain a data key and a modulation key.
And step S103, the quantum secret communication sending end encrypts the plaintext electric signal by using the data secret key to obtain a ciphertext electric signal.
And step S104, the quantum secret communication sending end generates a modulation control signal by using the modulation key.
And S105, electro-optically modulating the ciphertext electric signal by the quantum secret communication sending end by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to the quantum secret communication receiving end.
By adopting the method for quantum secret communication provided by the embodiment of the disclosure, an initial key can be generated by quantum key distribution QKD, the initial key is expanded to obtain a data key and a modulation key, then a plaintext electric signal is encrypted by the data key to obtain a ciphertext electric signal to realize data layer encryption, a modulation control signal is generated by the modulation key, and the ciphertext electric signal is electro-optically modulated by the modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
The quantum key distribution QKD can realize the quantum key distribution function of both a quantum secret communication sending end and a quantum secret communication receiving end based on the basic functions and methods of the quantum state optical signal transmission, the synchronous or local oscillator signal transmission, the negotiation signal transmission and the like, realize end-to-end key generation, provide an initial key for the quantum secret communication and store the initial key. Optionally, the generation rate of the initial key is greater than or equal to 10kbit/s.
Optionally, the initial key is a random data stream. Therefore, the data key and the modulation key obtained by expanding the initial key are random data, the plaintext electric signal is encrypted by the data key of the random data to obtain the ciphertext electric signal, then the modulation control signal is generated by the modulation key of the random data, the ciphertext electric signal is subjected to electro-optical modulation by the modulation control signal to obtain the ciphertext optical signal, the randomness of the ciphertext optical signal is increased, and the safety and the confidentiality of quantum secret communication are improved.
Optionally, the modulation method of the electro-optical modulation includes: modulation methods such as Amplitude Modulation (AM), phase Modulation (PM), and Quadrature Amplitude Modulation (QAM). Different modulation modes enable ciphertext optical signals to be distributed randomly in dimensions such as amplitude, phase or orthogonal phase. Therefore, the secondary encryption of the ciphertext signals in the optical domain is realized, the ciphertext optical signals can be hidden in channel quantum noise, such as shot noise of a detector, the difficulty of eavesdropping and storing the ciphertext optical signals is increased, and the safety and the confidentiality of quantum secret communication are improved.
Optionally, the quantum secure communication sending end expands the initial key to obtain a data key and a modulation key, including: the quantum secret communication sending end intercepts two different groups from the initial key, and respectively expands the intercepted two groups to obtain a data key and a modulation key.
Optionally, intercepting two different packets from the initial key, and spreading the two intercepted packets respectively to obtain a data key and a modulation key, including: continuously intercepting two different groups from the initial key every other preset time length to obtain a first group key and a second group key; expanding the first group key through a key expansion algorithm corresponding to the high three-bit data of the first group key to obtain a data key; and expanding the second grouping key through a key expansion algorithm corresponding to the high three-bit data of the second grouping key to obtain a modulation key. Optionally, the length of the first packet key is the same as the length of the second packet key. For example: are 256bits each. Optionally, the preset time duration is in the order of hundred milliseconds, that is, the rate of generating the first packet key and the second packet key is 10 times per second, so that the first packet key and the second packet key are updated. Under the condition that the length of the first grouping key and the length of the second grouping key are 256bits and the updating rate of the first grouping key and the second grouping key is 10 times per second, the requirements of key consistency and key randomness can be met, and the safety of quantum secret communication is high.
Optionally, the key expansion algorithm includes a first feedback control function, and the expanding is performed on the first group key through a key expansion algorithm corresponding to the upper three bits of data of the first group key, so as to obtain the data key, including: acquiring high three-bit data of a first packet key; matching a first feedback control function corresponding to the high three-bit data of the first packet key in a preset first algorithm lookup table; expanding the first packet key by using a first feedback control function to obtain a data key; the preset first algorithm lookup table stores the corresponding relation between the upper three-bit data of the first packet key and the first feedback control function.
Optionally, the key spreading algorithm includes a second feedback control function, and the spreading is performed on the second grouping key by using a key spreading algorithm corresponding to the upper three bits of the second grouping key to obtain the modulation key, including: acquiring high three-bit data of a second grouping key; matching a second feedback control function corresponding to the high three-bit data of the second grouping key in a preset second algorithm lookup table; expanding the second grouped key by using a second feedback control function to obtain a modulation key; the preset second algorithm lookup table stores the corresponding relation between the high three-bit data of the second grouping key and the second feedback control function.
Optionally, the first algorithm lookup table and the second algorithm lookup table are the same table, and the first algorithm lookup table and the second algorithm lookup table are stored in the linear feedback shift register. Optionally, 8 feedback control functions are stored in the linear feedback shift register.
Optionally, the key expansion algorithm is implemented by a linear feedback shift register. Therefore, the key expansion algorithm realized through the linear feedback shift register can respectively expand the first grouping key and the second grouping key, meanwhile, the output rates of the data key and the modulation key can be determined according to the speed of the plaintext electric signal, the output rates of the data key and the modulation key are improved, the output rates of the data key and the modulation key are larger than or equal to the speed of the plaintext electric signal, the speed matching among the data key, the modulation key and the plaintext electric signal is realized, and the plaintext electric signal is conveniently encrypted through the data key and the modulation key.
Two different groups are continuously intercepted from the initial key every preset time length, namely, a new first group key and a new second group key are obtained every preset time length, the first feedback control function and the second feedback control function are respectively matched again through the upper three-bit data of the updated first group key and the second group key, and the updated first group key and the updated second group key are respectively expanded according to the new first feedback control function and the new second feedback control function, so that a new data key and a new modulation key are obtained. Therefore, the initial key is provided through the QKD, the initial key is intercepted every other preset time length, a real-time updating function of the initial key is provided, the data key and the modulation key are updated according to the updated initial key, the reuse rate of the data key and the modulation key is reduced, the security of encrypting plaintext information can be improved, and the security of quantum secret communication is improved.
Optionally, the quantum secure communication sending end encrypts the plaintext electric signal by using the data key, and includes: the quantum secret communication sending end carries out bit-by-bit exclusive-OR logic operation on the received plain text electric signals by using the data key. Because the data key is matched with the speed of the plaintext electric signal, the data key can be used for carrying out bit-by-bit XOR logic operation on the received plaintext electric signal, the initial key is updated and expanded in real time, the expanded data key is used for carrying out bit-by-bit XOR encryption on the plaintext electric signal to obtain the ciphertext electric signal, the encryption of a plaintext electric signal data layer is realized, the polarity scrambling on the plaintext signal is completed, the modulation key is convenient to carry out electro-optical modulation on the ciphertext electric signal, and the safety and the confidentiality of quantum secret communication are further improved.
Optionally, the quantum secure communication sending end generates the modulation control signal by using the modulation key, including: a quantum secret communication sending end generates a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the modulation control signal.
Optionally, generating a modulation basis vector combination of the half-amplitude modulation domain includes: acquiring a preset modulation domain; will be adjustedAnd the domain making is divided into M groups of modulation basis vector combinations of the half-amplitude modulation domains. Alternatively, 12 ≦ M ≦ 16. In some embodiments, M =12, the number of combinations of spreading values of the corresponding modulation domains is 2 12 I.e., 4096. The larger M is, the more modulation basis vector combinations are, the larger the number of combinations of spreading values of the corresponding modulation domains is, and the more ciphertext optical signals can be hidden in sub-noise such as thermal noise and shot noise of the system. For example, M is 12, 13, 14, 15 or 16, so that the effect of electro-optical modulation can be ensured without being limited by hardware circuits.
Optionally, the grouping of the plurality of modulation keys is obtained by segmenting the modulation key. Optionally, the length of the packet of the modulation key is M.
Optionally, selecting a polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the packet of the modulation key to obtain the modulation control signal includes: determining a corresponding first mapping signal according to a modulation mode of electro-optical modulation; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key, and obtaining the modulation control signal according to the first mapping signal and the polarity of each modulation basis vector in the modulation basis vector combination. The modulation bias point and the modulation amplitude can be set through the modulation key, so that while the modulation control signal is obtained, the polarity of the modulation basis vector can be calibrated by configuring the quantum secret communication sending end and the quantum secret communication receiving end according to the high bit of the group of the modulation key, only the quantum secret communication receiving end can correctly judge the received ciphertext optical signal, and the safety of quantum secret communication is improved.
Optionally, in a case that the modulation mode of the electro-optical modulation is intensity modulation, the first mapping signal is a bias voltage distribution signal; under the condition that the modulation mode of the electro-optical modulation is phase modulation, the first mapping signal is a phase modulation voltage amplitude signal; when the modulation method of the electro-optical modulation is quadrature amplitude modulation, the first mapping signal is a quadrature electric field signal distribution signal.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is reversed.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
In this way, the polarity of each modulation basis vector in the modulation basis vector combination is controlled by the high bit controlled by the modulation key, the polarity of each modulation basis vector is randomly selected, and because each group of combinations still has 1/2 modulation domain amplitude, the quantum secret communication receiving end is not influenced by noise when performing receiving judgment, the difference between the modulation domain amplitudes of adjacent combinations is small, and under the condition of no modulation key, a ciphertext optical signal is hidden in sub-noise such as thermal noise and shot-bounce noise of a system, so that the quantum secret communication receiving end cannot perform correct receiving judgment. Meanwhile, the modulation key is matched with the speed of the plaintext electric signal and is random data, so that the modulation key can be used for randomly selecting the polarity of each modulation basis vector in the modulation basis vector combination, the ciphertext electric signal can be subjected to electro-optical modulation, a modulated ciphertext optical signal with a randomized modulation domain expansion is obtained, the physical layer encryption of the ciphertext electric signal is realized, and the security of quantum secret communication is improved.
With reference to fig. 2, another method for quantum secure communication is provided in an embodiment of the present disclosure, where the method is applied to a quantum secure communication receiving end, and the method includes:
step S201, the quantum secret communication receiving end generates an initial key by using quantum key distribution QKD.
Step S202, the quantum secret communication receiving end expands the initial key to obtain a data key and a modulation key.
In step S203, the quantum secure communication receiving end generates a demodulation control signal by using the modulation key.
And step S204, the quantum secret communication receiving end demodulates the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal.
And S205, the quantum secret communication receiving end decrypts the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
By adopting the method for quantum secure communication provided by the embodiment of the disclosure, an initial key can be generated by quantum key distribution QKD, the initial key is expanded to obtain a data key and a modulation key, then a demodulation control signal is generated by using the modulation key, a detected ciphertext optical signal is demodulated by using the demodulation control signal to obtain a ciphertext electric signal to realize decryption of a physical layer, the ciphertext electric signal is decrypted by using the data key to obtain a plaintext electric signal to realize decryption of a data layer, and thus the plaintext electric signal is recovered. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the safety of the quantum secret communication is improved.
The quantum key distribution QKD can realize the quantum key distribution function of both a quantum secret communication sending end and a quantum secret communication receiving end based on the basic functions and methods of the quantum key distribution QKD such as quantum state optical signal transmission, synchronous or local oscillation signal transmission, negotiation signal transmission and the like, realize end-to-end key generation, provide an initial key for quantum secret communication, and store the initial key. Optionally, the generation rate of the initial key is greater than or equal to 10kbit/s.
Optionally, the initial key is a random data stream. Thus, the data key and the modulation key obtained by spreading the initial key are both random data.
Optionally, the initial key of the quantum secure communication receiving end is the same as the initial key of the quantum secure communication transmitting end. Thus, the same data key and the same modulation key can be generated according to the same initial key, so that a plaintext electric signal can be recovered by receiving and decrypting the received ciphertext optical signal.
Optionally, the demodulation method of the electro-optical demodulation corresponds to the modulation method of the electro-optical modulation of the quantum secret communication sending end.
Optionally, the quantum secure communication receiving end expands the initial key to obtain a data key and a modulation key, including: the quantum secret communication receiving end intercepts two different groups from the initial key, and respectively expands the two intercepted groups to obtain a data key and a modulation key.
The method for intercepting the initial key at the receiving end of the quantum secret communication is the same as the method for intercepting the initial key at the sending end of the quantum secret communication, and is not described herein again. That is, the first packet key and the second packet key intercepted at the quantum secret communication receiving end for the initial key are the same as the first packet key and the second packet key intercepted at the quantum secret communication transmitting end for the initial key, respectively. Then, the data key obtained by the quantum secret communication receiving end expanding the initial key is the same as the data key obtained by the quantum secret communication sending end expanding the initial key. The modulation key obtained by the quantum secret communication receiving end expanding the initial key is the same as the modulation key obtained by the quantum secret communication sending end expanding the initial key.
Optionally, the quantum secure communication receiving end generates the demodulation control signal by using the modulation key, including: a quantum secret communication receiving end generates a modulation basis vector combination of a half-amplitude modulation domain; and the quantum secret communication receiving end selects the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a demodulation control signal.
Optionally, generating a modulation basis vector combination of the half-amplitude modulation domain includes: acquiring a preset modulation domain; and dividing the modulation domain into M groups of modulation basis vector combinations of the half-amplitude modulation domain. Optionally, M ≦ 12 ≦ 16. In some embodiments, M =12, the number of combinations of spreading values of the corresponding modulation domains is 2 12 4096.
Optionally, the grouping of the plurality of modulation keys is obtained by segmenting the modulation key. Optionally, the length of the packet of the modulation key is M.
Optionally, selecting a polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the packet of the modulation key to obtain the demodulation control signal, including: selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key; determining a corresponding second mapping signal according to the modulation mode of the electro-optical modulation; and obtaining a demodulation control signal according to the polarity of each modulation basis vector in the modulation basis vector combination and the second mapping signal.
Optionally, when the modulation mode of the electro-optical modulation is intensity modulation, the second mapping signal is a detection decision voltage signal; when the modulation mode of the electro-optical modulation is phase modulation, the second mapping signal is a phase interference control voltage signal; and when the modulation mode of the electro-optical modulation is quadrature amplitude modulation, the first mapping signal is a quadrature electric field signal decision combination signal.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is reversed.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
Alternatively, the method for selecting the polarity of each modulation basis vector in the modulation basis vector combination used in the quantum secret communication receiving end is the same as the method for selecting the polarity of each modulation basis vector in the modulation basis vector combination used in the quantum secret communication transmitting end.
Therefore, the same modulation basis vector combination is generated through the same modulation signals of the quantum secret communication receiving end and the quantum secret communication sending end, the detected and demodulated ciphertext optical signal can be judged and recovered, the ciphertext electric signal which is the same as the quantum secret communication receiving end is obtained, the physical layer decryption of the ciphertext optical signal is realized, and the second decryption of the ciphertext electric signal by using the data secret key is facilitated. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the safety of quantum secret communication is improved.
Optionally, the decrypting the ciphertext electric signal by the quantum secure communication receiving end using the data key includes: and the quantum secret communication receiving end performs bit-by-bit exclusive OR logic operation on the ciphertext electric signal by using the data key. The cipher text electric signal and the data key are subjected to bit-by-bit XOR logic operation at the quantum secret communication receiving end, the cipher text electric signal can be recovered to be a plaintext electric signal, secondary decryption is achieved, the quantum secret communication receiving end decrypts the cipher text optical signal twice to obtain the plaintext electric signal, and safety of quantum secret communication is improved.
In some embodiments, as shown in fig. 3, a method for quantum secure communication according to an embodiment of the present disclosure includes:
and S301, the quantum secret communication sending end generates an initial key by using Quantum Key Distribution (QKD).
And S302, the quantum secret communication receiving end generates an initial key by using the quantum key distribution QKD.
S303, the quantum secret communication sending end expands the initial key to obtain a data key and a modulation key;
s304, the quantum secret communication receiving end expands the initial key to obtain a data key and a modulation key.
S305, the quantum secret communication sending end uses the data secret key to carry out bit-by-bit logic operation on the plaintext electric signal to obtain the ciphertext electric signal.
S306, the quantum secret communication sending end uses the modulation key to generate a modulation control signal, and the ciphertext electric signal is modulated to obtain a ciphertext optical signal.
S307, the quantum secret communication sending end sends the ciphertext optical signal to the quantum secret communication receiving end.
S308, receiving the ciphertext optical signal by the quantum secret communication receiving end; and generating a demodulation control signal by using the modulation key, demodulating the ciphertext optical signal and recovering the ciphertext electric signal.
And S309, the quantum secret communication receiving end performs bit-by-bit logic operation on the ciphertext electric signal by using the data key to recover the plaintext electric signal.
With reference to fig. 4, an embodiment of the present disclosure provides an apparatus for quantum secure communication, where the apparatus is applied to a quantum secure communication sending end, and the apparatus includes: the system comprises a quantum key distribution sending module 1, a sender key expansion module 2, a data encryption module 3, a randomization modulation expansion module 4 and an electro-optical modulation module 5. The quantum key distribution transmission module 1 is configured to generate an initial key using quantum key distribution QKD; the sender key expansion module 2 is configured to expand the initial key to obtain a data key and a modulation key; the data encryption module 3 is configured to encrypt the plaintext electric signal by using a data key to obtain a ciphertext electric signal; the randomized modulation spreading module 4 is configured to generate a modulation control signal using a modulation key; the electro-optical modulation module 5 is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to the quantum secret communication receiving end.
The device for quantum secret communication provided by the embodiment of the disclosure is beneficial to generating an initial key by Quantum Key Distribution (QKD), expanding the initial key to obtain a data key and a modulation key, encrypting a plaintext electric signal by using the data key to obtain a ciphertext electric signal to realize data layer encryption, generating a modulation control signal by using the modulation key, and electro-optically modulating the ciphertext electric signal by using the modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
Optionally, the sender key expansion module is configured to expand the initial key to obtain the data key and the modulation key by: two different packets are intercepted from the initial key, and the two intercepted packets are respectively expanded to obtain a data key and a modulation key.
Optionally, the data encryption module is configured to encrypt the plaintext electrical signal with the data key by: and carrying out bit-by-bit exclusive-or logic operation on the plain-text electric signal by using the data key.
Optionally, the randomized modulation spreading module is configured to generate the modulation control signal using the modulation key by: generating a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the modulation control signal.
With reference to fig. 4, an embodiment of the present disclosure provides an apparatus for quantum secure communication, applied to a quantum secure communication receiving end, where the apparatus includes: the system comprises a quantum key distribution receiving module 6, a receiver key expansion module 7, a randomization demodulation adaptation module 8, a photoelectric detection demodulation module 9 and a data decryption module 10. The quantum key distribution receiving module 6 is configured to generate an initial key using quantum key distribution QKD; the receiver key expansion module 7 is configured to expand the initial key to obtain a data key and a modulation key; the randomized demodulation adaptation module 8 is configured to generate a demodulation control signal using the modulation key; the photoelectric detection demodulation module 9 is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; the electro-optical modulation module 10 is configured to decrypt the ciphertext electrical signal with the data key to obtain a plaintext electrical signal.
By adopting the device for quantum secret communication provided by the embodiment of the disclosure, the initial key is generated by Quantum Key Distribution (QKD), the initial key is expanded to obtain the data key and the modulation key, the modulation key is used for generating the demodulation control signal, the demodulation control signal is used for demodulating the detected ciphertext optical signal to obtain the ciphertext electric signal to realize decryption of the physical layer, the data key is used for decrypting the ciphertext electric signal to obtain the plaintext electric signal to realize decryption of the data layer, and thus the plaintext electric signal is recovered. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the security of the quantum secret communication is improved.
Optionally, the receiver key expansion module is configured to expand the initial key to obtain the data key and the modulation key by: two different packets are intercepted from the initial key, and the intercepted two packets are respectively expanded to obtain a data key and a modulation key.
Optionally, the randomized demodulation adaptation module is configured to generate the demodulation control signal using the modulation key by: generating a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the demodulation control signal.
Optionally, the electro-optical modulation module is configured to decrypt the ciphertext electrical signal with a data key by: and carrying out bit-by-bit exclusive-or logic operation on the ciphertext electric signal by using the data key.
Optionally, the communication mode between the quantum secret communication sending end and the quantum secret communication receiving end is optical communication. The optical path for optical communication is indicated by a dotted line in fig. 4, and the implementation indicates the circuit.
With reference to fig. 5, an embodiment of the present disclosure provides a system for quantum secure communication, where the system includes a quantum secure communication transmitting end 11 and a quantum secure communication receiving end 12, where the quantum secure communication transmitting end 11 includes: a QKD transmitter 13, a first FPGA (Field Programmable Gate Array) control system 14, a data encoding encryptor 15, and a signal modulating encryptor 16. The quantum secure communication receiving end 12 includes: QKD receiver 17, second FPGA control system 18, signal demodulation detector 19, and data decoding decryptor 20. In fig. 5, a solid line represents a circuit, and a broken line represents an optical path.
The QKD system consisting of QKD transmitter 13 and QKD receiver 17 is configured to generate initial keys at a rate of 10kbit/s and group the initial keys to obtain a first group key and a second group key. The length of the first grouping key and the second grouping key is 256bits, the grouping frequency is 10 times per second, and the first grouping key and the second grouping key are updated.
The first FPGA control system 14 is configured to receive the first packet key and the second packet key; expanding the first grouping key and the second grouping key by utilizing a linear feedback shift register built in the first FPGA control system; obtaining dataA key and a modulation key. By expanding the first grouping key and the second grouping key, the output rates of the first grouping key and the second grouping key are improved, and the rates of the data key and the modulation key are matched with the rate of the plaintext electric signal. Optionally, the data key and the modulation key have the rate of 15Gbit/s and the period of 2^ s 256 -1. Optionally, the type of the feedback function stored in the linear feedback shift register is set to 8, the feedback function is randomly selected by the upper 3 bits of the first group key and the second group key, and after each update of the first group key and the second group key, the feedback function is replaced by the upper 3 bits of the updated first group key and the updated second group key, so as to provide a new data key and a new modulation key.
The data coding encryptor 15 is configured to receive a plaintext electric signal of 10GE-LAN (Gigabit Ethernet-local area network) with a clock rate of 12.5G; carrying out protocol extension of encryption communication on the plaintext electric signal, and increasing the clock rate of the plaintext electric signal to 15G; and carrying out bit-by-bit XOR operation on the plaintext electric signal after the protocol expansion and the data secret key to obtain a ciphertext electric signal. In this way, the polarity scrambling of the plaintext signal data is achieved.
The signal modulation encryptor 16 provides an intensity modulation based randomized spread modulation encryption function, the signal modulation encryptor 16 is configured to set the modulation voltage using the modulator built into the signal modulation encryptor, divide the modulation amplitude domain into 12 half-amplitude modulation basis vector combinations, provide 2^ 2 12 4096 sets of modulation domain spreading values; grouping the modulation keys to obtain a modulation key group with the length of 12 bits; and setting the output voltage of a digital-analog converter with 12bit resolution in a modulation controller built in the signal modulation encryptor, and converting the ciphertext electric signal into a ciphertext optical signal through intensity modulation. Wherein, in the case that the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
The second FPGA control system 18 is configured to receive the initial key; the data key and the modulation key are obtained using the same setup and method as the first FPGA control system 15.
The signal demodulation detector 19 is configured to perform ciphertext optical signal detection, i.e., signal sampling on the ciphertext optical signal by using an analog-to-digital converter (ADC) with a resolution of 12 bits, which is built in the signal demodulation detector 19; and performing photoelectric demodulation on the sampled ciphertext relation user. Optionally, in a signal decision stage of the photoelectric demodulation, a modulation domain expansion combination the same as that of the sender is generated, and according to the modulation key and the modulation domain expansion combination, the demodulation and reception of the ciphertext optical signal are realized, and the ciphertext electric signal is recovered.
The data decoding and decrypting device 20 is configured to perform bit-by-bit exclusive-or operation on the data key and the ciphertext electric signal and perform encryption communication protocol decoding to recover a plaintext electric signal of 10 GE-LAN.
Embodiments of the present disclosure provide a storage medium storing computer-executable instructions configured to perform the above-described method for quantum secure communications.
Embodiments of the present disclosure provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the above-described method for quantum secure communications.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes one or more instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and the drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. Furthermore, the words used in the specification are words of description for example only and are not limiting upon the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising a" \8230; "does not exclude the presence of additional like elements in a process, method or apparatus comprising the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses, and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be merely a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (8)

1. A method for quantum secure communication is applied to a quantum secure communication sending end, and the method comprises the following steps:
distributing QKD by using the quantum key to generate an initial key;
expanding the initial key to obtain a data key and a modulation key;
encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal;
generating a modulation basis vector combination of a half-amplitude modulation domain;
selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a modulation control signal;
and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end.
2. The method of claim 1, wherein spreading the initial key to obtain a data key and a modulation key comprises:
and intercepting two different groups from the initial key, and respectively expanding the intercepted two groups to obtain a data key and a modulation key.
3. The method of claim 1, wherein encrypting the plaintext electrical signal using the data key comprises:
and carrying out bit-by-bit exclusive-OR logic operation on the plain electric signals by utilizing the data key.
4. A method for quantum secure communication, which is applied to a quantum secure communication receiving end, the method comprising:
distributing QKD by using the quantum key to generate an initial key;
expanding the initial key to obtain a data key and a modulation key;
generating a modulation basis vector combination of a half-amplitude modulation domain;
selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a demodulation control signal;
demodulating the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; and decrypting the ciphertext electric signal by using the data secret key to obtain a plaintext electric signal.
5. The method of claim 4, wherein spreading the initial key to obtain a data key and a modulation key comprises:
and intercepting two different groups from the initial key, and respectively expanding the intercepted two groups to obtain a data key and a modulation key.
6. The method of claim 4, wherein decrypting the ciphertext electrical signal using the data key comprises:
and carrying out bit-by-bit exclusive OR logic operation on the ciphertext electric signal by using the data key.
7. An apparatus for quantum secure communication, applied to a quantum secure communication sending end to implement the method of any one of claims 1 to 3, the apparatus comprising:
a quantum key distribution sending module configured to generate an initial key using Quantum Key Distribution (QKD);
a sender key expansion module configured to expand the initial key to obtain a data key and a modulation key;
the data encryption module is configured to encrypt a plaintext electric signal by using the data key to obtain a ciphertext electric signal;
a randomized modulation spreading module configured to generate a modulation control signal using the modulation key;
and the electro-optical modulation module is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to a quantum secret communication receiving end.
8. An apparatus for quantum secure communication, which is applied to a quantum secure communication receiving end to implement the method of any one of claims 4 to 6, the apparatus comprising:
a quantum key distribution receiving module configured to generate an initial key using a Quantum Key Distribution (QKD);
a receiver key expansion module configured to expand the initial key to obtain a data key and a modulation key;
a randomized demodulation adaptation module configured to generate a demodulation control signal using the modulation key;
the photoelectric detection demodulation module is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal;
and the data decryption module is configured to decrypt the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
CN202110849002.8A 2021-07-27 2021-07-27 Method and device for quantum secure communication Active CN113691370B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110849002.8A CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110849002.8A CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Publications (2)

Publication Number Publication Date
CN113691370A CN113691370A (en) 2021-11-23
CN113691370B true CN113691370B (en) 2023-01-13

Family

ID=78577906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110849002.8A Active CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Country Status (1)

Country Link
CN (1) CN113691370B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276824A (en) * 2022-07-26 2022-11-01 中国人民解放军国防科技大学 Quantum noise stream encryption transmitter, receiver, communication system and method
CN116647285B (en) * 2023-07-24 2023-10-10 之江实验室 Signal encryption and decryption system and method and communication system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040376A (en) * 2017-05-18 2017-08-11 烽火通信科技股份有限公司 A kind of method and system of quantum secure optic communication
CN107769859A (en) * 2017-10-19 2018-03-06 华中科技大学 A kind of security photo-communication system based on phase amplitude conversion
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
CN112073190A (en) * 2020-09-01 2020-12-11 上海循态信息科技有限公司 Quantum noise password communication method and system for randomly modulating phase and amplitude

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9905999B2 (en) * 2015-02-26 2018-02-27 California Institute Of Technology Optical frequency divider based on an electro-optical-modulator frequency comb

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040376A (en) * 2017-05-18 2017-08-11 烽火通信科技股份有限公司 A kind of method and system of quantum secure optic communication
CN107769859A (en) * 2017-10-19 2018-03-06 华中科技大学 A kind of security photo-communication system based on phase amplitude conversion
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
CN112073190A (en) * 2020-09-01 2020-12-11 上海循态信息科技有限公司 Quantum noise password communication method and system for randomly modulating phase and amplitude

Also Published As

Publication number Publication date
CN113691370A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
Cho et al. Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution
KR101446629B1 (en) Apparatus and method for secure data transmission in wireless communication system
US8995652B1 (en) Streaming one time pad cipher using rotating ports for data encryption
US7697687B2 (en) Streaming implementation of AlphaEta physical layer encryption
CN113691370B (en) Method and device for quantum secure communication
US10171238B2 (en) Secure data transmission using quantum communication
Rhouma et al. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem
CN110855438B (en) Quantum key distribution method and system based on annular QKD network
CN105577360A (en) OOFDM (Optical Orthogonal Frequency Division Multiplexing) encryption system based on chaos sequence mapping
Asaad et al. Partial image encryption using RC4 stream cipher approach and embedded in an image
US10756891B2 (en) Secure data communication
JP4889630B2 (en) Optical transmission apparatus and method for ciphertext transmission
CN114362928A (en) Quantum key distribution and reconstruction method for multi-node encryption
GB0028369D0 (en) A communication system
KR20060011999A (en) Des algorithm-based encryption method
JP2013021422A (en) Cipher transmission device
KR100797106B1 (en) Method for encrypting and decrypting transmmited and received packet in wireless lan
US7231048B2 (en) Key sharing system, public key cryptosystem, signature system, key sharing apparatus, encryption apparatus, decryption apparatus, signature apparatus, authentication apparatus, key sharing method, encryption method, decryption method, signature method, authentication method, and programs
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
Ahmad et al. Energy efficient sensor network security using Stream cipher mode of operation
JP2006157639A (en) Cipher transmitter
CN112615718B (en) Hash function-based key updating method for sequence cipher encryption system
Ahmad et al. Comparative study between stream cipher and block cipher using RC4 and Hill Cipher
CN112235071B (en) Safety encryption method based on FPGA modulation switching and optical communication device
KR20010008808A (en) Encryption method by scramble on wlan

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant